In this section, you will finalize the configuration in Portnox Cloud and Splunk Cloud.
-
Finalize the configuration in the Portnox tab.
- Optional:
Click on the Next button, and in the Policy enforcement
section, in the Device risk assessment section, change the setting to
Override with custom policy and then select a risk assessment policy if you want
to assess risk with this application using a custom risk assessment policy, and in the Access
control section, change the setting to Override with custom policy
and then select an access control policy if you want to control access to this application using a custom
access control policy.
-
Scroll all the way down to the end of the page, and then click on the Add resource
button.
-
Finalize the SAML configuration in the Splunk tab.
-
In the Name Id Format field, select the Email Address
option.
-
In the SSO Binding section, click on the HTTP Post
button.
-
In the Alias section, in the Role alias field, paste the
following value: http://schemas.microsoft.com/ws/2008/06/identity/claims/role.
-
Click on the Save button.
-
Configure your identity provider to send group information in the role field.
For example:
-
If you use Entra ID: In the Attributes & Claims pane, click on the
Add a group claim button. In the Group Claims pane,
select All groups, set Source attribute to
Group ID, in the Advanced options section, activate
the Customize the name of the group claim checkbox, activate the Emit
groups as role claims checkbox, and then click on the Save
button.

-
If you use Google Workspace: In the SAML attribute mapping pane, add all Google
groups that you want to have access to Splunk Cloud, and in the App attribute
field, enter role. Then, click on the Save button.

-
Map SAML groups in the Splunk tab.
-
In the SAML Groups pane, click on the New Group button.
-
In the Create New SAML Group window, in the Group Name field,
enter the group identifier as used in your identity provider, select suitable Splunk
Roles for this group, and then click on the Save button.

Note: For example, in Entra ID, the group-name-as-in-your-identity-provider is the
Object ID displayed on the group screen (in the UUID format, for example,
1b6c91ce-18d9-4211-8052-cc749bd73dd2), and in Google Workspace, it is the
username part of the group’s email address (for example, administrators).
Result: You have configured Splunk Cloud to be accessible using Portnox Zero Trust Network Access.
Note: If you made an error configuring Zero Trust Network Access and you cannot use SAML to log in to Splunk Cloud, you can
log in to Splunk Cloud with your Splunk credentials using the following URL:
https://your_tenant.splunkcloud.com/en-US/account/login?loginType=splunk,
where your_tenant is your Splunk Cloud tenant name.