Integrate Splunk Cloud with Conditional Access

In this topic, you will find general instructions on how to integrate Splunk Cloud with Portnox™ Conditional Access for Applications.

Create a Portnox Cloud application configuration

In this step, you will create a configuration in Portnox Cloud that will contain all the information necessary to integrate with Splunk Cloud.

  1. In a new tab of your browser, open your Portnox Cloud account by accessing the following URL: https://clear.portnox.com/

    From now on, we will call this tab the Portnox tab.

  2. In the Cloud portal top menu, click on the Applications option.

  3. On the Applications screen, click on the Add application button, and select the Add new SAML application option.

  4. Optional: If you have more than one SAML identity provider configured, select the identity provider in the Select an identity provider to use for this application section.
  5. In the Application details section, enter an Application name and optionally a Description.

    In this example, we used the name Splunk for the new application configuration but you can use any name you like.

  6. Keep this browser tab open. You will need it later.

Open your Splunk Cloud SAML configuration

In this section, you will access your Splunk Cloud administrative interface and find the SAML configuration page.

  1. In another tab of your browser, open your Splunk Cloud web interface by accessing the following URL: https://your_tenant.splunkcloud.com/, substituting your_tenant with your Splunk Cloud tenant name.

    From now on, we will call this tab the Splunk tab.

  2. In the top menu, click on the Settings option to open the menu, and then in the USERS AND AUTHENTICATION section, select the Authentication methods option.

  3. In the Authentication methods pane, in the External section, select the SAML option, and then click on the Configure Splunk to use SAML link.

Export metadata from the Portnox tab and upload it in the Splunk tab

In this section, you will export the metadata from Portnox Cloud into a file and upload that file in the Splunk Cloud SAML configuration section.

  1. In the Portnox tab, in the SAML metadata section, click on the Download metadata XML file link to download the XML file and save it to your local drive.

  2. In the Splunk tab, click on the Select File button next to the Metadata XML file heading, and then upload the XML file downloaded from Portnox Cloud.

  3. In the Splunk tab, in the Entity ID field, enter https://your_tenant.splunkcloud.com/, substituting your_tenant with your Splunk Cloud tenant name.

Enter configuration values in the Portnox tab

In this section, you will enter configuration values in the relevant fields in Portnox Cloud.

  1. In the Portnox tab, in the Application properties section, click on the empty field under the Entity ID / Service Provider Entity URL heading and enter the following value: https://your_tenant.splunkcloud.com/, substituting your_tenant with your Splunk Cloud tenant name.

  2. In the Portnox tab, in the Application properties section, click on the empty field under the Assertion Consumer Service (ACS) URL / Reply URL heading and enter the following value: https://your_tenant.splunkcloud.com/saml/acs, substituting your_tenant with your Splunk Cloud tenant name.

Finalize the configuration

In this section, you will finalize the configuration in Portnox Cloud and Splunk Cloud.

  1. Finalize the configuration in the Portnox tab.
    1. Optional: In the POLICY ASSIGNMENTS section, change the setting to Application-based and then select an access control policy and a risk assessment policy if you want to control access to this application without using groups.
    2. Scroll all the way down to the end of the page, and then click on the Save button.

  2. Finalize the SAML configuration in the Splunk tab.
    1. In the Name Id Format field, select the Email Address option.

    2. In the SSO Binding section, click on the HTTP Post button.

    3. In the Alias section, in the Role alias field, paste the following value: http://schemas.microsoft.com/ws/2008/06/identity/claims/role.

    4. Click on the Save button.

  3. Configure your identity provider to send group information in the role field.

    For example:

    • If you use Entra ID: In the Attributes & Claims pane, click on the Add a group claim button. In the Group Claims pane, select All groups, set Source attribute to Group ID, in the Advanced options section, activate the Customize the name of the group claim checkbox, activate the Emit groups as role claims checkbox, and then click on the Save button.

    • If you use Google Workspace: In the SAML attribute mapping pane, add all Google groups that you want to have access to Splunk Cloud, and in the App attribute field, enter role. Then, click on the Save button.

  4. Map SAML groups in the Splunk tab.
    1. In the SAML Groups pane, click on the New Group button.

    2. In the Create New SAML Group window, in the Group Name field, enter the group identifier as used in your identity provider, select suitable Splunk Roles for this group, and then click on the Save button.

      Note: For example, in Entra ID, the group-name-as-in-your-identity-provider is the Object ID displayed on the group screen (in the UUID format, for example, 1b6c91ce-18d9-4211-8052-cc749bd73dd2), and in Google Workspace, it is the username part of the group’s email address (for example, administrators).

Result: You have configured Splunk Cloud to be accessible using Portnox Conditional Access for Applications.

Note: If you made an error configuring Conditional Access and you cannot use SAML to log in to Splunk Cloud, you can log in to Splunk Cloud with your Splunk credentials using the following URL: https://your_tenant.splunkcloud.com/en-US/account/login?loginType=splunk, where your_tenant is your Splunk Cloud tenant name.