SAML2 Single Sign-On Service Request Processing with HTTP Error 400
book
Article ID: 191020
calendar_today
Updated On:
Products
CA Single Sign On Secure Proxy Server (SiteMinder)CA Single Sign On Federation (SiteMinder)SITEMINDER
Issue/Introduction
We are seeing the error in PROD with the error "SAML2 Single Sign-On Service request processing with HTTP error 400" for the IDP-initiated Parntership integration. Below is the error we see in the Policy Server logs.
[05/17/2020][10:15:30][10:15:30.057][][][][][][3224][1356][abb456ce-cc7aad97-59f7facc-381ced78-cd3c6dfa-1][][][][][][][][][TunnelUtils][addProviderPasswords][][][][][][][][][][][][][][][][][][][][][][][][][][][Exception while attempting to retrieve passwords: java.lang.Exception: com.ca.siteminder.sdk.agentapi.crypto.SmCryptoProviderException: javax.crypto.BadPaddingException: Invalid padding. at com.netegrity.federationps.tunnel.TunnelUtils.addPasswordsToMap(Unknown Source) at com.netegrity.federationps.tunnel.TunnelUtils.addProviderPasswords(Unknown Source) at com.netegrity.saml2ps.tunnel.SAMLSPbyIDTunnelService.tunnel(Unknown Source) at com.netegrity.policyserver.smapi.TunnelServiceContext.tunnel(Unknown Source) Caused by: com.ca.siteminder.sdk.agentapi.crypto.SmCryptoProviderException: javax.crypto.BadPaddingException: Invalid padding. at com.ca.siteminder.sdk.agentapi.crypto.ap.c(DashoA10*..:731) at com.ca.siteminder.sdk.agentapi.crypto.ap.b(DashoA10*..:628) at com.ca.siteminder.sdk.agentapi.crypto.SmServerCrypto.b(DashoA10*..:137) at com.ca.siteminder.sdk.agentapi.crypto.SmServerCrypto.decrypt(DashoA10*..:123) ... 4 more Caused by: javax.crypto.BadPaddingException: Invalid padding. at com.rsa.cryptoj.c.gc.engineDoFinal(Unknown Source) at javax.crypto.Cipher.doFinal(Cipher.java:2223) at com.ca.siteminder.sdk.agentapi.crypto.ap.c(DashoA10*..:692)
This problem began after configuring the system for FIPS-Migrate mode. It appears this partnership property did not get converted/migrated as we could see an RSA encryption type if the FWSTrace.log instead of the expected AES algorythm.
Resolution
Duplicating each partnership cleared the problem, allowing the partnerships to work successfully.