Configuring Roles » History » Version 10
Luke Murphey, 11/20/2012 10:34 PM
1 | 7 | Luke Murphey | {{>toc}} |
---|---|---|---|
2 | 7 | Luke Murphey | |
3 | 8 | Luke Murphey | h1. How Roles are Defined |
4 | 1 | Luke Murphey | |
5 | 8 | Luke Murphey | By default, successfully authenticated users are assigned the "user" role. However, this can be overridden several ways. Roles will be defined based on the first method which provides role information. |
6 | 8 | Luke Murphey | |
7 | 8 | Luke Murphey | Roles will be defined using the following (in order of decreasing precedence): |
8 | 8 | Luke Murphey | |
9 | 9 | Luke Murphey | # First, the app will check the radius_roles_map.csv lookup file for a entry |
10 | 8 | Luke Murphey | # Second, the app will try to find roles from the RADIUS server |
11 | 8 | Luke Murphey | # Finally, the app will use the default roles (defined in the setup screen) |
12 | 8 | Luke Murphey | |
13 | 8 | Luke Murphey | *Note:* if the account is associated with a local account on the host, then this account will be used (Splunk will not attempt to use scripted authentication if the user has an account on the local system). |
14 | 8 | Luke Murphey | |
15 | 8 | Luke Murphey | h1. Defining Roles in the radius_roles_map Lookup |
16 | 8 | Luke Murphey | |
17 | 8 | Luke Murphey | Roles can be defined in a lookup file. These roles will taken over roles from the RADIUS server and thus can be used to define roles even when the roles are not defined on the server. |
18 | 8 | Luke Murphey | |
19 | 8 | Luke Murphey | To define the roles in the lookup file, edit the file at *$SPLUNK_HOME\etc\apps\radius_auth\lookups\radius_roles_map.csv* with the username followed by the roles in a colon separated list. Below is an example: |
20 | 8 | Luke Murphey | |
21 | 8 | Luke Murphey | <pre> |
22 | 8 | Luke Murphey | username,roles |
23 | 8 | Luke Murphey | johndoe,user |
24 | 8 | Luke Murphey | janedoe,user:admin:power |
25 | 8 | Luke Murphey | </pre> |
26 | 8 | Luke Murphey | |
27 | 10 | Luke Murphey | You can view the file by running the following search: |
28 | 10 | Luke Murphey | |
29 | 10 | Luke Murphey | <pre> |
30 | 10 | Luke Murphey | | inputlookup append=t radius_roles_map |
31 | 10 | Luke Murphey | </pre> |
32 | 10 | Luke Murphey | |
33 | 8 | Luke Murphey | h1. Configuring Roles on the RADIUS Server |
34 | 8 | Luke Murphey | |
35 | 8 | Luke Murphey | By default, successfully authenticated users are assigned the "user" role. However, this can be overridden by creating a vendor specific attribute on the RADIUS server. The attribute should contain a string containing a colon or comma separated list of roles (like "admin:can_delete"). Re-run setup on the RADIUS auth app and configure the app to use the vendor code and vendor attribute ID you defined. |
36 | 3 | Luke Murphey | |
37 | 6 | Luke Murphey | If you are not sure what the attribute ID and vendor code being provided by the server is, run the following search after authenticating to see what attributes the app is receiving: |
38 | 6 | Luke Murphey | |
39 | 6 | Luke Murphey | index=_internal "Received the following fields upon login" sourcetype="radius_auth" |
40 | 6 | Luke Murphey | |
41 | 6 | Luke Murphey | h1. Configuring IAS (Microsoft Internet Authentication Service) |
42 | 6 | Luke Murphey | |
43 | 6 | Luke Murphey | Below are instructions for configuring IAS. |
44 | 1 | Luke Murphey | |
45 | 1 | Luke Murphey | h2. Open the IAS MMC Snap-In |
46 | 1 | Luke Murphey | |
47 | 1 | Luke Murphey | Start the "mmc" |
48 | 1 | Luke Murphey | |
49 | 1 | Luke Murphey | !Open_mmc_snap_in.png! |
50 | 1 | Luke Murphey | |
51 | 1 | Luke Murphey | h2. Open the Remote Access Policy |
52 | 1 | Luke Murphey | |
53 | 4 | Luke Murphey | Selected "Remote Access Policies" and open the appropriate policy. Then press the "Edit Profile" button and then click the "Advanced" tab. |
54 | 1 | Luke Murphey | |
55 | 1 | Luke Murphey | !Select_policy.png! |
56 | 1 | Luke Murphey | |
57 | 1 | Luke Murphey | h2. Create a New Attribute |
58 | 1 | Luke Murphey | |
59 | 4 | Luke Murphey | Press the "Add" button and create a new attribute with a name of "Vendor-Specific" and a vendor of "RADIUS Standard". |
60 | 1 | Luke Murphey | |
61 | 1 | Luke Murphey | !Select_attribute.png! |
62 | 1 | Luke Murphey | |
63 | 4 | Luke Murphey | Press "Add" under the list of attribute values. Set the vendor code to 27389 and click the radio button for "Yes. It conforms". |
64 | 4 | Luke Murphey | |
65 | 4 | Luke Murphey | !Set_vendor_code.png! |
66 | 4 | Luke Murphey | |
67 | 5 | Luke Murphey | Click "Configure Attribute" to edit the value. Set the "Vendor assigned attribute number" to 1. Select a format of string and set the value to a colon separated list of roles. |
68 | 1 | Luke Murphey | |
69 | 1 | Luke Murphey | !Edit_attribute.png! |
70 | 1 | Luke Murphey | |
71 | 1 | Luke Murphey | The created attribute should look something like this: |
72 | 1 | Luke Murphey | |
73 | 1 | Luke Murphey | !List_attributes.png! |