<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Problem with SSO SAML  (Splunk  6.5) in Security</title>
    <link>https://community.splunk.com/t5/Security/Problem-with-SSO-SAML-Splunk-6-5/m-p/295158#M7916</link>
    <description>&lt;P&gt;Please post your authentication.conf&lt;/P&gt;</description>
    <pubDate>Tue, 14 Feb 2017 18:15:42 GMT</pubDate>
    <dc:creator>suarezry</dc:creator>
    <dc:date>2017-02-14T18:15:42Z</dc:date>
    <item>
      <title>Problem with SSO SAML  (Splunk  6.5)</title>
      <link>https://community.splunk.com/t5/Security/Problem-with-SSO-SAML-Splunk-6-5/m-p/295153#M7911</link>
      <description>&lt;P&gt;Splunk issues the HTTP POST to our IdP with the auth request ,&lt;BR /&gt;on the browser we login to our IdP successfully , submit the form and then get HTTP POST back to Splunk with Auth Msg/Response&lt;BR /&gt;The splunk main/splash page then appears (but without the login/pwd prompts ) and displays a "No arguments found" message.&lt;BR /&gt;Splunkd.log file shows a similar message . &lt;BR /&gt;Haven't seen any info on this message on the boards.. but maybe something basic. Any thoughts on what this might mean? &lt;BR /&gt;thanks!&lt;/P&gt;</description>
      <pubDate>Sun, 07 Jun 2020 17:58:51 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/Problem-with-SSO-SAML-Splunk-6-5/m-p/295153#M7911</guid>
      <dc:creator>cm248k</dc:creator>
      <dc:date>2020-06-07T17:58:51Z</dc:date>
    </item>
    <item>
      <title>Re: Problem with SSO SAML  (Splunk  6.5)</title>
      <link>https://community.splunk.com/t5/Security/Problem-with-SSO-SAML-Splunk-6-5/m-p/295154#M7912</link>
      <description>&lt;P&gt;Use this browser plugin to trace your SAML exchange:&lt;BR /&gt;
&lt;A href="https://addons.mozilla.org/en-US/firefox/addon/saml-tracer/"&gt;https://addons.mozilla.org/en-US/firefox/addon/saml-tracer/&lt;/A&gt;&lt;/P&gt;

