<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: SAML Assertion signature verification failed. Unable to get local issuer certificate in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/SAML-Assertion-signature-verification-failed-Unable-to-get-local/m-p/275598#M190301</link>
    <description>&lt;P&gt;With respect to windows the steps remain the same. However the commands to achieve what is being done are slightly different.&lt;/P&gt;

&lt;P&gt;Navigate to the directory where splunk is installed &lt;BR /&gt;
PS C:\Program Files\Splunk\bin&amp;gt;&lt;/P&gt;

&lt;P&gt;---&amp;gt; here PS is the Powershell prompt &amp;lt;----&lt;BR /&gt;
1)&lt;BR /&gt;
PS C:\Program Files\Splunk\bin&amp;gt; .\splunk.exe cmd openssl version -d&lt;BR /&gt;
OPENSSLDIR: "C:\wrangler-2.0\build-home\galaxy/ssl"&lt;/P&gt;

&lt;P&gt;This gives the directory which we need to store certs under.&lt;/P&gt;

&lt;P&gt;2) If directory above is not created then lets create it.&lt;BR /&gt;
dir = OPENSSLDIR&lt;BR /&gt;
if (!dir.exist()) { mkdir dir}&lt;/P&gt;

&lt;P&gt;3) Trusted certs are stored within the certs folder of the openssl directory being used. Again lets create the certs folder if it does not exist.&lt;BR /&gt;
dir = OPENSSLDIR/certs&lt;BR /&gt;
if (!dir.exist()) { mkdir dir}&lt;/P&gt;

&lt;P&gt;3.5) Find out the hashes of the certs this can be found by.&lt;BR /&gt;
a)PS C:\Program Files\Splunk\bin&amp;gt; .\openssl.exe x509 -hash -noout -in 'C:\Users\Administrator\Desktop\root.pem.txt'&lt;BR /&gt;
3221ee22&lt;BR /&gt;
b)PS C:\Program Files\Splunk\bin&amp;gt; .\openssl.exe x509 -hash -noout -in 'C:\Users\Administrator\Desktop\intermediate.pem.txt'&lt;BR /&gt;
93dafc43&lt;BR /&gt;
c)PS C:\Program Files\Splunk\bin&amp;gt; .\openssl.exe x509 -hash -noout -in 'C:\Users\Administrator\Desktop\leaf.pem.txt'&lt;BR /&gt;
44e5e200&lt;/P&gt;

&lt;P&gt;You may see warnings like&lt;BR /&gt;
WARNING: can't open config file: C:\wrangler-2.0\build-home\galaxy/ssl/openssl.cnf&lt;BR /&gt;
Which are safe to ignore.&lt;/P&gt;

&lt;P&gt;4) Create soft links to the certfiles with their hashes as their name followed by appending '.0'&lt;/P&gt;

&lt;P&gt;PS C:\wrangler-2.0\build-home\galaxy\ssl\certs&amp;gt; cmd /c mklink '3221ee22.0' 'C:\Users\Administrator\Desktop\root.pem.txt'&lt;BR /&gt;
symbolic link created for 3221ee22.0 &amp;lt;&amp;lt;===&amp;gt;&amp;gt; C:\Users\Administrator\Desktop\root.pem.txt&lt;/P&gt;

&lt;P&gt;PS C:\wrangler-2.0\build-home\galaxy\ssl\certs&amp;gt; cmd /c mklink '93dafc43.0' 'C:\Users\Administrator\Desktop\intermdiate.pem.txt'&lt;BR /&gt;
symbolic link created for 93dafc43.0 &amp;lt;&amp;lt;===&amp;gt;&amp;gt; C:\Users\Administrator\Desktop\intermdiate.pem.txt&lt;/P&gt;

&lt;P&gt;PS C:\wrangler-2.0\build-home\galaxy\ssl\certs&amp;gt; cmd /c mklink '44e5e200.0' 'C:\Users\Administrator\Desktop\leaf.pem.txt'&lt;BR /&gt;
symbolic link created for 44e5e200.0 &amp;lt;&amp;lt;===&amp;gt;&amp;gt; C:\Users\Administrator\Desktop\leaf.pem.txt&lt;/P&gt;

&lt;P&gt;After this your directory should look something like this.&lt;/P&gt;

&lt;P&gt;PS C:\wrangler-2.0\build-home\galaxy\ssl\certs&amp;gt; ls&lt;BR /&gt;
Directory: C:\wrangler-2.0\build-home\galaxy\ssl\certs&lt;/P&gt;

