Troubleshoot Elastic Cloud SSO
Double check the saml_idp.sso_url
provided during IdP registration. This should be the HTTP-POST binding URL to your IdP’s SAML application. Elastic Cloud will redirect to this URL during sign in.
There could be a variety of issues that might result in sign in failure. Try tracing the SAML request and response with a SAML tracer. You should see a SAMLRequest
field when redirecting to your IdP, and a SAMLResponse
field when redirecting to the Cloud ACS.
If there was an error in your IdP, there may be a non-success Status
field which should describe the error that occurred.
If the SAML response was successful, double-check the components of the SAML response:
- The
Destination
andRecipient
should match theacs
provided by the Elastic Cloud IdP registration API. - An
AttributeStatement
namedemail
should be sent with the email matching a domain claimed by your Elastic Cloud organization. If the domain of the email doesn’t match a claimed domain, the authentication flow will not complete. - The
AudienceRestriction
Audience
should match thesp_entity_id
provided by the Elastic Cloud IdP registration API. - The
Issuer
should match the value provided to the Elastic Cloud IdP registration API. - The signature of the SAML response should be verifiable by the certificate provided during IdP configuration in Cloud.