EDIPI will NOT work per account formatting in your last reply. You will definitely need PIV. Have you tried to sign into Splunk via token using a non-admin account? In the web.conf help page, it gives the different values you can use for certBasedUserAuthMethod. PIV would be correct for you, but the certBasedUserAuthPivOidList may require a different value. I would look at your CAC values and find the field/attribute that holds the value you need Splunk to read. Per web.conf help page, https://docs.splunk.com/Documentation/Splunk/9.4.1/Admin/Webconf PIV (Personal Identity Verification): Use PIV, a 16-digit numeric identifier typically formatted
as xxxxxxxxxxxxxxxx@mil. It is extracted from an "Other Name" field in the Subject Alternate Name which
corresponds to one of the object identifiers (OIDs) that you configure in 'certBasedUserAuthPivOidList'. Seems like the incorrect field is being read. Look through your logs to see if it shows the value that is being read in and try to match that value up on your CAC. Otherwise, here is the full configuration for web.conf CAC authentication that I've had success with: [settings]
requireClientCert = true
sslRootCAPath = $SPLUNK_HOME\etc\auth\DOD.web.certificates\cert_chain_created.pem
enableCertBasedUserAuth = true
SSOMode = permissive
trustedIP = 127.0.0.1
certBasedUserAuthMethod = PIV
certBasedUserAuthPivOidList = Microsoft Universal Principal Name
allowSsoWithoutChangingServerConf = 1
... View more