You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Sumo Logic has introduced a change to the way group-to-role mapping is handled when performing on-demand role provisioning during SAML authentication. Previously, all groups included in a SAML assertion were validated against roles in Sumo Logic. Going forward, only the groups that match existing roles in Sumo Logic will be applied to the authenticating user. Any non-matching groups will be ignored. Only if no roles match with the groups passed in the assertion will an authentication fail.
13
+
14
+
For more information about SAML configuration for roles provisioning, see [Configure on-demand roles provisioning](/docs/manage/security/saml/set-up-saml/#configure-on-demand-roles-provisioning).
Copy file name to clipboardExpand all lines: docs/apm/traces/search-query-language-support-for-traces.md
+2Lines changed: 2 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -35,6 +35,8 @@ To search your tracing data do the following:
35
35
36
36
A Keyword Search Expression defines the scope of data for the query. You need to specify `_index=_trace_spans` in the scope to reference your trace data.
37
37
38
+
Keyword searching is supported for tracing indexes across all fields, unlike other indexes where only the `_raw` field is searched.
39
+
38
40
#### _any option
39
41
40
42
In scenarios where users are not familiar with the schema and would like to search across all the fields, `_any` modifier provides a means to search for a specified value from all of the Ingest Time Fields in your data. For example, to search for data with any field that has a value of success you would put `_any=success` in the scope of your query.
Copy file name to clipboardExpand all lines: docs/cse/records-signals-entities-insights/search-cse-records-in-sumo.md
+2Lines changed: 2 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -162,6 +162,8 @@ You can search Cloud SIEM fields by keyword, for example:
162
162
163
163
`_index=sec_record_authentication kerberos`
164
164
165
+
Keyword searching is supported for security indexes across all fields, unlike other indexes where only the `_raw` field is searched.
166
+
165
167
### Referencing nested JSON fields
166
168
167
169
The **Security Record Details** field contains a JSON object with all of the fields from the underlying record or signal. Some of the data is nested in one or more sub-objects, like the `fields` object for record., shown expanded in the screenshot below. The fields object contains the contents of the [fields](/docs/cse/schema/schema-attributes) field in the underlying record, which is all of the unnormalized data from the original log message before it was normalized to the Cloud SIEM schema.
The Duo Source provides a secure endpoint to receive authentication logsfrom the Duo[Authentication Logs API](https://duo.com/docs/adminapi#logs). It securely stores the required authentication, scheduling, and state tracking information.
16
+
The Duo Source collects logsfrom multiple DuoAPI endpoints. It securely stores the required authentication, scheduling, and state tracking information.
17
17
18
18
## Data collected
19
19
20
20
| Polling Interval | Data |
21
21
| :--- | :--- |
22
-
| 5 min |[Authentication Logs](https://duo.com/docs/adminapi#logs)|
1.**Duo Domain**. Provide your **API hostname**, such as `api-********.duosecurity.com`.
49
53
1.**Integration Key**. Provide the Duo Integration Key you want to use to authenticate collection requests.
50
54
1.**Secret Key**. Provide the Duo Secret Key you want to use to authenticate collection requests.
55
+
1.**Supported APIs to Collect**. Choose the API endpoints you wish to collect logs from.
56
+
1.**Collect User Inventory Every 24h**. Check this box if you want to collect user inventory every 24 hours.
51
57
1. (Optional) The **Polling Interval** is set for 300 seconds by default, you can adjust it based on your needs. This sets how often the Source checks for new data.
52
58
1. When you are finished configuring the Source, click **Submit**.
53
59
@@ -81,6 +87,8 @@ Sources can be configured using UTF-8 encoded JSON files with the Collector Ma
81
87
| domain | String | Yes |`null`| Provide your API hostname, such as api-********.duosecurity.com.||
82
88
| integration_key | String | Yes |`null`| Provide the Duo Integration Key you want to use to authenticate collection requests. ||
83
89
| secret_key | String | Yes |`null`| Provide the Duo Secret Key you want to use to authenticate collection requests. ||
90
+
| supported_apis| String Array| Yes | All APIs|Add an element for each of the APIs the integration should collect from.|`["authentication", "administrator", "telephony", "activity"]`|
91
+
| collectUserInventory | Boolean | No | True| Set to true if the integration should collect user inventory logs. |`True`|
84
92
| polling_interval | Integer | No | 300 | This sets how often the Source checks for new data. ||
0 commit comments