Splunk
Integrate TigerIdentity with Splunk for comprehensive log aggregation, security analytics, and automated incident response based on identity events.
Key Features
Log Aggregation
Send all TigerIdentity decision logs, audit events, and access grants to Splunk.
Advanced Analytics
Use Splunk queries to analyze access patterns, detect anomalies, and investigate incidents.
Security Investigations
Correlate identity events with security alerts for comprehensive threat investigation.
Context Enrichment
Import Splunk Notable Events and risk scores into TigerIdentity access decisions.
Bi-Directional Integration
Send logs to Splunk and receive security signals back for real-time policy enforcement.
Automated Response
Trigger access revocation based on Splunk alerts and correlation searches.
How It Works
Configure HEC
Set up Splunk HTTP Event Collector (HEC) and create a dedicated index for TigerIdentity.
Forward Logs
TigerIdentity sends decision logs, audit events, and access grants to Splunk in real-time.
Import Signals
Configure Splunk to send Notable Events and risk scores back to TigerIdentity.
Automated Response
Use Splunk alerts to trigger access revocation and session termination in TigerIdentity.
Configuration Example
connector:
type: splunk
name: "splunk-enterprise"
config:
hec_url: "https://splunk.company.com:8088"
hec_token: "${SPLUNK_HEC_TOKEN}"
index: "tigeridentity"
source: "tigeridentity"
sourcetype: "_json"
log_forwarding:
decision_logs: true
audit_logs: true
access_grants: true
policy_changes: true
events:
notable_events: true
risk_scores: true
correlation_searches:
- "Suspicious Access Pattern"
- "Privilege Escalation Detected"
automation:
revoke_on_alert: true
alert_threshold: "high"Use Cases
Threat Investigation
Correlate TigerIdentity access events with security alerts to understand attack paths.
Anomaly Detection
Use Splunk ML to detect unusual access patterns and automatically revoke suspicious sessions.
Compliance Reporting
Generate compliance reports in Splunk using TigerIdentity audit logs and decision data.
Risk-Based Access
Import user risk scores from Splunk and use them in TigerIdentity access policies.
Ready to connect Splunk?
See how TigerIdentity enhances Splunk with identity context in a personalized demo.
Schedule Your Demo