&lt;P&gt;Mode                LastWriteTime     Length Name&lt;BR /&gt;
-a---         7/11/2016   3:47 PM          0 3221ee22.0&lt;BR /&gt;
-a---         7/11/2016   3:49 PM          0 44e5e200.0&lt;BR /&gt;
-a---         7/11/2016   3:48 PM          0 93dafc43.0&lt;/P&gt;

&lt;P&gt;You may have to do this for all intermediate certs and root cert.&lt;BR /&gt;
as a result of 4: You should have in certs directory softlinks with names such as '1c235147.0' , 'facacbc6.0’ and so on(hash values themselves might be different).&lt;/P&gt;

&lt;P&gt;5) Restart splunk and test if it works.&lt;/P&gt;

&lt;P&gt;To make it clear Splunk does not use certificate store provided by microsoft, it uses one created by openssl therefore if you import certs via certlm they might not work.&lt;/P&gt;</description>
    <pubDate>Mon, 11 Jul 2016 23:10:59 GMT</pubDate>
    <dc:creator>rdimri_splunk</dc:creator>
    <dc:date>2016-07-11T23:10:59Z</dc:date>
    <item>
      <title>SAML Assertion signature verification failed. Unable to get local issuer certificate</title>
      <link>https://community.splunk.com/t5/Splunk-Search/SAML-Assertion-signature-verification-failed-Unable-to-get-local/m-p/275595#M190298</link>
      <description>&lt;P&gt;We are trying to configure SAML integration for our Splunk On-Premise instance with our identity provider. Per the document, when we upload IDP Metadata, Splunk automatically creates "idpCert.pem" in  /etc/auth/idpCerts/ directory.&lt;/P&gt;

&lt;P&gt;The certificate in the "idpCert.pem" is the signing certificate that we configured at our IdP. To check that certificate is saved properly, we make a copy of it some other location ourside Splunk install directory, rename it as "idpCert.crt" and open it. Windows shows the details of the certificate.&lt;/P&gt;

&lt;P&gt;Rest of the configuration for SAML is all fine. We are able to authenticate successfully if we disable SAML Signature Verification in authenticate.conf. But when we enable signature verification it fails with the message "Verification of SAML assertion failed".It lists "idpCert.pem" in the path.&lt;/P&gt;

&lt;P&gt;Alternative solution discovered through self debugging and trial &amp;amp; error:&lt;BR /&gt;
Modify the "idpCert.pem" to save CA certificate of the signing certificate. With this, saml assertion signature verification passes.&lt;/P&gt;

&lt;P&gt;Question:&lt;BR /&gt;
 1. If idpCert.pem is to contain the signing certificate that Splunk parses from IdP Metadata XML, then why is signature verification failing&lt;BR /&gt;
 2. Signature verification fails even when "idpCert.pem" is modified to contain certificate chain. I created this using below command:&lt;BR /&gt;
 cat signingcert.pem signingcertCA.pem &amp;gt; idpCert.pem  and copied this file to /etc/auth/idpCerts . But it still fails with the same message&lt;BR /&gt;
3. Does Splunk need IdP signing cert or CA cert or both? If both, is our certificate chain creation process wrong? If it needs CA certificate only, then why is Splunk creating idpCert.pem with the signing certificate from the metadata?&lt;/P&gt;

&lt;P&gt;Regards,&lt;BR /&gt;
Umesh&lt;/P&gt;</description>
      <pubDate>Sun, 29 May 2016 13:47:03 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/SAML-Assertion-signature-verification-failed-Unable-to-get-local/m-p/275595#M190298</guid>
      <dc:creator>umesh_waghode</dc:creator>
      <dc:date>2016-05-29T13:47:03Z</dc:date>
    </item>
    <item>
      <title>Re: SAML Assertion signature verification failed. Unable to get local issuer certificate</title>
      <link>https://community.splunk.com/t5/Splunk-Search/SAML-Assertion-signature-verification-failed-Unable-to-get-local/m-p/275596#M190299</link>
      <description>&lt;P&gt;When I raised this query, there was a note that usually there is a response in 24 hours. It is now more than a week but I have not received any reply.&lt;/P&gt;

