<< Click to Display Table of Contents >> Troubleshooting SAML 2.0 error codes |
Overview
When configuring SAML 2.0 as your authentication protocol, you may face different error messages regarding its configuration. This article shows the possible error messages as well as their respective solution.
Troubleshooting SAML authentication codes
Code |
State |
Cause |
Solution |
---|---|---|---|
3000 |
saml2_error |
An unhandled exception appears during the configuration process or when receiving SAML 2.0 messages when trying to connect with non-supported Identity Providers. |
If the error “Invalid algorithm specified” is registered in the traces, verify that the certificate loaded in Bizagi Cloud used to sign supports the algorithms SHA-256 or SHA-1. Also, make sure that the certificate loaded in Bizagi to sign supports the algorithms SHA-256, SHA-387 and SHA-512. The support of these algorithms depends on the Provider that was used to create the certificate. If you used the “Microsoft Enhanced Cryptographic Provider v1.0” Provider, only SHA-1 is supported. It is recommended to use the “Microsoft Enhanced RSA and AES Cryptographic Provider” provider which allows the use of strong algorithms. For more information about the Microsoft Cryptographic Service Providers, click here.
If the error “No Identity Provider supporting SAML binding REDIRECT found in metadata” is registered, verify that the Single Log Out endpoint is correctly configured in the IdP, as Bizagi accounts requires the log out endpoints to be configured in the Identity Provider. |
3001 |
binding_saml2_error |
Occurs when an unknown binding was registered, or when the binding is not supported for an Identity provider. |
Bizagi supports the following bindings for SSO and SLO: • HTTP Redirect Binding • HTTP POST Binding
Make sure that the Identity provider is using the correct binding for Bizagi, as it may be using non-supported bindings like HTTP Artifact Binding or SAML SOAP Binding. |
3002 |
idp_endpoints_saml2_error |
The Identity Provider (IdP) endpoints are null or don't exist in the IdP metadata file. This might happen because: •The path to the IdP file was configured incorrectly. •The IdP metadata file is incomplete or has errors. |
Make sure that the metadata file used in the setup is correct. |
3003 |
service_provider_not_set_saml2_error |
The Service Provider is null or wasn't configured. |
Bizagi's Service Provider is Bizagi Cloud. This parameter is configured by default. However, you can check the information regarding the Service Provider and make sure that the following properties are complete •Organization Name •Technical email contact adress •Organization URL •Service Provider URL |
3004 |
metadata_location_not_found_saml2_error |
The IdP metadata file directory or URL cannot be located. |
Verify the Identity Provider Metadata File Path property. Make sure that it is well configured and that the file is accessible by Bizagi. |
3005 |
invalid_file_signature_saml2_error |
The IdP file signature cannot be verified. |
Make sure that the algorithm used by the IdP to sign the file's metadata is supported by Bizagi. The supported algorithms are SHA-1 and SHA-256. Also, if the file was edited, check for possible errors. |
3006 |
metadata_configuration_saml2_error |
This error might happen because: •The binding used is not supported by Bizagi •The IdP's URI is not valid |
•Verify that the binding included by the IdP is supported by Bizagi. Bizagi supports the following bindings for SSO and SLO: • HTTP Redirect Binding • HTTP POST Binding
•Verify the Service Provider URL property.
