Skip to content

Commit 5e564f5

Browse files
authored
Merge branch 'main' into rhdhbugs-2722-jtbd-authentication
2 parents 432c1ec + 7dcb97e commit 5e564f5

File tree

3 files changed

+96
-0
lines changed

3 files changed

+96
-0
lines changed

assemblies/shared/assembly-troubleshoot-authentication-issues.adoc

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -11,5 +11,11 @@ Learn how to troubleshoot common authentication issues.
1111

1212
include::../modules/shared/proc-reduce-the-size-of-issued-tokens.adoc[leveloffset=+1]
1313

14+
15+
include::../modules/shared/ref-troubleshoot-login-failed-errors.adoc[leveloffset=+1]
16+
17+
18+
include::../modules/shared/ref-troubleshoot-catalog-provider-errors.adoc[leveloffset=+1]
19+
1420
ifdef::parent-context[:context: {parent-context}]
1521
ifndef::parent-context[:!context:]
Lines changed: 34 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,34 @@
1+
:_mod-docs-content-type: REFERENCE
2+
3+
[id="troubleshoot-catalog-provider-errors_{context}"]
4+
= Troubleshoot catalog provider errors
5+
6+
[role="_abstract"]
7+
Catalog provider plugins can fail to ingest users and groups into the {product-short} software catalog.
8+
The following sections describe common catalog provider errors visible in the backend logs and their solutions.
9+
10+
== LDAP: Malformed entity envelope
11+
12+
----
13+
LdapOrgEntityProvider:default refresh failed, TypeError: Malformed entity envelope, TypeError: /metadata/name must NOT have fewer than 1 characters - limit: 1
14+
----
15+
16+
This error occurs when a user being ingested from LDAP has no value for the `name` field, which is mapped to the `uid` LDAP attribute by default.
17+
18+
To resolve this issue:
19+
20+
* Add a filter to the LDAP users configuration to exclude users without a `uid`:
21+
+
22+
[source,yaml]
23+
----
24+
catalog:
25+
providers:
26+
ldapOrg:
27+
default:
28+
users:
29+
- dn: OU=Users,DC=example,DC=com
30+
options:
31+
filter: (uid=*)
32+
----
33+
+
34+
For more information about LDAP user filters, see xref:enable-user-provisioning-with-ldap_enable-authentication-with-rhbk[Enable user provisioning with LDAP].
Lines changed: 56 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,56 @@
1+
:_mod-docs-content-type: REFERENCE
2+
3+
[id="troubleshoot-login-failed-errors_{context}"]
4+
= Troubleshoot login failed errors
5+
6+
[role="_abstract"]
7+
When a user cannot sign in to {product-short}, the sign-in page displays a "Login failed" error message.
8+
The following sections describe common login errors and their solutions.
9+
10+
== Login failed: unable to resolve user identity
11+
12+
----
13+
Login failed; caused by Error: Failed to sign-in, unable to resolve user identity. Please verify that your catalog contains the expected User entities that would match your configured sign-in resolver.
14+
----
15+
16+
This error indicates that the user signing in does not match a user entity in the {product-short} software catalog.
17+
18+
To resolve this issue:
19+
20+
. Check that the corresponding catalog provider plugin is set up correctly and is successfully syncing users and groups into the catalog.
21+
+
22+
In the backend logs, look for a successful synchronization message such as:
23+
+
24+
[source]
25+
----
26+
catalog info Read 114 GitHub users and 22 GitHub groups in 3.4 seconds. Committing...
27+
catalog info Committed 114 GitHub users and 22 GitHub groups in 0.0 seconds.
28+
----
29+
30+
. If users and groups have been ingested into the catalog, verify that the sign-in resolver used (default or configured) matches the correct user attributes.
31+
. Optionally, use guest login to look into the user entity in the catalog and verify the attributes.
32+
33+
== Login failed: provider not configured to support sign-in
34+
35+
----
36+
Login failed; caused by Error: The <providerId> provider is not configured to support sign-in.
37+
----
38+
39+
This error indicates that the authentication provider has `disableIdentityResolution` set to `true`, meaning it is configured as an auxiliary provider, not for primary sign-in.
40+
41+
To resolve this issue:
42+
43+
* In your `{my-app-config-file}` file, ensure that `disableIdentityResolution` is not set to `true` for your primary sign-in authentication provider.
44+
45+
== Login failed: user profile does not contain an email
46+
47+
----
48+
Login failed, user profile does not contain an email
49+
----
50+
51+
This error indicates that the authentication client does not have permission to read the user's email from the identity provider.
52+
53+
To resolve this issue:
54+
55+
* Grant the necessary email-reading permissions to the authentication client in the identity provider.
56+
* Or, use a sign-in resolver that does not rely on email, such as `preferredUsernameMatchingUserEntityName` instead of `emailMatchingUserEntityProfileEmail`.

0 commit comments

Comments
 (0)