Create an identity lookup from your current LDAP data in Splunk Enterprise Security

Use LDAP to register your identities, create a lookup, and schedule a search to run on a regular basis.

Prerequisites

This requires the Splunk Supporting Add-on for Active Directory for access to the | ldapsearch command. See Collect and extract asset and identity data in Splunk Enterprise Security.

To get started with the Asset and Identity Builder, do the following:

  1. From the Splunk Enterprise Security menu bar, select Configure > Data Enrichment > Asset and Identity Management.
  2. Click the Identity Lookup Configuration tab.
  3. Click New.
  4. Select the LDAP Lookup from the drop-down menu.

Search

Lookup

In the lookup section, do the following:

  1. Provide a lookup label for your search-driven lookup.
  2. Provide a unique lookup name and/or transform name.
  3. The lookup filename .csv will auto-complete based on the name you provided for the lookup name.

Search schedule

Once you have completed the lookup fields, the custom search builder preview will show the search it has created. Click Run search to verify if the search returns results.

In the search schedule section, do the following to run the search on a regular basis:

  1. Enter a cron schedule.
  2. Select Real-time or Continuous scheduling.
  3. Click Save.

This saves two things:

  • Saved searches that you can find in Configure > Content > Content Management
  • Lookup table and lookup definition that you can find in Settings > Lookups

Identity management

The next step is where you begin to create the settings stored in the input.conf file that points to the lookup and pulls the data every 5 minutes to make updates to the asset or identity collections.

Since this example is for an identity, the next window that pops up is the New Identity Manager.

  1. The Source is auto-populated with the name of the lookup that you provided.
  2. See Identity Lookup Configuration.