Access and roles Flashcards

1
Q

What authentication methods does Splunk support?

A
  • Built-in
  • LDAP
  • Multifactor authentication
  • SSO
  • Scripted authentication
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the most common authentication method?

A

LDAP with Active Directory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

In case there are two LDAPs configured, which one gets priority?

A

The first one in the list

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

List SSO options

A

SSO can be implemented with:

  • reverse proxy
  • proxy
  • SAML
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

List 4 SAML options

A

CA Siteminder, Okta, Ping Identity, Azure AD

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Give two examples for a scripted authentication?

A

RADIUS or PAM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Where is Splunk internals authentication placed?

A

/etc/passwd

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the difference between authentication and authorization, give examples.

A

authentication. conf describes the way the user gets authenticated (who are you and are you allowed to come in). Eg LDAP with AD configuration.
authorization. conf describes what the granted user can do, eg which indexes can be accessed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A customer wants to implement LDAP with AD, does he need to work on authentication.conf or authorization.conf?

A

authentication.conf

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What Authentication method always takes precedence when multiple methods are configured?

A

Built-in

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

In LDAP, what is a OU?

A

Organizational Unit

ex. ou=people, dc=splunk, dc=com

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What can you ask for from a system administrator to help with configuring Splunk with LDAP?

A

LDAP Data Interchange Format(LDIF)

This will allow you to review all of the attribute/value pairs associated with each and more identify things such as the “Base DN for users” and the “Base DN for groups”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How does authorization work in Splunk?

A
  • In order for a user to login they must have a User Account and A ROLE assigned.
  • Cannot assign Access/Capabilities to a user. They must be assigned to Roles.
  • Roles can only Assign Capabilites, Not Remove them.
  • Rest API Data Access Query
    https: //host:port/services/authorization/roles/admin
  • To faithfully restrict access to data it must be in its own index, and restricted from there. Search time obfuscation can be subverted
  • Create separate indexes for data with diffferent classifications, and User access levels
  • Default User Role has access to all Non-Internal indexes
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

If there are SSO or SAML problems and the login is not possible, what is your option?

A

Add to the login URI:

?login_type=splunk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is Role?

A

A collection of permissions and capabilities

A role is a handle for linking together access rights and capabilities

Cannot assign access/capabiltiies to a user. These must be assigned to roles. If a particular individual needs a specific capability or access, then a role must be created for that user, making it a role of one.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are some LDAP tools to help you?

A

GUI Apps:

  • Apache Directory Studio
  • Softerra LDAP Vrowser
  • ASDI Edit

Linux CLI:
-ldapsearch

17
Q

Can you disable capabilities inherited from parent roles?

A

No

18
Q

If SSO is configured, which does Splunk handle, Authentication or Authorization?

A

Authorization

19
Q

How do users inherit capabilities?

A

The user is given the highest level of abilities granted to any role to which they are assigned.

20
Q

What is the srchIndexesAllowed setting?

A

A list of indexes a role is allowed to search.

21
Q

What is role inheritance?

A

As a rule, members of multiple roles inherit properties from the role with the broadest permissions.

22
Q

What is the srchIndexesDefault setting?

A

A list of indexes to search when no index is specified.

23
Q

In LDAP, what is a CN?

A

Common Name

ex.cn: Peter Gibbons

24
Q

Which authentication method is natively not supported in Splunk? (needs to be scripted)

A

RADIUS