Skip to content

Files

Latest commit

 

History

History

saml

Folders and files

NameName
Last commit message
Last commit date

parent directory

..
 
 
 
 
 
 
 
 
STARTING
========
./prep.sh   ( one time only to create certs and config )

docker compose up -d

WHAT
====

This demonstrates splunk using SAML as an authentication strategy

This uses :
keycloak (an opensource idp sponsored by redhat)
splunk 
openldap

a custom authentication extension script - might not be needed - works well enough without

NOTES
=====
Splunk sends signed SAML requests to keycloak
Keycloak verifies the signiture.
Keycloak sends signed documents back to splunk
Splunk verifies the signature.

In order to do this we need to prepare some certificates + keys ahead of time

LOGGING IN
==========

Log into keycloak at http://localhost:9080   (admin/password)
Log into splunk using http://localhost:9000  (splunkadmin/password)

Bypass splunk SAML using http://localhost:9000/account/login?loginType=splunk ( admin/password )

For other users - see resources/ldap-ldif/main.ldif

BEWARE
======
The SAML dance happens in your browser.
Splunk doesnt talk to keycloak directly.
The redirect URIs *WILL* break if you alter the exposed ports the containers listen on

FUN STUFF
=========

For more security, enable MFA with one-time-passcodes

1. log into keycloak
2. Browse to the apps domain
3. Authentication -> Flows -> Browser
4. Set 'Browser -> Conditional OTP' to 'Required'
5. Log out and in of splunk

You will need to register the app in Microsoft authenticator on your mobile.
Its as simple as scanning a barcode.