Skip to content

Automatically generated certificates are not self-signed #19058

@bitpavel-l25

Description

@bitpavel-l25

Describe the bug

Some services connected with SAML protocol verify certificate that is used to sign SAML response. And automatically generated Authentik certificates don't pass such check. Specifically, we faced such issue with Splunk service. We were forced to issue self-signed certificate manually to make it work with a command:
openssl req -x509 -newkey rsa:4096 -keyout key.pem -out cert.pem -sha256 -days 36500 -nodes -subj "/O=name.dns/OU=SSO/CN=sso.name.dns"
For comparison, Okta issues self-signed certificates for SAML applications as well, but they are really 'self-signed' and work correctly.

How to reproduce

  1. Download default Authentik certificate, or generate a new one on System > Certificates page
  2. Verify with a command openssl verify -CAfile ./cert.pem ./cert.pem. You will see:
CN=test, O=authentik, OU=Self-signed
error 20 at 0 depth lookup: unable to get local issuer certificate
error ./test_certificate.pem: verification failed

Expected behavior

openssl verify call has to print:
./cert.pem: OK

Screenshots

No response

Additional context

No response

Deployment Method

Docker

Version

2025.10.2

Relevant log output

Metadata

Metadata

Assignees

Labels

bugSomething isn't workingstatus/staleThis issue has not been updated recently

Type

Projects

No projects

Milestone

No milestone

Relationships

None yet

Development

No branches or pull requests

Issue actions