&lt;P&gt;What does the response from the IdP look like?&lt;/P&gt;</description>
      <pubDate>Sat, 11 Feb 2017 00:54:25 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/Problem-with-SSO-SAML-Splunk-6-5/m-p/295154#M7912</guid>
      <dc:creator>suarezry</dc:creator>
      <dc:date>2017-02-11T00:54:25Z</dc:date>
    </item>
    <item>
      <title>Re: Problem with SSO SAML  (Splunk  6.5)</title>
      <link>https://community.splunk.com/t5/Security/Problem-with-SSO-SAML-Splunk-6-5/m-p/295155#M7913</link>
      <description>&lt;P&gt;Thanks ...  See Idp Response below (exported from saml  tracer)&lt;BR /&gt;&lt;BR /&gt;
Instead of "role","realName" and "mail" which I believe Splunk expects : Idp returns  "Groups","FederationKey", and "Email" in the response.&lt;BR /&gt;
I believe I need to map these to role,realName, mail in the SAML config, which  I did try doing that but same "No arguments found" error  resulted. Thinking  its probably something basic at this point ...&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;&amp;lt;samlp:Response xmlns:saml="urn:oasis:names:tc:SAML:2.0:assertion"
                ID="_37173e23-c4d4-46d6-85c5-0786e1d651f0"
                Version="2.0"
                IssueInstant="2017-02-10T16:53:10Z"
                Destination="http://www.test.com:8000//saml/acs"
                xmlns:samlp="urn:oasis:names:tc:SAML:2.0:protocol"
                &amp;gt;
    &amp;lt;saml:Issuer&amp;gt;www.auth.test.com&amp;lt;/saml:Issuer&amp;gt;
    &amp;lt;Signature xmlns="http://www.w3.org/2000/09/xmldsig#"&amp;gt;
        &amp;lt;SignedInfo&amp;gt;
            &amp;lt;CanonicalizationMethod Algorithm="http://www.w3.org/2001/10/xml-exc-c14n#" /&amp;gt;
            &amp;lt;SignatureMethod Algorithm="http://www.w3.org/2000/09/xmldsig#rsa-sha1" /&amp;gt;
            &amp;lt;Reference URI="#_37173e23-c4d4-46d6-85c5-0786e1d651f0"&amp;gt;
                &amp;lt;Transforms&amp;gt;
                    &amp;lt;Transform Algorithm="http://www.w3.org/2000/09/xmldsig#enveloped-signature" /&amp;gt;
                    &amp;lt;Transform Algorithm="http://www.w3.org/2001/10/xml-exc-c14n#" /&amp;gt;
                &amp;lt;/Transforms&amp;gt;
                &amp;lt;DigestMethod Algorithm="http://www.w3.org/2000/09/xmldsig#sha1" /&amp;gt;
                &amp;lt;DigestValue&amp;gt;FrMXOU9JKV2KMVT70BhsZMBm330=&amp;lt;/DigestValue&amp;gt;
            &amp;lt;/Reference&amp;gt;
        &amp;lt;/SignedInfo&amp;gt;
        &amp;lt;SignatureValue&amp;gt; removed signature here==&amp;lt;/SignatureValue&amp;gt;
        &amp;lt;KeyInfo&amp;gt;
            &amp;lt;X509Data&amp;gt;
                &amp;lt;X509Certificate&amp;gt; removed cert here...&amp;lt;/X509Certificate&amp;gt;
            &amp;lt;/X509Data&amp;gt;
        &amp;lt;/KeyInfo&amp;gt;
    &amp;lt;/Signature&amp;gt;
    &amp;lt;samlp:Status&amp;gt;
        &amp;lt;samlp:StatusCode Value="urn:oasis:names:tc:SAML:2.0:status:Success" /&amp;gt;
    &amp;lt;/samlp:Status&amp;gt;
    &amp;lt;saml:Assertion Version="2.0"
                    ID="_a4f4ebeb-42d4-47aa-9290-7ddbf2d39884"
                    IssueInstant="2017-02-10T16:53:10Z"
                    &amp;gt;
        &amp;lt;saml:Issuer&amp;gt;www.auth.test.com&amp;lt;/saml:Issuer&amp;gt;
        &amp;lt;saml:Subject&amp;gt;
            &amp;lt;saml:NameID NameQualifier="www.auth.test.com"&amp;gt;chrism@test.com&amp;lt;/saml:NameID&amp;gt;
            &amp;lt;saml:SubjectConfirmation Method="urn:oasis:names:tc:SAML:2.0:cm:bearer"&amp;gt;
                &amp;lt;saml:SubjectConfirmationData NotOnOrAfter="2017-02-10T16:58:10Z"
                                              Recipient="http://www.test.com:8000//saml/acs"
                                              /&amp;gt;
            &amp;lt;/saml:SubjectConfirmation&amp;gt;
        &amp;lt;/saml:Subject&amp;gt;
        &amp;lt;saml:Conditions NotBefore="2017-02-10T16:48:10Z"
                         NotOnOrAfter="2017-02-10T16:58:10Z"
                         &amp;gt;
            &amp;lt;saml:AudienceRestriction&amp;gt;
                &amp;lt;saml:Audience&amp;gt;http://www.test.com:8000//saml/acs&amp;lt;/saml:Audience&amp;gt;
            &amp;lt;/saml:AudienceRestriction&amp;gt;
        &amp;lt;/saml:Conditions&amp;gt;
        &amp;lt;saml:AuthnStatement AuthnInstant="2017-02-10T16:53:10Z"
                             SessionIndex="1885244480"
                             &amp;gt;
            &amp;lt;saml:AuthnContext&amp;gt;
                &amp;lt;saml:AuthnContextClassRef&amp;gt;urn:oasis:names:tc:SAML:2.0:ac:classes:unspecified&amp;lt;/saml:AuthnContextClassRef&amp;gt;
            &amp;lt;/saml:AuthnContext&amp;gt;
        &amp;lt;/saml:AuthnStatement&amp;gt;
        &amp;lt;saml:AttributeStatement&amp;gt;
            &amp;lt;saml:Attribute Name="FederationKey"
                            NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"
                            FriendlyName="header"
                            &amp;gt;
                &amp;lt;saml:AttributeValue xmlns:q1="http://www.w3.org/2001/XMLSchema"
                                     p7:type="q1:string"
                                     xmlns:p7="http://www.w3.org/2001/XMLSchema-instance"
                                     &amp;gt;chrism@test.com&amp;lt;/saml:AttributeValue&amp;gt;
            &amp;lt;/saml:Attribute&amp;gt;
            &amp;lt;saml:Attribute Name="Groups"
                            NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"
                            &amp;gt;
                &amp;lt;saml:AttributeValue xmlns:q2="http://www.w3.org/2001/XMLSchema"
                                     p7:type="q2:string"
                                     xmlns:p7="http://www.w3.org/2001/XMLSchema-instance"
                                     &amp;gt;&amp;amp;quot;HRUserGroup&amp;amp;quot;,&amp;amp;quot;TEST_EMP&amp;amp;quot;,&amp;amp;quot;TEST_MGR&amp;amp;quot;&amp;lt;/saml:AttributeValue&amp;gt;
            &amp;lt;/saml:Attribute&amp;gt;
            &amp;lt;saml:Attribute Name="FirstName"
                            NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"
                            &amp;gt;
                &amp;lt;saml:AttributeValue xmlns:q3="http://www.w3.org/2001/XMLSchema"
                                     p7:type="q3:string"
                                     xmlns:p7="http://www.w3.org/2001/XMLSchema-instance"
                                     &amp;gt;CHRISTOPHER&amp;lt;/saml:AttributeValue&amp;gt;
            &amp;lt;/saml:Attribute&amp;gt;
            &amp;lt;saml:Attribute Name="Email"
                            NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"
                            &amp;gt;
                &amp;lt;saml:AttributeValue xmlns:q4="http://www.w3.org/2001/XMLSchema"
                                     p7:type="q4:string"
                                     xmlns:p7="http://www.w3.org/2001/XMLSchema-instance"
                                     &amp;gt;chrism@test.com&amp;lt;/saml:AttributeValue&amp;gt;
            &amp;lt;/saml:Attribute&amp;gt;
        &amp;lt;/saml:AttributeStatement&amp;gt;
    &amp;lt;/saml:Assertion&amp;gt;
&amp;lt;/samlp:Response&amp;gt;
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Sun, 12 Feb 2017 22:29:23 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/Problem-with-SSO-SAML-Splunk-6-5/m-p/295155#M7913</guid>
      <dc:creator>cm248k</dc:creator>
      <dc:date>2017-02-12T22:29:23Z</dc:date>
    </item>
    <item>
      <title>Re: Problem with SSO SAML  (Splunk  6.5)</title>
      <link>https://community.splunk.com/t5/Security/Problem-with-SSO-SAML-Splunk-6-5/m-p/295156#M7914</link>
      <description>&lt;P&gt;Ok, so you'll need to tell splunk how to map your saml roles.  You'll need the following in your &lt;A href="https://docs.splunk.com/Documentation/Splunk/6.5.2/Admin/Authenticationconf"&gt;authentication.conf&lt;/A&gt;:&lt;/P&gt;

