9205662 - Debug jar : SAML Dynamic User Addition

9205662 - Debug jar : SAML Dynamic User Addition

Issue:
  1. SAML login with existing user works, But Error while dynamic user addition.

Debug:
  1. Additional prints will be printed in the serverout.

Steps to get the Debug logs:
  1. Download the attached 14500_9205662_SAML_DYNAMIC_USER_ADDITION_DEBUG.fjar file
  2. Apply the fjar file and restart the application service. Check here for the steps to apply this fjar.
  3. Recreate the issue, try dynamic user addition with SAML.
  4. After getting the error, zip the logs folder and send it to us using our FTP link https://bonitas2.zohocorp.com/. Select the product as "ServiceDesk Plus" and ticket number as 9205662.
  5. We will analyse the uploaded files and get back to at the earliest.

                  New to ADSelfService Plus?

                    • Related Articles

                    • SAML FAQ's

                      Please find the list of frequently asked queries in SAML 1. I have enabled SAML but still could not find a way to log in using SAML Since the application has multi-tenant feature there are certain security added to the SAML login. In a SAML ...
                    • User defined fields is not getting populated for the user while using dynamic user addition in SAML

                      Issue: The user defined fields is not getting populated for the user while using dynamic user addition in SAML. Fix: We found out an issue in entity mismatch in internal user api level and fixed it. Check the "Jar Compatibility" section to download ...
                    • Configuring SAML with ADFS

                      Step 1: Open the ADFS management application Step 2: Right-click Relying Party trust and choose Add Relying Party Trust. The Add Relying Party Trust Wizard opens. Step 3: Choose Claims Aware and click Start Step 4: Choose Enter data about the relying ...
                    • Configuring SAML with Azure (New)

                      Step 1: Open the Azure Portal--->Enterprise Applications. Step 2: Select the created Enterprise Application and get started with Set up Single Sign-On. Step 3: Edit the basic SAML Configuration. Step 4: Copy the Entity ID from SDPMSP and place the ...
                    • SAML | Configure KeyCloak as IDP

                      Setting up KeyCloak Download KeyCloak from their official website (Used v25 here). Open conf/keycloak.conf and enter the hostname Run sh kc.sh start-dev Create a user and login at http://localhost:8080 Setting up the IDP: To enable logging, go to ...