<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Verification of SAML assertion using cert failed in Security</title>
    <link>https://community.splunk.com/t5/Security/Verification-of-SAML-assertion-using-cert-failed/m-p/297513#M7972</link>
    <description>&lt;P&gt;I have had this issue where one of the certs had expired. In $SPLUNK_HOME/etc/auth/idpCerts, splunk creates a folder called idpCertChain_1 where it breaks apart the cert you pasted (IdP certificate chains--these are the signing certs from your SSO provider--this can often be found in a metadata file from the provider or sometimes they just outright have a way for you to download it) from the setup into various certs and calls them cert_1.pem, cert_2.pem, ... etc. cert_1.pem is the root CA, cert_2.pem would be an issuing CA if applicable--if not would be the main cert from the IdP (fancy name for single sign on provider). You can check the certs out using $SPLUNK_HOME/bin/splunk cmd openssl x509 -noout -text -in cert_1.pem to see when it expires, adding -endate will print that line last like so:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;$SPLUNK_HOME/bin/splunk cmd openssl x509 -noout -text -in $SPLUNK_HOME/etc/auth/idpCerts/idpCertChain_1/cert_1.pem -enddate
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Updating the cert with one that was not expired fixed the issue in my case. &lt;/P&gt;</description>
    <pubDate>Wed, 30 Sep 2020 03:25:08 GMT</pubDate>
    <dc:creator>worshamn</dc:creator>
    <dc:date>2020-09-30T03:25:08Z</dc:date>
    <item>
      <title>Verification of SAML assertion using cert failed</title>
      <link>https://community.splunk.com/t5/Security/Verification-of-SAML-assertion-using-cert-failed/m-p/297507#M7966</link>
      <description>&lt;P&gt;I have configured SAML SSO with Onelogin. My splunk app &lt;A href="http://:8000/" target="test_blank"&gt;http://:8000/&lt;/A&gt; is redirecting succusfully to Assertion consumer URL but getting an error message on spunk login page which does not allowing me to login with onelogn credentials&lt;/P&gt;

&lt;P&gt;&lt;STRONG&gt;"Verification of SAML assertion using the IDP's certificate provided failed. Error: Failed to verify signature with cert :/opt/splunk/etc/auth/idpCerts/idpCert.pem;"&lt;/STRONG&gt;&lt;/P&gt;

&lt;P&gt;I have copied IdPCert.pem in required path /etc/auth/IdPCerts/ &lt;/P&gt;

&lt;P&gt;Does any one know who do i fix this?&lt;/P&gt;