&lt;BLOCKQUOTE&gt;
&lt;P&gt;[authenticationResponseAttrMap_SAML]&lt;BR /&gt;
 mail = Email&lt;BR /&gt;
realName = FirstName &lt;BR /&gt;
role = Groups&lt;/P&gt;
&lt;/BLOCKQUOTE&gt;</description>
      <pubDate>Tue, 14 Feb 2017 12:45:20 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/Problem-with-SSO-SAML-Splunk-6-5/m-p/295156#M7914</guid>
      <dc:creator>suarezry</dc:creator>
      <dc:date>2017-02-14T12:45:20Z</dc:date>
    </item>
    <item>
      <title>Re: Problem with SSO SAML  (Splunk  6.5)</title>
      <link>https://community.splunk.com/t5/Security/Problem-with-SSO-SAML-Splunk-6-5/m-p/295157#M7915</link>
      <description>&lt;P&gt;Thanks but  still no luck .  Same error in the logs (splunkd.log)&lt;BR /&gt;&lt;BR /&gt;
"ERROR UiSAML - no arguments found." &lt;/P&gt;</description>
      <pubDate>Tue, 14 Feb 2017 17:18:54 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/Problem-with-SSO-SAML-Splunk-6-5/m-p/295157#M7915</guid>
      <dc:creator>cm248k</dc:creator>
      <dc:date>2017-02-14T17:18:54Z</dc:date>
    </item>
    <item>
      <title>Re: Problem with SSO SAML  (Splunk  6.5)</title>
      <link>https://community.splunk.com/t5/Security/Problem-with-SSO-SAML-Splunk-6-5/m-p/295158#M7916</link>
      <description>&lt;P&gt;Please post your authentication.conf&lt;/P&gt;</description>
      <pubDate>Tue, 14 Feb 2017 18:15:42 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/Problem-with-SSO-SAML-Splunk-6-5/m-p/295158#M7916</guid>
      <dc:creator>suarezry</dc:creator>
      <dc:date>2017-02-14T18:15:42Z</dc:date>
    </item>
    <item>
      <title>Re: Problem with SSO SAML  (Splunk  6.5)</title>
      <link>https://community.splunk.com/t5/Security/Problem-with-SSO-SAML-Splunk-6-5/m-p/295159#M7917</link>
      <description>&lt;P&gt;[authentication]&lt;BR /&gt;
authSettings = saml&lt;BR /&gt;
authType = SAML&lt;/P&gt;