&lt;P&gt;Can someone please reply?&lt;/P&gt;</description>
      <pubDate>Mon, 06 Jun 2016 06:40:34 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/SAML-Assertion-signature-verification-failed-Unable-to-get-local/m-p/275596#M190299</guid>
      <dc:creator>umesh_waghode</dc:creator>
      <dc:date>2016-06-06T06:40:34Z</dc:date>
    </item>
    <item>
      <title>Re: SAML Assertion signature verification failed. Unable to get local issuer certificate</title>
      <link>https://community.splunk.com/t5/Splunk-Search/SAML-Assertion-signature-verification-failed-Unable-to-get-local/m-p/275597#M190300</link>
      <description>&lt;P&gt;Hello Umesh,&lt;BR /&gt;
Your observations are valid ones. To give you some background, historically we supported signature validation assuming that the certificate used for singing is a trusted one, that is ability to traverse up a cert chain was missing, for example if you have a cert chain of root-&amp;gt;intermediate-&amp;gt;leaf and leaf is the one used for signing the assertion, then we would be unable to verify it. However if there was just one trusted cert, for examples sake "certA", which could be publicly verified by itself, and assertion was signed with it it would work. We have plans in place to remedy this in forth coming releases.&lt;/P&gt;

&lt;P&gt;If your splunk is running on *ix or Mac or Linux,you can  work around this by trusting the signing certificate on the host that it is running.&lt;BR /&gt;
I have enumerated the steps below.&lt;BR /&gt;
Basically we want to add certs as trusted certs.&lt;BR /&gt;
Figure out what is the openssl directory being used by splunk. There could be two openssls one that we want to use and ship with splunk and another one that is used by os. We want to add the trusted certs to the version that we use with splunk.&lt;BR /&gt;
1) ./bin/splunk cmd openssl version -d&lt;BR /&gt;
  this should display openssl version being used by splunk.&lt;BR /&gt;
  for example:&lt;BR /&gt;
  OPENSSLDIR: "/home/build/build-home/current-BETA/openssl"&lt;BR /&gt;
  again the above value may be different based on the PATH variable set it could also point to $SPLUNK_HOME/openssl&lt;/P&gt;

&lt;P&gt;2) If directory above is not created then lets create it.&lt;BR /&gt;
  dir = OPENSSLDIR&lt;BR /&gt;
  if (!dir.exist()) { mkdir dir}&lt;/P&gt;

&lt;P&gt;3) Trusted certs are stored within the certs folder of the openssl directory being used. Again lets create the certs folder if it does not exist.&lt;BR /&gt;
  dir = OPENSSLDIR/certs&lt;BR /&gt;
  if (!dir.exist()) { mkdir dir}&lt;/P&gt;

&lt;P&gt;4) Create soft links to the certfiles with their hashes as their name followed by appending '.0'&lt;BR /&gt;
  ex: &lt;BR /&gt;
    ln -s /opt/splunk/etc/auth/idpCertInter.pem `openssl x509 -hash -noout -in /opt/splunk/etc/auth/idpCertInter.pem`.0&lt;BR /&gt;
   You may have to do this for all intermediate certs and root cert.&lt;BR /&gt;
   as a result of 4: You should have in certs directory softlinks with names such as '1c235147.0' , 'facacbc6.0’  and so on(hash values themselves might be different).&lt;BR /&gt;
5) Restart splunk and test if it works.&lt;/P&gt;

&lt;P&gt;For windows based systems, we could probably do something similar to trust the cert.&lt;/P&gt;

&lt;P&gt;Now getting back to the questions you have asked.&lt;BR /&gt;
1) This works because the SAML response itself contains signing cert information, however if there is a cert chain then the parent signing cert information is not present in response. When you provide the CA cert in idpCert.pem then along with CA cert, and signing cert splunk has enough information to verify the signature.&lt;/P&gt;

&lt;P&gt;2) I have explained (above) that it is not yet supported.&lt;BR /&gt;
3) Again my explaination above should answer this, adding a bit of a detail splunk only extracts signing certificate because from whatever metadata I have seen till now, only signing cert is present in it instead of the entire chain. Let me know if this is not in your particular case.&lt;/P&gt;

&lt;P&gt;Again let us know how this goes for you. Hopefully this should have demystified some of the things.&lt;/P&gt;</description>
      <pubDate>Thu, 07 Jul 2016 15:42:02 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/SAML-Assertion-signature-verification-failed-Unable-to-get-local/m-p/275597#M190300</guid>
      <dc:creator>rdimri_splunk</dc:creator>
      <dc:date>2016-07-07T15:42:02Z</dc:date>
    </item>
    <item>
      <title>Re: SAML Assertion signature verification failed. Unable to get local issuer certificate</title>
      <link>https://community.splunk.com/t5/Splunk-Search/SAML-Assertion-signature-verification-failed-Unable-to-get-local/m-p/275598#M190301</link>
      <description>&lt;P&gt;With respect to windows the steps remain the same. However the commands to achieve what is being done are slightly different.&lt;/P&gt;

&lt;P&gt;Navigate to the directory where splunk is installed &lt;BR /&gt;
PS C:\Program Files\Splunk\bin&amp;gt;&lt;/P&gt;

