Following are few error messages / issues that you might face when trying to configure Active Directory authentication. Click on the link and see the steps needed to resolve the problem :
If you are using AD FS 2.0 as your identity provider, there might be a new certificate which would have got auto-generated. You need to export that certificate and then import it into ServiceDesk Plus On-Demand in order to resolve this. Please note that, the self-signed certificate auto-generated by AD FS is valid only for one year. So, every year you might face this problem and need to export the new certificate and configure it in ServiceDesk Plus On-Demand.
To overcome this, you can increase the certificate validity to 100 years so that you don't need to worry about performing this step every year. The below steps will generate a new token signing certificate that will be valid for 100 years.
Please follow these steps :
Export the new certificate
If you are using any other Identity Provider, download the new certificate (in Base-64 Encoded X509 format with .cer extension) from your identity provider.
Now, Log-In to sdpondemand.manageengine.com using Organization Admin credentials
Please try the following steps:
The above commands will configure AD FS to adjust the time stamp it generates during authentication. Now try AD Authentication and you should be able to login to our service.
If you still face the issue even after setting the above Skew, please make sure the System Time in AD FS machine is correct according to your local time zone. Even a few minutes difference in system time when compared to the actual time might cause this.
Please check the following cases :
The Federation Service Name in AD FS system must match the Hostname in the Login URL.
For, example, if the Login URL you have configured in SDP On-Demand is https://abc.test.com/adfs/ls, then the Federation Service name in AD FS must be "abc.test.com". Make sure the Federation Service name in AD FS matches this.
To change the Federation Service name,
After changing the federation service name, restart AD FS 2.0 Windows Service and try authentication one time.
If you have AD FS Proxy :
After changing Federation Service name, put an entry in "hosts" file in AD FS proxy system. In the hosts file, make sure abc.test.com points to the AD FS system's IP Address. Re-run the AD FS proxy configuration wizard and then try Authentication one time.
While configuring the AD FS, you must give the verified Primary domain name that you see in the SDP On-Demand's Admin ---> Organization Details ---> Domain details page.
You can go to the AD FS management console, go to Relying party trusts, right-click on "zoho.com" and go to Properties. In the "End points" tab, please check the URLs and verify that they end with your verified primary domain.
For example, if your verified primary domain is example.com, then the URL must be : https://accounts.zoho.com/samlresponse/example.com
If you still face issues during Login, please go to Event Viewer in AD FS system and see if there are Error events. Please send us those details and we will get back to you as soon as possible.
Certificate expiry in AD FS.
Restart the AD FS service from Windows Services console and check for certificate expiry messages in the Event Logs. (In the event logs tree, navigate to Application & Services Log ---> AD FS 2.0 ---> Admin). If there are error messages related to Service communication certificate expiry, follow the instructions present in the below Microsoft articles to change the Service communication certificate.
AD FS 2.0 : https://support.microsoft.com/en-us/kb/2921805
AD FS 3.0 : Refer here
Make sure the Active Directory contains the EMail address for the User account. Only if the "mail" attribute has value, the users will be authenticated.
Please make sure
a) the EMail address of the user who tries to login is same in Active Directory as well as in SDP On-Demand.
b) the user is present as a Requester or Technician in SDP On-Demand and his Login is enabled
This can come in case SSL is not enabled in IIS 7.
Please refer the following article on how to generate a self-signed certificate and use it on IIS. Once the certificate is configured for port 443, please exit and re-run the AD FS 2.0 configuration wizard. This time you must be able to select the certificate in the configuration wizard.
https://www.sslshopper.com/article-how-to-create-a-self-signed-certificate-in-iis-7.html
Internet Explorer
Please try the following
Firefox / Chrome
You might repeatedly get the Login credentials box in Firefox / Chrome. Please try turning off Extended Protection for Authentication (EPA) in IIS 7.
Please refer the following article for the exact steps : http://social.technet.microsoft.com/wiki/contents/articles/1426.ad-fs-2-0-continuously-prompted-for-credentials-while-using-fiddler-web-debugger.aspx
Try authentication one time after setting this.
If you have purchased a SSL certificate from a Certificate Authority, please follow the steps available in the below link to update the AD FS 2.0 Service Communications certificate.
Internet Explorer
Please try the following
Firefox / Chrome / Edge
You might repeatedly get the Login credentials box in Firefox / Chrome / Edge. Following articles suggests few steps to overcome this.
Try authentication one time after setting this.
Please refer here for more details : https://samlman.wordpress.com/2015/03/02/400-bad-request-error-with-adfs/
Try authentication one time after setting this.
The detailed steps are available here : http://www.blackmanticore.com/332874ac9a2f5e7bc6c05d6aef42fd3f
In case you change the user name in AD, AD FS might still use the old user's details. Try disabling Local cache in AD FS machine and then try authentication again. More details on disabling cache available here : https://support.microsoft.com/en-us/kb/946358
Try authentication one time after restarting the AD FS service.