<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: 6.2.0 Free Getting: Forbidden: Strict SSO Mode in Deployment Architecture</title>
    <link>https://community.splunk.com/t5/Deployment-Architecture/6-2-0-Free-Getting-Forbidden-Strict-SSO-Mode/m-p/193081#M7237</link>
    <description>&lt;P&gt;I had this issue after the upgrade as well.  I think the correct fix is to set "tools.proxy.on" to "false".  I know this setting was required, or at least made it easier, when running splunk behind a (reverse) proxy.  Now the setting is only needed when using SSO or very old apache proxies. &lt;/P&gt;</description>
    <pubDate>Tue, 25 Nov 2014 21:08:27 GMT</pubDate>
    <dc:creator>jkleensang</dc:creator>
    <dc:date>2014-11-25T21:08:27Z</dc:date>
    <item>
      <title>6.2.0 Free Getting: Forbidden: Strict SSO Mode</title>
      <link>https://community.splunk.com/t5/Deployment-Architecture/6-2-0-Free-Getting-Forbidden-Strict-SSO-Mode/m-p/193080#M7236</link>
      <description>&lt;P&gt;Has anyone run into and/or resolved this with 6.2 --&amp;gt;&lt;/P&gt;

&lt;P&gt;"Forbidden: Strict SSO Mode  View more information about your request (request ID = XX) in Search"&lt;/P&gt;

&lt;P&gt;I get this message when attempting to load ANY splunk URL, except for the login page, which is just a blank grey page.&lt;/P&gt;

&lt;P&gt;Not my blog, but this site has some more detail about the issue: &lt;A href="http://translate.google.com.au/translate?hl=en&amp;amp;sl=ja&amp;amp;u=http://snickerjp.blogspot.com/2014/10/splunk-62-proxy.html&amp;amp;prev=search"&gt;http://translate.google.com.au/translate?hl=en&amp;amp;sl=ja&amp;amp;u=http://snickerjp.blogspot.com/2014/10/splunk-62-proxy.html&amp;amp;prev=search&lt;/A&gt;&lt;/P&gt;

&lt;P&gt;In /opt/splunk/etc/system/default/web.conf 'SSOMode = permissive' should have gotten past this from what i read on &lt;A href="http://docs.splunk.com/Documentation/Splunk/6.2.0/admin/Webconf"&gt;http://docs.splunk.com/Documentation/Splunk/6.2.0/admin/Webconf&lt;/A&gt;&lt;/P&gt;

&lt;P&gt;In saying that, I don't believe that should be needed anyway, as I have not set up SSO on this instance (nor can I properly, as it is the free version).&lt;/P&gt;

&lt;P&gt;Running on Ubuntu if it makes any difference (an upgrade I did on RHEL hasn't encountered this issue)&lt;/P&gt;

&lt;P&gt;It works fine if I make appServerPorts 0, so it goes into legacy mode&lt;/P&gt;

&lt;P&gt;Thanks,&lt;/P&gt;

&lt;P&gt;Carson.&lt;/P&gt;</description>
      <pubDate>Tue, 04 Nov 2014 00:34:54 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Deployment-Architecture/6-2-0-Free-Getting-Forbidden-Strict-SSO-Mode/m-p/193080#M7236</guid>
      <dc:creator>carsonl</dc:creator>
      <dc:date>2014-11-04T00:34:54Z</dc:date>
    </item>
    <item>
      <title>Re: 6.2.0 Free Getting: Forbidden: Strict SSO Mode</title>
      <link>https://community.splunk.com/t5/Deployment-Architecture/6-2-0-Free-Getting-Forbidden-Strict-SSO-Mode/m-p/193081#M7237</link>
      <description>&lt;P&gt;I had this issue after the upgrade as well.  I think the correct fix is to set "tools.proxy.on" to "false".  I know this setting was required, or at least made it easier, when running splunk behind a (reverse) proxy.  Now the setting is only needed when using SSO or very old apache proxies. &lt;/P&gt;</description>
      <pubDate>Tue, 25 Nov 2014 21:08:27 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Deployment-Architecture/6-2-0-Free-Getting-Forbidden-Strict-SSO-Mode/m-p/193081#M7237</guid>
      <dc:creator>jkleensang</dc:creator>
      <dc:date>2014-11-25T21:08:27Z</dc:date>
    </item>
    <item>
      <title>Re: 6.2.0 Free Getting: Forbidden: Strict SSO Mode</title>
      <link>https://community.splunk.com/t5/Deployment-Architecture/6-2-0-Free-Getting-Forbidden-Strict-SSO-Mode/m-p/193082#M7238</link>
      <description>&lt;P&gt;That didn't seem to work for me. by default tools.proxy.on is false, and I hadn't overridden it...&lt;/P&gt;

