<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>article Error 500 - Internal server error in the Hub/QMC when connecting through SAML authentication in Official Support Articles</title>
    <link>https://community.qlik.com/t5/Official-Support-Articles/Error-500-Internal-server-error-in-the-Hub-QMC-when-connecting/ta-p/1710388</link>
    <description>&lt;P&gt;&lt;BR /&gt;The most likely cause of this error after installation, and when using SAML, is that Qlik Sense is attempting to use a SHA256 Hashing algorithm and the 3&lt;SUP&gt;rd&lt;/SUP&gt; Party Certificate installed for the Proxy does not have the appropriate Cryptographic Providers added to them.&lt;BR /&gt;&lt;BR /&gt;In order to use SHA-256, a third-party certificate is required, where the associated private key has the provider "&lt;STRONG&gt;Microsoft Enhanced RSA and AES Cryptographic Provider&lt;/STRONG&gt;". See under&amp;nbsp;&lt;STRONG&gt;Authentication &amp;gt;&amp;nbsp; SAML signing algorithm&lt;/STRONG&gt; section of the documentation&amp;nbsp;&lt;A href="https://help.qlik.com/en-US/sense-admin/Subsystems/DeployAdministerQSE/Content/Sense_DeployAdminister/QSEoW/Administer_QSEoW/Managing_QSEoW/edit-virtual-proxy.htm" target="_blank" rel="noopener"&gt;Editing a virtual proxy - Qlik Sense for administrators&lt;/A&gt;&amp;nbsp;&lt;BR /&gt;&amp;nbsp;&lt;/P&gt;
&lt;DIV style="text-align: center;"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="000041680.png" style="width: 640px;"&gt;&lt;img src="https://community.qlik.com/t5/image/serverpage/image-id/54793i64E59F8CC3A02707/image-size/large?v=v2&amp;amp;px=999" role="button" title="000041680.png" alt="000041680.png" /&gt;&lt;/span&gt;
&lt;P class="lia-align-left"&gt;&amp;nbsp;&lt;/P&gt;
&lt;/DIV&gt;
&lt;H3 class="qlik-migrated-tkb-headings"&gt;Environment:&lt;/H3&gt;
&lt;P&gt;&lt;LI-PRODUCT title="Qlik Sense Enterprise on Windows" id="qlikSenseEnterpriseWindows"&gt;&lt;/LI-PRODUCT&gt;&amp;nbsp;, all versions&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3 class="qlik-migrated-tkb-headings"&gt;Resolution:&lt;/H3&gt;
&lt;P&gt;Convert the current certificates to use the correct &lt;STRONG&gt;Cryptographic Provider&lt;/STRONG&gt;.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Note:&lt;/STRONG&gt; The same conversion steps and how to check for the correct provider are documented under&amp;nbsp;&lt;A href="https://community.qlik.com/t5/Knowledge-Base/SHA-256-and-Converting-the-Cryptographic-Service-Provider-Type/ta-p/1716032" target="_blank" rel="noopener"&gt;&lt;SPAN class="lia-message-read"&gt;SHA-256 and Converting the Cryptographic Service Provider Type&lt;/SPAN&gt;&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;&lt;STRONG&gt;Needed Items:&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Certificate with the Private Key in it&lt;/LI&gt;
&lt;LI&gt;Certificate in PFX format
&lt;UL style="list-style-type: circle;"&gt;
&lt;LI&gt;&lt;STRONG&gt;Note: &lt;/STRONG&gt;As long as the Private Key is there and the Cryptographic Providers can be added to the certificate type, &lt;I&gt;and is supported by that type&lt;/I&gt;, it doesn’t matter the actual format.&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;Trusted Root for that certificate is installed on the Proxy Server&lt;/LI&gt;
&lt;LI&gt;OpenSSL (3&lt;SUP&gt;rd&lt;/SUP&gt; Party Software)&lt;/LI&gt;
