<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>article Error 400 - Bad request Contact your system administrator. The user cannot be authenticated by the SAML response through the following virtual proxy: in Official Support Articles</title>
    <link>https://community.qlik.com/t5/Official-Support-Articles/Error-400-Bad-request-Contact-your-system-administrator-The-user/ta-p/1713070</link>
    <description>&lt;H4&gt;Environment:&lt;/H4&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;&lt;LI-PRODUCT title="Qlik Sense Enterprise on Windows" id="qlikSenseEnterpriseWindows"&gt;&lt;/LI-PRODUCT&gt;&amp;nbsp;, all versions&lt;/P&gt;
&lt;H4&gt;&lt;BR /&gt;&lt;FONT color="#339966"&gt;&lt;STRONG&gt;Scenario 1:&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/H4&gt;
&lt;P&gt;When setting up SP initiated SAML Authentication with a 3rd party SSL and custom ports, login fails with the following:&lt;/P&gt;
&lt;P&gt;"&lt;FONT face="courier new,courier"&gt;Error 400 - Bad request Contact your system administrator. The user cannot be authenticated by the SAML response through the following virtual proxy&lt;/FONT&gt;"&lt;/P&gt;
&lt;P&gt;The certificate was checked to ensure it read Provider =&amp;nbsp;&lt;STRONG&gt;&lt;I&gt;Microsoft Enhanced RSA and AES Cryptographic Provider,&amp;nbsp;&lt;/I&gt;&lt;/STRONG&gt;but authentication is still failing a 400 error, with very little indication as to what was occurring in the logging.&amp;nbsp;&amp;nbsp;&lt;BR /&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Custom ports are not always reflected in the metadata, which causes the connection to attempt on the standard secure port (&lt;STRONG&gt;443)&lt;/STRONG&gt;&lt;/P&gt;
&lt;H3 class="qlik-migrated-tkb-headings"&gt;Resolution:&lt;/H3&gt;
&lt;P&gt;&lt;BR /&gt;Check the metadata that is uploaded from the Identity Provider in the Qlik Management Console to ensure the port number is not listed, or utilizing the custom port.&amp;nbsp;&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;STRONG&gt;Example:&lt;/STRONG&gt;&lt;BR /&gt;In the metadata, you will see the POST and Redirect URL's using the standard port (&lt;STRONG&gt;443&lt;/STRONG&gt;), though port &lt;STRONG&gt;1443 &lt;/STRONG&gt;is specified in the proxy.&amp;nbsp;&amp;nbsp;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;Location="&lt;A href="https://qlikserver1.domain.local:443/pingfed/samlauthn/" target="_blank" rel="noopener"&gt;https://qlikserver1.domain.local:443/pingfed/samlauthn/&lt;/A&gt;"&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;Change the URL to read the correct custom port number specified in the proxy.&amp;nbsp;&amp;nbsp;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;Location="&lt;A href="https://qlikserver1.domain.local:1443/pingfed/samlauthn/" target="_blank" rel="noopener"&gt;https://qlikserver1.domain.local:1443/pingfed/samlauthn/&lt;/A&gt;"&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H4&gt;&lt;FONT color="#339966"&gt;&lt;STRONG&gt;Scenario 2:&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/H4&gt;
&lt;P&gt;SAML is a data format for authentication and authorization. It&amp;nbsp;enables&amp;nbsp;single sign-on (SSO), and thereby minimizes the number of times a user has to log on to cloud applications and websites. Three entities are involved in the authentication process:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;the user&lt;/LI&gt;
&lt;LI&gt;the identity provider (IdP)&lt;/LI&gt;
&lt;LI&gt;the service provider (SP)&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;The identity provider is used for authentication. When the identity provider has asserted the user identity, the service provider can give the user access to their services. Because the identity provider has enabled&amp;nbsp;SSO, the user can access several service provider sites and applications without having to log in at each site.&lt;BR /&gt;&lt;BR /&gt;If SAML Autentication fails in&amp;nbsp;the audit proxy log the following message can be seen:&lt;BR /&gt;&lt;BR /&gt;The identity provider failed authentication.&amp;nbsp;urn:oasis:names:tc:SAML:2.0:status:Requester&lt;BR /&gt;&lt;BR /&gt;Refer to&amp;nbsp;&lt;A href="https://msdn.microsoft.com/en-us/library/hh269642.aspx" target="_blank" rel="noopener"&gt;https://msdn.microsoft.com/en-us/library/hh269642.aspx&lt;/A&gt;&amp;nbsp;for the status codes.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;Resolution:&lt;/H3&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;It may be necessary to check the following:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;On the metadata.xml file set&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;WantAuthnRequestsSigned=true&lt;/FONT&gt;&lt;/LI&gt;
&lt;LI&gt;Recreate the metadata file double signing it.&lt;/LI&gt;
&lt;LI&gt;Set&amp;nbsp;AssertionConsumerService to 2&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 25 Oct 2022 09:52:44 GMT</pubDate>
    <dc:creator>Sonja_Bauernfeind</dc:creator>
    <dc:date>2022-10-25T09:52:44Z</dc:date>
    <item>