&lt;P&gt;---&amp;gt; here PS is the Powershell prompt &amp;lt;----&lt;BR /&gt;
1)&lt;BR /&gt;
PS C:\Program Files\Splunk\bin&amp;gt; .\splunk.exe cmd openssl version -d&lt;BR /&gt;
OPENSSLDIR: "C:\wrangler-2.0\build-home\galaxy/ssl"&lt;/P&gt;

&lt;P&gt;This gives the directory which we need to store certs under.&lt;/P&gt;

&lt;P&gt;2) If directory above is not created then lets create it.&lt;BR /&gt;
dir = OPENSSLDIR&lt;BR /&gt;
if (!dir.exist()) { mkdir dir}&lt;/P&gt;

&lt;P&gt;3) Trusted certs are stored within the certs folder of the openssl directory being used. Again lets create the certs folder if it does not exist.&lt;BR /&gt;
dir = OPENSSLDIR/certs&lt;BR /&gt;
if (!dir.exist()) { mkdir dir}&lt;/P&gt;

&lt;P&gt;3.5) Find out the hashes of the certs this can be found by.&lt;BR /&gt;
a)PS C:\Program Files\Splunk\bin&amp;gt; .\openssl.exe x509 -hash -noout -in 'C:\Users\Administrator\Desktop\root.pem.txt'&lt;BR /&gt;
3221ee22&lt;BR /&gt;
b)PS C:\Program Files\Splunk\bin&amp;gt; .\openssl.exe x509 -hash -noout -in 'C:\Users\Administrator\Desktop\intermediate.pem.txt'&lt;BR /&gt;
93dafc43&lt;BR /&gt;
c)PS C:\Program Files\Splunk\bin&amp;gt; .\openssl.exe x509 -hash -noout -in 'C:\Users\Administrator\Desktop\leaf.pem.txt'&lt;BR /&gt;
44e5e200&lt;/P&gt;

&lt;P&gt;You may see warnings like&lt;BR /&gt;
WARNING: can't open config file: C:\wrangler-2.0\build-home\galaxy/ssl/openssl.cnf&lt;BR /&gt;
Which are safe to ignore.&lt;/P&gt;

&lt;P&gt;4) Create soft links to the certfiles with their hashes as their name followed by appending '.0'&lt;/P&gt;

&lt;P&gt;PS C:\wrangler-2.0\build-home\galaxy\ssl\certs&amp;gt; cmd /c mklink '3221ee22.0' 'C:\Users\Administrator\Desktop\root.pem.txt'&lt;BR /&gt;
symbolic link created for 3221ee22.0 &amp;lt;&amp;lt;===&amp;gt;&amp;gt; C:\Users\Administrator\Desktop\root.pem.txt&lt;/P&gt;

&lt;P&gt;PS C:\wrangler-2.0\build-home\galaxy\ssl\certs&amp;gt; cmd /c mklink '93dafc43.0' 'C:\Users\Administrator\Desktop\intermdiate.pem.txt'&lt;BR /&gt;
symbolic link created for 93dafc43.0 &amp;lt;&amp;lt;===&amp;gt;&amp;gt; C:\Users\Administrator\Desktop\intermdiate.pem.txt&lt;/P&gt;

&lt;P&gt;PS C:\wrangler-2.0\build-home\galaxy\ssl\certs&amp;gt; cmd /c mklink '44e5e200.0' 'C:\Users\Administrator\Desktop\leaf.pem.txt'&lt;BR /&gt;
symbolic link created for 44e5e200.0 &amp;lt;&amp;lt;===&amp;gt;&amp;gt; C:\Users\Administrator\Desktop\leaf.pem.txt&lt;/P&gt;

&lt;P&gt;After this your directory should look something like this.&lt;/P&gt;

&lt;P&gt;PS C:\wrangler-2.0\build-home\galaxy\ssl\certs&amp;gt; ls&lt;BR /&gt;
Directory: C:\wrangler-2.0\build-home\galaxy\ssl\certs&lt;/P&gt;

&lt;P&gt;Mode                LastWriteTime     Length Name&lt;BR /&gt;
-a---         7/11/2016   3:47 PM          0 3221ee22.0&lt;BR /&gt;
-a---         7/11/2016   3:49 PM          0 44e5e200.0&lt;BR /&gt;
-a---         7/11/2016   3:48 PM          0 93dafc43.0&lt;/P&gt;

&lt;P&gt;You may have to do this for all intermediate certs and root cert.&lt;BR /&gt;
as a result of 4: You should have in certs directory softlinks with names such as '1c235147.0' , 'facacbc6.0’ and so on(hash values themselves might be different).&lt;/P&gt;