&lt;LI&gt;Logged in as an account with the User/Administrator rights on the machine to run certutil and install/delete certificates&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;STRONG&gt;Note:&lt;/STRONG&gt; Qlik Sense does &lt;STRONG&gt;NOT&lt;/STRONG&gt; create CSRs for Certificate Authorities (CA) to create 3&lt;SUP&gt;rd&lt;/SUP&gt; Party SSL certificates. There’s many ways of doing this outside the product. Please consult your CA team for how to request one. Basic instructions are available and provided as-is outside scope of Qlik Support under&amp;nbsp;&lt;A href="https://community.qlik.com/t5/Knowledge-Base/Qlik-Sense-Generating-CSR-for-3rd-Party-Certificates/ta-p/1713936" target="_blank" rel="noopener"&gt;Qlik Sense: Generating CSR for 3rd Party Certificates&lt;/A&gt;.&lt;BR /&gt;--&lt;BR /&gt;&lt;BR /&gt;&lt;STRONG&gt;Step 1:&lt;/STRONG&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;STRONG&gt;Run from an elevated Command Prompt (CMD):&lt;/STRONG&gt;&amp;nbsp;&amp;nbsp;&lt;FONT face="courier new,courier"&gt;certutil -store -v my &amp;gt; c:\certificate.txt&lt;/FONT&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;STRONG&gt;Step 2:&lt;/STRONG&gt;&lt;BR /&gt;&lt;BR /&gt;Search the certificate.txt file for the certificate that will used for Authentication (the installed 3&lt;SUP&gt;rd&lt;/SUP&gt; party certificate).&lt;BR /&gt;&lt;BR /&gt;&lt;STRONG&gt;Example of a SHA1 certificate that does not have the proper Cryptographic Provider:&lt;/STRONG&gt;&lt;BR /&gt;&amp;nbsp;&lt;FONT face="courier new,courier"&gt; Provider = &lt;STRONG&gt;&lt;I&gt;Microsoft Enhanced Cryptographic Provider v1.0&lt;/I&gt;&lt;/STRONG&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;&amp;nbsp; ProviderType = 1&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;&amp;nbsp; Unique container name: 67b595f1f5dc08c5b04181220a6a9f6a_13f6a9b2-6308-4b91-b867-c7fe1a974faf&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;&amp;nbsp; PP_KEYSTORAGE = 1&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;&amp;nbsp; &amp;nbsp; CRYPT_SEC_DESCR -- 1&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;&amp;nbsp; KP_PERMISSIONS = 3f (63)&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;&amp;nbsp; &amp;nbsp; CRYPT_ENCRYPT -- 1&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;&amp;nbsp; &amp;nbsp; CRYPT_DECRYPT -- 2&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;&amp;nbsp; &amp;nbsp; CRYPT_EXPORT -- 4&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;&amp;nbsp; &amp;nbsp; CRYPT_READ -- 8&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;&amp;nbsp; &amp;nbsp; CRYPT_WRITE -- 10 (16)&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;&amp;nbsp; &amp;nbsp; CRYPT_MAC -- 20 (32)&lt;/FONT&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;STRONG&gt;Example of the SHA256 certificate that has the proper Cryptographic Providers:&lt;/STRONG&gt;&lt;BR /&gt;&amp;nbsp;&lt;FONT face="courier new,courier"&gt;Provider = &lt;STRONG&gt;&lt;I&gt;Microsoft Enhanced RSA and AES Cryptographic Provider&lt;/I&gt;&lt;/STRONG&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;&amp;nbsp; ProviderType = 24&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;&amp;nbsp; Unique container name: 6c66d03c2de5c8747450e7c12960e4b5_13f6a9b2-6308-4b91-b867-c7fe1a974faf&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;&amp;nbsp; PP_KEYSTORAGE = 1&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;&amp;nbsp; &amp;nbsp; CRYPT_SEC_DESCR -- 1&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;&amp;nbsp; KP_PERMISSIONS = 3f (63)&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;&amp;nbsp; &amp;nbsp; CRYPT_ENCRYPT -- 1&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;&amp;nbsp; &amp;nbsp; CRYPT_DECRYPT -- 2&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;&amp;nbsp; &amp;nbsp; CRYPT_EXPORT -- 4&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;&amp;nbsp; &amp;nbsp; CRYPT_READ -- 8&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;&amp;nbsp; &amp;nbsp; CRYPT_WRITE -- 10 (16)&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;&amp;nbsp; &amp;nbsp; CRYPT_MAC -- 20 (32)&lt;/FONT&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;STRONG&gt;Note:&lt;/STRONG&gt; If the certificate does &lt;STRONG&gt;NOT&lt;/STRONG&gt; have &lt;I&gt;Microsoft Enhanced RSA and AES Cryptographic Provider, &lt;/I&gt;SAML with SHA256 will &lt;STRONG&gt;NOT&lt;/STRONG&gt; work until this provider is used. Qlik does &lt;STRONG&gt;NOT&lt;/STRONG&gt; perform this modification and will need to be done outside the product. Steps below&amp;nbsp; are provided as-is&amp;nbsp; and can be followed as general guidelines.