Did you ever get this to work? I'm having a similar problem but mine is even more perplexing. I have 2 Splunk servers that are already configured for MFA with smart card. They are on the latest 9.x version. I'm in the process of building new Splunk 10 servers, and I can't get those to auth with our smart card tokens. I've mimicked exactly all of our conf files the way they are on the existing working splunk servers. I'm getting ready to pull my hair out. As far as I can tell, AD Auth through LDAPS is working, because when I turn token based login off via web.conf file, I am able to authenticate in using active directory username/password. When I turn it back on and try again, here my errors: splunkd.log: SAN OtherName not found for configured OIDs in client certificate CertBasedUserAuth: error fetching username from client certificate audit.log: user=n/a, action=read_session_token, info=denied, reason="cannot decrypt token" My web.conf and server.conf files are exactly the same as my existing production system that works. web.conf is a little different than listed here though because I have: certBasedUserAuthMethod = PIV certBasedUserAuthPivOidList = 1.3.6.1.4.1.311.20.2.3, Microsoft Universal Principal Name I don't know why my audit.log says it can't decrypt my token. All of my certs for the system are brand new and procedures for creating their public/private .pem files have been followed. I haven't even installed any AV software on this new build yet because I didn't want anything interfering with the troubleshooting. If anyone has any suggestions on where else to look, that would be great! I need to take these old servers offline but I can't until the new one is configured and working.
... View more