<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Splunk CAC Authentication not working in Security</title>
    <link>https://community.splunk.com/t5/Security/Splunk-CAC-Authentication-not-working/m-p/690768#M17933</link>
    <description>&lt;P&gt;So, there is two ways to do this CAC authentication.&amp;nbsp; &amp;nbsp;SAML or LDAP trusted methods.&amp;nbsp; Before, I thought PKI was just one option but, SAML open up another option.&lt;/P&gt;&lt;P&gt;I hope this helps:&amp;nbsp;&amp;nbsp;&lt;A href="https://docs.splunk.com/Documentation/SplunkCloud/latest/Security/HowSAMLSSOworks" target="_blank"&gt;Configure single sign-on with SAML - Splunk Documentation&lt;/A&gt;&lt;/P&gt;</description>
    <pubDate>Wed, 11 Sep 2024 22:36:03 GMT</pubDate>
    <dc:creator>youngsuh</dc:creator>
    <dc:date>2024-09-11T22:36:03Z</dc:date>
    <item>
      <title>Splunk CAC Authentication not working</title>
      <link>https://community.splunk.com/t5/Security/Splunk-CAC-Authentication-not-working/m-p/639837#M16911</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am attempting to configure splunk to allow users to authenticate via CAC card using LDAP. However when I attempt to log in I get forwarded to a page that simply says "Unauthorized". This suggested to me that splunk is successfully reading my card, but rejecting my credentials for some reason.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Checking splunkd.log shows that whenever I attempt to log in i get the message "Account John D Johnson does not exist".&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Looking in active directory users and computers the account splunk is searching for from the card does seem to not exist, however I'm able to log in to my computer with it, so it must exist in some capacity.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;My thoughts are that splunk is searching for the account with a field that does not match the field it is looking for in AD. Is there any way to tell splunk what value it should be trying to match on the CAC card in AD?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I tried changing the values of userNameAttribute in authorize.conf but it seems to have had no affect. My config files are below.&lt;BR /&gt;&lt;BR /&gt;authentication.conf&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;[authentication]
authSettings = xx
authType = LDAP

[xx]
SSLEnabled = 1
anonymous_referrals = 1
bindDN = xx
bindDNpassword =xx
charset = utf8
emailAttribute = mail
enableRangeRetrieval = 0
groupBaseDN = OU=IT,OU=Groups,OU=RM,DC=xx,DC=xx,DC=xx
groupMappingAttribute = dn
groupMemberAttribute = member
groupNameAttribute = cn
host = xx
nestedGroups = 0
network_timeout = 20
pagelimit = -1
port = 636
realNameAttribute = displayname
sizelimit = 30000
timelimit = 30
userBaseDN = DC=xx,DC=xx,DC=xx
userNameAttribute = userprincipalname
#userBaseDN = DC=xx,DC=xx,DC=xx
#userNameAttribute = samaccountname

[roleMap_xx]
admin = xx SPLUNK Admins
isso normal user = xx SPLUNK isso Normal Users
operations normal user = xx SPLUNK Operations Normal Users
user = xx SPLUNK Admins
&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;web.conf&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;[settings]
httpport = 8000
enableSplunkWebSSL = 1
requireClientCert = 1
sslRootCAPath = C:\Program Files\Splunk\etc\auth\safezone\combined_pivfirst.pem
enableCertBasedUserAuth = 1
SSOMode = permissive
trustedIP = 127.0.0.1
certBasedUserAuthMethod = commonname
privKeyPath = etc\auth\splunkweb\xx.key
serverCert = etc\auth\splunkweb\xx.pem
loginBackgroundImageOption = custom
loginCustomBackgroundImage = search:logincustombg/Warning_for_Official_Use_Only!.jpg
tools.sessions.timeout = 5&lt;/LI-CODE&gt;</description>
      <pubDate>Thu, 13 Apr 2023 17:08:00 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/Splunk-CAC-Authentication-not-working/m-p/639837#M16911</guid>
      <dc:creator>xwill13</dc:creator>
