RSA Identity Governance and Lifecycle error "Signature on SAML authn failed to verify" when processing SAML assertion from IDP
Originally Published: 2017-01-27
Article Number
Applies To
RSA Product/Service Type: Enterprise Software
RSA Version/Condition: 7.0.0, 7.0.1
Issue
01/16/2017 08:47:05.271 INFO (default task-56) [com.aveksa.gui.pages.toolbar.login.SSOAuthenticatorHandler]
SSOAuthenticator: isAuthenticator failed. Reason: Signature on SAML authn failed to verify
01/16/2017 08:47:05.271 ERROR (default task-56) [com.aveksa.gui.pages.toolbar.login.SSOAuthenticatorHandler]
com.aveksa.server.authentication.AuthenticationProviderException: Signature on SAML authn failed to verify
...
Caused by: org.opensaml.xml.validation.ValidationException: Signature did not validate against the credential's key
Cause
Resolution
Ensure that the correct certificate is references in the SAML configuration page for the authentication.
- Under the Admin menu, select System.
- On the Authentication tab, edit the Authentication Source.
- In Authentication Source ensure that the end entity certificate used by the IDP to sign the SAML assertion is selected for the IDPCertificate file.
Notes
- Use a tool of your choice to capture a copy of the SAML response. Some tools that you may use are suggested below:
- Fiddler
- FireFox SAML Tracer Plug-in
- Google Chrome Developer Console
- URL decode the SAML response using a tool of your choice.
- Base64 Decode the SAML response.
- Identify the certificate in the XML content of the SAML response. It is located between the XML tags <ds:X509Certificate> and </ds:X509Data>.
- Copy the text characters that compose the certificate into a text file and save the file to a location accesable to the your RSA Identity Governance and Lifecycle console session.
- Rename the file with a .cer extension.
- Follow the instructions above to trust the certificate as the IDPCertificate in RSA Identity Governance and Lifecycle.
The .cer file may be opened in Windows to view the certificate information to validate that it is the expected certificate by double clicking on the file in Windows.
The .cer file may be opened in Unix to view the certificate information to validate that it is the expected certificate by using openssl
$ openssl x509 -in cert.cer -text
Related Articles
What causes: SAMLException: No assertion associated with artifact 12Number of Views local user name attribute value not found in X.509 name 13Number of Views FIM 2.5: 'local user name attribute value not found in X.509 name' 7Number of Views Symantec Privileged Access Manager - SAML My Page SSO Configuration - RSA Ready Implementation Guide 4Number of Views Verify the LDAP Directory Identity Source 68Number of Views
Trending Articles
Passwordless Authentication in Windows MFA Agent for Active Directory – Quick Setup Guide RSA Authentication Manager 8.9 Release Notes (January 2026) RSA Authentication Manager Upgrade Process RSA Authentication Manager 8.7 SP2 Setup and Configuration Guide An example of SSO using SAML and ADFS with RSA Identity Management and Governance 6.9.x
Don't see what you're looking for?