<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Is it possible to deploy idpCerts? in Deployment Architecture</title>
    <link>https://community.splunk.com/t5/Deployment-Architecture/Is-it-possible-to-deploy-idpCerts/m-p/400917#M14490</link>
    <description>&lt;P&gt;In my lab environment, I have &lt;CODE&gt;idpCertPath = /opt/splunk/etc/auth/idpCert.pem&lt;/CODE&gt; and it is working fine which is outside &lt;CODE&gt;$SPLUNK_HOME/etc/auth/idpCerts&lt;/CODE&gt;&lt;/P&gt;</description>
    <pubDate>Wed, 09 Jan 2019 14:29:48 GMT</pubDate>
    <dc:creator>harsmarvania57</dc:creator>
    <dc:date>2019-01-09T14:29:48Z</dc:date>
    <item>
      <title>Is it possible to deploy idpCerts?</title>
      <link>https://community.splunk.com/t5/Deployment-Architecture/Is-it-possible-to-deploy-idpCerts/m-p/400912#M14485</link>
      <description>&lt;P&gt;For SAML authentication, we need to provide a certificate chain to validate the SAML response. The certificate chain appears to be hardcoded to &lt;CODE&gt;$SPLUNK_HOME/etc/auth/idpCerts&lt;/CODE&gt;. There is a configuration option that will let you specify a subdirectory underneath, but there doesn't seem to be a way to configure anything else.&lt;/P&gt;

&lt;P&gt;This is great for people that configure SAML via the UI. But not so great for people that use deployment server or similar tools to deploy their configuration to &lt;CODE&gt;$SPLUNK_HOME/etc/apps&lt;/CODE&gt;. Right now, the SAML &lt;CODE&gt;authentication.conf&lt;/CODE&gt; file can be deployed, but won't work on its own unless someone manually pushes the certifications to the search heads out of band.&lt;/P&gt;

&lt;P&gt;Is there a way to deploy certificate chains using deploymentserver? Can I customize the name of the subdirectory from &lt;CODE&gt;idpCertChain_1&lt;/CODE&gt; ? &lt;/P&gt;

&lt;P&gt;Thanks.&lt;/P&gt;</description>
      <pubDate>Wed, 09 Jan 2019 13:03:58 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Deployment-Architecture/Is-it-possible-to-deploy-idpCerts/m-p/400912#M14485</guid>
      <dc:creator>scottsavarese</dc:creator>
      <dc:date>2019-01-09T13:03:58Z</dc:date>
    </item>
    <item>
      <title>Re: Is it possible to deploy idpCerts?</title>
      <link>https://community.splunk.com/t5/Deployment-Architecture/Is-it-possible-to-deploy-idpCerts/m-p/400913#M14486</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;

