Manage access to passwords through the Network Allow List
The Network Allow List contains external networks that can and cannot receive passwords in cleartext in response to calls to the /storage/passwords REST endpoint. Using this list, you can manage end user access to passwords while allowing Splunk applications to access stored passwords.
Requirements
To configure the Network Allow List, you must have:
- Splunk Cloud Platform version 9.4.2503 or higher
- The edit_limits_conf capability
Configure the Network Allow List
To configure the network allow list, add networks to the list and specify whether or not they can access passwords. If you enable the networks to access passwords, you can still prevent individual networks on the list from accessing passwords.
Requests from the localhost address always receive passwords in cleartext.
To configure the Network Allow List, follow these steps:
- In Splunk Web, click Settings > Server settings > Secrets management.
- On the Network Allow List page, select + Add network.
- Create a rule by entering a network in one of the following formats:
- A single IPv4 or IPv6 address, for example,
10.1.2.3
,fe80::4a3
- A Classless Inter-Domain Routing (CIDR) block of addresses, for example,
10/8
,192.168.1/24
,fe80:1234/32
- A DNS name, possibly with a
*
used as a wildcard, for example,myhost.example.com
,*.splunk.com
*
, which matches anything.
- A single IPv4 or IPv6 address, for example,
- (Optional) To prevent a network from accessing passwords in cleartext, prefix the rule with
!
, for example,!10.1.2.3
.The input applies rules in order, and uses the first one that matches. For example,
!10.1/16, *
returns cleartext passwords to calls from everywhere except the10.1.*.*
network.
Prevent networks from accessing passwords through the SPL rest command
Although you can prevent external networks from accessing passwords in cleartext, users of these networks still can access the passwords through the SPL rest command. To avoid it, follow these steps:
- In Splunk Web, click Settings > Server settings > Secrets management.
- In the top right of the Network Allow List page, select the Options gear icon.
- In the Options dialog, turn off the Return passwords in cleartext option.
Then the SPL rest command cannot return passwords in cleartext in response to calls to the /storage/passwords REST endpoint.