Describe the bug
Some services connected with SAML protocol verify certificate that is used to sign SAML response. And automatically generated Authentik certificates don't pass such check. Specifically, we faced such issue with Splunk service. We were forced to issue self-signed certificate manually to make it work with a command:
openssl req -x509 -newkey rsa:4096 -keyout key.pem -out cert.pem -sha256 -days 36500 -nodes -subj "/O=name.dns/OU=SSO/CN=sso.name.dns"
For comparison, Okta issues self-signed certificates for SAML applications as well, but they are really 'self-signed' and work correctly.
How to reproduce
- Download default Authentik certificate, or generate a new one on System > Certificates page
- Verify with a command
openssl verify -CAfile ./cert.pem ./cert.pem. You will see:
CN=test, O=authentik, OU=Self-signed
error 20 at 0 depth lookup: unable to get local issuer certificate
error ./test_certificate.pem: verification failed
Expected behavior
openssl verify call has to print:
./cert.pem: OK
Screenshots
No response
Additional context
No response
Deployment Method
Docker
Version
2025.10.2
Relevant log output
Describe the bug
Some services connected with SAML protocol verify certificate that is used to sign SAML response. And automatically generated Authentik certificates don't pass such check. Specifically, we faced such issue with Splunk service. We were forced to issue self-signed certificate manually to make it work with a command:
openssl req -x509 -newkey rsa:4096 -keyout key.pem -out cert.pem -sha256 -days 36500 -nodes -subj "/O=name.dns/OU=SSO/CN=sso.name.dns"For comparison, Okta issues self-signed certificates for SAML applications as well, but they are really 'self-signed' and work correctly.
How to reproduce
openssl verify -CAfile ./cert.pem ./cert.pem. You will see:Expected behavior
openssl verifycall has to print:./cert.pem: OKScreenshots
No response
Additional context
No response
Deployment Method
Docker
Version
2025.10.2
Relevant log output