Forum Discussion
APM Webtop SAML Links
I have Virtual Server 1 providing SAML IDP for an application. This is SP initiated SAML, which works when a user first goes to the SP link. I've created Virtual Server 2 that has a full webtop attached to it and requires a user to log in with Active Directory credentials before getting the webtop. I also created a SAML resource with the SAML SSO for the app and published it on the webtop. I'd like to have a user be able to click on the webtop link and get signed in seamlessly to the app. When I click on the link I get an "Error Message: The given key was not present in the dictionary" from the SP. Would I need to reconfigure the app to use IDP initiated SAML to have this work correctly?
6 Replies
Hello,
there are lot of things unknown and lot to assume. first you should really see what the error message means.
I'd consider a good point to start get an HTTP monitoring tool (e.g. Fiddler) and see what are differences in the SAML Response when initiate logon from SP and from IDP. Maybe you just need to specify a relay state or a few parameters to the ACS URL.
But without providing more information or having insight into the SP application I doubt anybody will give any better hint.
Gabriel
- Brian_E_Nine_17
Nimbostratus
First, let me clarify that the error from the SP is coming from the consumer assertion URL. I ran a fiddler capture on a successful vs unsuccessful SSO. The successful SSO shows a post with value assigned to the Relaystate and all the Active Directory attributes the IDP is supposed to be providing. The unsuccessful SSO doesn't have value set for Relaystate and doesn't appear to be posting any of the attributes.
- Brian_E_Nine_17
Nimbostratus
Ok, I read about what the relaystate is/does. I set this field under my SP connector. Now I get a different error "The (&(objectClass=user)(SAMAccountName=)) search filter is invalid" From the SP. I still don't see a POST in fiddler with all the AD attributes the SP is looking for.
Now it's looking better. Seems you are missing the SAML attributes. You have to set the same Access Policy to the VS with the Webtop (or fill the ACCESS:session data with required attributes).
- Brian_E_Nine_17
Nimbostratus
Thanks for the help Gabriel. I noticed the access policy on VirtualServer1, which was setup by a contractor, had an extra variable assign and LDAP query on it so I added these to the Webtop VS access policy. Looks like the SAML link is working correctly now.
- :)
Help guide the future of your DevCentral Community!
What tools do you use to collaborate? (1min - anonymous)Recent Discussions
Related Content
* Getting Started on DevCentral
* Community Guidelines
* Community Terms of Use / EULA
* Community Ranking Explained
* Community Resources
* Contact the DevCentral Team
* Update MFA on account.f5.com