&lt;P&gt;[roleMap_SAML]&lt;BR /&gt;
admin = admin;mgr&lt;/P&gt;

&lt;P&gt;[saml]&lt;BR /&gt;
entityId = &lt;A href="http://www.auth.test.com"&gt;www.auth.test.com&lt;/A&gt;&lt;BR /&gt;
fqdn = &lt;A href="http://www.test.com"&gt;http://www.test.com&lt;/A&gt;&lt;BR /&gt;
idpCertPath = idpCert.pem&lt;BR /&gt;
idpSLOUrl = &lt;A href="https://www.auth.test.com/usersvcs/cspsaml/ssologout.aspx?service=astrasplunk&amp;amp;servicetype=stage"&gt;https://www.auth.test.com/usersvcs/cspsaml/ssologout.aspx?service=astrasplunk&amp;amp;servicetype=stage&lt;/A&gt;&lt;BR /&gt;
idpSSOUrl = &lt;A href="https://www.auth.test.com/usersvcs/cspsaml/?service=astrasplunk&amp;amp;servicetype=stage"&gt;https://www.auth.test.com/usersvcs/cspsaml/?service=astrasplunk&amp;amp;servicetype=stage&lt;/A&gt;&lt;BR /&gt;
issuerId = &lt;A href="http://www.auth.test.com"&gt;www.auth.test.com&lt;/A&gt; (also tried removing this, no difference)&lt;BR /&gt;
nameIdFormat = urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress&lt;BR /&gt;
redirectPort = 8000&lt;BR /&gt;
signAuthnRequest = false&lt;BR /&gt;
signatureAlgorithm = RSA-SHA1&lt;BR /&gt;
signedAssertion = false&lt;BR /&gt;
sloBinding = HTTPPost&lt;BR /&gt;
sslKeysfile = /opt/splunk/etc/auth/server.pem&lt;BR /&gt;
sslKeysfilePassword = $1$h/QE0gGYmEQv&lt;BR /&gt;
ssoBinding = HTTPPost&lt;/P&gt;

