Splunk Enterprise

Changing from ProxySSO authentication to SAML

phamanth
Explorer

Inherited Splunk deployment.  Looks like authentication was setup with proxysso.  I am unfamiliar with this and we are planning on migrating the proxysso authentication to SAML.  
In the past, I have used the web UI for authentications like LDAP.  ProxySSO seems to be a backend conf file?

Not sure on how to proceed if there will be a conflict of just adding the SAML authentication method and will it simply override the ProxySSO configurations? 

Or does the ProxySSO conf need to be removed first and then saml configured?  If that is the case, what methods to remove?

Thank you

Labels (1)
0 Karma

isoutamo
SplunkTrust
SplunkTrust

Hi

I propose that you set up a test/lab system to test and document this change. There are some things which you need check and test.

  • Are you using REST api for current users? This works differently with SAML users
  • How you avoid that used user accounts / userIDs didn't change or if those have change, how to migrate
    • users private KOs
    • users schedules
    • something else which are depending on userID
  • Are you need CLI access with your old LDAP users. This didn't work with SAML account or at least it needs some additional scripts or something else?
  • Probably something else depending on which SAML idP you are using?

r. Ismo

0 Karma
Career Survey
First 500 qualified respondents will receive a $20 gift card! Tell us about your professional Splunk journey.

Can’t make it to .conf25? Join us online!

Get Updates on the Splunk Community!

Community Content Calendar, September edition

Welcome to another insightful post from our Community Content Calendar! We're thrilled to continue bringing ...

Splunkbase Unveils New App Listing Management Public Preview

Splunkbase Unveils New App Listing Management Public PreviewWe're thrilled to announce the public preview of ...

Leveraging Automated Threat Analysis Across the Splunk Ecosystem

Are you leveraging automation to its fullest potential in your threat detection strategy?Our upcoming Security ...