authorize.conf - Splunk Documentation (original) (raw)

This documentation does not apply to the most recent version of SplunkĀ® Enterprise. For documentation on the most recent version, go to the latest release.

The following are the spec and example files for authorize.conf.

Version 8.2.5

OVERVIEW

This file contains descriptions of the settings that you can use to

create roles in authorize.conf.

There is an authorize.conf file in the $SPLUNK_HOME/etc/system/default/ directory.

Never change or copy the configuration files in the default directory.

The files in the default directory must remain intact and in their original

location.

To set custom configurations, create a new file with the name authorize.conf in

the $SPLUNK_HOME/etc/system/local/ directory. Then add the specific settings

that you want to customize to the local configuration file.

For examples, see authorize.conf.example. You must restart the Splunk instance

to enable configuration changes.

To learn more about configuration files (including file precedence) see the

documentation located at

http://docs.splunk.com/Documentation/Splunk/latest/Admin/Aboutconfigurationfiles

GLOBAL SETTINGS

Use the [default] stanza to define any global settings.

* You can also define global settings outside of any stanza, at the top of

the file.

* Each .conf file should have at most one default stanza. If there are

multiple default stanzas, settings are combined. In the case of

multiple definitions of the same setting, the last definition in the

file takes precedence.

* If a setting is defined at both the global level and in a specific

stanza, the value in the specific stanza takes precedence.

[default]

srchFilterSelecting =

[capability::]

[role_]

=

importRoles =

grantableRoles =

srchFilter =

srchTimeWin =

srchTimeEarliest =

srchDiskQuota =

srchJobsQuota =

rtSrchJobsQuota =

srchMaxTime =

srchIndexesDefault =

srchIndexesAllowed =

srchIndexesDisallowed =

deleteIndexesAllowed =

cumulativeSrchJobsQuota =

cumulativeRTSrchJobsQuota =

federatedProviders =

Descriptions of Splunk system capabilities.

Capabilities are added to roles to which users are then assigned.

When a user is assigned a role, they acquire the capabilities added to that role.

[tokens_auth]

expiration = |never

ephemeralExpiration =

disabled =

[capability::accelerate_datamodel]

[capability::admin_all_objects]

[capability::edit_tokens_settings]

[capability::change_authentication]

[capability::change_own_password]

[capability::list_tokens_scs]

[capability::delete_by_keyword]

[capability::delete_messages]

[capability::edit_log_alert_event]

[capability::dispatch_rest_to_indexers]

[capability::edit_authentication_extensions]

[capability::edit_bookmarks_mc]

[capability::edit_deployment_client]

[capability::edit_deployment_server]

[capability::list_dist_peer]

[capability::edit_dist_peer]

[capability::edit_encryption_key_provider]

[capability::request_pstacks]

[capability::edit_watchdog]

[capability::edit_forwarders]

[capability::edit_health]

[capability::edit_health_subset]

[capability::edit_httpauths]

[capability::edit_indexer_cluster]

[capability::edit_indexerdiscovery]

[capability::edit_input_defaults]

[capability::edit_local_apps]

[capability::edit_monitor]

[capability::edit_modinput_winhostmon]

[capability::edit_modinput_winnetmon]

[capability::edit_modinput_winprintmon]

[capability::edit_modinput_perfmon]

[capability::edit_modinput_admon]

[capability::edit_roles]

[capability::edit_roles_grantable]

[capability::edit_scripted]

[capability::edit_search_head_clustering]

[capability::edit_search_concurrency_all]

[capability::edit_search_concurrency_scheduled]

[capability::edit_search_scheduler]

[capability::edit_search_schedule_priority]

[capability::edit_search_schedule_window]

[capability::edit_search_server]

[capability::edit_server]

[capability::edit_server_crl]

[capability::edit_sourcetypes]

[capability::edit_splunktcp]

[capability::edit_splunktcp_ssl]