&lt;P&gt;Regarding IDP certificate Path, you can use &lt;CODE&gt;idpCertPath&lt;/CODE&gt; parameter in authentication.conf to define other path to retrieve certificate, I have never tried this but I can test in my lab environment.&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;idpCertPath = &amp;lt;Pathname&amp;gt;
* OPTIONAL
* This setting is required if 'signedAssertion' is set to true.
* This value is relative to $SPLUNK_HOME/etc/auth/idpCerts.
* The value for this setting can be the name of the certificate file or a directory.
* If it is empty, Splunk will automatically verify with certificates in all subdirectories
  present in $SPLUNK_HOME/etc/auth/idpCerts.
* If the saml response is to be verified with a IDP (Identity Provider) certificate that
  is self signed, then this setting holds the filename of the certificate.
* If the saml response is to be verified with a certificate that is a part of a
  certificate chain(root, intermediate(s), leaf), create a subdirectory and place the
  certificate chain as files in the subdirectory.
* If there are multiple end certificates, create a subdirectory such that, one subdirectory
  holds one certificate chain.
* If multiple such certificate chains are present, the assertion is considered verified,
  if validation succeeds with any certifcate chain.
* The file names within a certificate chain should be such that root certificate is alphabetically
  before the intermediate which is alphabetically before of the end cert.
  ex. cert_1.pem has the root, cert_2.pem has the first intermediate cert, cert_3.pem has the second
      intermediate certificate and cert_4.pem has the end certificate.
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;And example given in authentication.conf documentation showing that you can configure other path as well for IDP Certificate Chain.&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[samlv2]
attributeQuerySoapPassword = changeme
attributeQuerySoapUsername = test
entityId = test-splunk
idpAttributeQueryUrl = &lt;A href="https://exsso/idp/attrsvc.ssaml2" target="test_blank"&gt;https://exsso/idp/attrsvc.ssaml2&lt;/A&gt;
idpCertPath = /home/splunk/etc/auth/idp.crt
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Regarding sub directory, can't you combine all leaf, intermediate and root cert in single file and push it via Deployment Server in your app and provide that file in parameter &lt;CODE&gt;idpCertPath&lt;/CODE&gt;?&lt;/P&gt;</description>
      <pubDate>Wed, 09 Jan 2019 13:46:28 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Deployment-Architecture/Is-it-possible-to-deploy-idpCerts/m-p/400913#M14486</guid>
      <dc:creator>harsmarvania57</dc:creator>
      <dc:date>2019-01-09T13:46:28Z</dc:date>
    </item>
    <item>
      <title>Re: Is it possible to deploy idpCerts?</title>
      <link>https://community.splunk.com/t5/Deployment-Architecture/Is-it-possible-to-deploy-idpCerts/m-p/400914#M14487</link>
      <description>&lt;P&gt;That path is actually relative to the idpCerts directory. It just creates a subdirectory under &lt;CODE&gt;$SPLUNK_HOME/etc/auth/idpCerts&lt;/CODE&gt;.&lt;/P&gt;</description>
      <pubDate>Wed, 09 Jan 2019 14:20:16 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Deployment-Architecture/Is-it-possible-to-deploy-idpCerts/m-p/400914#M14487</guid>
      <dc:creator>scottsavarese</dc:creator>
      <dc:date>2019-01-09T14:20:16Z</dc:date>
    </item>
    <item>
      <title>Re: Is it possible to deploy idpCerts?</title>
      <link>https://community.splunk.com/t5/Deployment-Architecture/Is-it-possible-to-deploy-idpCerts/m-p/400915#M14488</link>
      <description>&lt;P&gt;Yes but when you use Splunk UI, if you have access to command line you can configure it in other path as well and provide that directory in &lt;CODE&gt;idpCertPath&lt;/CODE&gt; in authentication.conf&lt;/P&gt;</description>
      <pubDate>Wed, 09 Jan 2019 14:22:44 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Deployment-Architecture/Is-it-possible-to-deploy-idpCerts/m-p/400915#M14488</guid>
      <dc:creator>harsmarvania57</dc:creator>
      <dc:date>2019-01-09T14:22:44Z</dc:date>
    </item>
    <item>
      <title>Re: Is it possible to deploy idpCerts?</title>
      <link>https://community.splunk.com/t5/Deployment-Architecture/Is-it-possible-to-deploy-idpCerts/m-p/400916#M14489</link>
      <description>&lt;P&gt;Sorry, but no... idpCertPath is a relative path as per the authentication.conf documentation you posted. So I wasn't able to move the certs to my apps directory. But give it a try yourself. Just because I couldn't get it to work doesn't mean I did it right.&lt;/P&gt;</description>
      <pubDate>Wed, 09 Jan 2019 14:27:44 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Deployment-Architecture/Is-it-possible-to-deploy-idpCerts/m-p/400916#M14489</guid>
      <dc:creator>scottsavarese</dc:creator>
      <dc:date>2019-01-09T14:27:44Z</dc:date>
    </item>
    <item>
      <title>Re: Is it possible to deploy idpCerts?</title>
      <link>https://community.splunk.com/t5/Deployment-Architecture/Is-it-possible-to-deploy-idpCerts/m-p/400917#M14490</link>
      <description>&lt;P&gt;In my lab environment, I have &lt;CODE&gt;idpCertPath = /opt/splunk/etc/auth/idpCert.pem&lt;/CODE&gt; and it is working fine which is outside &lt;CODE&gt;$SPLUNK_HOME/etc/auth/idpCerts&lt;/CODE&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 09 Jan 2019 14:29:48 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Deployment-Architecture/Is-it-possible-to-deploy-idpCerts/m-p/400917#M14490</guid>
      <dc:creator>harsmarvania57</dc:creator>
      <dc:date>2019-01-09T14:29:48Z</dc:date>
    </item>
    <item>
      <title>Re: Is it possible to deploy idpCerts?</title>
      <link>https://community.splunk.com/t5/Deployment-Architecture/Is-it-possible-to-deploy-idpCerts/m-p/400918#M14491</link>
      <description>&lt;P&gt;I finally got it working... The issue I had was that I had a full chain and thus couldn't point to a single file. I had to point to the directory I want the chain in. I couldn't just put the certs in the directory I specified (which is where I failed). Instead I still had to use idpCertChain_1.&lt;/P&gt;

&lt;P&gt;Putting it another way... If &lt;CODE&gt;idpCertPath&lt;/CODE&gt; is set to &lt;CODE&gt;/opt/splunk/etc/apps/myapp/certs&lt;/CODE&gt;, my certs actually live in &lt;CODE&gt;/opt/splunk/etc/apps/myapp/certs/idpCertChain_1&lt;/CODE&gt; and were named cert_1, cert_2, etc.&lt;/P&gt;

&lt;P&gt;Thanks for the help.&lt;BR /&gt;
Scott&lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 22:44:00 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Deployment-Architecture/Is-it-possible-to-deploy-idpCerts/m-p/400918#M14491</guid>
      <dc:creator>scottsavarese</dc:creator>
      <dc:date>2020-09-29T22:44:00Z</dc:date>
    </item>
    <item>
      <title>Re: Is it possible to deploy idpCerts?</title>
      <link>https://community.splunk.com/t5/Deployment-Architecture/Is-it-possible-to-deploy-idpCerts/m-p/400919#M14492</link>
      <description>&lt;P&gt;See the conversation with harsmarvania57. I'm actually able to set idpCertPath to something outside of etc/auth with some caveats.&lt;/P&gt;</description>
      <pubDate>Wed, 09 Jan 2019 17:01:56 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Deployment-Architecture/Is-it-possible-to-deploy-idpCerts/m-p/400919#M14492</guid>
      <dc:creator>scottsavarese</dc:creator>
      <dc:date>2019-01-09T17:01:56Z</dc:date>
    </item>
  </channel>
</rss>

