Configuring SAML SSO with Splunk Cloud and PingFederate
Learn how to configure SAML SSO with Splunk Cloud and PingFederate.
About this task
An error in configuration could cause users and administrators to be unable to sign on to Splunk Cloud. The following Direct Login link can be used for local authentication:
|
The following table details the required and optional attributes to be configured in the assertion attribute contract.
Attribute Name | Description | Required / Optional |
---|---|---|
|
|
Required |
|
User role as per SAML Groups. Attribute name is configurable in SAML configuration for application. |
Required |
|
User Email address. Attribute name is configurable in SAML configuration for application. |
Optional |
|
User display name. Attribute name is configurable in SAML configuration for application. |
Optional |
The following table details the references that are used within this guide that are environment-specific. Replace these with the suitable value for your environment.
Reference | Description |
---|---|
|
The instance name for the Splunk Cloud tenant. |
The following configuration is untested, and is provided as an example. Additional steps might be required. |
Create a PingFederate SP connection for Splunk Cloud
-
Download the Splunk Cloud metadata from
https://tenant.splunkcloud.com/en-US/saml/spmetadata
. -
Sign on to the PingFederate administrative console.
-
Using the metadata that you downloaded, create an SP connection in PingFederate:
-
Configure using Browser SSO profile SAML 2.0.
-
Enable the following SAML Profiles:
-
IdP-Initiated SSO
-
SP-Initiated SSO
-
IdP-Initiated SLO
-
SP-Initiated SLO
-
-
In Assertion Creation: Attribute Contract, set the Subject Name Format to urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress.
-
Extend the contract:
-
Attribute:
Role
-
Format:
urn:oasis:names:tc:SAML:2.0:attrname-format-basic
-
-
In the Assertion Creation: Attribute Contract Fulfilment, map attribute SAML_SUBJECT to the attribute mail and map attribute Role to the LDAP attribute containing the Splunk role.
-
In Protocol Settings: Allowable SAML Bindings, enable Redirect and POST.
-
-
Export the metadata for the newly-created SP connection.
-
Export the signing certificate public key.
Configure the PingFederate IdP-connection for Splunk Cloud
-
Sign on to Splunk Cloud as an administrator.
-
In the top navigation bar, click Settings.
-
Click Authentication Methods.
-
Click SAML, and then click Configure Splunk to use SAML.
-
On the SAML Configuration window, note the warning and save the Direct Login URL so that you can use it in the event of integration errors.
-
In the Metadata XML File field, click Select File, and select the PingFederate metadata file that you exported.
-
Review the configuration loaded from the metadata.
-
Set the Entity ID to the one that you configured in PingFederate when creating the SP configuration, such as
splunkEntityId
. -
Set the Role alias to the value that you configured in PingFederate for the attribute contract, such as
Role
. -
Set the Name ID Format to Email Address.
-
Ensure the fully qualified domain name parameter and port parameter match that of your Splunk Cloud instance.
For example:
-
Fully Qualified Domain Name:
https://tenant.splunkcloud.com
-
Port: 443
-
-
Click Save.
-
Go to Settings → Authentication Methods → SAML Settings.
-
Click New Group and configure the following settings.
Setting Value Name
samluser
This value should match the role you are passing from PingFederate in the SSO Attribute Mapping.
Role
user
-
Click Save.
-
Create additional groups as required to meet requirements.
The configuration is complete.