Failed to Authenticate the Sso Server. Please Try Again Later
- Was this page helpful?
- Comments
Troubleshooting authentication issues
This topic provides information for troubleshooting authentication issues of Remedy Unmarried Sign-On.
Generic hallmark issue
Effect | Description | Workaround |
---|---|---|
A not-existing domain is mapped to a realm | When a user asking is redirected to the Remedy SSO login URL, the post-obit message is displayed: This error happens when the administrator deletes the default realm "*'" so adds another realm, but does not configure a domain of the new realm. | Add together the application host name or FQDN in the realm domain if the realm ID is not "*". |
Authentication issues for applications hosted on dissimilar domains
Issue | Description | Workaround |
---|---|---|
Unable to outcome id_token | Subsequently configuring the Remedy SSO agent for using the OpenID scope, the Remedy SSO server fails to generate id_token in the following scenarios, and an exception is logged in the Remedy SSO amanuensis logs:
For more information near the exception, run into the Remedy SSO agent logs. | After configuring the Remedy SSO agent for using the OpenID telescopic, make sure that yous:
|
An OAuth2 client cannot apply the OpenID scope | At the time of registering a customer every bit an OAuth2 client, if y'all do not select the openid (Scope used for OpenID connect) check box, the customer cannot use the OpenID scope. The Remedy SSO server logs a message mentioning that the specified OAuth2 client is not allowed to use the OpenID telescopic. | On the Admin Console, edit the OAuth2 client details and select the openid (Scope used for OpenID connect) check box for that client. |
id_token is invalid | The user cannot log in and gets the following mistake message: The post-obit exception is logged in the log files: | Synchronize the time on the Remedy SSO server and Remedy SSO agent machines. |
Issue | Clarification | Workaround |
---|---|---|
The cantankerous launch link is not displayed.
| The target Remedy SSO server is not configured correctly. | On the target Remedy SSO server, for the Preauth authentication method, make certain that yous enter the name of the originating Remedy SSO server in theALLOW-FROM Domain(s) field. For information almost how to configure this field, see Configuring preauthentication. |
The post-obit error message is displayed in an iframe: Unexpected error happened. Failed to login. Please contact the Administrator. | A incorrect document is configured for a realm with the Preauth authentication method on the target Remedy SSO server. |
|
Remedy AR authentication problems
Effect | Clarification | Workaround |
---|---|---|
AREA plugin error after AR user credentials were submitted | The user completes a Remedy SSO login (on the Remedy SSO login page for AR authentication or on the IdP login page) and is redirected back to BMC application URL. Then, the application might brandish an authentication error. The AR Expanse plugin log file ( ARSystemInstallFolder/Arserver/Db/arjavaplugin.log ) might contain the post-obit or similar fault logs: 2015-09-13 17:04:21,324 Error [pool-iv-thread-10] com.bmc.arsys.pluginsvr.plugins.ARPluginContext (?:?) - <ARSYS.AREA.RSSO> Could non validate userId with Service Provider. Could not think user from authentication cord. 2015-09-13 17:04:21,324 ERROR [pool-4-thread-10] com.bmc.arsys.pluginsvr.plugins.ARPluginContext (?:?) - <ARSYS.AREA.RSSO> Return Code:two |
|
No groups for authenticated users | Remedy AR System is integrated with Remedy SSO, and authenticated users have no groups afterward login. | Uncomment the following setting in the ARSystemInstallFolder /Conf/rsso.cfg file: AR-USER-GROUPS-FIX: truthful |
AR Hallmark on Remedy SSO does not work when Premium Encryption is enabled on AR System Server | After installing Encryption Premium or Performance security on AR Organisation Server, Remedy SSO can no longer connect to AR System Server with encryption enabled. | Install the same Premium or Operation security application on the Remedy SSO server. For data virtually how to set up Premium or Functioning security awarding, see Installing encryption on BMC Remedy applications . To integrate Remedy SSO with Premium Encryption, see Doc-128148 . |
SAML authentication issues
Issue | Description | Workaround |
---|---|---|
IdP fault on SAML request if SAML IdP login URL contains a query parameter | If the IdP login URL contains a query parameter (a question marking [?] is in the URL), an error might appear when the browser is redirected to the IdP login URL. For instance, if you are trying to access https://sso.connect.pingidentity.com/sso/idp/SSO.saml2?idpid=XXX , you will not be able to log in. | Not applicable |
SAML IdP returns NameID with an encrypted string | Some IdPs might return an encrypted string in the NameID of the response. | If the NameID in a SAML response returned by IdP exceeds 255 characters, increase the size of the NameId column in the IssuesTokens table of the Remedy SSO database. For example, if the NameID length is 300 characters, set the NameId cavalcade to at least VARCHAR(300). |
LDAP authentication issues
Consequence | Description | Workaround |
---|---|---|
LDAP authentication failure | When using LDAP over SSL in an environment that uses Java 8+, users are not authenticated. The the following records are available in the Remedy SSO server logs: | Add together the Coffee proprerties for the JVM that Tomcat uses. Linux instance: Create or edit the TomcatInstallFolder/bin/setenv.sh file. Microsoft Windows example:
|
If the LDAP server uses a self-signed certificate, the JVM that Tomcat uses on the Remedy SSO server does not trust this certificate. | To utilise TLS/SSL connection to the LDAP server, import the LDAP server certificates (cacerts) to the truststore ( JavaHome \jre\lib\security ) of the Apache Tomcat used by the Remedy SSO server . Import the certificates by using third-party utilities such as Keystore explorer . | |
The login request is redirected to an emptyrsso/beginning URL | When the Remedy SSO server and the integrated awarding both use self-signed TLS/SSL certificates for the HTTPS connection, the certificate confirmation dialog box breaks the flow, and you cannot log in past using Microsoft Edge and Safari browsers. | Use another browser to log in, or open the application URL again afterward confirming the exception for the document. |
Kerberos authentication issues
You can notice the events and log information related to Kerberos in the following files, which are usually located in the log directory for Tomcat:
- rsso.log—The main log file of the Remedy SSO server.