&lt;BR /&gt;&lt;BR /&gt;This example is going to use a 3&lt;SUP&gt;rd&lt;/SUP&gt; Party tool called OpenSSL (&lt;A href="https://wiki.openssl.org/index.php/Binaries" target="_blank" rel="noopener"&gt;https://wiki.openssl.org/index.php/Binaries&lt;/A&gt; -&lt;STRONG&gt; 3rd Party Tool OpenSSL – NOT supported by Qlik). &lt;/STRONG&gt;You can try different ways of requesting or making the change by other means.&lt;BR /&gt;&amp;nbsp;&lt;BR /&gt;&lt;STRONG&gt;Step 3: &lt;/STRONG&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;STRONG&gt;Converting a PFX file to a PEM file and adding the correct Cryptographic Providers:&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;&lt;STRONG&gt;Command line:&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;FONT face="courier new,courier"&gt;&lt;STRONG&gt;cd C:\OpenSSL-Win64\bin&lt;/STRONG&gt;&lt;/FONT&gt;
&lt;UL style="list-style-type: circle;"&gt;
&lt;LI&gt;Default install location for &lt;FONT face="courier new,courier"&gt;&lt;I&gt;Win64OpenSSL_Light-1_1_0f.exe&lt;/I&gt;&lt;/FONT&gt; install path (can be changed during installation)
&lt;UL&gt;
&lt;LI&gt;Different versions may do different functions, this one was picked for its small size and performed the functions needed in a 64 bit OS. (Current version as of 10/31/2017)&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;&lt;FONT face="courier new,courier"&gt;&lt;STRONG&gt;openssl pkcs12 -in c:\3rdsslcert.pfx -out c:\3rdsslcert-new.pem&lt;/STRONG&gt;&lt;/FONT&gt;
&lt;UL style="list-style-type: circle;"&gt;
&lt;LI&gt;Converts the PFX file to a PEM file.
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Note:&lt;/STRONG&gt; You will need the &lt;I&gt;Import Password&lt;/I&gt; to have access to the Private Key. This is supplied by the CA when the certificate is generated. If the password is not supplied, the certificate cannot be used.&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;&lt;FONT face="courier new,courier"&gt;&lt;STRONG&gt;openssl pkcs12 -export -in c:\3rdsslcert-new.pem -out c:\3rdsslcert-new.pfx -CSP "Microsoft Enhanced RSA and AES Cryptographic Provider"&lt;/STRONG&gt;&lt;/FONT&gt;
&lt;UL style="list-style-type: circle;"&gt;
&lt;LI&gt;Converts the PEM file back to PFX and adding the correct Cryptographic Providers.&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;STRONG&gt;Step 4:&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Shut down the services for the node you will need to replace the certificate on.&lt;/LI&gt;
&lt;LI&gt;Delete the old version of the certificate and install the new one.&lt;/LI&gt;
&lt;LI&gt;Restart the services.
&lt;UL style="list-style-type: circle;"&gt;
&lt;LI&gt;The thumbprint will not change as the certificate is the same, but the Cryptographic Providers have been added. You do not need to change anything in the QMC.
&lt;UL&gt;
&lt;LI&gt;However, if this is a new certificate entirely, you will need to replace the Thumbprint for the old certificate with the new one in the Proxy settings in the QMC.&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;Verify in the Hub/QMC that it’s using the installed certificate with no issues.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;STRONG&gt;Step 5:&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Verify that the Virtual Proxy for SAML is correctly configured to use SHA256.&lt;/LI&gt;
&lt;LI&gt;Verify that the SAML IdP and Entity for that Virtual Proxy is configured to use SHA256.
&lt;UL style="list-style-type: circle;"&gt;
&lt;LI&gt;Some IdPs use certificate data inside the metadata provided by Qlik Sense. If you change the certificate (even modifying it for this article) in any way, the SP metadata (From the SAML VP in the QMC) should be regenerated and reimported to the IdP.