&lt;P&gt;5) Restart splunk and test if it works.&lt;/P&gt;

&lt;P&gt;To make it clear Splunk does not use certificate store provided by microsoft, it uses one created by openssl therefore if you import certs via certlm they might not work.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Jul 2016 23:10:59 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/SAML-Assertion-signature-verification-failed-Unable-to-get-local/m-p/275598#M190301</guid>
      <dc:creator>rdimri_splunk</dc:creator>
      <dc:date>2016-07-11T23:10:59Z</dc:date>
    </item>
    <item>
      <title>Re: SAML Assertion signature verification failed. Unable to get local issuer certificate</title>
      <link>https://community.splunk.com/t5/Splunk-Search/SAML-Assertion-signature-verification-failed-Unable-to-get-local/m-p/275599#M190302</link>
      <description>&lt;P&gt;We have worked through the certificate problems, but still receive the error "No valid Splunk role is found in the local mapping or in the assertion."  &lt;/P&gt;

&lt;P&gt;We have tried to follow the troubleshooting guide and have tried two different formats for the Splunk group mapping.&lt;BR /&gt;
1)  Plain Mapping -- saml_users to user splunk role.&lt;BR /&gt;
2)  DN style:  "cn=keyscan,ou=dynamicgroup,ou=groups,dc=companydc"&lt;/P&gt;

&lt;P&gt;Neither of these styles seem to work and we have checked to make sure that the mapping has a trailing semicolon and is properly formatted in the authentication.conf.&lt;/P&gt;

&lt;P&gt;Any ideas?&lt;/P&gt;</description>
      <pubDate>Fri, 15 Jul 2016 13:11:42 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/SAML-Assertion-signature-verification-failed-Unable-to-get-local/m-p/275599#M190302</guid>
      <dc:creator>Dave98</dc:creator>
      <dc:date>2016-07-15T13:11:42Z</dc:date>
    </item>
    <item>
      <title>Re: SAML Assertion signature verification failed. Unable to get local issuer certificate</title>
      <link>https://community.splunk.com/t5/Splunk-Search/SAML-Assertion-signature-verification-failed-Unable-to-get-local/m-p/275600#M190303</link>
      <description>&lt;P&gt;Dave,&lt;BR /&gt;
Splunk needs three critical pieces of information in SAML authentication response to work well with SAML.&lt;BR /&gt;
1) realName : This is the user name that gets populated in the UI.&lt;BR /&gt;
2) mail: the email of the user.&lt;BR /&gt;
3) role: this information is used to map user group names to splunk roles, an example would be "developer" -&amp;gt; "user" (SplunkRole), "domain admin"-&amp;gt; "admin" (SplunkRole). We create mappings for incoming group information to splunk roles via the SAML Group map(Green button next to SAML configuration on the UI)&lt;/P&gt;

