title |
---|
Troubleshooting SAML authentication setup |
{% include plans-blockquote.html feature="SAML authentication" %}
Some common problems when setting up SAML.
Verify that the application you created in your IdP supports SAML. Sometimes other options are presented during the app creation process.
After filling out the authentication form with your identity provider, you're taken back to Metabase but it throws an error. To see the error, go to Admin settings > Troubleshooting > Logs. You'll see an error that says something like Incorrect response <issuer>.
Root cause: Your issuer or Entity ID is incorrect.
Steps to take:
http://www.example.com/141xkex604w0Q5PN724v
After filling out the authentication form with your identity provider, you go back to Metabase but it throws an error. Go to Admin settings > Troubleshooting > Logs. You'll see an error that says something like Invalid assertion error <issuer>.
Root cause: The certificate value you entered is incorrect.
Steps to take:
Go to Metabase and select Admin settings > Settings > Authentication > SAML. Check that the certificate that you entered into the SAML Identity Provider Certificate field matches the certificate in the XML file you got from your identity provider.
Depending on your provider, you might need to download the XML file, open it in a text editor, then copy and paste the certificate's contents into the SAML Identity Provider Certificate field in Metabase.
Note that your certificate text may include header and footer comments that look like -----BEGIN CERTIFICATE-----
and -----END CERTIFICATE-----
. These comments should be included when pasting your certificate text into Metabase.
Verify that the Single Sign On URL (or equivalent) that you enter on your SAML provider’s website has /auth/sso
appended to it. For instance, if you want your users to end up at https://metabase.mycompany.com
, the full URL should be https://metabase.mycompany.com/auth/sso
.
This error will only occur if you're using Signed SSO requests. That is, in Metabase, you've filled out the fields in the configuration section in Admin settings > Settings > Authentication > SAML > Signed SSO requests. Those fields are:
Root cause: The certificate in the keystore file lacks a private key.
Steps to take:
Go to your Metabase login page. If SAML is working correctly, you should see a single button to sign in with your identity provider (IdP). Once you're authenticated, you should be automatically redirected to the Metabase home page.
If you can’t solve your problem using the troubleshooting guides:
Вы можете оставить комментарий после Вход в систему
Неприемлемый контент может быть отображен здесь и не будет показан на странице. Вы можете проверить и изменить его с помощью соответствующей функции редактирования.
Если вы подтверждаете, что содержание не содержит непристойной лексики/перенаправления на рекламу/насилия/вульгарной порнографии/нарушений/пиратства/ложного/незначительного или незаконного контента, связанного с национальными законами и предписаниями, вы можете нажать «Отправить» для подачи апелляции, и мы обработаем ее как можно скорее.
Опубликовать ( 0 )