&lt;P&gt;[authenticationResponseAttrMap_SAML]&lt;BR /&gt;
mail = Email&lt;BR /&gt;
realName = FederationKey ( this attribute maps to email address, also tried FirstName, no change)&lt;BR /&gt;
role = Groups&lt;BR /&gt;
~&lt;/P&gt;</description>
      <pubDate>Tue, 14 Feb 2017 18:32:31 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/Problem-with-SSO-SAML-Splunk-6-5/m-p/295159#M7917</guid>
      <dc:creator>cm248k</dc:creator>
      <dc:date>2017-02-14T18:32:31Z</dc:date>
    </item>
    <item>
      <title>Re: Problem with SSO SAML  (Splunk  6.5)</title>
      <link>https://community.splunk.com/t5/Security/Problem-with-SSO-SAML-Splunk-6-5/m-p/295160#M7918</link>
      <description>&lt;P&gt;I suggest you familiarize yourself with all the SAML bits in &lt;A href="https://docs.splunk.com/Documentation/Splunk/6.5.2/Admin/Authenticationconf" target="_blank"&gt;authentication.conf&lt;/A&gt;.&lt;/P&gt;

&lt;BLOCKQUOTE&gt;
&lt;P&gt;entityId = &lt;A href="http://www.auth.test.com" target="_blank"&gt;www.auth.test.com&lt;/A&gt;&lt;/P&gt;
&lt;/BLOCKQUOTE&gt;

&lt;P&gt;This is supposed to be the entityId of your splunk instance, not your IdP&lt;/P&gt;

&lt;BLOCKQUOTE&gt;
&lt;P&gt;issuerId = &lt;A href="http://www.auth.test.com" target="_blank"&gt;www.auth.test.com&lt;/A&gt;&lt;/P&gt;
&lt;/BLOCKQUOTE&gt;

&lt;P&gt;Where did you get this?  It doesn't exist in authentication.conf.  You can delete this line.&lt;/P&gt;

&lt;BLOCKQUOTE&gt;
&lt;P&gt;nameIdFormat = urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress&lt;/P&gt;
&lt;/BLOCKQUOTE&gt;

&lt;PRE&gt;&lt;CODE&gt;&amp;lt;saml:NameID NameQualifier="www.auth.test.com"&amp;gt;chrism@test.com&amp;lt;/saml:NameID&amp;gt;
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;You're restricting the nameid format but the response doesn't include the format.  Since this is an optional setting I'd remove this while troubleshooting.  (You can add it back later if you wish once you confirm everything is working).&lt;/P&gt;

&lt;BLOCKQUOTE&gt;
&lt;P&gt;signatureAlgorithm = RSA-SHA1&lt;BR /&gt;
signedAssertion = false&lt;/P&gt;
&lt;/BLOCKQUOTE&gt;

&lt;P&gt;You can remove signatureAlgorithm.   You're saying that the request should be signed SHA1 but you don't want requests signed???  &lt;/P&gt;

&lt;P&gt;Also:&lt;/P&gt;

&lt;UL&gt;
&lt;LI&gt;the response you posted earlier contained &lt;STRONG&gt;"HRUserGroup","TEST_EMP","TEST_MGR"&lt;/STRONG&gt; as the group but you don't have these defined in &lt;STRONG&gt;roleMap_SAML&lt;/STRONG&gt;.&lt;/LI&gt;
&lt;LI&gt;The IdP response you provided seems to have an extra "/" in the SP URLs, ie "&lt;A href="http://www.test.com:8000//saml/acs" target="_blank"&gt;http://www.test.com:8000//saml/acs&lt;/A&gt;"&lt;/LI&gt;
&lt;/UL&gt;</description>
      <pubDate>Tue, 29 Sep 2020 12:53:19 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/Problem-with-SSO-SAML-Splunk-6-5/m-p/295160#M7918</guid>
      <dc:creator>suarezry</dc:creator>
      <dc:date>2020-09-29T12:53:19Z</dc:date>
    </item>
    <item>
      <title>Re: Problem with SSO SAML  (Splunk  6.5)</title>
      <link>https://community.splunk.com/t5/Security/Problem-with-SSO-SAML-Splunk-6-5/m-p/295161#M7919</link>
      <description>&lt;P&gt;Thanks Suarezry.&lt;BR /&gt;&lt;BR /&gt;
I've tried most of the above with the same error result.&lt;BR /&gt;
 "ERROR - UiSAML No argument Found" . &lt;BR /&gt;
I will try to get the IdP response URL fixed (remove the extra "/")&lt;BR /&gt;
What is  the entityId of the Splunk instance ?&lt;BR /&gt;
thanks!&lt;/P&gt;</description>
      <pubDate>Wed, 15 Feb 2017 18:34:56 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/Problem-with-SSO-SAML-Splunk-6-5/m-p/295161#M7919</guid>
      <dc:creator>cm248k</dc:creator>
      <dc:date>2017-02-15T18:34:56Z</dc:date>
    </item>
    <item>
      <title>Re: Problem with SSO SAML  (Splunk  6.5)</title>
      <link>https://community.splunk.com/t5/Security/Problem-with-SSO-SAML-Splunk-6-5/m-p/295162#M7920</link>
      <description>&lt;P&gt;Integration with SAML IdP's is vastly improved in 6.5. One has to seldom modify the authentication.conf file directly if the integration is performed correctly for the IdP through the SAML configuration UI.&lt;/P&gt;