      <dc:date>2023-04-13T17:08:00Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk CAC Authentication not working</title>
      <link>https://community.splunk.com/t5/Security/Splunk-CAC-Authentication-not-working/m-p/690768#M17933</link>
      <description>&lt;P&gt;So, there is two ways to do this CAC authentication.&amp;nbsp; &amp;nbsp;SAML or LDAP trusted methods.&amp;nbsp; Before, I thought PKI was just one option but, SAML open up another option.&lt;/P&gt;&lt;P&gt;I hope this helps:&amp;nbsp;&amp;nbsp;&lt;A href="https://docs.splunk.com/Documentation/SplunkCloud/latest/Security/HowSAMLSSOworks" target="_blank"&gt;Configure single sign-on with SAML - Splunk Documentation&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 11 Sep 2024 22:36:03 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/Splunk-CAC-Authentication-not-working/m-p/690768#M17933</guid>
      <dc:creator>youngsuh</dc:creator>
      <dc:date>2024-09-11T22:36:03Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk CAC Authentication not working</title>
      <link>https://community.splunk.com/t5/Security/Splunk-CAC-Authentication-not-working/m-p/691688#M17945</link>
      <description>&lt;P&gt;I just ran into the same issue. I upgraded to splunk 9.2.1 and everything seemed to be working fine,&amp;nbsp; and now I am unable to authenticate using cac card&lt;/P&gt;</description>
      <pubDate>Wed, 26 Jun 2024 14:48:10 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/Splunk-CAC-Authentication-not-working/m-p/691688#M17945</guid>
      <dc:creator>mlousch</dc:creator>
      <dc:date>2024-06-26T14:48:10Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk CAC Authentication not working</title>
      <link>https://community.splunk.com/t5/Security/Splunk-CAC-Authentication-not-working/m-p/696899#M18079</link>
      <description>&lt;P&gt;If you are Army you need to be on versions&lt;/P&gt;&lt;P&gt;9.0.10, 9.1.5, or 9.2.2&lt;/P&gt;&lt;P&gt;There was a bug that was fixed and pushed on 7/1/2024&lt;/P&gt;</description>
      <pubDate>Tue, 20 Aug 2024 22:12:27 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/Splunk-CAC-Authentication-not-working/m-p/696899#M18079</guid>
      <dc:creator>cmcgee_splunk</dc:creator>
      <dc:date>2024-08-20T22:12:27Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk CAC Authentication not working</title>
      <link>https://community.splunk.com/t5/Security/Splunk-CAC-Authentication-not-working/m-p/698822#M18099</link>
      <description>&lt;P&gt;I am also having this issue. We are on Splunk 9.3.0 So for Army it is not possible to use DoD CAC authentication with this version?&lt;/P&gt;</description>
      <pubDate>Wed, 11 Sep 2024 19:07:28 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/Splunk-CAC-Authentication-not-working/m-p/698822#M18099</guid>
      <dc:creator>Ty_Rob</dc:creator>
      <dc:date>2024-09-11T19:07:28Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk CAC Authentication not working</title>
      <link>https://community.splunk.com/t5/Security/Splunk-CAC-Authentication-not-working/m-p/698823#M18100</link>
      <description>&lt;P&gt;Anything above 9.2.2 will have the fix, so you should be fine with 9.3. What is the value you are using for&amp;nbsp;userNameAttribute in authentication.conf?&lt;/P&gt;</description>
      <pubDate>Wed, 11 Sep 2024 19:11:48 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/Splunk-CAC-Authentication-not-working/m-p/698823#M18100</guid>
      <dc:creator>cmcgee_splunk</dc:creator>
      <dc:date>2024-09-11T19:11:48Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk CAC Authentication not working</title>
      <link>https://community.splunk.com/t5/Security/Splunk-CAC-Authentication-not-working/m-p/698825#M18101</link>
      <description>&lt;P&gt;userNameAttribute = samaccountname&lt;/P&gt;</description>
      <pubDate>Wed, 11 Sep 2024 19:20:10 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/Splunk-CAC-Authentication-not-working/m-p/698825#M18101</guid>