      <title>Error 400 - Bad request Contact your system administrator. The user cannot be authenticated by the SAML response through the following virtual proxy:</title>
      <link>https://community.qlik.com/t5/Official-Support-Articles/Error-400-Bad-request-Contact-your-system-administrator-The-user/ta-p/1713070</link>
      <description>&lt;H4&gt;Environment:&lt;/H4&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;&lt;LI-PRODUCT title="Qlik Sense Enterprise on Windows" id="qlikSenseEnterpriseWindows"&gt;&lt;/LI-PRODUCT&gt;&amp;nbsp;, all versions&lt;/P&gt;
&lt;H4&gt;&lt;BR /&gt;&lt;FONT color="#339966"&gt;&lt;STRONG&gt;Scenario 1:&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/H4&gt;
&lt;P&gt;When setting up SP initiated SAML Authentication with a 3rd party SSL and custom ports, login fails with the following:&lt;/P&gt;
&lt;P&gt;"&lt;FONT face="courier new,courier"&gt;Error 400 - Bad request Contact your system administrator. The user cannot be authenticated by the SAML response through the following virtual proxy&lt;/FONT&gt;"&lt;/P&gt;
&lt;P&gt;The certificate was checked to ensure it read Provider =&amp;nbsp;&lt;STRONG&gt;&lt;I&gt;Microsoft Enhanced RSA and AES Cryptographic Provider,&amp;nbsp;&lt;/I&gt;&lt;/STRONG&gt;but authentication is still failing a 400 error, with very little indication as to what was occurring in the logging.&amp;nbsp;&amp;nbsp;&lt;BR /&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Custom ports are not always reflected in the metadata, which causes the connection to attempt on the standard secure port (&lt;STRONG&gt;443)&lt;/STRONG&gt;&lt;/P&gt;
&lt;H3 class="qlik-migrated-tkb-headings"&gt;Resolution:&lt;/H3&gt;
&lt;P&gt;&lt;BR /&gt;Check the metadata that is uploaded from the Identity Provider in the Qlik Management Console to ensure the port number is not listed, or utilizing the custom port.&amp;nbsp;&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;STRONG&gt;Example:&lt;/STRONG&gt;&lt;BR /&gt;In the metadata, you will see the POST and Redirect URL's using the standard port (&lt;STRONG&gt;443&lt;/STRONG&gt;), though port &lt;STRONG&gt;1443 &lt;/STRONG&gt;is specified in the proxy.&amp;nbsp;&amp;nbsp;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;Location="&lt;A href="https://qlikserver1.domain.local:443/pingfed/samlauthn/" target="_blank" rel="noopener"&gt;https://qlikserver1.domain.local:443/pingfed/samlauthn/&lt;/A&gt;"&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;Change the URL to read the correct custom port number specified in the proxy.&amp;nbsp;&amp;nbsp;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;Location="&lt;A href="https://qlikserver1.domain.local:1443/pingfed/samlauthn/" target="_blank" rel="noopener"&gt;https://qlikserver1.domain.local:1443/pingfed/samlauthn/&lt;/A&gt;"&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H4&gt;&lt;FONT color="#339966"&gt;&lt;STRONG&gt;Scenario 2:&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/H4&gt;
&lt;P&gt;SAML is a data format for authentication and authorization. It&amp;nbsp;enables&amp;nbsp;single sign-on (SSO), and thereby minimizes the number of times a user has to log on to cloud applications and websites. Three entities are involved in the authentication process:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;the user&lt;/LI&gt;
&lt;LI&gt;the identity provider (IdP)&lt;/LI&gt;
&lt;LI&gt;the service provider (SP)&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;The identity provider is used for authentication. When the identity provider has asserted the user identity, the service provider can give the user access to their services. Because the identity provider has enabled&amp;nbsp;SSO, the user can access several service provider sites and applications without having to log in at each site.&lt;BR /&gt;&lt;BR /&gt;If SAML Autentication fails in&amp;nbsp;the audit proxy log the following message can be seen:&lt;BR /&gt;&lt;BR /&gt;The identity provider failed authentication.&amp;nbsp;urn:oasis:names:tc:SAML:2.0:status:Requester&lt;BR /&gt;&lt;BR /&gt;Refer to&amp;nbsp;&lt;A href="https://msdn.microsoft.com/en-us/library/hh269642.aspx" target="_blank" rel="noopener"&gt;https://msdn.microsoft.com/en-us/library/hh269642.aspx&lt;/A&gt;&amp;nbsp;for the status codes.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;Resolution:&lt;/H3&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;It may be necessary to check the following:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;On the metadata.xml file set&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;WantAuthnRequestsSigned=true&lt;/FONT&gt;&lt;/LI&gt;
&lt;LI&gt;Recreate the metadata file double signing it.&lt;/LI&gt;
&lt;LI&gt;Set&amp;nbsp;AssertionConsumerService to 2&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 25 Oct 2022 09:52:44 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Official-Support-Articles/Error-400-Bad-request-Contact-your-system-administrator-The-user/ta-p/1713070</guid>
      <dc:creator>Sonja_Bauernfeind</dc:creator>
      <dc:date>2022-10-25T09:52:44Z</dc:date>
    </item>
  </channel>
</rss>

