Customer who has SAML configured before 16.1 and haven't filled Signon URL in CSA are unable to use SSO.
Steps to Reproduce:
Expected Result: The users should be able to login to clarity using SAML
Actual Result: The users are unable to login and users are redirected to Authentication Error URL as SAML token is not generated and below error stacks can be seen upon enabling the SAML logger
INFO 2022-11-17 18:52:11,516 [https-openssl-nio2-##-##-##-##-443-exec-60] filter.SAMLFilter (clarity:unknown:-1:none) SAMLFilter: start doFilter()
INFO 2022-11-17 18:52:11,516 [https-openssl-nio2-##-##-##-##-443-exec-60] filter.SAMLFilter (clarity:unknown:-1:none) SAMLFilter: sessionId from cookie = null
INFO 2022-11-17 18:52:11,516 [https-openssl-nio2-##-##-##-##-443-exec-60] filter.SAMLFilter (clarity:unknown:-1:none) SAMLFilter: Checking for and processing PPMSSO token
INFO 2022-11-17 18:52:11,516 [https-openssl-nio2-##-##-##-##-443-exec-60] filter.SAMLFilter (clarity:unknown:-1:none) SAMLFilter: samlToken from request parameter: null
INFO 2022-11-17 18:52:11,516 [https-openssl-nio2-##-##-##-##-443-exec-60] filter.SAMLFilter (clarity:unknown:-1:none) SAMLFilter: checking for cookie _clarity_User
INFO 2022-11-17 18:52:11,516 [https-openssl-nio2-##-##-##-##-443-exec-60] filter.SAMLFilter (clarity:unknown:-1:none) SAMLFilter: Checking for and processing direct SAML
INFO 2022-11-17 18:52:11,516 [https-openssl-nio2-##-##-##-##-443-exec-60] filter.SAMLFilter (clarity:unknown:-1:none) SAMLFilter: loading SAML settings from toolkit properties
INFO 2022-11-17 18:52:11,516 [https-openssl-nio2-##-##-##-##-443-exec-60] filter.SAMLFilter (clarity:unknown:-1:none) SAMLFilter: samlResponse from request parameters = null
INFO 2022-11-17 18:52:11,516 [https-openssl-nio2-##-##-##-##-443-exec-60] filter.SAMLFilter (clarity:unknown:-1:none) SAMLFilter: No SAML received, skipping destination validation
INFO 2022-11-17 18:52:11,516 [https-openssl-nio2-##-##-##-##-443-exec-60] filter.SAMLFilter (clarity:unknown:-1:none) SAMLFilter: HttpRequest.getRequestURL() = https://CLARITYSERVER/niku/nu
INFO 2022-11-17 18:52:11,516 [https-openssl-nio2-##-##-##-##-443-exec-60] filter.SAMLFilter (clarity:unknown:-1:none) SAMLFilter: Loading of Classic Clarity detected, direct SAML.
INFO 2022-11-17 19:01:56,063 [WrapperListener_stop_runner] filter.SAMLFilter (none:none:none:none) SAMLFilter destroyed
16.1.1 and supported clarity releases.
The architecture of SAML is changed with introduction of SSO Book Marking Feature where a user now can click on any clarity URL bookmarked and if its SSO enabled it will authenticate and ensure that context is not lost.
Traditional SSO solutions, i.e. not using SAML, need to have the field in
Administration > System Options > Other > 'Enable SAML Authentication'
be unchecked, as this is enabled by default, in an upgrade.
In order to use bookmark feature and SAML SSO with 16.0.3, 16.1, 16.1.1 and above please follow the below steps :
<clarity home>/bin/admin toggle-feature SSO_BOOKMARKS 1 and restart clarity
Note: There might be other SSO providers where the Signon URL might be named differently, please check with IDP provider and provide the information in CSA in order to ensure SAML SSO is working.
Some may require appending &RelayState= to the Sign On URL to avoid appending query string arguments to the end of the URL incorrectly.