      <dc:creator>Ty_Rob</dc:creator>
      <dc:date>2024-09-11T19:20:10Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk CAC Authentication not working</title>
      <link>https://community.splunk.com/t5/Security/Splunk-CAC-Authentication-not-working/m-p/698826#M18102</link>
      <description>&lt;P&gt;The value for&amp;nbsp;userNameAttribute needs to be userPrincipalName to match the value being extracted from the CAC&lt;/P&gt;</description>
      <pubDate>Wed, 11 Sep 2024 19:34:36 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/Splunk-CAC-Authentication-not-working/m-p/698826#M18102</guid>
      <dc:creator>cmcgee_splunk</dc:creator>
      <dc:date>2024-09-11T19:34:36Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk CAC Authentication not working</title>
      <link>https://community.splunk.com/t5/Security/Splunk-CAC-Authentication-not-working/m-p/698827#M18103</link>
      <description>&lt;P&gt;Ok thanks I will update that. What needs to be in the web.conf file to enable CAC login I currently have&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;[settings]
httpport = 8000
enableSplunkWebSSL = 1
tools.sessions.timeout = 15
requireClientCert = true

enableCertBasedUserAuth = true

SSOMode = permissive

trustedIP = 127.0.0.1

certBasedUserAuthMethod = commonname

allowSsoWithoutChangingServerConf = 1

privKeyPath = E:\SPLUNKent\etc\auth\mycerts\xx.key
serverCert = E:\SPLUNKent\etc\auth\mycerts\xx.pem&lt;/LI-CODE&gt;</description>
      <pubDate>Wed, 11 Sep 2024 23:32:34 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/Splunk-CAC-Authentication-not-working/m-p/698827#M18103</guid>
      <dc:creator>Ty_Rob</dc:creator>
      <dc:date>2024-09-11T23:32:34Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk CAC Authentication not working</title>
      <link>https://community.splunk.com/t5/Security/Splunk-CAC-Authentication-not-working/m-p/698834#M18104</link>
      <description>&lt;P&gt;For web.conf&lt;BR /&gt;Change the AuthMethod, and add the PivOid list&lt;BR /&gt;&lt;BR /&gt;certBasedUserAuthMethod = PIV&lt;BR /&gt;certBasedUserAuthPivOidList = 1.3.6.1.4.1.311.20.2.3, Microsoft Universal Principal Name&lt;/P&gt;</description>
      <pubDate>Wed, 11 Sep 2024 20:57:23 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/Splunk-CAC-Authentication-not-working/m-p/698834#M18104</guid>
      <dc:creator>cmcgee_splunk</dc:creator>
      <dc:date>2024-09-11T20:57:23Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk CAC Authentication not working</title>
      <link>https://community.splunk.com/t5/Security/Splunk-CAC-Authentication-not-working/m-p/698913#M18105</link>
      <description>&lt;P&gt;Since Splunk 6.x we have been using a proxy server (Apache) with Splunk to pass the user's CAC credentials to Splunk.&amp;nbsp; Is it true that with 9.2.2, a proxy is no longer needed?&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;I'm also trying to implement CAC authentication following&amp;nbsp;&lt;A href="https://docs.splunk.com/Documentation/Splunk/latest/Security/SetupCACPIV" target="_blank"&gt;Configure Splunk Enterprise to use a common access card for authentication - Splunk Documentation&lt;/A&gt;&amp;nbsp;and&amp;nbsp;&lt;A href="https://lantern.splunk.com/Splunk_Platform/Product_Tips/Administration/Configuring_Splunk_for_Common_Access_Card_(CAC)_authentication#4._Switch_from_Splunk.E2.80.99s_.22native_authentication.22_to_CAC-enforced_authentication" target="_blank"&gt;Configuring Splunk for Common Access Card (CAC) authentication - Splunk Lantern&lt;/A&gt;, but now getting the following error message: "This site can't be reached"&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 12 Sep 2024 14:12:04 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/Splunk-CAC-Authentication-not-working/m-p/698913#M18105</guid>
      <dc:creator>computermathguy</dc:creator>
      <dc:date>2024-09-12T14:12:04Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk CAC Authentication not working</title>
