Skip to content

Commit ee3627c

Browse files
committed
Add section for misconfigured sp entity id
This started popping up quite a lot in cloud, with the culprit usually being trailing slashes in the SP entity ID that is set in either `elasticsearch.yml` or the IdP configuration.
1 parent a7eea78 commit ee3627c

File tree

1 file changed

+26
-0
lines changed

1 file changed

+26
-0
lines changed

docs/en/stack/security/troubleshooting.asciidoc

Lines changed: 26 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -497,6 +497,32 @@ its correct public URL.
497497
Authentication in {kib} fails and the following error is printed in the
498498
{es} logs:
499499

500+
....
501+
Authentication to realm saml1 failed - Provided SAML response is not valid for realm
502+
saml/saml1 (Caused by ElasticsearchSecurityException[Conditions [https://some-url-here...]
503+
do not match required audience [https://my.kibana.url]])
504+
....
505+
506+
*Resolution:*
507+
508+
We received a SAML response that is addressed to another SAML Service Provider. This
509+
usually means that the configured SAML Service Provider Entity ID in`elasticsearch.yml`
510+
(`sp.entity_id`) does not match what has been configured as SAML Service Provider Entity ID
511+
in the SAML Identity Provider documentation. To resolve this issue:
512+
513+
.. Ensure that both the saml realm in {es} and the IdP are configured with the same string
514+
for the SAML Entity ID of the Service Provider.
515+
.. Note that these are also compared as case-sensitive strings and not as
516+
canonicalized URLs even when the values are URL-like. Be mindful of trailing slashes, port
517+
numbers etc.
518+
--
519+
520+
. *Symptoms:*
521+
+
522+
--
523+
Authentication in {kib} fails and the following error is printed in the
524+
{es} logs:
525+
500526
....
501527
Cannot find metadata for entity [your:entity.id] in [metadata.xml]
502528
....

0 commit comments

Comments
 (0)