product_guid
" value of "p-bosh-xx
" refers to the Director Tile in Operations Manager (Ops Manager).
{ "valid_until": "2019-06-14T09:26:19Z", "configurable": false, "property_reference": ".properties.saml_service_provider_cert", "property_type": "rsa_cert_credentials", "product_guid": "p-bosh-xxxxxxxxxxxxxxxxxxx", "location": "ops_manager", "variable_path": null, "issuer": "/C=US/O=Pivotal", "valid_from": "2017-06-14T09:26:19Z" },
To resolve this issue, follow the steps below:
1. Check to see when the Ops Manager SAML Certificate will expire. You can grab the SAML certification from the web interface or from the CLI.
saml-sp.xml
.<ds:X509Certificate>
xml tag. You can format this string using a web tool, such as https://www.samltool.com/format_x509cert.php./home/tempest-web/ramdisk/uaa/config/login.yml
and find the variable login.serviceProviderCertificate
.
2. Copy the certificate to a file named opsman.saml.cert
.
-----BEGIN CERTIFICATE----- ... -----END CERTIFICATE-----
openssl x509 -in opsman.saml.cert -noout -startdate -enddate notBefore=Oct 2 02:55:33 2018 GMT notAfter=Oct 2 02:55:33 2020 GMT
4. Regenerate the Ops Manager SAML Certificate. Please choose the correct methods depends on your OPS Manager version.
Note: Please consult internally with your IDP provider before regenerating the Operations Manager and BOSH Director SAML Certificates. Once the certificates have been generated, they will need to be imported into the IDP Provider configuration in order for login to function properly.
sudo -u tempest-web psql tempest_production
update uaa_configs set encrypted_saml_service_provider_cert = null, encrypted_saml_service_provider_private_key = null;
sudo service tempest-web restart
. Upon restarting, Operations Manager will generate a new SAML Certification and Key.sudo su -
TEMPEST_INFRASTRUCTURE
with the actual infra you are using (vsphere, aws, azure, gcp, openstack), in the example here we are using 'vsphere' :
cd /home/tempest-web/tempest/web; RAILS_ENV='production' TEMPEST_INFRASTRUCTURE='vsphere' TEMPEST_WEB_DIR='/home/tempest-web' DATA_ROOT='/var/tempest' LOG_DIR='/var/log/opsmanager' SECRET_KEY_BASE="1234" su tempest-web --command 'bundle exec rails console'c. Setup the ops manager decryption passphrase:
EncryptionKey.instance.passphrase = '<om passphrase>'
Uaa::UaaConfig:
uaa_config =
Uaa::UaaConfig.singletonuaa_config = Uaa::UaaConfig.instance
irb(main):002:0> uaa_config = Uaa::UaaConfig.singleton
(Object doesn't support #inspect)
uaa_config.generate_saml_service_provider_cert(force:true)
uaa_config.send('saml_service_provider_cert')
uaa_config.save!
WARNING: Before proceeding, collaborate with your IDP regarding the new SAML certificate generated above. Failure to do so may result in all SSO users being locked out of the platform.
service tempest-web restart