<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Verification of SAML assertion using the IDP's certificate provided failed. Error: Failed to verify signature with cert in Security</title>
    <link>https://community.splunk.com/t5/Security/Verification-of-SAML-assertion-using-the-IDP-s-certificate/m-p/498597#M11375</link>
    <description>&lt;P&gt;You'll want use a "valid" cert however you choose how to make it "valid" is up to you.&lt;/P&gt;</description>
    <pubDate>Thu, 28 Nov 2019 15:58:26 GMT</pubDate>
    <dc:creator>jkat54</dc:creator>
    <dc:date>2019-11-28T15:58:26Z</dc:date>
    <item>
      <title>Verification of SAML assertion using the IDP's certificate provided failed. Error: Failed to verify signature with cert</title>
      <link>https://community.splunk.com/t5/Security/Verification-of-SAML-assertion-using-the-IDP-s-certificate/m-p/498592#M11370</link>
      <description>&lt;P&gt;I have configured SAML 2.0 SSO with our own IdP.&lt;BR /&gt;
My local splunk app &lt;A href="http://khal:8000/"&gt;http://khal:8000/&lt;/A&gt; successfully redirect to Assertion consumer URL. Then I enter user and pass there and get an error message on spunk login page:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;Verification of SAML assertion using the IDP's certificate provided failed. Error: Failed to verify signature with cert
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Here is /opt/splunk/var/log/splunk/splunkd.log:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;11-27-2019 16:59:30.229 +0200 ERROR XmlParser - func=xmlSecOpenSSLX509StoreVerify:file=x509vfy.c:line=341:obj=x509-store:subj=unknown:error=71:certificate verification failed:X509_verify_cert: subject=/CN=selfSi
gned; issuer=/CN=selfSignedCA; err=20; msg=unable to get local issuer certificate
11-27-2019 16:59:30.229 +0200 ERROR XmlParser - func=xmlSecOpenSSLX509StoreVerify:file=x509vfy.c:line=380:obj=x509-store:subj=unknown:error=71:certificate verification failed:subject=/CN=selfSigned; issuer=/CN=s
elfSignedCA; err=20; msg=unable to get local issuer certificate
11-27-2019 16:59:30.229 +0200 ERROR XmlParser - func=xmlSecOpenSSLKeyDataX509VerifyAndExtractKey:file=x509.c:line=1505:obj=x509:subj=unknown:error=72:certificate is not found:details=NULL
11-27-2019 16:59:30.229 +0200 ERROR XmlParser - func=xmlSecOpenSSLKeyDataX509XmlRead:file=x509.c:line=655:obj=x509:subj=xmlSecOpenSSLKeyDataX509VerifyAndExtractKey:error=1:xmlsec library function failed: 
11-27-2019 16:59:30.229 +0200 ERROR XmlParser - func=xmlSecKeyInfoNodeRead:file=keyinfo.c:line=117:obj=x509:subj=xmlSecKeyDataXmlRead:error=1:xmlsec library function failed:node=X509Data
11-27-2019 16:59:30.229 +0200 ERROR XmlParser - func=xmlSecKeysMngrGetKey:file=keys.c:line=1230:obj=unknown:subj=xmlSecKeyInfoNodeRead:error=1:xmlsec library function failed:node=KeyInfo
11-27-2019 16:59:30.229 +0200 ERROR XmlParser - func=xmlSecDSigCtxProcessKeyInfoNode:file=xmldsig.c:line=790:obj=unknown:subj=unknown:error=45:key is not found:details=NULL
11-27-2019 16:59:30.229 +0200 ERROR XmlParser - func=xmlSecDSigCtxProcessSignatureNode:file=xmldsig.c:line=503:obj=unknown:subj=xmlSecDSigCtxProcessKeyInfoNode:error=1:xmlsec library function failed: 
11-27-2019 16:59:30.229 +0200 ERROR XmlParser - func=xmlSecDSigCtxVerify:file=xmldsig.c:line=341:obj=unknown:subj=xmlSecDSigCtxSignatureProcessNode:error=1:xmlsec library function failed: 
11-27-2019 16:59:30.229 +0200 ERROR Saml - Error: Failed to verify signature with cert :/opt/splunk/etc/auth/idpCerts/idpCert.pem;
11-27-2019 16:59:30.229 +0200 ERROR Saml -  Unable to verify Saml document 
11-27-2019 16:59:30.229 +0200 ERROR UiSAML - Verification of SAML assertion using the IDP's certificate provided failed. Error: Failed to verify signature with cert 
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Here is /opt/splunk/etc/system/local/authentication.conf:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[saml]
entityId = splunkEntityId
fqdn = &lt;A href="http://khal" target="test_blank"&gt;http://khal&lt;/A&gt;
idpSLOUrl = &lt;A href="https://idp.cloud.imprivata.com/BOE/saml2/slo/post" target="test_blank"&gt;https://idp.cloud.imprivata.com/BOE/saml2/slo/post&lt;/A&gt;
idpSSOUrl = &lt;A href="https://idp.cloud.imprivata.com/BOE/saml2/sso/post" target="test_blank"&gt;https://idp.cloud.imprivata.com/BOE/saml2/sso/post&lt;/A&gt;
inboundSignatureAlgorithm = RSA-SHA1;RSA-SHA256
issuerId = &lt;A href="https://idp.cloud.imprivata.com/BOE/saml2" target="test_blank"&gt;https://idp.cloud.imprivata.com/BOE/saml2&lt;/A&gt;
redirectPort = 8000
replicateCertificates = true
signAuthnRequest = true
signatureAlgorithm = RSA-SHA256
signedAssertion = true
sloBinding = HTTP-POST
sslKeysfile = /opt/splunk/etc/auth/server.pem
sslKeysfilePassword = $7$3creInbv0FSAruNBlecI/Ax+eJmCOy2kaKaGi/AYzwNChCylHgv/cQ==
ssoBinding = HTTP-POST
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Environment: &lt;BR /&gt;
OS: 18.04.1-Ubuntu. &lt;BR /&gt;
Splunk Enterprise: splunk-7.3.3-7af3758d0d5e-linux-2.6-amd64 and splunk-8.0.0-1357bef0a7f6-linux-2.6-amd64&lt;/P&gt;

