Tibin
Tibin12mo ago

Hello Team, One specific SAML is bugging us more than a WEEK

Hey Team, We've been working on integrating ADFS for a customer and encountered an unusual exception that's got us stumped. The error code is SAML-nuo0vphhh9. Interestingly, when we attempted to reproduce the issue using our test ADFS server, everything worked fine, which was a bit disappointing 😦 However, the problem persists in the customer's environment. We've compared the decrypted assertions between our ADFS response and the customer's, but nothing stood out. We'd really appreciate any insights or help you could offer. Thanks a lot!
No description
19 Replies
Tibin
TibinOP12mo ago
@Zitadel Staff
FFO
FFO12mo ago
Hm tricky to tell, have you compared the settings on the adfs side? Btw. this is a community forum, so even without tagging we try to respond 😉
Tibin
TibinOP12mo ago
Yes, did compared the ADFS configuration as well, but couldn’t find anything specific which could make this issue. One thing, zitadel uses UTC regardless which timezone zitadel server is configured on right? thanks . @FFO . 🙂 :zitadel: I ran the application in local debug mode with production dump and did some hackaround to disable user-agent check. the root issue cannot validate signature on Assertion: Could not verify certificate against trusted certs for some reason, we were not getting this exception even after running production and local application in debug level mode.
Tibin
TibinOP12mo ago
No description
Tibin
TibinOP12mo ago
GitHub
cannot validate signature on Response: Could not verify certificate...
Hi, I am using version v0.4.5, i got redirected on /saml/acs where my request returns with a forbidden code, and this error happens intermittent, below is the IDP metadata and IDP response, based o...
Tibin
TibinOP12mo ago
getting the exception over here.
No description
FFO
FFO12mo ago
Hm but would indicate that the cert used to verify the sig is not working
Tibin
TibinOP12mo ago
What could be the possible problem here?
FFO
FFO12mo ago
Usually its down to encoding errors in the cert. How did you setup the trust here?
Tibin
TibinOP12mo ago
so the client shared their adfs metadata file , and from our side we did the base64 and configured in zitadel, and to client we shared the zitadel metadata
Tibin
TibinOP12mo ago
No description
No description
Tibin
TibinOP12mo ago
Thank you , issue got resolved. The certificate mentioned in the decrypted assertions has a signing certificate on it, which is not mentioned in the metadata file they shared. And in our test ADFS case, it's the same. (metasaml signing cert=assertion certificate) And Zitadel is considering only the signing certificate which is mentioned in the metadata file; it will ignore the one that is present in the assertions. So, I changed their metadata.xml to include the signing certificate which is mentioned in the assertions. This situation happens when IDP certificate rotation occurs, where they don’t update the federated metadata xml with the latest signing certificate. I don’t see any point in keeping it different either. It would have worked if Zitadel reads the assertion's signing certificate to validate the assertions. So technically, it can be a bug or as per SAML design as well.
FFO
FFO12mo ago
Tibin
TibinOP12mo ago
@ffo, issue got resolved. thanks buddy ❤️ this was different, where some reasons, our client ADFS SAML is not accepting sha256 it got fixed by switching to sh1
FFO
FFO12mo ago
Ah perfect, thanks for sharing 😄
Tibin
TibinOP12mo ago
@FFO not sure if it’s bug or as per design, and also library errors are not being shown even in debug
FFO
FFO12mo ago
Hm that can be both 😄 We are talking about the saml part, right?
Tibin
TibinOP12mo ago
Yes, validating saml assertions
FFO
FFO12mo ago

Did you find this page helpful?