Getting a one-time passcode from BOSH Director could fail after upgrading to version 1.7 or 1.8 with SAML authentication enabled in Operations (Ops) Manager.
From CF CLI, the user attempts to target and login to BOSH Director af the er upgrade completes successfully:
$ bosh --ca-cert /var/tempest/workspaces/default/root_ca_certificate login 10.0.0.11 One Time Code ( Get one at https://10.0.0.11:8443/passcode ):
When a user goes to the Web Address, the following error is observed:
Response has invalid status code urn:oasis:names:tc:SAML:2.0:status:Responder, status message is Unable to verify the signature
There was a regression in Ops Manager 1.7 and 1.8 which omits the SAML serviceProviderKey and serviceProviderCertificate keys from the director manifest. This Causes UAA on the director to use an expired SSL certificate and may cause SAML authentication to fail if the identity provider is performing a SSL verification.
This issue only impacts Ops Manager version 1.7 and 1.8:
All later releases do not have this problem.
Workaround
login: serviceProviderKey: | -----BEGIN RSA PRIVATE KEY----- ... -----END RSA PRIVATE KEY----- serviceProviderCertificate: | -----BEGIN CERTIFICATE----- ... -----END CERTIFICATE-----
monit restart uaa