      <link>https://community.splunk.com/t5/Security/Splunk-CAC-Authentication-not-working/m-p/698914#M18106</link>
      <description>&lt;P&gt;Currently the above fix is only for Microsoft ADFS, but it is possible using Okta and F5 using the SAML configuration with the prompt being on the IdP side. What is your IdP?&lt;/P&gt;</description>
      <pubDate>Thu, 12 Sep 2024 14:17:28 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/Splunk-CAC-Authentication-not-working/m-p/698914#M18106</guid>
      <dc:creator>cmcgee_splunk</dc:creator>
      <dc:date>2024-09-12T14:17:28Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk CAC Authentication not working</title>
      <link>https://community.splunk.com/t5/Security/Splunk-CAC-Authentication-not-working/m-p/698925#M18107</link>
      <description>&lt;P&gt;I made those changes and when I go to the webpage it prompts me for a pin then I get the following error after entering my cac pin:&lt;/P&gt;&lt;P&gt;This XML file does not appear to have any style information associated with it. The document tree is shown below.&lt;BR /&gt;&amp;lt;response&amp;gt;&lt;BR /&gt;&amp;lt;messages&amp;gt;&lt;BR /&gt;&amp;lt;msg type="ERROR"&amp;gt;Unauthorized&amp;lt;/msg&amp;gt;&lt;BR /&gt;&amp;lt;/messages&amp;gt;&lt;BR /&gt;&amp;lt;/response&amp;gt;&lt;/P&gt;</description>
      <pubDate>Thu, 12 Sep 2024 15:57:06 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/Splunk-CAC-Authentication-not-working/m-p/698925#M18107</guid>
      <dc:creator>Ty_Rob</dc:creator>
      <dc:date>2024-09-12T15:57:06Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk CAC Authentication not working</title>
      <link>https://community.splunk.com/t5/Security/Splunk-CAC-Authentication-not-working/m-p/698947#M18109</link>
      <description>&lt;P&gt;&lt;SPAN&gt;Adding this attribute&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;enableCertBasedUserAuth = true \&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;to web.conf,&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;generates the below proxy error&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;SPAN&gt;The proxy server received an invalid response from an upstream server.&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;The proxy server could not handle the request&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;Reason: Error reading from remote server&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 12 Sep 2024 20:48:07 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/Splunk-CAC-Authentication-not-working/m-p/698947#M18109</guid>
      <dc:creator>computermathguy</dc:creator>
      <dc:date>2024-09-12T20:48:07Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk CAC Authentication not working</title>
      <link>https://community.splunk.com/t5/Security/Splunk-CAC-Authentication-not-working/m-p/699892#M18123</link>
      <description>&lt;P&gt;There should be an error in splunkd when you get redirected to unauthorized that states what user it was trying to log in as. Also if you changed it from samaccountname to userprincipalname you will have to modify it on the AD/ADFS side as well.&lt;/P&gt;</description>
      <pubDate>Mon, 23 Sep 2024 23:04:28 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/Splunk-CAC-Authentication-not-working/m-p/699892#M18123</guid>
      <dc:creator>cmcgee_splunk</dc:creator>
      <dc:date>2024-09-23T23:04:28Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk CAC Authentication not working</title>
      <link>https://community.splunk.com/t5/Security/Splunk-CAC-Authentication-not-working/m-p/699893#M18124</link>
      <description>&lt;P&gt;This error could be caused by a few things, do you have updated protocol? Do you have all the certs required? Are you actually routing through a proxy? Are there any more errors than that?&lt;/P&gt;</description>
      <pubDate>Mon, 23 Sep 2024 23:07:34 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/Splunk-CAC-Authentication-not-working/m-p/699893#M18124</guid>
