How do I troubleshoot issues related to Active Directory, Lightweight Directory Access Protocol, and Single Sign-On?

When configuring authentication sources for MetaDefender Managed File Transfer (MFT), you may encounter some issues related to Active Directory (AD), Lightweight Directory Access Protocol (LDAP), or Single Sign-On (SSO). Here are some common issues and how to troubleshoot them.

Unable to log in to the same user account with both AD and SSO

Issue: When setting up both AD and SSO integration for MFT, you may notice that when a user logs in with AD or SSO, their user account is different and not the same account (i.e. 1 user account for AD, and 1 user account for SSO).

Solution: To authenticate into an existing AD synced user account through SSO, the SSO integration must return claims containing the same username that a user through AD sync already exists.

The SSO claims for username are the following:

  1. upn

  2. preferred_username

  3. name

If there is already an AD synced user with the resolved username, the SSO login will authenticate into that user. For example:

  • An AD user named “user” is synced in MFT. SSO returns username claim “user” → SSO will authenticate into existing AD user.
  • An AD user named “user” is synced in MFT. SOO returns username claim “user@domain.com” → SSO will authenticate into a different user account.

Unable to log in to SSO after setting up AD of the same source

Issue: If SSO was configured and used before configuring an active directory pointing to the same source, the MFT system cannot distinguish between the two occurrences of the same user (local user created by SSO integration, and active directory user created by AD integration).

Solution: Delete all local users created through the SSO integration before logging in. After deleting the local user occurrence, both SSO and AD logins will direct to the active directory user.

AD users/groups are missing

Issue: After finalizing AD setup and synchronizing AD users/groups, some users/groups are missing and cannot be logged in.

Solution: By default, if no AD organizational unit (OU) and security group are specified during steps 4 and 5 of the AD setup process, all users will be licensed to use MFT. However, if some OUs and security groups are specified, only users in those groups will be licensed to use MFT.

If AD users/groups are missing, please go back to steps 4 and 5 of AD setup and review your include/exclude list according to this documentation page.

“Something unexpected happened” when syncing AD

Issue: After finalizing AD configuration and start to sync, the error “Something unexpected happened” occurs and the process fails.

Solution: This type of issue that occurs during AD synchronization is mostly due to configuration mistakes. To fix this, please go back to User Directory Account settings page and review the configuration.

“Invalid OAuth authorization request was received” when logging in with SSO

Issue: When logging in with SSO (in this case AD FS), the following error appears: Error details: MSIS9224: An invalid OAuth authorization request was received. The received ‘redirect_uri’ parameter is not a valid registered redirect URI for client identifier ‘…’.

Solution: In this case, the URL used to access (and consequently, the SSO redirect endpoint) hasn’t been registered as a redirect URI for the application in AD FS management console.

Take the above example:

To fix this issue, add any additional redirect URI that an end user might encounter when logging in with SSO, like so:

For assistance with Troubleshooting issues related to Authentication Sources in MetaDefender Managed File Transfer, please follow the instructions at Creating Support Packages before submitting a Support Ticket.

Type to search, ESC to discard
Type to search, ESC to discard
Type to search, ESC to discard