We have the sso enabled (for office 365) … now our wildcard certificate was outdated and every machine got the new certificate. Everything is working well… EXCEPT OF THE ucs-sso… The simplesaml does not use the default Certificate (including Chain) which is defined in the Apache conf.
THIS IS A HUGE PROBLEM because now, the SSO (for Office 365) is not working anymore.
is there any usable manual on how to replace the ucs-sso certificate with a valid, not selfsigned certificate?
That worked, now we not have any certificate issues anymore. but Office365 logins are still not working.
It says:
5 STAT [9fac2bec35] user ‘xy’ has been sucessfulyy authenticated.
5 STAT [9fac2bec35] saml20-idp-SSO-first urn:federation:MicrosoftOnline https://ucs-sso.our_fqdn.net/simplesamlphp/saml2/idp/metadata.php NA
5 STAT [9fac2bec35] saml20-idp-SSO urn:federation:MicrosoftOnline https://ucs-sso.our_fqdn.net/simplesamlphp/saml2/idp/metadata.php NA
But on office.com, it aways redirect to “enter your email address” so, no login possible…
There are some things to consider, that I can think of:
Yes, Microsoft broke some APIs that rendered new installs not working. (you could not get federated setups to work anymore.) However already configured environments should not be affected. (look in the forums). The new app has been released for UCS 4.4 like last week or so which specifically addressed this issue.
During the O365 connector setup you had to import a certificate into Azure AD and that has now changed. You will have likely need to re-upload the new certificate as shown in the O365 config wizard in the UCS O365 connector app.
In order to login on Azure AD and Office online while the federation is broken, you will need a user that is not federated and only exists Azure AD (not in your UCS domain). Such users are identifiable by their user principal name suffix (username)@yourazureadtenant.onmicrosoft.com.
This user needs (AFAIR) global admin privileges on your Microsoft Azure AD tenant. Your very first user that you have created, should be such a admin and will not be redirected to your UCS SSO page.
If you have gone through a partner who has set up your tenant initially, they might be able to access your tenant and add such a global admin. - Keep these admin credentials in a safe space
We solved the issue… the problem was that, due to the fact, that we had to replace our Core-Certificates (Erneuern der TLS/SSL-Zertifikate). through that, our ucs-sso certificate got replaced too. This new Certificate was not matching the Cert on MS side.
So, because we installed the Office365 Connector later, than our UCS Master, the certificate of the sso had a longer/other expiry date.
This new created Certificate did not match to MS
PLEASE descripte this fact in your documentation , that you have to replace the SSO Certificate on Microsoft-Side, if you change the IDP Certificate.
Now, everything works again till 2022 (when the certificate really expires )
Question: Is there any documentation or scripting, which does the Replacement for the IDP Certificat to Microsofts Azure AD, like a saml update (like saml_setup.bat) script on UCS?