Configuring SAML for Splunk


This article is an add-on to our SAML configuration guide, supplementing the process described there with specific details and additional information unique to configuring SAML for the Splunk Enterprise SAML 2.0 app connector in OneLogin's app catalog.

Prerequisites

Table of Contents

 


 

App Search: Splunk

 


 

Certificate

In the main navigation menu, go to Security > Certificates > New to create a designated certificate in OneLogin for Splunk. Set Signature to SHA256 and ensure that Set the CA flag in the Basic Constraints extension to "true" and keyCertSign bit for KeyUsage is checked.

 


 

Configuration

Audience (EntityID)

Any string, e.g. splunk-saml.

SAML Consumer URL

https://{fqdn-server-name}:8000/saml/acs

Single Logout URL

https://{fqdn-server-name}:8000/saml/logout

Splunk Enterprise SAML Configuration

 


 

Parameters

Add a parameter with the following settings, then save:

Name

role

This value is case-sensitive; be sure to enter it exactly as shown, in lowercase.

Value

- Macro -

splunk-admin-role

This value is case-sensitive; be sure to enter it exactly as shown, in lowercase.

Flags Toggle Include in SAML assertion

Splunk Enterprise SAML Parameters page, Edit Field role

Splunk Enterprise SAML Parameters

 


 

Install Splunk Enterprise

  1. Download Splunk Enterprise and run the installer, leaving the defaults as-is. Note your admin credentials.
  2. Launch Splunk Enterprise and login with the admin credentials.
  3. Go to Indexes and create a New Index: e.g. “onelogin
  4. Go to Settings > Server settings > General settings.
    • Enter the server’s name to match a the FQDN URL in the Splunk Server name and Index Host name.
    • Check Enable SSL (HTTPS) in Splunk Web?
  5. Directly on the server, open CMD and change into C:\Program Files\Splunk\bin. Run splunk restart.
  6. Stop Splunk again by running splunk stop.
  7. Copy/paste your PEM certificates (certificate and private key) to C:\Program Files\Splunk\etc\auth\splunkweb. Rename the existing *.PEM to *PEM.OLD. Rename your copied PEM files and rename them to match the cert.pem and privkey.pem names.
  8. In CMD, run splunk start.
  9. At this stage, you can create a form-based connector in OneLogin to use this url: https://{FQDN-server-url}:8000/en-US/account/login?. At this point you should be logged in via the form admin/password.
  10. Go to Settings > Authentication methods.
  11. Select SAML from the External list and click Configure Splunk to use SAML.
  12. Click SAML Configuration and:
    • Import the OneLogin Metadata XML file.
    • Enter the value from the OneLogin Audience field into the Entity ID field, e.g “splunk-saml”
    • In the Advanced Settings section on the bottom of the page, enter the FQDN of the server.
    • This needs to match the Configuration details in OneLogin, e.g. “https://{fqdn-server-name}”. Leave any other option as such.
    • Save and return in the SAML Configuration and download the SP Metadata File to double check we have the same values.
  13. Click on New Group and create a new SAML group. Name it exactly as you have named your role parameter in Splunk (case-sensitive).
  14. Click settings > Authentication methods > Reload Authentication.

If you get errors, your certificates are not clean.