&lt;P&gt;P.S: We are using self signed certificates, so answer in &lt;A href="https://answers.splunk.com/answers/543221/problem-with-saml-cert-error-uisaml-verification-o.html"&gt;https://answers.splunk.com/answers/543221/problem-with-saml-cert-error-uisaml-verification-o.html&lt;/A&gt; doesn't apply.&lt;/P&gt;</description>
      <pubDate>Wed, 27 Nov 2019 15:53:09 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/Verification-of-SAML-assertion-using-the-IDP-s-certificate/m-p/498592#M11370</guid>
      <dc:creator>jawaj30860</dc:creator>
      <dc:date>2019-11-27T15:53:09Z</dc:date>
    </item>
    <item>
      <title>Re: Verification of SAML assertion using the IDP's certificate provided failed. Error: Failed to verify signature with cert</title>
      <link>https://community.splunk.com/t5/Security/Verification-of-SAML-assertion-using-the-IDP-s-certificate/m-p/498593#M11371</link>
      <description>&lt;P&gt;It's complaining about your splunkd tls certificate&lt;/P&gt;

&lt;P&gt;You need valid ssl certs on the splunk daemon for this to work properly.&lt;/P&gt;

&lt;P&gt;Please work with your certificates team to get a valid tls cert for your splunk server.  Then install it properly and this error should go away (assuming the idP is trusting the CA that issues your cert).&lt;/P&gt;</description>
      <pubDate>Wed, 27 Nov 2019 16:25:05 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/Verification-of-SAML-assertion-using-the-IDP-s-certificate/m-p/498593#M11371</guid>
      <dc:creator>jkat54</dc:creator>
      <dc:date>2019-11-27T16:25:05Z</dc:date>
    </item>
    <item>
      <title>Re: Verification of SAML assertion using the IDP's certificate provided failed. Error: Failed to verify signature with cert</title>
      <link>https://community.splunk.com/t5/Security/Verification-of-SAML-assertion-using-the-IDP-s-certificate/m-p/498594#M11372</link>
      <description>&lt;P&gt;Thanks for responding. Can you please be more specific and provide more details . I don't understand what is the relation between splunkd tls certificate with SAML exchange? It's a sandbox and I use self signed certificates. &lt;/P&gt;</description>
      <pubDate>Thu, 28 Nov 2019 13:00:33 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/Verification-of-SAML-assertion-using-the-IDP-s-certificate/m-p/498594#M11372</guid>
      <dc:creator>jawaj30860</dc:creator>
      <dc:date>2019-11-28T13:00:33Z</dc:date>
    </item>
    <item>
      <title>Re: Verification of SAML assertion using the IDP's certificate provided failed. Error: Failed to verify signature with cert</title>
      <link>https://community.splunk.com/t5/Security/Verification-of-SAML-assertion-using-the-IDP-s-certificate/m-p/498595#M11373</link>
      <description>&lt;P&gt;You'll find it's nearly impossible to use self signed for saml.&lt;/P&gt;

&lt;P&gt;Perhaps if you want to load splunks certs in trusted root stores on all your sandboxed devices... I suppose it could work....&lt;/P&gt;