&lt;P&gt;I think the key part is, I'm not actually running SSO, so it shouldn't be showing this. I am currently running behind an Apache proxy, but purely to make the URL better, not for any SSO functionality. I was getting the same error when going direct to Splunk via port 8000.&lt;/P&gt;</description>
      <pubDate>Tue, 25 Nov 2014 22:53:27 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Deployment-Architecture/6-2-0-Free-Getting-Forbidden-Strict-SSO-Mode/m-p/193082#M7238</guid>
      <dc:creator>carsonl</dc:creator>
      <dc:date>2014-11-25T22:53:27Z</dc:date>
    </item>
    <item>
      <title>Re: 6.2.0 Free Getting: Forbidden: Strict SSO Mode</title>
      <link>https://community.splunk.com/t5/Deployment-Architecture/6-2-0-Free-Getting-Forbidden-Strict-SSO-Mode/m-p/193083#M7239</link>
      <description>&lt;P&gt;What settings are in your web.conf?  There are a few other settings that may enable/force SSO unintentionally. &lt;/P&gt;</description>
      <pubDate>Tue, 25 Nov 2014 22:57:09 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Deployment-Architecture/6-2-0-Free-Getting-Forbidden-Strict-SSO-Mode/m-p/193083#M7239</guid>
      <dc:creator>jkleensang</dc:creator>
      <dc:date>2014-11-25T22:57:09Z</dc:date>
    </item>
    <item>
      <title>Re: 6.2.0 Free Getting: Forbidden: Strict SSO Mode</title>
      <link>https://community.splunk.com/t5/Deployment-Architecture/6-2-0-Free-Getting-Forbidden-Strict-SSO-Mode/m-p/193084#M7240</link>
      <description>&lt;PRE&gt;&lt;CODE&gt;[settings]
x_frame_options_sameorigin = False
root_endpoint = /splunk
#SSOMode = permissive
#trustedIP = 1.0.0.0/23, 127.0.0.1
#http://docs.splunk.com/Documentation/Splunk/6.2.0/Admin/Webconf appServerPorts
appServerPorts = 0 #This is my workaround to get it working
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;I'm pretty sure I've tried it without the first two settings, and had the same outcome.&lt;/P&gt;</description>
      <pubDate>Tue, 25 Nov 2014 23:16:30 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Deployment-Architecture/6-2-0-Free-Getting-Forbidden-Strict-SSO-Mode/m-p/193084#M7240</guid>
      <dc:creator>carsonl</dc:creator>
      <dc:date>2014-11-25T23:16:30Z</dc:date>
    </item>
    <item>
      <title>Re: 6.2.0 Free Getting: Forbidden: Strict SSO Mode</title>
      <link>https://community.splunk.com/t5/Deployment-Architecture/6-2-0-Free-Getting-Forbidden-Strict-SSO-Mode/m-p/193085#M7241</link>
      <description>&lt;P&gt;Mine was much more complicated, and I got an answer from Splunk support.&lt;/P&gt;

&lt;P&gt;The very short story is that I had some misconfigured IP Tables rules that were masquerading traffic from the loopback to come from my eth0 IP Address... as Splunk was seeing the source IP as not 127.0.0.1, it was freaking out.&lt;/P&gt;

&lt;P&gt;Fixing the IP Tables rule resolved my issue.&lt;/P&gt;</description>
      <pubDate>Thu, 04 Jun 2015 00:24:17 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Deployment-Architecture/6-2-0-Free-Getting-Forbidden-Strict-SSO-Mode/m-p/193085#M7241</guid>
      <dc:creator>carsonl</dc:creator>
      <dc:date>2015-06-04T00:24:17Z</dc:date>
    </item>
    <item>
      <title>Re: 6.2.0 Free Getting: Forbidden: Strict SSO Mode</title>
      <link>https://community.splunk.com/t5/Deployment-Architecture/6-2-0-Free-Getting-Forbidden-Strict-SSO-Mode/m-p/193086#M7242</link>
      <description>&lt;P&gt;It's a bit unclear from the docs, but it seems like &lt;CODE&gt;trustedIp&lt;/CODE&gt; doesn't support ranges unless the &lt;CODE&gt;appServerPorts&lt;/CODE&gt; is set to something other than 0.  I've made a few requests into the docs team on this topic today, so hopefully we can all benefit.&lt;/P&gt;</description>
      <pubDate>Mon, 10 Oct 2016 22:07:53 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Deployment-Architecture/6-2-0-Free-Getting-Forbidden-Strict-SSO-Mode/m-p/193086#M7242</guid>
      <dc:creator>Lowell</dc:creator>
      <dc:date>2016-10-10T22:07:53Z</dc:date>
    </item>
    <item>
      <title>Re: 6.2.0 Free Getting: Forbidden: Strict SSO Mode</title>
      <link>https://community.splunk.com/t5/Deployment-Architecture/6-2-0-Free-Getting-Forbidden-Strict-SSO-Mode/m-p/193087#M7243</link>
      <description>&lt;P&gt;To add some detail to this, I had this error until I set all traffic destined to 127.0.0.1 to skip MASQUERADE. The new iptables rule immediately fixed the error, no service restart required.&lt;/P&gt;

&lt;P&gt;iptables -I POSTROUTING 1 -t nat -d 127.0.0.1 -j ACCEPT&lt;/P&gt;

&lt;P&gt;Chain POSTROUTING (policy ACCEPT 0 packets, 0 bytes)&lt;BR /&gt;
 pkts bytes target     prot opt in     out     source               destination&lt;BR /&gt;
   10   600 ACCEPT     all  --  *      *       0.0.0.0/0            127.0.0.1&lt;BR /&gt;
5710K  580M MASQUERADE  all  --  *      *       0.0.0.0/0            0.0.0.0/0&lt;/P&gt;</description>
      <pubDate>Sun, 17 Dec 2017 21:01:31 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Deployment-Architecture/6-2-0-Free-Getting-Forbidden-Strict-SSO-Mode/m-p/193087#M7243</guid>
      <dc:creator>elewis1</dc:creator>
      <dc:date>2017-12-17T21:01:31Z</dc:date>
    </item>
  </channel>
</rss>