      <dc:creator>cmcgee_splunk</dc:creator>
      <dc:date>2024-09-23T23:07:34Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk CAC Authentication not working</title>
      <link>https://community.splunk.com/t5/Security/Splunk-CAC-Authentication-not-working/m-p/744941#M18418</link>
      <description>&lt;P&gt;♪♫♬ And they say that a hero could saaaaaaave us&lt;/P&gt;&lt;P&gt;I'm not gonna stand here and waaaaaaaait&amp;nbsp;♪♫♬&lt;/P&gt;</description>
      <pubDate>Thu, 24 Apr 2025 19:50:08 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/Splunk-CAC-Authentication-not-working/m-p/744941#M18418</guid>
      <dc:creator>jnoose</dc:creator>
      <dc:date>2025-04-24T19:50:08Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk CAC Authentication not working</title>
      <link>https://community.splunk.com/t5/Security/Splunk-CAC-Authentication-not-working/m-p/744946#M18419</link>
      <description>&lt;P&gt;Sorry for the late response.&amp;nbsp; We opted to stay with using Apache as an SSL proxy to pass the user's credentials to Splunk.&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 24 Apr 2025 20:29:36 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/Splunk-CAC-Authentication-not-working/m-p/744946#M18419</guid>
      <dc:creator>computermathguy</dc:creator>
      <dc:date>2025-04-24T20:29:36Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk CAC Authentication not working</title>
      <link>https://community.splunk.com/t5/Security/Splunk-CAC-Authentication-not-working/m-p/753557#M18520</link>
      <description>&lt;P&gt;Just documenting a mental note for myself and others navigating CAC enablement:&lt;/P&gt;&lt;P&gt;After working through the options, things are much clearer now. There are &lt;STRONG&gt;multiple paths&lt;/STRONG&gt; to integrate CAC authentication, each with trade-offs:&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;&lt;P&gt;&lt;STRONG&gt;SAML via CAC&lt;/STRONG&gt; – This is the most straightforward and scalable option. It requires F5 configuration as a SAML Service Provider and integrates cleanly with enterprise IdPs like Microsoft Entra ID. It simplifies certificate validation and user mapping.&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;&lt;STRONG&gt;LDAP/AD via CAC&lt;/STRONG&gt; – Also requires F5, but involves deeper complexity: LDAP schema alignment, altsecid mapping, and certificate parsing. It’s more effort-intensive and better suited for legacy environments.&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;&lt;STRONG&gt;Header-Based SSO via F5 + LDAP&lt;/STRONG&gt; – F5 handles CAC auth and injects headers based on LDAP attributes. Useful for apps that don’t support SAML or OAuth directly.&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;&lt;STRONG&gt;Direct Smart Card Logon to Windows Domain&lt;/STRONG&gt; – Enables CAC-based workstation or domain logon. Requires registry tweaks and trusted CA enforcement. Best for tightly controlled on-prem environments.&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;&lt;STRONG&gt;Hybrid Models&lt;/STRONG&gt; – Some environments combine SAML for web apps and LDAP for legacy systems, using F5 to bridge both. This adds flexibility but increases configuration overhead.&lt;/P&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;If you're starting fresh or aiming for simplicity, &lt;STRONG&gt;SAML via CAC is the cleanest and most future-proof path&lt;/STRONG&gt;, especially in environments already using F5 and federated identity.&lt;/P&gt;&lt;P&gt;Hope this helps others exploring CAC integration—especially in Zero Trust-aligned architectures.&lt;/P&gt;</description>
      <pubDate>Wed, 24 Sep 2025 15:44:24 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/Splunk-CAC-Authentication-not-working/m-p/753557#M18520</guid>
      <dc:creator>youngsuh</dc:creator>
      <dc:date>2025-09-24T15:44:24Z</dc:date>
    </item>
  </channel>
</rss>