[capability::edit_splunktcp_token]

[capability::edit_tcp]

[capability::edit_telemetry_settings]

[capability::edit_token_http]

[capability::edit_tokens_all]

[capability::edit_tokens_own]

[capability::edit_udp]

[capability::edit_user]

[capability::edit_view_html]

[capability::edit_web_settings]

[capability::export_results_is_visible]

[capability::get_diag]

[capability::get_metadata]

[capability::get_typeahead]

[capability::indexes_edit]

[capability::input_file]

[capability::install_apps]

[capability::license_tab]

[capability::license_edit]

[capability::license_read]

[capability::license_view_warnings]

[capability::list_deployment_client]

[capability::list_deployment_server]

[capability::list_pipeline_sets]

[capability::list_forwarders]

[capability::list_health]

[capability::list_health_subset]

[capability::list_httpauths]

[capability::list_indexer_cluster]

[capability::list_indexerdiscovery]

[capability::list_inputs]

[capability::list_introspection]

[capability::list_search_head_clustering]

[capability::list_search_scheduler]

[capability::list_settings]

[capability::list_metrics_catalog]

[capability::edit_metrics_rollup]

[capability::list_storage_passwords]

[capability::list_token_http]

[capability::list_tokens_all]

[capability::list_tokens_own]

[capability::never_lockout]

[capability::never_expire]

[capability::output_file]

[capability::pattern_detect]

[capability::request_remote_tok]

[capability::rest_apps_management]

[capability::rest_apps_view]

[capability::rest_properties_get]

[capability::rest_properties_set]

[capability::restart_splunkd]

[capability::rtsearch]

[capability::run_collect]

[capability::run_mcollect]

[capability::run_msearch]

[capability::run_debug_commands]

[capability::run_walklex]

[capability::schedule_rtsearch]

[capability::metric_alerts]

[capability::search]

[capability::search_process_config_refresh]

[capability::use_file_operator]

[capability::upload_lookup_files]

[capability::web_debug]

[capability::fsh_manage]

[capability::edit_statsd_transforms]

[capability::edit_metric_schema]

[capability::list_workload_pools]

[capability::edit_workload_pools]

[capability::select_workload_pools]

[capability::list_workload_rules]

[capability::edit_workload_rules]

[capability::list_workload_policy]

[capability::edit_workload_policy]

[capability::apps_restore]

[capability::edit_kvstore]

[capability::edit_manager_xml]

############################################################################

Settings used to control commands started by Splunk

############################################################################

[commands:user_configurable]

prefix =

authorize.conf.example

Version 8.2.5

This is an example authorize.conf. Use this file to configure roles and

capabilities.

To use one or more of these configurations, copy the configuration block

into authorize.conf in $SPLUNK_HOME/etc/system/local/. You must reload

auth or restart Splunk to enable configurations.

To learn more about configuration files (including precedence) please see

the documentation located at

http://docs.splunk.com/Documentation/Splunk/latest/Admin/Aboutconfigurationfiles

[role_ninja] rtsearch = enabled importRoles = user srchFilter = host=foo srchIndexesAllowed = * srchIndexesDefault = mail;main srchJobsQuota = 8 rtSrchJobsQuota = 8 srchDiskQuota = 500 srchTimeWin = 86400 srchTimeEarliest = 2592000

This creates the role 'ninja', which inherits capabilities from the 'user'

role. ninja has almost the same capabilities as power, except cannot

schedule searches.

The search filter limits ninja to searching on host=foo.

ninja is allowed to search all public indexes (those that do not start

with underscore), and will search the indexes mail and main if no index is

specified in the search.

ninja is allowed to run 8 search jobs and 8 real time search jobs

concurrently (these counts are independent).

ninja is allowed to take up 500 megabytes total on disk for all their jobs.

ninja is allowed to run searches that span a maximum of one day

ninja is allowed to run searches on data that is newer than 30 days ago