&lt;P&gt;-Thanks&lt;/P&gt;</description>
      <pubDate>Wed, 17 May 2017 07:07:46 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/Verification-of-SAML-assertion-using-cert-failed/m-p/297507#M7966</guid>
      <dc:creator>splunkgk</dc:creator>
      <dc:date>2017-05-17T07:07:46Z</dc:date>
    </item>
    <item>
      <title>Re: Verification of SAML assertion using cert failed</title>
      <link>https://community.splunk.com/t5/Security/Verification-of-SAML-assertion-using-cert-failed/m-p/297508#M7967</link>
      <description>&lt;P&gt;I am facing the same issue wondering if you got this resolved ? if yes? please share some tips.&lt;/P&gt;</description>
      <pubDate>Wed, 14 Feb 2018 05:46:14 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/Verification-of-SAML-assertion-using-cert-failed/m-p/297508#M7967</guid>
      <dc:creator>raomu</dc:creator>
      <dc:date>2018-02-14T05:46:14Z</dc:date>
    </item>
    <item>
      <title>Re: Verification of SAML assertion using cert failed</title>
      <link>https://community.splunk.com/t5/Security/Verification-of-SAML-assertion-using-cert-failed/m-p/297509#M7968</link>
      <description>&lt;P&gt;Please post your $SPLUNK_HOME/etc/system/local/authentication.conf&lt;/P&gt;</description>
      <pubDate>Tue, 01 May 2018 14:52:22 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/Verification-of-SAML-assertion-using-cert-failed/m-p/297509#M7968</guid>
      <dc:creator>suarezry</dc:creator>
      <dc:date>2018-05-01T14:52:22Z</dc:date>
    </item>
    <item>
      <title>Re: Verification of SAML assertion using cert failed</title>
      <link>https://community.splunk.com/t5/Security/Verification-of-SAML-assertion-using-cert-failed/m-p/297510#M7969</link>
      <description>&lt;P&gt;You need to generate the Cert file information from Onelogin. Then paste the same cert information under -IdP certificate chains box under "Configure Splunk to use SAML" .&lt;/P&gt;</description>
      <pubDate>Wed, 02 May 2018 03:59:09 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/Verification-of-SAML-assertion-using-cert-failed/m-p/297510#M7969</guid>
      <dc:creator>raomu</dc:creator>
      <dc:date>2018-05-02T03:59:09Z</dc:date>
    </item>
    <item>
      <title>Re: Verification of SAML assertion using cert failed</title>
      <link>https://community.splunk.com/t5/Security/Verification-of-SAML-assertion-using-cert-failed/m-p/297511#M7970</link>
      <description>&lt;P&gt;How do you generate the Cert file from onelogin?&lt;/P&gt;</description>
      <pubDate>Fri, 23 Nov 2018 21:10:27 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/Verification-of-SAML-assertion-using-cert-failed/m-p/297511#M7970</guid>
      <dc:creator>stsamson005</dc:creator>
      <dc:date>2018-11-23T21:10:27Z</dc:date>
    </item>
    <item>
      <title>Re: Verification of SAML assertion using cert failed</title>
      <link>https://community.splunk.com/t5/Security/Verification-of-SAML-assertion-using-cert-failed/m-p/297512#M7971</link>
      <description>&lt;P&gt;HI All,&lt;/P&gt;

&lt;P&gt;Would like to clarify for SAML do we have to bring separate istance for configuration,OR just ADFS server and Splunk configured with SAML will do.&lt;/P&gt;

&lt;P&gt;I am totally confuse from documentation.Any help with respect to enabling SSO in splunk will help.&lt;/P&gt;

&lt;P&gt;Regards,&lt;BR /&gt;
Shweta&lt;/P&gt;</description>
      <pubDate>Thu, 19 Dec 2019 04:31:17 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/Verification-of-SAML-assertion-using-cert-failed/m-p/297512#M7971</guid>
      <dc:creator>shwetas</dc:creator>
      <dc:date>2019-12-19T04:31:17Z</dc:date>
    </item>
    <item>
      <title>Re: Verification of SAML assertion using cert failed</title>
      <link>https://community.splunk.com/t5/Security/Verification-of-SAML-assertion-using-cert-failed/m-p/297513#M7972</link>
      <description>&lt;P&gt;I have had this issue where one of the certs had expired. In $SPLUNK_HOME/etc/auth/idpCerts, splunk creates a folder called idpCertChain_1 where it breaks apart the cert you pasted (IdP certificate chains--these are the signing certs from your SSO provider--this can often be found in a metadata file from the provider or sometimes they just outright have a way for you to download it) from the setup into various certs and calls them cert_1.pem, cert_2.pem, ... etc. cert_1.pem is the root CA, cert_2.pem would be an issuing CA if applicable--if not would be the main cert from the IdP (fancy name for single sign on provider). You can check the certs out using $SPLUNK_HOME/bin/splunk cmd openssl x509 -noout -text -in cert_1.pem to see when it expires, adding -endate will print that line last like so:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;$SPLUNK_HOME/bin/splunk cmd openssl x509 -noout -text -in $SPLUNK_HOME/etc/auth/idpCerts/idpCertChain_1/cert_1.pem -enddate
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Updating the cert with one that was not expired fixed the issue in my case. &lt;/P&gt;</description>
      <pubDate>Wed, 30 Sep 2020 03:25:08 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/Verification-of-SAML-assertion-using-cert-failed/m-p/297513#M7972</guid>
      <dc:creator>worshamn</dc:creator>
      <dc:date>2020-09-30T03:25:08Z</dc:date>
    </item>
  </channel>
</rss>