&lt;P&gt;There are many more IdPs that we've integrated with since 6.5. In 6.4 we only "supported" Okta, Ping, ADFS and Azure. There are blogs for each of those four that step you through how to perform the integration, specific to each IdP, in 6.4. Such as ADFS integration &lt;A href="http://blogs.splunk.com/2016/09/14/configuring-microsofts-adfs-splunk-cloud/"&gt;here&lt;/A&gt; Okta integration &lt;A href="http://blogs.splunk.com/2016/09/01/configuring-okta-security-assertion-markup-language-saml-single-sign-on-sso-with-splunk-cloud/"&gt;here&lt;/A&gt; Ping integration &lt;A href="http://blogs.splunk.com/2016/09/21/configuring-pingidentity-pingfederate-ping-security-assertion-markup-language-saml-single-sign-on-sso-with-splunk-cloud/"&gt;here&lt;/A&gt; and Azure integration &lt;A href="http://blogs.splunk.com/2016/09/09/configuring-microsofts-azure-security-assertion-markup-language-saml-single-sign-on-sso-with-splunk-cloud/"&gt;here&lt;/A&gt; .&lt;/P&gt;

&lt;P&gt;Most likely one of those would get you what you need for whichever IdP you're trying to integrate with now. NOTE: In addition to those four, we have customers (in Splunk Cloud) that have integrated with Google, OneLogin, IBM Tivoli Identity Manager, SecureAuth, CA Siteminder and many others. And most likely many of those and others by on-prem customers. There is a team within our support organization that is well schooled on SAML integrations and are ready and willing to help you with your setup.&lt;/P&gt;

