authorize.conf - Splunk Documentation (original) (raw)

This documentation does not apply to the most recent version of SplunkĀ® Enterprise. For documentation on the most recent version, go to the latest release.

The following are the spec and example files for authorize.conf.

Version 7.3.0

This file contains possible attribute/value pairs for creating roles in

authorize.conf. You can configure roles and granular access controls by

creating your own authorize.conf.

There is an authorize.conf in $SPLUNK_HOME/etc/system/default/. To set

custom configurations, place an authorize.conf in

$SPLUNK_HOME/etc/system/local/. For examples, see authorize.conf.example.

You must restart Splunk to enable configurations.

To learn more about configuration files (including precedence) please see

the documentation located at

http://docs.splunk.com/Documentation/Splunk/latest/Admin/Aboutconfigurationfiles

GLOBAL SETTINGS

Use the [default] stanza to define any global settings.

* You can also define global settings outside of any stanza, at the top

of the file.

* Each .conf file should have at most one default stanza. If there are

multiple default stanzas, attributes are combined. In the case of

multiple definitions of the same attribute, the last definition in

the file wins.

* If an attribute is defined at both the global level and in a specific

stanza, the value in the specific stanza takes precedence.

[default]

srchFilterSelecting =

[capability::]

[role_]

=

importRoles =

grantableRoles =

[role_power]

grantableRoles = role1;role2

and edit the role so that the 'edit_roles_grantable' capability is selected, and the 'edit_roles' capability is not selected,

then a user that has been assigned the 'power' role can make only the following access control changes on the instance:

srchFilter =

srchTimeWin =

srchDiskQuota =

srchJobsQuota =

rtSrchJobsQuota =

srchMaxTime =

srchIndexesDefault =

srchIndexesAllowed =

deleteIndexesAllowed =

cumulativeSrchJobsQuota =

cumulativeRTSrchJobsQuota =

federatedProviders =

Descriptions of Splunk system capabilities.

Capabilities are added to roles to which users are then assigned.

When a user is assigned a role, they acquire the capabilities added to that role.

[tokens_auth]

expiration = |never

disabled =

[capability::accelerate_datamodel]

[capability::run_multi_phased_searches]

[capability::admin_all_objects]

[capability::edit_tokens_settings]

[capability::change_authentication]

[capability::change_own_password]

[capability::delete_by_keyword]

[capability::dispatch_rest_to_indexers]

[capability::edit_deployment_client]

[capability::edit_deployment_server]

[capability::edit_dist_peer]

[capability::edit_encryption_key_provider]

[capability::request_pstacks]

[capability::edit_watchdog]

[capability::edit_forwarders]

[capability::edit_health]

[capability::edit_httpauths]

[capability::edit_indexer_cluster]

[capability::edit_indexerdiscovery]

[capability::edit_input_defaults]

[capability::edit_local_apps]

[capability::edit_monitor]

[capability::edit_modinput_winhostmon]

[capability::edit_modinput_winnetmon]

[capability::edit_modinput_winprintmon]

[capability::edit_modinput_perfmon]

[capability::edit_modinput_admon]

[capability::edit_roles]

[capability::edit_roles_grantable]

[capability::edit_scripted]

[capability::edit_search_head_clustering]

[capability::edit_search_concurrency_all]

[capability::edit_search_concurrency_scheduled]

[capability::edit_search_scheduler]

[capability::edit_search_schedule_priority]

[capability::edit_search_schedule_window]

[capability::edit_search_server]

[capability::edit_server]

[capability::edit_server_crl]

[capability::edit_sourcetypes]

[capability::edit_splunktcp]

[capability::edit_splunktcp_ssl]

[capability::edit_splunktcp_token]

[capability::edit_tcp]

[capability::edit_telemetry_settings]

[capability::edit_token_http]

[capability::edit_tokens_all]

[capability::edit_tokens_own]

[capability::edit_udp]

[capability::edit_user]

[capability::edit_view_html]

[capability::edit_web_settings]

[capability::export_results_is_visible]

[capability::get_diag]

[capability::get_metadata]

[capability::get_typeahead]

[capability::indexes_edit]

[capability::input_file]

[capability::license_tab]

[capability::license_edit]

[capability::license_view_warnings]

[capability::list_deployment_client]

[capability::list_deployment_server]

[capability::list_pipeline_sets]

[capability::list_forwarders]

[capability::list_health]

[capability::list_httpauths]

[capability::list_indexer_cluster]

[capability::list_indexerdiscovery]

[capability::list_inputs]

[capability::list_introspection]

[capability::list_search_head_clustering]

[capability::list_search_scheduler]

[capability::list_settings]

[capability::list_metrics_catalog]

[capability::edit_metrics_rollup]

[capability::list_storage_passwords]

[capability::list_tokens_all]

[capability::list_tokens_own]

[capability::never_lockout]

[capability::never_expire]

[capability::output_file]

[capability::request_remote_tok]

[capability::rest_apps_management]

[capability::rest_apps_view]

[capability::rest_properties_get]

[capability::rest_properties_set]

[capability::restart_splunkd]

[capability::rtsearch]

[capability::run_collect]

[capability::run_mcollect]

[capability::run_debug_commands]

[capability::schedule_rtsearch]

[capability::search]

[capability::search_process_config_refresh]

[capability::use_file_operator]

[capability::upload_lookup_files]

[capability::web_debug]

[capability::fsh_manage]

[capability::edit_statsd_transforms]

[capability::edit_metric_schema]

[capability::list_workload_pools]

[capability::edit_workload_pools]

[capability::select_workload_pools]

[capability::list_workload_rules]

[capability::edit_workload_rules]

[capability::apps_restore]

authorize.conf.example

Version 7.3.0

This is an example authorize.conf. Use this file to configure roles and

capabilities.

To use one or more of these configurations, copy the configuration block

into authorize.conf in $SPLUNK_HOME/etc/system/local/. You must reload

auth or restart Splunk to enable configurations.

To learn more about configuration files (including precedence) please see

the documentation located at

http://docs.splunk.com/Documentation/Splunk/latest/Admin/Aboutconfigurationfiles

[role_ninja] rtsearch = enabled importRoles = user srchFilter = host=foo srchIndexesAllowed = * srchIndexesDefault = mail;main srchJobsQuota = 8 rtSrchJobsQuota = 8 srchDiskQuota = 500

This creates the role 'ninja', which inherits capabilities from the 'user'

role. ninja has almost the same capabilities as power, except cannot

schedule searches.

The search filter limits ninja to searching on host=foo.

ninja is allowed to search all public indexes (those that do not start

with underscore), and will search the indexes mail and main if no index is

specified in the search.

ninja is allowed to run 8 search jobs and 8 real time search jobs

concurrently (these counts are independent).

ninja is allowed to take up 500 megabytes total on disk for all their jobs.