Security

Multiple Roles inherited from LDAP Group Memberships

dominiquevocat
SplunkTrust
SplunkTrust

I have several indexes and created a role in splunk for each index. We have a RBAC system in place to grant users group memberships in our eDirectory based MetaDirectory. I map each splunk role to a LDAP groupmembership.

If a user has only one groupmembership all works fine.
If a user receives a second group membership it is shown fine in the user overview in Splunk Administration
The user does however not see the content of the index to which it received access by the second (N'th) group membership.

I modeled the role such that they have access to one index, the capability search and rtsearch.

What am i doing wrong?

Tags (2)
1 Solution

dominiquevocat
SplunkTrust
SplunkTrust

The roles were configured via the GUI and i assigned indizes to the roles. Seemingly each role had a srchFilter entry in the authorize.conf which caused the problem. Manually clearing the srchFilter from the authorize.conf seems to solve the issue.

View solution in original post

dominiquevocat
SplunkTrust
SplunkTrust

The roles were configured via the GUI and i assigned indizes to the roles. Seemingly each role had a srchFilter entry in the authorize.conf which caused the problem. Manually clearing the srchFilter from the authorize.conf seems to solve the issue.

Get Updates on the Splunk Community!

Unlock Database Monitoring with Splunk Observability Cloud

  In today’s fast-paced digital landscape, even minor database slowdowns can disrupt user experiences and ...

Purpose in Action: How Splunk Is Helping Power an Inclusive Future for All

At Cisco, purpose isn’t a tagline—it’s a commitment. Cisco’s FY25 Purpose Report outlines how the company is ...

[Upcoming Webinar] Demo Day: Transforming IT Operations with Splunk

Join us for a live Demo Day at the Cisco Store on January 21st 10:00am - 11:00am PST In the fast-paced world ...