I am working on a SAML SSO configuration . Below is the configuration at our side
Service Provider is Pega → Reverse Proxy → IDP(AAD )
I am facing an issue : when IDP trigger a request to access the application it is pointed to Pega Login page not to the User Portal .
Relay State URL which we receive from IDP as Saml Response is the DNS set by ReverseProxy and which in turn is redirected to the actual Authentication service url (https://(host)/prweb/xx. But the UI displayed to Thirdparty is Pega Login Screen not the Portal .
What Pega send back as message is
"Since your browser does not support JavaScript,
you must press the Continue button once to proceed. "
This is set from the Pega OOTB HTML code invoked from assertion service activity .
Even after trying from Chrome too it is same.
We tried login manually but still it is redirected to Login Page .
Pega version what we are using is 7.3
Do we need to change anything in Web proxy side ? web.xml other than x forwarded host setting ?
If any one faced the similar issue request you to help .
@MAMATHAP did you already try the suggestions from other posts?
The error you describe appears to e an error response from your iDP provider
In past support incidents we have seen occasions where clients needed to add RequestedAuthnContext element by setting the values of the pyAuthenticationContext property
ie
IDP is requiring extra parametesr when using HTTP-POST method for the AuthnRequest.
For example:
Extra parameters can be added to the following HTML Rule:
The error which I am getting is the one we are sending as response .This is set from the SAML Assertion OOTB Activity . This I could find from the logs .But to IDP Pega login screen is displayed not portal .
I have gone through those documents before.
ie IDP is requiring extra parametesr when using HTTP-POST method for the AuthnRequest.
This parameter should be set from IDP? . IDP is AAD in our case can they set it from their side ?
What does that parameter do from pega ? Please elaborate .
@MAMATHAP ticket INC-210135 had to be closed as the support engineer had no more response from you.
If you do need further help, please log a new support incident, and make sure that you add the SAML tracer to chrome which was available in the chrome web store.
After adding it start the saml tracer and try to reproduce the issue and share us the saml tracer file.