&lt;P&gt;Attributes in SAML Assertion should look like following.&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;    &amp;amp;lt;saml2:Attribute Name=&amp;amp;quot;mail&amp;amp;quot; NameFormat=&amp;amp;quot;urn:oasis:names:tc:SAML:2.0:attrname-format:unspecified&amp;amp;quot;&amp;amp;gt;
        &amp;amp;lt;saml2:AttributeValue xmlns:xs=&amp;amp;quot;http://www.w3.org/2001/XMLSchema&amp;amp;quot; xmlns:xsi=&amp;amp;quot;http://www.w3.org/2001/XMLSchema-instance&amp;amp;quot; xsi:type=&amp;amp;quot;xs:string&amp;amp;quot;&amp;amp;gt;XXXX@splunk.com&amp;amp;lt;/saml2:AttributeValue&amp;amp;gt;
    &amp;amp;lt;/saml2:Attribute&amp;amp;gt;
    &amp;amp;lt;saml2:Attribute Name=&amp;amp;quot;realName&amp;amp;quot; NameFormat=&amp;amp;quot;urn:oasis:names:tc:SAML:2.0:attrname-format:unspecified&amp;amp;quot;&amp;amp;gt;&amp;amp;lt;saml2:AttributeValue xmlns:xs=&amp;amp;quot;http://www.w3.org/2001/XMLSchema&amp;amp;quot; xmlns:xsi=&amp;amp;quot;http://www.w3.org/2001/XMLSchema-instance&amp;amp;quot; xsi:type=&amp;amp;quot;xs:string&amp;amp;quot;&amp;amp;gt;XXXX@splunk.com&amp;amp;lt;/saml2:AttributeValue&amp;amp;gt;
    &amp;amp;lt;/saml2:Attribute&amp;amp;gt;
    &amp;amp;lt;saml2:Attribute Name=&amp;amp;quot;role&amp;amp;quot; NameFormat=&amp;amp;quot;urn:oasis:names:tc:SAML:2.0:attrname-format:basic&amp;amp;quot;&amp;amp;gt;
        &amp;amp;lt;saml2:AttributeValue xmlns:xs=&amp;amp;quot;http://www.w3.org/2001/XMLSchema&amp;amp;quot; xmlns:xsi=&amp;amp;quot;http://www.w3.org/2001/XMLSchema-instance&amp;amp;quot; xsi:type=&amp;amp;quot;xs:string&amp;amp;quot;&amp;amp;gt;Super Admin&amp;amp;lt;/saml2:AttributeValue&amp;amp;gt;
        &amp;amp;lt;saml2:AttributeValue xmlns:xs=&amp;amp;quot;http://www.w3.org/2001/XMLSchema&amp;amp;quot; xmlns:xsi=&amp;amp;quot;http://www.w3.org/2001/XMLSchema-instance&amp;amp;quot; xsi:type=&amp;amp;quot;xs:string&amp;amp;quot;&amp;amp;gt;Everyone&amp;amp;lt;/saml2:AttributeValue&amp;amp;gt;
    &amp;amp;lt;/saml2:Attribute&amp;amp;gt;
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;You can look at what is being returned in the assertion by using a browser plugin called SAML Tracer.&lt;/P&gt;</description>
      <pubDate>Fri, 15 Jul 2016 15:42:43 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/SAML-Assertion-signature-verification-failed-Unable-to-get-local/m-p/275600#M190303</guid>
      <dc:creator>rdimri_splunk</dc:creator>
      <dc:date>2016-07-15T15:42:43Z</dc:date>
    </item>
    <item>
      <title>Re: SAML Assertion signature verification failed. Unable to get local issuer certificate</title>
      <link>https://community.splunk.com/t5/Splunk-Search/SAML-Assertion-signature-verification-failed-Unable-to-get-local/m-p/275601#M190304</link>
      <description>&lt;P&gt;The xml is escaped you can unescape it to understand it better&lt;/P&gt;</description>
      <pubDate>Fri, 15 Jul 2016 15:45:37 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/SAML-Assertion-signature-verification-failed-Unable-to-get-local/m-p/275601#M190304</guid>
      <dc:creator>rdimri_splunk</dc:creator>
      <dc:date>2016-07-15T15:45:37Z</dc:date>
    </item>
    <item>
      <title>Re: SAML Assertion signature verification failed. Unable to get local issuer certificate</title>
      <link>https://community.splunk.com/t5/Splunk-Search/SAML-Assertion-signature-verification-failed-Unable-to-get-local/m-p/275602#M190305</link>
      <description>&lt;P&gt;Hi rdimri&lt;/P&gt;

&lt;P&gt;I am working with Umesh, who originally asked the question. I am replying on his behalf.&lt;/P&gt;

&lt;P&gt;Thank you for your answers for both the platforms. The steps which you have given works and our issue is resolved. We have tried it for linux as well as windows. Thanks a lot.&lt;/P&gt;

&lt;P&gt;We also would like to ask you that when it will be formally documented? &lt;BR /&gt;
Also, currently what do you suggest to us to tell it to our customers. Do we tell them to open support ticket with you?&lt;/P&gt;

&lt;P&gt;We would appreciate if you can reply on these questions too.&lt;/P&gt;

&lt;P&gt;Regards,&lt;BR /&gt;
Shashank&lt;/P&gt;</description>
      <pubDate>Mon, 18 Jul 2016 09:07:45 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/SAML-Assertion-signature-verification-failed-Unable-to-get-local/m-p/275602#M190305</guid>
      <dc:creator>shashanksdixit</dc:creator>
      <dc:date>2016-07-18T09:07:45Z</dc:date>
    </item>
    <item>
      <title>Re: SAML Assertion signature verification failed. Unable to get local issuer certificate</title>
      <link>https://community.splunk.com/t5/Splunk-Search/SAML-Assertion-signature-verification-failed-Unable-to-get-local/m-p/275603#M190306</link>
      <description>&lt;P&gt;Hi Dave&lt;/P&gt;

&lt;P&gt;To add to the above answer&lt;BR /&gt;
The attribute name (i.e. Attribute Name="role" ) in the saml response should be exactly matched with the name given in the Splunk. &lt;/P&gt;

&lt;P&gt;Hope this helps.&lt;/P&gt;

