Microsoft Permissions Error
Issue: User is presented with a message from Microsoft that they do not have access to the application.
Resolution: Confirm users/groups have been provided the appropriate access
- Sign into the Azure Portal
- Navigate to Enterprise Applications
- Select the Swank SAML Application
- Navigate to Manage > Users and groups
- Select Add user/group
- Select the appropriate user/group and click Assign. These will be authorized users for the application.
You do not have access to the page you requested.
Issue: Login results in a "You do not have access to the page you requested." message.
Resolution: Your portal is configured to authenticate users at the Basic level by default. The Basic role will only have access to direct watch links provided by an instructor. Anything accessed outside of direct links will result in the unauthorized access page. If the account experiencing the issue needs to be mapped to an Admin or Instructor role you can refer to steps starting around 2.5 in the document linked here:
Certificate Error
Issue: Issues presented during SAML authentication that are related to the SAML certificate may be an indicator that the expiration date has passed. You may be presented with an error as shown in the image below that states "Error: malformed_certificate. Error while signing data with certificate" or "The SAML response signature failed to verify."
Resolution: The SAML certificate will need to be updated periodically.
-
Generate New Certificate/Export New Metadata File From Azure
- If you are unfamiliar with how to create a new certificate in Azure you can refer to Microsoft's documentation here:
- Once you have generated a new certificate, navigate to Azure Active Directory / Enterprise Applications
- Select the Swank App
- Under Properties select Single sign-on
- Download Federation Metadata XML File
-
Import New Metadata
- You can import metadata from your identity provider (which will include a new certificate) into the Swank streaming portal. This is used to verify the identity provider during the SAML login process.
-
- Log Into your Digital Campus portal and select the Admin section (e.g.: https://digitalcampus.swankmp.net/[your site ID]/admin )
- Select Authentication/SAML Settings in the left menu
- Ensure you are in the basic view by toggling the switch in the upper left to the off position
- Ensure you are in the basic view by toggling the switch in the upper left to the off position
- Locate the IdP Metadata XML file from your IDP
- Click Import Identity Provider Settings
- In the Load External Identity Provider Settings pop up window, click Select and navigate to the IdP Metadata XML file.
- Note: The EntityID (optional) field is only needed if the IdP XML contains multiple EntityIDs. This is not common
- Click Save
- In the Load External Identity Provider Settings pop up window, click Select and navigate to the IdP Metadata XML file.
-
Once you have imported the new metadata file, you can refresh the page and perform a Test SAML Login (Step 5).
- Note, you may need to clear your recent browsing history (24hrs) if you have recently logged into this machine.
-
Cleanup: Once you have confirmed the new cert is in place and working correctly the old certificate can be removed under Authentication > SAML Settings > Advanced > Certificates. Please be aware it may take up to 24 hours for the new certificate to be available for use by your SAML applications
-
SAML Tracer
You might want to utilize a browser plugin called SAML-tracer in order to determine where the sign-in process is breaking down.
For Chrome and other Chrome based browsers
- On your computer, open Chrome.
- At the top right, select Extensions
-
Search for SAML-tracer and add it to your browser
-
Note, if you have security concerns about the plugin, you can choose which permissions to give the extension:
- Select Extensions from your browser
- Select the three dots (More)
-
Mouseover "This can read and change site data."
-
Note, if you have security concerns about the plugin, you can choose which permissions to give the extension:
-
-
-
Decide which permission to give the extension:
- When you select the extension: This setting only allows the extension to access the current site in the open tab or window when you select the extension. If you close the tab or window, you’ll have to select the extension to turn it on again.
- On [current site]: Allow the extension to automatically read and change data on the current site.
- On all sites: Allow the extension to automatically read and change data on all sites.
-
Decide which permission to give the extension:
-
Safari
Safari doesn't have a SAML tracer extension, but you can use Safari's developer tools to capture a SAML trace:
- Open Safari and select Settings
- Click Advanced
- Check the box next to Show Developer menu in menu bar
- Click Develop and then Show Web Inspector
- Select the Network tab
- Click the circle with three lines icon and select Preserve Log
- Go to the Admin Portal and select Single sign-on
- Enter your email address and click Submit
- Click the row, then select Headers
- Scroll down to Request Data, then copy and paste the information into a text file
Comments
0 comments
Please sign in to leave a comment.