|
3007 |
sso_binding_not_supported_saml2_error |
The binding used for the Single Sign On (SSO) is not supported |
Verify that the binding included by the IdP is supported by Bizagi. Bizagi supports the following bindings for SSO: • HTTP Redirect Binding • HTTP POST Binding |
3008 |
slo_binding_not_supported_saml2_error |
The binding used for the Single Log Out (SLO) is not supported. |
Verify that the binding included by the IdP is supported by Bizagi. Bizagi supports the following bindings for SLO: • HTTP Redirect Binding • HTTP POST Binding |
3009 |
invalid_data_time_assertion_saml2_error |
The assertion valid time does not met the SAML-Core specification. Valid time does not meet the SAML-Core specification when: •The assertion is read before the valid time. •The assertion is read after the valid time. |
•Make sure that the assertion is read in the allowed time window. If it is read before or after, the error will persist. •Verify that the IdP is generating the time values for the assertions as specified in section 1.3.3 of the SAML-Core document. |
3011 |
metadata_idp_missing_entityid_saml2_error |
The IdP metadata file does not have the entityID attribute. |
Make sure that the IdP metadata file includes the entityID with the server ID attribute. |
3014 |
metadata_load_error_saml2_error |
The IdP metadata file cannot be loaded. This might occur because it is empty or has errors. |
Verify that the IdP file: •Is not empty •Does not have special characters •Has the XML structure that meets the SAML 2.0 specification |
3015 |
saml2_configuration_not_found_error |
The SAML 2.0 configuration is not found in the Bizagi Cloud database. This might happen when migrating between Bizagi versions or if there are errors in Bizagi's internal metadata, or if there is only one active user in the database and is trying to obtain the SAML metadata from Bizagi. There must be at least two active users to use the SAML 2.0 protocol. |
Contact Bizagi's technical support. |
3016 |
private_key_not_found_error |
The private key of the certificate is not found. This happens when a certificate is loaded with the public key, but not with the private key. |
Generate and load the certificate that includes the private key. Then, configure the password needed for the private key. |
3017 |
response_not_contain_an_InResponseTo_error |
The response message received does not contain the InResponseTto attribute. This happens when the message sent to /saml2/assertionConsumer does not have the proper structure. |
Look for the IP or the URL from which the requests are being sent and fix the issue in the external application. |
3019 |
status_assertion_saml2_error |
You may receive one of the following responses from the IdP: •urn:oasis:names:tc:SAML:2.0:status:Requester: the SAML request could not be processed due to an error in the message creation in Bizagi. •urn:oasis:names:tc:SAML:2.0:status:Responder: the SAML request could not be processed due to an error in the IdP •urn:oasis:names:tc:SAML:2.0:status:VersionMismatch: the SAML request has an incorrect version or a version that is not supported by the IdP. |
Look the IdP authentication logs to determine the issue. Possible solutions for this problem are: •If the IdP does not trust in the certificates sent by Bizagi, export the certificates public keys and install them in the IdP. •If the IdP does not support the algorithm used by Bizagi to sign the certificate, make sure to configure the same algorithm in both Bizagi and the IdP. •Validate that both Bizagi and the IdP have a correct configuration. |
3020 |
decrypted_assertion_error |
The assertion could not be decrypted. |
Verify that you are using complete encryption for the assertion. Bizagi does not support encryption by parts or attribute encryption. |
3021 |
locate_assertion_decryption_error |
It is not possible to locate the key to decrypt the assertion. This happens when the IdP sends an assertion to Bizagi with the EncryptedAssertion element, but it is not possible to locate the EncryptedKey element. |
Make sure that the encryption option is configured in the IdP and that Bizagi's certificate is installed in the IdP. |
3022 |
format_saml2_error |
The assertion does not comply with the format validations. |
Look in the authentication logs in Bizagi for the element that could not be validated and fix its format. |
3023 |
assertion_signature_could_not_be_verified_error |
The assertion signature sent by the IdP could not be verified. |
•Make sure that the algorithm used by the IdP to sign the file's metadata is supported by Bizagi. The supported algorithms are SHA-1 and SHA-256. •Make sure that the certificate used for the signature is valid and that corresponds with the one specified in the metadata file. •Verify that the IdP is configured to sign the messages sent to Bizagi. |
3024 |
assertion_is_expired_error |
The assertion expired or could not be validated. This happens when the attribute NotOnOrAfter, from the element SubjectConfirmation could not be validated. This might be because: •The assertion expiration time was configured too short. •The time configured is 0. •An expired assertion is being used. |
Check for the IdP configuration and adjust the assertion time. |
3026 |
assertion_must_contain_one_issuer_error |
The assertion does not comply with the format validations because the <issuer> element is missing. |
Vefify that the IdP includes the <issuer> element when generating the assertion |
3029 |
assertion_name_id_not_found_error |
The subject element in the assertion response does not have the NameID element. This element is used to identify the user and must be validated by Bizagi. |
Make sure that the IdP includes and maps correctly the NameID element in the assertion response. This element must have the user's email. |
3030 |
logout_saml2_error |
The session cannot be closed because the user does not have an active session.
