Multiple SAML authentication domains not working

I have configured two SAML authentication domains ( saml_auth_domain_1, saml_auth_domain_2).
SAML authentication working fine with domain_1 (order:1 ) , but when try to authenticate with domain_2 ( order:2) it is failing. SAML response is always validating with the order:1 configuration, so authentication failing.
Can you please help me if I am missing any configuration ?

[2020-07-07T10:39:31,100][ERROR][c.o.s.a.SamlResponse ] [d2e2a24b5dae] Invalid issuer in the Assertion/Response. Was “####/exk2a5dqy6V91kXy24x6”, but expected “####/exk5gkh4nXCGhGIkc4x6”
[2020-07-07T10:39:31,101][WARN ][c.a.d.a.h.s.AuthTokenProcessorHandler] [d2e2a24b5dae] Error while validating SAML response in /_opendistro/_security/api/authtoken

SAML response for domain_2 authentication contains ( entity_id: ####/exk2a5dqy6V91kXy24x6 ) but this response got compared with domain_1 entity_id , not with the domain_2. so the validation is failing.

saml_auth_domain_1:
description: “Authenticate via SAML”
http_enabled: true
transport_enabled: false
order: 1
http_authenticator:
type: saml
challenge: true
config:
idp:
metadata_file: okta.xml
entity_id: ####/exk5gkh4nXCGhGIkc4x6
sp:
entity_id: kibana_saml
kibana_url: KIBANA_URL
roles_key: Role
exchange_key: ‘mnbvczlkjhgfdsapoiuytrewqqwertonjklhgfrt’
authentication_backend:
type: noop
saml_auth_domain_2:
description: “Authenticate via SAML”
http_enabled: true
transport_enabled: false
order: 2
http_authenticator:
type: saml
challenge: true
config:
idp:
metadata_file: okta_2.xml
entity_id: #####/exk2a5dqy6V91kXy24x6
sp:
entity_id: kibana_saml
kibana_url: KIBANA_URL
roles_key: Role
exchange_key: ‘asdfghjklmnbvczxqwertyuioplkiujhytgfredws’
authentication_backend:
type: noop

1 Like

@prasadrashika

Did you get this resolved?

It seems you have challenge set to true for both of the domains. The first SAML domain should be set to false, if you want the plugin to go to the next domain if this one fails.

Hope this helps