Splunk's role based access control implementation can be daunting to learn. In this course, you'll gain a thorough understanding of Splunk roles and master Splunk authentication methods including single sign-on and multi-factor authentication.
Securing Splunk Enterprise is an important task of a Splunk Administrator. But mastering Splunk's role based access control and various authentication mechanisms can be difficult. In this course, Splunk Enterprise Administration: Managing Users and Authentication, you will gain foundational knowledge of Splunk users and roles management. First, you will learn Splunk's role based access control and the inheritance of capabilities. Next, you will discover configuring external LDAP for authentication and mapping LDAP groups into Splunk roles. Finally, you will explore how to configure single sign-on and multi-factor authentication. When you’re finished with this course, you will have the skills and knowledge of configuring Splunk roles and authentication mechanisms needed to manage Splunk security.
Passionate about IT Ops, Karun has 20+ years of hands on experience with Linux, Cloud tech, Monitoring and Log aggregation. He enjoys creating learning materials that are engaging and provide immediate practical value.
Course Overview [Autogenerated] Hi, everyone. My name is Karen Subramanian. Welcome to my course. Splunk Enterprise Administration Managing users. On that indication, I am a nightie operations expert under Splunk certified architect Administering a Splunk enterprise environment records a thorough knowledge off the platform. One of the critical calm prints off this plank platform is managing users on at indication. In this course, we're going to learn Splunk role based access control model. People discuss. Splunk is building roads on how capabilities are inherited. I'll walk you through creating a custom roll using both Splunk Web and configuration files. I'll provide plenty of examples along the way. Some of the major topics we'll cover include granting granular capabilities to custom Splunk rolls configuring external elder part indication map Elder groups two rolls configure single sign on unmodified actor authentication. By the end of the scores, you will know how to secure your _____. Instance by the use off custom roads on external adapt at indication before beginning this course, you should be familiar Red writing. Simple SPL Cory's creating Splunk knowledge objects. I hope you will join me on this journey to learn Splunk security with the Splunk Enterprise Administration Managing users on authentication course at your site