A user session is identified in Bizagi with the SessionIndex attribute, in the AuthnStatement element. When a user logs out, Bizagi sends the SessionIndex to the IdP so that the session can be closed. However, the error appears when the IdP cannot find the specified SessionIndex.
This may happen because: •The session in the Portal was closed automatically due to user inactivity. •The IdP URL was changed while the user was working in the Portal. •The IdP was restarted, and the contexts' states and the server sessions were not persisted. |
Erase the cookies from your browser and sign in again. |
3031 |
single_logout_unknown_idp_error |
a logout request is received from an unknown or an untrusted IdP. The requests sent to Bizagi must come from a registered IdP. |
Make sure that the IdP metadata file is correct and that the requests are being sent from the correct IdP. |
3032 |
signature_not_present_error |
The incoming message is not signed |
Make sure that all the messages that the IdP is sending to Bizagi are signed. |
3033 |
unsupported_request_type_error |
The HTTP request has a non supported method. Bizagi supports GET and POST HTTP requests. Other methods are not supported. |
Verify that the IdP is using a method supported by Bizagi. |
3035 |
logout_request_is_malformed_error |
The logout request is not complete. The SAMLResponse or the SAMLRequest parameter is missing. |
Make sure that the logout request is being sent to the correct endpoint and that the parameters specified are complete. |
3036 |
signature_algorithm_not_supported_error |
The algorithm used to sign the messages and the assertions is not supported by Bizagi. |
Make sure that the algorithm used by the IdP to sign the file's metadata is supported by Bizagi. The supported algorithms are SHA-1 and SHA-256. |
3037 |
sha256_algorithm_saml2_error |
This happens when the SHA-256 algorithm is invalid or is not supported. |
Verify that Bizagi is using version 4.5 of the .NET Framework, in versions lower than 4.5 the validation of signatures with the SHA256 algorithm generate an error. |
3038 |
encryption_key_not_found-error |
The encryption certificate is not found in the database. This happens when the assertion encryption option is enabled but no certificate is uploaded to do the encryption.
|
Make sure that the properties Encryption certificate and Signature certificate password are properly filled out. Take into account that the certificate must be in a P12 or PFX format and the private key must be protected with a password. |
3039 |
assertion_not_found_saml2 |
Bizagi received in the endpoint /saml2/assertionConsumer a request that does not have an assertion or a SAML token. |
Make sure that the Service Provider in the IdP is properly configured. |
3041 |
signing_certificate_not_found_saml2 |
The certificate needed to sign the messages generated by Bizagi is not found. |
Generate and load the certificate that includes the private key. Then, make sure that the properties Signing certificate and Signature certificate password are properly filled out. |
3042 |
encryption_certifcate_not_found_saml2 |
The certificate needed to encrypt the messages generated by Bizagi is not found. Bizagi gives you the option to encrypt the messages sent to the IdP. If this option is enabled, you need to generate a certificate to encrypt the messages. |
Generate and load the certificate that includes the private key. Then, make sure that the properties Encryption certificate and Encryption certificate password are properly filled out. |
3043 |
too_short_idle_session_timeout_configurated_in_bizagi |
The session time in Bizagi is lower than 1. |
Configure the session time in Bizagi with a value equal or higher than 1. |
1150 |
user_not_found_error |
The user does not exist in Bizagi. |
Users need to be created before they can log in to any Portal. To know how to synchronize users in Bizagi, |
1155 |
assertion_saml2_email_duplicate_error |
The email account is assigned to more than one user. |
Update the users info table so that every user has a unique email adress. |
122 |
assertion_saml2_user_not_enabled_error |
The user is not enabled in Bizagi. |
Log in to the Customer Portal with the Administrator account and enable the specified user. |
123 |
assertion_saml2_user_locked_account_error |
The user is blocked in Bizagi. |
Contact Bizagi support. |
124 |
forgot_password_unsupported
|
The Forgot Your Password flow is not supported. |
Access your account management directly from your identity provider, for example Microsoft (not from the Bizagi Work portal), and select the Forgot Password option from there. Or contact your identity provider support. |
Last Updated 7/17/2023 3:27:04 PM