Visibility of RUM tokens

This page describes the inherent limitations associated with Splunk Real User Monitoring (RUM) tokens. The limitations described here represent industry-wide challenges that are recognized across the technology landscape.

Splunk RUM tokens support the collection of performance and usage metrics from user environments. Due to their exposure to client-side interactions, these tokens might be subject to potential third-party misuse or exposure.

Splunk implements extensive measures to minimize potential impact from these exploits, including encryption, token rotation, and limiting the scope and permissions of these tokens.

Splunk remains committed to constantly reviewing and enhancing its security practices and encourages you to follow best practices for securing your own environments. If you have concerns or want further clarification, reach out to our Customer Support.