&lt;P&gt;Also, If you need more information, can I request you to open a new question. Because the question posted here is for a different subject. I believe if you create a new question, you will get a better response.&lt;/P&gt;

&lt;P&gt;Regards,&lt;BR /&gt;
Shashank&lt;/P&gt;</description>
      <pubDate>Mon, 18 Jul 2016 11:25:18 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/SAML-Assertion-signature-verification-failed-Unable-to-get-local/m-p/275603#M190306</guid>
      <dc:creator>shashanksdixit</dc:creator>
      <dc:date>2016-07-18T11:25:18Z</dc:date>
    </item>
    <item>
      <title>Re: SAML Assertion signature verification failed. Unable to get local issuer certificate</title>
      <link>https://community.splunk.com/t5/Splunk-Search/SAML-Assertion-signature-verification-failed-Unable-to-get-local/m-p/275604#M190307</link>
      <description>&lt;P&gt;Well we have plans to add support for this in future releases and henceforth would recommend that approach going forward. I believe in the meantime people can be pointed to this post until we have this workaround documented officially.&lt;/P&gt;</description>
      <pubDate>Mon, 18 Jul 2016 15:19:51 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/SAML-Assertion-signature-verification-failed-Unable-to-get-local/m-p/275604#M190307</guid>
      <dc:creator>rdimri_splunk</dc:creator>
      <dc:date>2016-07-18T15:19:51Z</dc:date>
    </item>
    <item>
      <title>Re: SAML Assertion signature verification failed. Unable to get local issuer certificate</title>
      <link>https://community.splunk.com/t5/Splunk-Search/SAML-Assertion-signature-verification-failed-Unable-to-get-local/m-p/275605#M190308</link>
      <description>&lt;P&gt;Thanks rdimri.&lt;/P&gt;</description>
      <pubDate>Tue, 19 Jul 2016 09:38:43 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/SAML-Assertion-signature-verification-failed-Unable-to-get-local/m-p/275605#M190308</guid>
      <dc:creator>shashanksdixit</dc:creator>
      <dc:date>2016-07-19T09:38:43Z</dc:date>
    </item>
    <item>
      <title>Re: SAML Assertion signature verification failed. Unable to get local issuer certificate</title>
      <link>https://community.splunk.com/t5/Splunk-Search/SAML-Assertion-signature-verification-failed-Unable-to-get-local/m-p/275606#M190309</link>
      <description>&lt;P&gt;In step 2 above, could you please provide more details where to create the directory?&lt;BR /&gt;
Would this be a full path or in reference to Splunk_Home Directory?&lt;/P&gt;

