“UPN Not Configured” Error
The Error "UPN not configured" is a generic that can occur for a number of reasons. One potential cause is related to the expiry of the Umbrella SAML signing certificate which is renewed on an annual basis. For the latest details on certificate expiry, please read our Announcements portal.
If the Umbrella certificate expires and a customer has not taken action then users will be blocked from internet access with the following potential errors:
- an Umbrella-branded “UPN Not Configured” error when browsing the web through SWG;
- or, some other error presented by the customer's Identity Provider.
This is a generic error that can occur for a number of reasons. In this scenario the error happens because the Identity Provider (IdP) does not trust the new Umbrella certificate.
Impact
New user logons for SWG will fail, blocking internet access. This does not necessarily apply to all users but will be triggered when:
- A user's session expires due to our re-authentication setting (Eg. daily)
- A new user logs on
- A user clears the browser cache or uses a new browser.
Scenario - Error appears when importing new Umbrella Certificate
If the error occurs directly after making a change (eg. in preparation for Umbrella's certificate renewal) then it's likely that a mistake has been made with the certificate import.
Ensure both Current & New Umbrella certificates are imported
In preparation for certificate renewal Umbrella will make a new certificate available, but the new certificate is not used for signing until expiry time. Therefore your IdP configuration must have two certificates listed in the Service Provider / Relying Party configuration. Reconfigure from metadata to resolve this.
- Current Certificate - With an upcoming expiry date
- Future Certificate - Which will be valid for the next year.
Ensure the Attribute Claims map is correct
If you have reconfigured the Service Provider / Relying party, you may need to make additional configuration changes to ensure the IdP is sending the attributes we need to validate the SAML response. This is common with Microsoft ADFS where our Claims map needs to be recreated.
Scenario - Error appears when Umbrella's Certificate Expired
Ensure the new certificate has been imported to the Identity Provider.
To resolve the problem Manually import the new certificate into your identity provider. When our certificate is approaching renewal, the new certificate will be made available in our Announcements portal.
(RECOMMENDED) Configure automatic metadata updates Umbrella now provides a fixed metadata URL which can be used for seamless metadata updates. We recommend to configure this method to prevent manual action during the next certificate rollover.
Ensure the Certificate Revocation List (CRL) server addresses are accessible to the Identity Provider. Umbrella now use a different Certificate Authority so ensure the following CRL/OCSP addresses are available to the IdP server:
Microsoft ADFS - Manual Certificate Import Example
Microsoft ADFS is a popular IdP which is known to validate request signatures. The certificate can be updated as follows:
- Open ‘AD FS’ management
- Expand ‘Relying Party Trusts’ and locate the RP for Umbrella SWG
- Right-Click on the 'Relying Party' in ADFS and select 'Properties'
- Upload the new certificate on the ‘Signing’ tab
ADFS Example
Multiple Certificates
When we are approaching the certificate expiration date the metadata provided by Cisco will include multiple certificates to prepare for seamless rollover.
Do not delete the current certificate whilst it is still valid. Cisco continue signing with the current certificate up until the expiration date/time.
Comments
0 comments
Please sign in to leave a comment.