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Note:&lt;/STRONG&gt; Some IdPs don’t need this information, but some do. When in doubt, reimport metadata from either the IdP/SP to the other to ensure it’s all up to date.&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;Attempt to log into the Virtual Proxy and the SAML provider.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P class="qlik-migrated-tkb-headings"&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3 class="qlik-migrated-tkb-headings"&gt;Cause:&lt;/H3&gt;
&lt;P&gt;&lt;BR /&gt;&lt;STRONG&gt;Special Notes:&lt;/STRONG&gt;&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;Internal 500 Errors are normally caused by the SSL certificate bound to the Proxy Service. While it may not be the issue documented in this article, there may be another with it that’s linked. Verifying different certificates (EX: Sense Self-Signed instead of a CA generated one) or SHA1 vs SHA256 on the IdP or Sense side, will help narrow down where the issue lies.&lt;/LI&gt;
&lt;LI&gt;IdP certificates &lt;STRONG&gt;CAN&lt;/STRONG&gt; expire and if that happens, Qlik Sense needs the updated metadata from it.&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;Related Content:&lt;/H3&gt;
&lt;UL&gt;
&lt;LI&gt;
&lt;H2 class="message-subject"&gt;&lt;A href="https://community.qlik.com/t5/Knowledge-Base/Qlik-Sense-SAML-Integration-fails-with-500-Internal-Server-Error/ta-p/1711692" target="_blank" rel="noopener"&gt;&lt;SPAN class="lia-message-unread lia-message-unread-windows"&gt;Qlik Sense SAML Integration fails with 500 Internal Server Error, Unanticipated ComponentSpace.SAML2.Exceptions.SAMLBindingException&lt;/SPAN&gt;&lt;/A&gt;&lt;/H2&gt;
&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://community.qlik.com/t5/Knowledge-Base/SHA-256-and-Converting-the-Cryptographic-Service-Provider-Type/ta-p/1716032" target="_blank" rel="noopener"&gt;&lt;SPAN class="lia-message-read"&gt;SHA-256 and Converting the Cryptographic Service Provider Type&lt;/SPAN&gt;&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;</description>
    <pubDate>Wed, 12 May 2021 12:36:25 GMT</pubDate>
    <dc:creator>pbr</dc:creator>
    <dc:date>2021-05-12T12:36:25Z</dc:date>
    <item>
      <title>Error 500 - Internal server error in the Hub/QMC when connecting through SAML authentication</title>
      <link>https://community.qlik.com/t5/Official-Support-Articles/Error-500-Internal-server-error-in-the-Hub-QMC-when-connecting/ta-p/1710388</link>
      <description>&lt;P&gt;&lt;BR /&gt;The most likely cause of this error after installation, and when using SAML, is that Qlik Sense is attempting to use a SHA256 Hashing algorithm and the 3&lt;SUP&gt;rd&lt;/SUP&gt; Party Certificate installed for the Proxy does not have the appropriate Cryptographic Providers added to them.&lt;BR /&gt;&lt;BR /&gt;In order to use SHA-256, a third-party certificate is required, where the associated private key has the provider "&lt;STRONG&gt;Microsoft Enhanced RSA and AES Cryptographic Provider&lt;/STRONG&gt;". See under&amp;nbsp;&lt;STRONG&gt;Authentication &amp;gt;&amp;nbsp; SAML signing algorithm&lt;/STRONG&gt; section of the documentation&amp;nbsp;&lt;A href="https://help.qlik.com/en-US/sense-admin/Subsystems/DeployAdministerQSE/Content/Sense_DeployAdminister/QSEoW/Administer_QSEoW/Managing_QSEoW/edit-virtual-proxy.htm" target="_blank" rel="noopener"&gt;Editing a virtual proxy - Qlik Sense for administrators&lt;/A&gt;&amp;nbsp;&lt;BR /&gt;&amp;nbsp;&lt;/P&gt;
&lt;DIV style="text-align: center;"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="000041680.png" style="width: 640px;"&gt;&lt;img src="https://community.qlik.com/t5/image/serverpage/image-id/54793i64E59F8CC3A02707/image-size/large?v=v2&amp;amp;px=999" role="button" title="000041680.png" alt="000041680.png" /&gt;&lt;/span&gt;
&lt;P class="lia-align-left"&gt;&amp;nbsp;&lt;/P&gt;
&lt;/DIV&gt;
