Define an OAuth 2.0 external application server
Defining an external application server on your Splunk Enterprise instance lets you allow incoming connections from client applications on your identity provider (IdP) to access Splunk data.
An OAuth 2.0 client application that is registered on your identity provider (IdP) with necessary client credentials including the client ID and client secret
The issuer URL, client ID claim, and Java Web Key Sets (JWKS) URL from the IdP client application
Administrator access to your Splunk platform instance (specifically, the Splunk user you log in with must hold the 'list_oauth_configs" and "edit_oauth_configs" Splunk capabilities)
- Log into your Splunk platform instance.
- Select Settings > Authentication Methods.
- Under External Frameworks, select Open Authorization (OAuth) 2.0. The OAuth 2.0 page loads.
- Select + New Configuration. The New Configuration page loads.
- In the Configuration Name field, enter a name for the configuration that you will remember.
- In the Issuer URL field, enter the URL that identifies the OAuth 2.0 server in the tokens that the OAuth 2.0 server creates.
- In the JSON Web Key Set URL field, enter the URL from the IdP client application that represents the set of JavaScript Object Notation (JSON) Web Key Set (JWKs) that are used to verify JSON Web Tokens that the authorization server issues.
- In the Audience field, specify the expected audience for this configuration. Typically, the audience will be "splunk" for the purposes of an external OAuth client application connecting to your Splunk platform instance, but can be any string that is pertinent to your organization's needs.
- In the Client ID claim field, enter the name of the JSON Web Token (JWT) claim that contains the client ID. This claim comes from the client application that you set up on the IdP. The Splunk platform uses this ID to identify the client application that makes the incoming authorization request.
- In the Group claim field, enter the name of the JWT claim that contains the groups that the client application sends as part of the authorization request. The Splunk platform uses the group claim to identify the groups that will have access to Splunk data when you map those groups to Splunk roles, as described in "Map groups from the client application on the identity provider to Splunk roles".
- (Optional) In the Full Name Claim field, enter the name of the JWT claim that contains the full name of the client that the client application sends as part of the authorization request. The Splunk platform uses the full name claim to provide a human-readable name for the client that makes the incoming request.
- Select Save.