Federation transactions are failing with 403 forbidden error in the browser.
Below are the errors at the Web Agent Option Pack (Federation Services) and the Policy Server:
FWSTrace logs:
[06/13/2016][04:51:37][][][][SAML2Base.java][getServiceProviderInfo][SAML2.0 SP Configuration is not in cache. Requesting to get from policy server [CHECKPOINT = SSOSAML2_SPCONFFROMPS_REQ]]
[06/13/2016][04:51:37][][][][SAML2Base.java][getServiceProviderInfo][Could not find service provider information for sp: example.com/ Message: .]
[06/13/2016][04:51:37][][][][SAML2Base.java][getServiceProviderInfo][Could not find service provider information for idp: example.com/.]
[06/13/2016][04:51:37][][][][SSO.java][processRequest][Transaction with ID: failed. Reason: NO_PROVIDER_INFO_FOUND]
[06/13/2016][04:51:37][][][][SSO.java][processRequest][No SAML2 provider information found for SP example.com/.]
[06/13/2016][04:51:37][][][][SSO.java][processRequest][Ending SAML2 Single Sign-On Service request processing with HTTP error 400]
smtrace logs:
[06/13/2016][07:51:37.160][07:51:37][][][TunnelUtils][addProviderPasswords][][][][][][][][][][][][][][][][][][][][][Found passwords for oid: <value>]
[06/13/2016][07:51:37.161][07:51:37][][][TunnelUtils][addProviderPasswords][][][][][][][][][][][][][][][][][][][][][Exception while attempting to retrieve passwords:
java.lang.NoClassDefFoundError: Could not initialize class javax.crypto.JceSecurity
at javax.crypto.Cipher.getInstance(Cipher.java:643)
at com.ca.siteminder.sdk.agentapi.crypto.SmCryptoProvider.getBlockSize(SmCryptoProvider.java:1203)
at com.ca.siteminder.sdk.agentapi.crypto.SmRC2SHA1CryptoProvider.<init>(SmRC2SHA1CryptoProvider.java:72)
at com.ca.siteminder.sdk.agentapi.crypto.SmCryptoProvider.getInstance(SmCryptoProvider.java:203)
at com.ca.siteminder.sdk.agentapi.crypto.SmServerCrypto.decryptInternal(SmServerCrypto.java:135)
at com.ca.siteminder.sdk.agentapi.crypto.SmServerCrypto.decrypt(SmServerCrypto.java:123)
at com.netegrity.federationps.tunnel.TunnelUtils.addPasswordsToMap(TunnelUtils.java:223)
at com.netegrity.federationps.tunnel.TunnelUtils.addProviderPasswords(TunnelUtils.java:150)
at com.netegrity.saml2ps.tunnel.SAMLSPbyIDTunnelService.tunnel(SAMLSPbyIDTunnelService.java:135)
at com.netegrity.policyserver.smapi.TunnelServiceContext.tunnel(TunnelServiceContext.java:275)
Basically, password encryption at Policy Server side is done, and it needs JCE to be updated on Policy Server side.
RSA libraries are also used for the encryption, RSA libraries need latest JCE patches for key size and different algorithms.