&lt;H3 class="qlik-migrated-tkb-headings"&gt;Environment:&lt;/H3&gt;
&lt;P&gt;&lt;LI-PRODUCT title="Qlik Sense Enterprise on Windows" id="qlikSenseEnterpriseWindows"&gt;&lt;/LI-PRODUCT&gt;&amp;nbsp;, all versions&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3 class="qlik-migrated-tkb-headings"&gt;Resolution:&lt;/H3&gt;
&lt;P&gt;Convert the current certificates to use the correct &lt;STRONG&gt;Cryptographic Provider&lt;/STRONG&gt;.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Note:&lt;/STRONG&gt; The same conversion steps and how to check for the correct provider are documented under&amp;nbsp;&lt;A href="https://community.qlik.com/t5/Knowledge-Base/SHA-256-and-Converting-the-Cryptographic-Service-Provider-Type/ta-p/1716032" target="_blank" rel="noopener"&gt;&lt;SPAN class="lia-message-read"&gt;SHA-256 and Converting the Cryptographic Service Provider Type&lt;/SPAN&gt;&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;&lt;STRONG&gt;Needed Items:&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Certificate with the Private Key in it&lt;/LI&gt;
&lt;LI&gt;Certificate in PFX format
&lt;UL style="list-style-type: circle;"&gt;
&lt;LI&gt;&lt;STRONG&gt;Note: &lt;/STRONG&gt;As long as the Private Key is there and the Cryptographic Providers can be added to the certificate type, &lt;I&gt;and is supported by that type&lt;/I&gt;, it doesn’t matter the actual format.&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;Trusted Root for that certificate is installed on the Proxy Server&lt;/LI&gt;
&lt;LI&gt;OpenSSL (3&lt;SUP&gt;rd&lt;/SUP&gt; Party Software)&lt;/LI&gt;
&lt;LI&gt;Logged in as an account with the User/Administrator rights on the machine to run certutil and install/delete certificates&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;STRONG&gt;Note:&lt;/STRONG&gt; Qlik Sense does &lt;STRONG&gt;NOT&lt;/STRONG&gt; create CSRs for Certificate Authorities (CA) to create 3&lt;SUP&gt;rd&lt;/SUP&gt; Party SSL certificates. There’s many ways of doing this outside the product. Please consult your CA team for how to request one. Basic instructions are available and provided as-is outside scope of Qlik Support under&amp;nbsp;&lt;A href="https://community.qlik.com/t5/Knowledge-Base/Qlik-Sense-Generating-CSR-for-3rd-Party-Certificates/ta-p/1713936" target="_blank" rel="noopener"&gt;Qlik Sense: Generating CSR for 3rd Party Certificates&lt;/A&gt;.&lt;BR /&gt;--&lt;BR /&gt;&lt;BR /&gt;&lt;STRONG&gt;Step 1:&lt;/STRONG&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;STRONG&gt;Run from an elevated Command Prompt (CMD):&lt;/STRONG&gt;&amp;nbsp;&amp;nbsp;&lt;FONT face="courier new,courier"&gt;certutil -store -v my &amp;gt; c:\certificate.txt&lt;/FONT&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;STRONG&gt;Step 2:&lt;/STRONG&gt;&lt;BR /&gt;&lt;BR /&gt;Search the certificate.txt file for the certificate that will used for Authentication (the installed 3&lt;SUP&gt;rd&lt;/SUP&gt; party certificate).&lt;BR /&gt;&lt;BR /&gt;&lt;STRONG&gt;Example of a SHA1 certificate that does not have the proper Cryptographic Provider:&lt;/STRONG&gt;&lt;BR /&gt;&amp;nbsp;&lt;FONT face="courier new,courier"&gt; Provider = &lt;STRONG&gt;&lt;I&gt;Microsoft Enhanced Cryptographic Provider v1.0&lt;/I&gt;&lt;/STRONG&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;&amp;nbsp; ProviderType = 1&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;&amp;nbsp; Unique container name: 67b595f1f5dc08c5b04181220a6a9f6a_13f6a9b2-6308-4b91-b867-c7fe1a974faf&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;&amp;nbsp; PP_KEYSTORAGE = 1&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;&amp;nbsp; &amp;nbsp; CRYPT_SEC_DESCR -- 1&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;&amp;nbsp; KP_PERMISSIONS = 3f (63)&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;&amp;nbsp; &amp;nbsp; CRYPT_ENCRYPT -- 1&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;&amp;nbsp; &amp;nbsp; CRYPT_DECRYPT -- 2&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;&amp;nbsp; &amp;nbsp; CRYPT_EXPORT -- 4&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;&amp;nbsp; &amp;nbsp; CRYPT_READ -- 8&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;&amp;nbsp; &amp;nbsp; CRYPT_WRITE -- 10 (16)&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;&amp;nbsp; &amp;nbsp; CRYPT_MAC -- 20 (32)&lt;/FONT&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;STRONG&gt;Example of the SHA256 certificate that has the proper Cryptographic Providers:&lt;/STRONG&gt;&lt;BR /&gt;&amp;nbsp;&lt;FONT face="courier new,courier"&gt;Provider = &lt;STRONG&gt;&lt;I&gt;Microsoft Enhanced RSA and AES Cryptographic Provider&lt;/I&gt;&lt;/STRONG&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;&amp;nbsp; ProviderType = 24&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;&amp;nbsp; Unique container name: 6c66d03c2de5c8747450e7c12960e4b5_13f6a9b2-6308-4b91-b867-c7fe1a974faf&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;&amp;nbsp; PP_KEYSTORAGE = 1&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;&amp;nbsp; &amp;nbsp; CRYPT_SEC_DESCR -- 1&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;&amp;nbsp; KP_PERMISSIONS = 3f (63)&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;&amp;nbsp; &amp;nbsp; CRYPT_ENCRYPT -- 1&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;&amp;nbsp; &amp;nbsp; CRYPT_DECRYPT -- 2&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;&amp;nbsp; &amp;nbsp; CRYPT_EXPORT -- 4&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;&amp;nbsp; &amp;nbsp; CRYPT_READ -- 8&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;&amp;nbsp; &amp;nbsp; CRYPT_WRITE -- 10 (16)&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;&amp;nbsp; &amp;nbsp; CRYPT_MAC -- 20 (32)&lt;/FONT&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;STRONG&gt;Note:&lt;/STRONG&gt; If the certificate does &lt;STRONG&gt;NOT&lt;/STRONG&gt; have &lt;I&gt;Microsoft Enhanced RSA and AES Cryptographic Provider, &lt;/I&gt;SAML with SHA256 will &lt;STRONG&gt;NOT&lt;/STRONG&gt; work until this provider is used. Qlik does &lt;STRONG&gt;NOT&lt;/STRONG&gt; perform this modification and will need to be done outside the product. Steps below&amp;nbsp; are provided as-is&amp;nbsp; and can be followed as general guidelines.&lt;BR /&gt;&lt;BR /&gt;This example is going to use a 3&lt;SUP&gt;rd&lt;/SUP&gt; Party tool called OpenSSL (&lt;A href="https://wiki.openssl.org/index.php/Binaries" target="_blank" rel="noopener"&gt;https://wiki.openssl.org/index.php/Binaries&lt;/A&gt; -&lt;STRONG&gt; 3rd Party Tool OpenSSL – NOT supported by Qlik). &lt;/STRONG&gt;You can try different ways of requesting or making the change by other means.&lt;BR /&gt;&amp;nbsp;&lt;BR /&gt;&lt;STRONG&gt;Step 3: &lt;/STRONG&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;STRONG&gt;Converting a PFX file to a PEM file and adding the correct Cryptographic Providers:&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;&lt;STRONG&gt;Command line:&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;FONT face="courier new,courier"&gt;&lt;STRONG&gt;cd C:\OpenSSL-Win64\bin&lt;/STRONG&gt;&lt;/FONT&gt;
&lt;UL style="list-style-type: circle;"&gt;
&lt;LI&gt;Default install location for &lt;FONT face="courier new,courier"&gt;&lt;I&gt;Win64OpenSSL_Light-1_1_0f.exe&lt;/I&gt;&lt;/FONT&gt; install path (can be changed during installation)
&lt;UL&gt;
&lt;LI&gt;Different versions may do different functions, this one was picked for its small size and performed the functions needed in a 64 bit OS. (Current version as of 10/31/2017)&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;&lt;FONT face="courier new,courier"&gt;&lt;STRONG&gt;openssl pkcs12 -in c:\3rdsslcert.pfx -out c:\3rdsslcert-new.pem&lt;/STRONG&gt;&lt;/FONT&gt;
&lt;UL style="list-style-type: circle;"&gt;
&lt;LI&gt;Converts the PFX file to a PEM file.