&lt;P&gt;I suggest you open a support ticket with Splunk, note the SAML IdP you're integrating with, and you'll get all the support you need. If it's an IdP we've not integrated with in the past, the support team will work with you to get it up and running so we'll have the internal knowledge to know how to get it working for the next customer.&lt;/P&gt;</description>
      <pubDate>Wed, 15 Feb 2017 18:58:41 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/Problem-with-SSO-SAML-Splunk-6-5/m-p/295162#M7920</guid>
      <dc:creator>pgreer_splunk</dc:creator>
      <dc:date>2017-02-15T18:58:41Z</dc:date>
    </item>
    <item>
      <title>Re: Problem with SSO SAML  (Splunk  6.5)</title>
      <link>https://community.splunk.com/t5/Security/Problem-with-SSO-SAML-Splunk-6-5/m-p/295163#M7921</link>
      <description>&lt;PRE&gt;&lt;CODE&gt;I will try to get the IdP response URL fixed (remove the extra "/")
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Take a look at the SP metadata file you gave to your IdP, it will have the typo there.  Of course, the SP metadata file was generated from your splunk config so you'll need to find out where the typo in your config is.&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;What is the entityId of the Splunk instance ?
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;You can call it whatever you want.  I typically set it to my splunk instance fqdn.  So in this case I would set it to '&lt;A href="http://www.test.com"&gt;http://www.test.com&lt;/A&gt;'&lt;/P&gt;</description>
      <pubDate>Thu, 16 Feb 2017 12:22:03 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/Problem-with-SSO-SAML-Splunk-6-5/m-p/295163#M7921</guid>
      <dc:creator>suarezry</dc:creator>
      <dc:date>2017-02-16T12:22:03Z</dc:date>
    </item>
    <item>
      <title>Re: Problem with SSO SAML  (Splunk  6.5)</title>
      <link>https://community.splunk.com/t5/Security/Problem-with-SSO-SAML-Splunk-6-5/m-p/295164#M7922</link>
      <description>&lt;P&gt;Thanks! the extra "/" fixed the no arguments error problems &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt; &lt;BR /&gt;
After working thru some cert format issues getting further along .&lt;BR /&gt;
Seeing a role mapping issue now "No valid splunk role found in local mapping" &lt;/P&gt;</description>
      <pubDate>Thu, 16 Feb 2017 22:00:07 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/Problem-with-SSO-SAML-Splunk-6-5/m-p/295164#M7922</guid>
      <dc:creator>cm248k</dc:creator>
      <dc:date>2017-02-16T22:00:07Z</dc:date>
    </item>
    <item>
      <title>Re: Problem with SSO SAML  (Splunk  6.5)</title>
      <link>https://community.splunk.com/t5/Security/Problem-with-SSO-SAML-Splunk-6-5/m-p/295165#M7923</link>
      <description>&lt;P&gt;Yes, that's because of this problem:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;the response you posted earlier contained "HRUserGroup","TEST_EMP","TEST_MGR" as the group but you don't have these defined in roleMap_SAML.
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Thu, 16 Feb 2017 22:17:42 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/Problem-with-SSO-SAML-Splunk-6-5/m-p/295165#M7923</guid>
      <dc:creator>suarezry</dc:creator>
      <dc:date>2017-02-16T22:17:42Z</dc:date>
    </item>
    <item>
      <title>Re: Problem with SSO SAML  (Splunk  6.5)</title>
      <link>https://community.splunk.com/t5/Security/Problem-with-SSO-SAML-Splunk-6-5/m-p/295166#M7924</link>
      <description>&lt;P&gt;Adding the appropriate group fixed the mapping problem! I was missing the quotes around HRUserGroup.   I can now log in! Thanks for all the help.&lt;/P&gt;

&lt;P&gt;One last question , since our SAML groups are not very specific at the moment can I authorize based on existing configured Splunk users in the system instead?&lt;BR /&gt;
So if only a local splunk user called "chrism" was configured in Splunk, then only SAML user "chrism" can be authorized via SAML?&lt;/P&gt;

&lt;P&gt;There is a stanza called [usertoRoleMap_SAML] in authentication.conf, that  it appears splunk has automatically mapped SAML users to  our "user" splunk role.&lt;/P&gt;

&lt;P&gt;[roleMap_SAML]&lt;BR /&gt;
user = "hrusergroup"&lt;/P&gt;

&lt;P&gt;[userToRoleMap_SAML]&lt;BR /&gt;
chrism = user   (all these user belong to "hrusergroup")&lt;BR /&gt;
edwardh =user&lt;BR /&gt;
stevea= user&lt;BR /&gt;
..&lt;BR /&gt;
(seems Splunk is automatically adding users here ?)&lt;/P&gt;</description>
      <pubDate>Fri, 17 Feb 2017 17:07:02 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/Problem-with-SSO-SAML-Splunk-6-5/m-p/295166#M7924</guid>
      <dc:creator>cm248k</dc:creator>
      <dc:date>2017-02-17T17:07:02Z</dc:date>
    </item>
    <item>
      <title>Re: Problem with SSO SAML  (Splunk  6.5)</title>
      <link>https://community.splunk.com/t5/Security/Problem-with-SSO-SAML-Splunk-6-5/m-p/295167#M7925</link>
      <description>&lt;P&gt;Does this SAML support team still exist at Splunk? &lt;/P&gt;</description>
      <pubDate>Wed, 01 Apr 2020 20:20:46 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/Problem-with-SSO-SAML-Splunk-6-5/m-p/295167#M7925</guid>
      <dc:creator>jlmurray</dc:creator>
      <dc:date>2020-04-01T20:20:46Z</dc:date>
    </item>
  </channel>
</rss>

