This occurs for Splunk 6.4.4 possibly related to issue SPL-141089 which is fixed in 6.5 and other releases
Problem evaluation:
Prior to this fix, we didn't have a mechanism of keeping the SAML user attributes such as email and realname on the disk
If the auth system were to be bounced, the cache would get cleared, which would result in the loss of the user attributes
Another scenario identified during the course of this investigation: in a SHC, if the SH, which was used by the LB to log the user in, goes down, a different SH in the cluster wouldn't have the user attributes, resulting in the same problem.
Resolution:
Store the user's real name and email id along with the role list under the userToRoleMap_SAML stanza of authentication.conf.
The role list, real name and email are all separated by "::" delimiter. If any of these string have "::" as part of them, the same is stripped off before storing in authentication.conf
The GET endpoint for admin/SAML-user-role-map is also updated to now return real name and email id along with the real list.
This issue has been fixed in the the following releases:
6.5.6+
6.6.4+
7.0.0+
http://docs.splunk.com/Documentation/Splunk/6.5.6/ReleaseNotes/6.5.6
SPL-141089, SPL-143593, SPL-142248, SPL-143592
SAML - Users realName and email being dropped from the UI on authentication bounce
Support have tested this (on 7.0.2) and when you log in this section is added to authentication.conf to have the name/email mapped:
...
[userToRoleMap_SAML]
user@someaddress.net = admin::Tester::user@someaddress.net
... View more