Security

Splunk Configuration of Password encryption and Complexity

rogerroger
New Member

I am trying to determine how SPLUNK passwords are stored using one way encryption. I am also trying to determine if I can change the SPLUNK complexity passwords requirements for users.

Tags (1)
0 Karma
1 Solution

martin_mueller
SplunkTrust
SplunkTrust

There's a setting in authentication.conf: http://docs.splunk.com/Documentation/Splunk/6.1.2/Admin/Authenticationconf

passwordHashAlgorithm = [SHA512-crypt|SHA256-crypt|SHA512-crypt-<num_rounds>|SHA256-crypt-<num_rounds>|MD5-crypt]

I believe the password requirements with built-in authentication is limited to requiring a certain length (same .conf):

minPasswordLength = <positive integer>

For more sophisticated complexity requirements you should use external authentication, such as Active Directory.

View solution in original post

martin_mueller
SplunkTrust
SplunkTrust

There's a setting in authentication.conf: http://docs.splunk.com/Documentation/Splunk/6.1.2/Admin/Authenticationconf

passwordHashAlgorithm = [SHA512-crypt|SHA256-crypt|SHA512-crypt-<num_rounds>|SHA256-crypt-<num_rounds>|MD5-crypt]

I believe the password requirements with built-in authentication is limited to requiring a certain length (same .conf):

minPasswordLength = <positive integer>

For more sophisticated complexity requirements you should use external authentication, such as Active Directory.

View solution in original post

msmith4
New Member

Best thing you can do there is SHA256-crypt-1000000 . This makes it almost impossible to guess passwords unless you have "Welcome-2016".

In our case we did not have the slow downs mentioned in the doc.

0 Karma
Register for .conf21 Now! Go Vegas or Go Virtual!

How will you .conf21? You decide! Go in-person in Las Vegas, 10/18-10/21, or go online with .conf21 Virtual, 10/19-10/20.