When attempting to log in to ADManager Plus using SAML authentication, users may encounter the following error:
Login failed. The SSO login attribute value "user@example.com" is not unique within the domains configured in ADManager Plus. Please contact your administrator.
This error occurs when the SAML authentication process provides an attribute value that matches multiple user entries in ADManager Plus, preventing the system from uniquely identifying the user.
Duplicate email address: The same email address is assigned to multiple users in Active Directory (AD).
Misconfigured SAML attribute mapping: Incorrect mapping in ADManager Plus might be causing authentication to search for an attribute that is not unique.
Multiple domains in ADManager Plus: If multiple domains are configured in ADManager Plus, a user with the same login attribute across different domains may trigger the error.
Ensure you have admin rights on both ADManager Plus and your Identity Provider (IdP) administrative console.
Open Active Directory Users and Computers (ADUC).
In the search bar, enter the conflicting login attribute (Email).
If multiple users appear, note their domain and OU locations.
If duplicate values exist, either:
Modify one of the duplicate user entries by updating the email, UPN, or sAMAccountName.
Remove the duplicate user if it is no longer in use.
Log in to ADManager Plus with administrator privileges.
Navigate to Delegation > Configuration > Logon Settings > Single Sign-On.
Find the Attribute Mapping Selection section.
Verify which Active Directory attribute (e.g., mail) is configured for authentication.
Confirm that the value of this attribute is unique for each user across the entire Active Directory
If duplicate attributes cannot be resolved in AD, modify the SAML authentication mapping in ADManager Plus:
Set the login attribute to User Principal Name (UPN) instead of mail or sAMAccountName.
Save the changes and restart ADManager Plus.
Have the affected user attempt to log in again.
If login still fails, double-check the SAML attribute mapping and AD user entries.
Standardize User Principal Name (UPN) as the authentication attribute for SAML.
Regularly audit AD accounts to prevent duplicate entries.
Check SAML response in Serverout logs in ADManager Plus for detailed debugging information.