&lt;P&gt;Is your identity provider in your sandbox as well?&lt;/P&gt;</description>
      <pubDate>Thu, 28 Nov 2019 14:03:48 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/Verification-of-SAML-assertion-using-the-IDP-s-certificate/m-p/498595#M11373</guid>
      <dc:creator>jkat54</dc:creator>
      <dc:date>2019-11-28T14:03:48Z</dc:date>
    </item>
    <item>
      <title>Re: Verification of SAML assertion using the IDP's certificate provided failed. Error: Failed to verify signature with cert</title>
      <link>https://community.splunk.com/t5/Security/Verification-of-SAML-assertion-using-the-IDP-s-certificate/m-p/498596#M11374</link>
      <description>&lt;P&gt;IdP is on remote server in cloud while I have local instance of Splunk Enterprise where I test it out. &lt;/P&gt;</description>
      <pubDate>Thu, 28 Nov 2019 14:16:09 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/Verification-of-SAML-assertion-using-the-IDP-s-certificate/m-p/498596#M11374</guid>
      <dc:creator>jawaj30860</dc:creator>
      <dc:date>2019-11-28T14:16:09Z</dc:date>
    </item>
    <item>
      <title>Re: Verification of SAML assertion using the IDP's certificate provided failed. Error: Failed to verify signature with cert</title>
      <link>https://community.splunk.com/t5/Security/Verification-of-SAML-assertion-using-the-IDP-s-certificate/m-p/498597#M11375</link>
      <description>&lt;P&gt;You'll want use a "valid" cert however you choose how to make it "valid" is up to you.&lt;/P&gt;</description>
      <pubDate>Thu, 28 Nov 2019 15:58:26 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/Verification-of-SAML-assertion-using-the-IDP-s-certificate/m-p/498597#M11375</guid>
      <dc:creator>jkat54</dc:creator>
      <dc:date>2019-11-28T15:58:26Z</dc:date>
    </item>
    <item>
      <title>Re: Verification of SAML assertion using the IDP's certificate provided failed. Error: Failed to verify signature with cert</title>
      <link>https://community.splunk.com/t5/Security/Verification-of-SAML-assertion-using-the-IDP-s-certificate/m-p/498598#M11376</link>
      <description>&lt;P&gt;You could configure the idP to  trust the server.pem file you're specifying in your [saml] stanza for example&lt;/P&gt;</description>
      <pubDate>Thu, 28 Nov 2019 16:03:04 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/Verification-of-SAML-assertion-using-the-IDP-s-certificate/m-p/498598#M11376</guid>
      <dc:creator>jkat54</dc:creator>
      <dc:date>2019-11-28T16:03:04Z</dc:date>
    </item>
    <item>
      <title>Re: Verification of SAML assertion using the IDP's certificate provided failed. Error: Failed to verify signature with c</title>
      <link>https://community.splunk.com/t5/Security/Verification-of-SAML-assertion-using-the-IDP-s-certificate/m-p/632089#M16603</link>
      <description>&lt;P&gt;In our case we were configuring Splunk for SAML authentication with Ping as the identity provider (IDP) with Splunk Enterprise version 8.2.7.1. After extensive troubleshooting we discovered that we needed a few check boxes in the Ping certificate configuration.&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;INCLUDE THE CERTIFICATE IN THE SIGNATURE &amp;lt;KEYINFO&amp;gt; ELEMENT&lt;/LI&gt;&lt;LI&gt;&lt;SPAN&gt;INCLUDE THE RAW KEY IN THE SIGNATURE &amp;lt;KEYVALUE&amp;gt; ELEMENT&lt;/SPAN&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="PingCertificateConfiguration.PNG" style="width: 999px;"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/24024i6CC5FA722C01C2B1/image-size/large?v=v2&amp;amp;px=999" role="button" title="PingCertificateConfiguration.PNG" alt="PingCertificateConfiguration.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;We discovered this after comparing the SAMLResponse between a working and non-working environment and noticing that the KeyInfo data was missing in the&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;&amp;lt;ds:KeyInfo&amp;gt;
&amp;lt;ds:X509Data&amp;gt;
&amp;lt;ds:X509Certificate&amp;gt;[CERTIFICATE TEXT REDACTED]
&amp;lt;/ds:X509Certificate&amp;gt;
&amp;lt;/ds:X509Data&amp;gt;
&amp;lt;ds:KeyValue&amp;gt;
&amp;lt;ds:RSAKeyValue&amp;gt;
&amp;lt;ds:Modulus&amp;gt;[MODULUS TEXT REDACTED]
&amp;lt;/ds:Modulus&amp;gt;
&amp;lt;ds:Exponent&amp;gt;AQAB
&amp;lt;/ds:Exponent&amp;gt;
&amp;lt;/ds:RSAKeyValue&amp;gt;
&amp;lt;/ds:KeyValue&amp;gt;
&amp;lt;/ds:KeyInfo&amp;gt; &lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 23 Feb 2023 21:44:39 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/Verification-of-SAML-assertion-using-the-IDP-s-certificate/m-p/632089#M16603</guid>
      <dc:creator>ericnewman</dc:creator>
      <dc:date>2023-02-23T21:44:39Z</dc:date>
    </item>
  </channel>
</rss>