- tomcat8-stdout.*.log —A file that contains Kerberos related events from Java Authentication and Authorization Service, which theRemedy SSO server uses internally to authenticate users.
Outcome | Description | Workaround |
---|---|---|
Invalid keytab alphabetize number for Kerberos | An exception is generated in the logs when the keytab file is generated with a key version number (KVNO) dissimilar from the one specified in the ticket. The log file might look something like this: | Regenerate the keytab file. You must specify the /kvno 0 option to ensure that the KVNO value is compatible. |
Browser sends NTLM instead of SPNEGO | The token that the Remedy SSO server receives from the client is a Microsoft Windows NT LAN Manager (NTLM) token and not the Kerberos token. If this issue happens, the post-obit entry is recorded in the log file: | Ensure that the Remedy SSO server host name or domain is added to the list of websites for Kerberos authentication. The failure could happen due to the following reasons:
|
Keytab file does non contain an entry to decrypt a service ticket | The keytab file does not comprise an entry to decrypt a service ticket. The logs might look something like this: | Examine items and make certain that the service principal names (SPNs) are valid. If an SPN password is used in the Remedy SSO Admin Console, ensure that the Service Principal Name is specified as To meet content of the existing keytab file, run the |
The following error appears in the rsso.log file: | | Install JCE Unlimited Strength Jurisdiction Policy Files for JDK/JRE to support AES128 and AES256 encryption types. You can find the policy files at the following links:
Also, install these policy files in the JRE that is used by the Tomcat server on which the Remedy SSO runs. |
The login fails because of the large size, and the browser displays an error | The Kerberos service ticket is passed equally a header value in the HTTP asking. Though the default maximum header size in Tomcat is 4096 bytes (4 KB), the header size may go upwardly to 28 KB under some circumstances. The login fails because of the large size, and the browser displays an mistake message because Tomcat does not reply to such requests. | Specify the |
To debug Kerberos authentication issues
-
To ensure that customer's machine has joined the domain and the domain user is used, run the following command:
C:\whoami DOMAIN\userID
- Ensure that you have other internal resources with Kerberos authentication, and you can successfully log in to them and apply them.
For this, y'all must accept service tickets in the output of theklist utility. - Ensure that the Remedy SSO server is configured to utilize the same domain that your machine has joined.
- Ensure that yous are trying to access the Remedy SSO server by using its FQDN (for example, http://access.instance.com/rsso/). Also, make certain that the host name used in the FQDN is identical to the host name used in the service master name (SPN) for a service account created in the key distribution center (KDC). In this case, the SPN volition be HTTP/access.instance.com.
- Ensure that y'all have obtained the Kerberos ticket-granting ticket (TGT).
- Ensure that the browser is configured properly, see Configuring browser settings for Kerberos authentication.
- Ensure that the KDC domain is defined in upper-case letter in the Remedy SSO Admin Console.
- Ensure that the time departure between the KDC and your motorcar is no more than 5 minutes.
- Ensure that the Kerberos service ticket obtained on the automobile accessing the Remedy SSO server looks like HTTP/access.bmc.com@RSSO.COM whereaccess.bmc.com@RSSO.COM is the host name of the auto that hosts the Remedy SSO server.
Was this page helpful? Yes No Submitting... Cheers
Failed to Authenticate the Sso Server. Please Try Again Later
Source: https://docs.bmc.com/docs/rsso1911/troubleshooting-authentication-issues-897552931.html
0 Response to "Failed to Authenticate the Sso Server. Please Try Again Later"
Post a Comment