Troubleshooting the SAML SSO issues
Use the following topics to resolve common issues with the SAML SSO.
Error 203: SRVE0295E: Error reported: 203
error when accessing the Admin UI
- Solution
-
- Go to the $TOP/etc/default/common.properties file.
- Set the value of the enable_referer_check property to false.
- Restart the application and ensure that all services are running.
CWPKI0428I: The signer might need to be added to the local trust store
error when
accessing the Admin UI
- Solution
- You can use the Retrieve from port in the WebSphere® Application Server administrative console to retrieve the certificate
and resolve the problem. If you determine that the request is trusted, complete the following steps.
- Log in to the administrative console.
- Expand Security and click SSL certificate and key management.
- Under the Configuration settings, click Manage endpoint security configurations.
- Select the appropriate outbound configuration to get to the (cell):<CELL>:(node):<NODE> management scope.
- Under the Related Items, click Key stores and certificates and click the NodeDefaultTrustStore key store.
- Under the Additional Properties, click Signer certificates and Retrieve From Port.
- Enter the host name, port, and alias.
- Click Retrieve Signer Information and verify the certificate information.
- Click Apply and Save.
On IdP session expiry with Windows authentication enabled for SAML, Admin UI and Persona-based UI do not load after refreshing browser.
- Solution
-
- Close the browser.
- Open the browser and access the Admin UI or Persona-based UIs. Confirm that you can now log in to both the interfaces.
Admin UI or Persona-based UI login screen is displayed
- Cause
- The Login page can be displayed due to multiple reasons. The URL used for accessing the application do not match the pattern that is given in the SAML SSO configuration.
- Solution
-
- Session has expired, refresh the URL in the browser to log in again.
- You can also increase the session timeout for the application.
- The SAML authentication has failed, check your SAML configuration.
- Enable following loggers to trace the issue.
- Enable the Login.wpcs
logger.To enable logger, you must add a logger and appender for this LDAP logger in the $TOP/etc/default/log4j2.xml file. In the Login.wpcs script, the default logger is ldap.For example,
Definition Script Category definition <Logger name="com.ibm.ccd.wpc_user_scripting.ldap" level="info" additivity="false"> <AppenderRef ref="LDAPLOGGER" /> </Logger>
Appender definition <RollingFile name="LDAPLOGGER" fileName="%LOG_DIR%/${svc_name}/ldap.log" append="true" filePattern="%LOG_DIR%/${svc_name}/ldap-%d{MM-dd-yyyy}-%i.log"> <PatternLayout> <Pattern>%d [%t] %-5p %c %x- %m%n</Pattern> </PatternLayout> <Policies> <TimeBasedTriggeringPolicy /> <SizeBasedTriggeringPolicy size="10 MB" /> </Policies> <DefaultRolloverStrategy max="2" /> </RollingFile>
- Enable SSO request filter logger.
To enable debug logger, you must set level=debug in the $TOP/etc/default/log4j2.xml file for the following logger.
<Logger name="com.ibm.ccd.ui.sso.filters" level="debug" additivity="false"> <AppenderRef ref="SERVLET_FILTERS" /> </Logger>
- Check the ipm.log file for SAML attributes and roles that are assigned to the user.
- Enable the Login.wpcs
logger.
HTTP error message
- Symptoms
- On accessing the Admin UI or Persona-based UI, you get "HTTP Error 403 – Forbidden" error.
- Cause
- The error indicates that the SAML token has expired.
- Solution
-
- Refresh the URL in the browser and SAML login should work.
- Increase the SAML token expiry on your SSO Partner.
Note: For information on troubleshooting SAML SSO - WebSphere Application Server issues, see Web Single Sign-on problems with WebSphere Application Server.