&lt;P&gt;2) If directory above is not created then lets create it.&lt;BR /&gt;
dir = OPENSSLDIR&lt;BR /&gt;
if (!dir.exist()) { mkdir dir}&lt;/P&gt;</description>
      <pubDate>Fri, 26 Aug 2016 01:28:54 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/SAML-Assertion-signature-verification-failed-Unable-to-get-local/m-p/275606#M190309</guid>
      <dc:creator>rdjoraev_splunk</dc:creator>
      <dc:date>2016-08-26T01:28:54Z</dc:date>
    </item>
    <item>
      <title>Re: SAML Assertion signature verification failed. Unable to get local issuer certificate</title>
      <link>https://community.splunk.com/t5/Splunk-Search/SAML-Assertion-signature-verification-failed-Unable-to-get-local/m-p/275607#M190310</link>
      <description>&lt;P&gt;Hi. The directory is /home/build/build-home/current-BETA/openssl to check for existence and if it doesn't, create it.&lt;/P&gt;</description>
      <pubDate>Sun, 28 Aug 2016 17:38:02 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/SAML-Assertion-signature-verification-failed-Unable-to-get-local/m-p/275607#M190310</guid>
      <dc:creator>davidpaper</dc:creator>
      <dc:date>2016-08-28T17:38:02Z</dc:date>
    </item>
    <item>
      <title>Re: SAML Assertion signature verification failed. Unable to get local issuer certificate</title>
      <link>https://community.splunk.com/t5/Splunk-Search/SAML-Assertion-signature-verification-failed-Unable-to-get-local/m-p/275608#M190311</link>
      <description>&lt;P&gt;2) the paths are absolute. value of the absolute path is obtained from step1&lt;/P&gt;</description>
      <pubDate>Wed, 31 Aug 2016 17:44:20 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/SAML-Assertion-signature-verification-failed-Unable-to-get-local/m-p/275608#M190311</guid>
      <dc:creator>rdimri_splunk</dc:creator>
      <dc:date>2016-08-31T17:44:20Z</dc:date>
    </item>
    <item>
      <title>Re: SAML Assertion signature verification failed. Unable to get local issuer certificate</title>
      <link>https://community.splunk.com/t5/Splunk-Search/SAML-Assertion-signature-verification-failed-Unable-to-get-local/m-p/275609#M190312</link>
      <description>&lt;P&gt;Why is splunk using a build directory for these certificates instead of making the OPENSSLDIR just be /opt/splunk/openssl, and have the certs in there?&lt;/P&gt;</description>
      <pubDate>Thu, 06 Oct 2016 19:00:09 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/SAML-Assertion-signature-verification-failed-Unable-to-get-local/m-p/275609#M190312</guid>
      <dc:creator>vliggio</dc:creator>
      <dc:date>2016-10-06T19:00:09Z</dc:date>
    </item>
    <item>
      <title>Re: SAML Assertion signature verification failed. Unable to get local issuer certificate</title>
      <link>https://community.splunk.com/t5/Splunk-Search/SAML-Assertion-signature-verification-failed-Unable-to-get-local/m-p/275610#M190313</link>
      <description>&lt;P&gt;Because we do not know what openssl you might have (or if have it). We also want to use an openssl version that we have tested with and meets our security policies.&lt;/P&gt;</description>
      <pubDate>Thu, 06 Oct 2016 19:09:51 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/SAML-Assertion-signature-verification-failed-Unable-to-get-local/m-p/275610#M190313</guid>
      <dc:creator>rdimri_splunk</dc:creator>
      <dc:date>2016-10-06T19:09:51Z</dc:date>
    </item>
    <item>
      <title>Re: SAML Assertion signature verification failed. Unable to get local issuer certificate</title>
      <link>https://community.splunk.com/t5/Splunk-Search/SAML-Assertion-signature-verification-failed-Unable-to-get-local/m-p/275611#M190314</link>
      <description>&lt;P&gt;But you're assuming that it's the openssl version provided by splunk since you're using the cmd openssl command (and it's distributed as part of the Splunk install). It would be a lot easier to build openssl within the standard splunk hierarchy and then put the certs there by default.&lt;/P&gt;</description>
      <pubDate>Thu, 06 Oct 2016 19:24:06 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/SAML-Assertion-signature-verification-failed-Unable-to-get-local/m-p/275611#M190314</guid>
      <dc:creator>vliggio</dc:creator>
      <dc:date>2016-10-06T19:24:06Z</dc:date>
    </item>
    <item>
      <title>Re: SAML Assertion signature verification failed. Unable to get local issuer certificate</title>
      <link>https://community.splunk.com/t5/Splunk-Search/SAML-Assertion-signature-verification-failed-Unable-to-get-local/m-p/275612#M190315</link>
      <description>&lt;P&gt;I can confirm that rdimri's steps solve the SAML signature verification errors.&lt;/P&gt;

&lt;P&gt;I can also confirm that having to perform these steps feels extremely dirty.  I expect better from Splunk...&lt;/P&gt;</description>
      <pubDate>Mon, 11 Dec 2017 22:40:40 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/SAML-Assertion-signature-verification-failed-Unable-to-get-local/m-p/275612#M190315</guid>
      <dc:creator>bedgar_oneok</dc:creator>
      <dc:date>2017-12-11T22:40:40Z</dc:date>
    </item>
    <item>
      <title>Re: SAML Assertion signature verification failed. Unable to get local issuer certificate</title>
      <link>https://community.splunk.com/t5/Splunk-Search/SAML-Assertion-signature-verification-failed-Unable-to-get-local/m-p/275613#M190316</link>
      <description>&lt;P&gt;The resolution to this is in the following answers post:&lt;/P&gt;

&lt;P&gt;&lt;A href="https://answers.splunk.com/answers/543221/problem-with-saml-cert-error-uisaml-verification-o.html"&gt;https://answers.splunk.com/answers/543221/problem-with-saml-cert-error-uisaml-verification-o.html&lt;/A&gt;&lt;/P&gt;

&lt;P&gt;After you add the IdP Certificate Chains (root, intermediate, leaf), go back to Authentication Method page and just click Reload Authentication at the bottom of the page.  Doing this is faster that a splunk restart.&lt;/P&gt;</description>
      <pubDate>Tue, 13 Feb 2018 00:03:13 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/SAML-Assertion-signature-verification-failed-Unable-to-get-local/m-p/275613#M190316</guid>
      <dc:creator>scannon4</dc:creator>
      <dc:date>2018-02-13T00:03:13Z</dc:date>
    </item>
  </channel>
</rss>