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Note:&lt;/STRONG&gt; You will need the &lt;I&gt;Import Password&lt;/I&gt; to have access to the Private Key. This is supplied by the CA when the certificate is generated. If the password is not supplied, the certificate cannot be used.&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;&lt;FONT face="courier new,courier"&gt;&lt;STRONG&gt;openssl pkcs12 -export -in c:\3rdsslcert-new.pem -out c:\3rdsslcert-new.pfx -CSP "Microsoft Enhanced RSA and AES Cryptographic Provider"&lt;/STRONG&gt;&lt;/FONT&gt;
&lt;UL style="list-style-type: circle;"&gt;
&lt;LI&gt;Converts the PEM file back to PFX and adding the correct Cryptographic Providers.&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;STRONG&gt;Step 4:&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Shut down the services for the node you will need to replace the certificate on.&lt;/LI&gt;
&lt;LI&gt;Delete the old version of the certificate and install the new one.&lt;/LI&gt;
&lt;LI&gt;Restart the services.
&lt;UL style="list-style-type: circle;"&gt;
&lt;LI&gt;The thumbprint will not change as the certificate is the same, but the Cryptographic Providers have been added. You do not need to change anything in the QMC.
&lt;UL&gt;
&lt;LI&gt;However, if this is a new certificate entirely, you will need to replace the Thumbprint for the old certificate with the new one in the Proxy settings in the QMC.&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;Verify in the Hub/QMC that it’s using the installed certificate with no issues.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;STRONG&gt;Step 5:&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Verify that the Virtual Proxy for SAML is correctly configured to use SHA256.&lt;/LI&gt;
&lt;LI&gt;Verify that the SAML IdP and Entity for that Virtual Proxy is configured to use SHA256.
&lt;UL style="list-style-type: circle;"&gt;
&lt;LI&gt;Some IdPs use certificate data inside the metadata provided by Qlik Sense. If you change the certificate (even modifying it for this article) in any way, the SP metadata (From the SAML VP in the QMC) should be regenerated and reimported to the IdP.
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Note:&lt;/STRONG&gt; Some IdPs don’t need this information, but some do. When in doubt, reimport metadata from either the IdP/SP to the other to ensure it’s all up to date.&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;Attempt to log into the Virtual Proxy and the SAML provider.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P class="qlik-migrated-tkb-headings"&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3 class="qlik-migrated-tkb-headings"&gt;Cause:&lt;/H3&gt;
&lt;P&gt;&lt;BR /&gt;&lt;STRONG&gt;Special Notes:&lt;/STRONG&gt;&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;Internal 500 Errors are normally caused by the SSL certificate bound to the Proxy Service. While it may not be the issue documented in this article, there may be another with it that’s linked. Verifying different certificates (EX: Sense Self-Signed instead of a CA generated one) or SHA1 vs SHA256 on the IdP or Sense side, will help narrow down where the issue lies.&lt;/LI&gt;
&lt;LI&gt;IdP certificates &lt;STRONG&gt;CAN&lt;/STRONG&gt; expire and if that happens, Qlik Sense needs the updated metadata from it.&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;Related Content:&lt;/H3&gt;
&lt;UL&gt;
&lt;LI&gt;
&lt;H2 class="message-subject"&gt;&lt;A href="https://community.qlik.com/t5/Knowledge-Base/Qlik-Sense-SAML-Integration-fails-with-500-Internal-Server-Error/ta-p/1711692" target="_blank" rel="noopener"&gt;&lt;SPAN class="lia-message-unread lia-message-unread-windows"&gt;Qlik Sense SAML Integration fails with 500 Internal Server Error, Unanticipated ComponentSpace.SAML2.Exceptions.SAMLBindingException&lt;/SPAN&gt;&lt;/A&gt;&lt;/H2&gt;
&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://community.qlik.com/t5/Knowledge-Base/SHA-256-and-Converting-the-Cryptographic-Service-Provider-Type/ta-p/1716032" target="_blank" rel="noopener"&gt;&lt;SPAN class="lia-message-read"&gt;SHA-256 and Converting the Cryptographic Service Provider Type&lt;/SPAN&gt;&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;</description>
      <pubDate>Wed, 12 May 2021 12:36:25 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Official-Support-Articles/Error-500-Internal-server-error-in-the-Hub-QMC-when-connecting/ta-p/1710388</guid>
      <dc:creator>pbr</dc:creator>
      <dc:date>2021-05-12T12:36:25Z</dc:date>
    </item>
  </channel>
</rss>

