RSA Identity Governance and Lifecycle error "Signature on SAML authn failed to verify" when processing SAML assertion from IDP
Originally Published: 2017-01-27
Article Number
Applies To
RSA Product/Service Type: Enterprise Software
RSA Version/Condition: 7.0.0, 7.0.1
Issue
01/16/2017 08:47:05.271 INFO (default task-56) [com.aveksa.gui.pages.toolbar.login.SSOAuthenticatorHandler]
SSOAuthenticator: isAuthenticator failed. Reason: Signature on SAML authn failed to verify
01/16/2017 08:47:05.271 ERROR (default task-56) [com.aveksa.gui.pages.toolbar.login.SSOAuthenticatorHandler]
com.aveksa.server.authentication.AuthenticationProviderException: Signature on SAML authn failed to verify
...
Caused by: org.opensaml.xml.validation.ValidationException: Signature did not validate against the credential's key
Cause
Resolution
Ensure that the correct certificate is references in the SAML configuration page for the authentication.
- Under the Admin menu, select System.
- On the Authentication tab, edit the Authentication Source.
- In Authentication Source ensure that the end entity certificate used by the IDP to sign the SAML assertion is selected for the IDPCertificate file.
Notes
- Use a tool of your choice to capture a copy of the SAML response. Some tools that you may use are suggested below:
- Fiddler
- FireFox SAML Tracer Plug-in
- Google Chrome Developer Console
- URL decode the SAML response using a tool of your choice.
- Base64 Decode the SAML response.
- Identify the certificate in the XML content of the SAML response. It is located between the XML tags <ds:X509Certificate> and </ds:X509Data>.
- Copy the text characters that compose the certificate into a text file and save the file to a location accesable to the your RSA Identity Governance and Lifecycle console session.
- Rename the file with a .cer extension.
- Follow the instructions above to trust the certificate as the IDPCertificate in RSA Identity Governance and Lifecycle.
The .cer file may be opened in Windows to view the certificate information to validate that it is the expected certificate by double clicking on the file in Windows.
The .cer file may be opened in Unix to view the certificate information to validate that it is the expected certificate by using openssl
$ openssl x509 -in cert.cer -text
Related Articles
FIM 2.5: 'local user name attribute value not found in X.509 name' 7Number of Views local user name attribute value not found in X.509 name 13Number of Views What causes: SAMLException: No assertion associated with artifact 12Number of Views Verify the Web-Tier Version 33Number of Views Keeper Security - SAML My Page SSO Configuration - RSA Ready Implementation Guide 11Number of Views
Trending Articles
Troubleshooting RSA SecurID Access Identity Router to RSA Authentication Manager test connection failures RSA SecurID Software Token 5.0.2 Downloads for Microsoft Windows RSA Authentication Manager 8.9 Release Notes (January 2026) Quick Setup Guide - Passwordless Authentication in Windows MFA Agent for Active Directory RSA Authentication Manager 8.8 Setup and Configuration Guide
Don't see what you're looking for?