Unable to sign in to Adobe products, services, or mobile apps with Federated ID (SSO): Troubleshooting errors

  1. Adobe Enterprise & Teams: Administration guide
  2. Plan your deployment
    1. Basic concepts
      1. Licensing
      2. Identity
      3. User management
      4. App deployment
      5. Admin roles
    2. Deployment Guides
      1. Named User deployment guide
      2. SDL deployment guide
    3. Deploy Creative Cloud for education
      1. Deployment guide
      2. Integration with Canvas LMS
      3. Integration with Blackboard Learn
      4. Configuring SSO for District Portals and LMSs
      5. Kivuto FAQ
      6. Primary and Secondary institution eligibility guidelines
  3. Set up your organization
    1. Set up identity
      1. Identity types | overview
      2. Set up organization with Enterprise ID
      3. Set up organization with Federated ID
        1. SSO overview
        2. Setup Azure Connector and sync
          1. Set up SSO with Microsoft via Azure OIDC
          2. Add Azure Sync to your directory
          3. Azure Connector FAQ
        3. Set up Google Federation and sync
          1. Set up SSO with Google Federation
          2. Add Google Sync to your directory
          3. Google federation FAQ
        4. Generic SAML
          1. Set up SSO with other SAML providers
          2. Set up SSO with Microsoft Azure ADFS
          3. SSO Common questions
          4. SSO Troubleshooting
        5. Education SSO
          1. Configure SSO for District Portals and LMS
          2. Common questions
          3. Dovetail
      4. Verify ownership of a domain
      5. Add and manage domains
      6. Link domains to directories
      7. Use directory trust to add pre-claimed domains
      8. Migrate to new authentication provider
    2. Asset settings
    3. Authentication settings
    4. Privacy and security contacts
    5. Console settings
    6. Manage encryption
  4. Manage products and entitlements
    1. Manage users
      1. Overview
      2. Administrative roles
      3. User management techniques
        1. Manage users individually   
        2. Manage multiple users (Bulk CSV)
        3. User Sync tool (UST)
        4. User management API (UMAPI)
        5. Microsoft Azure Sync
        6. Google Federation Sync
      4. Change user's identity type
      5. Manage user groups
      6. Manage directory users
      7. Manage developers
      8. Migrate existing users to the Adobe Admin Console
      9. Migrate user management to the Adobe Admin Console
    2. Manage products and product profiles
      1. Manage products
      2. Manage product profiles for enterprise users
      3. Manage self-service policies
      4. Manage app integrations
      5. Manage product permissions in the Admin Console  
      6. Enable/disable services for a product profile
      7. Single App | Creative Cloud for enterprise
      8. Optional services
    3. Manage Shared Device licenses
      1. What's new
      2. Deployment guide
      3. Create packages
      4. Recover licenses
      5. Migrate from Device Licensing
      6. Manage profiles
      7. Licensing toolkit
      8. Shared Device Licensing FAQ
  5. Manage storage and assets
    1. Storage
      1. Manage enterprise storage
      2. Adobe Creative Cloud: Update to storage
      3. Manage Adobe storage
    2. Asset migration
      1. Automated Asset Migration
      2. Automated Asset Migration FAQ  
      3. Manage transferred assets
    3. Reclaim assets from a user
    4. Student asset migration | EDU only
      1. Automatic student asset migration
      2. Migrate your assets
  6. Manage services
    1. Adobe Stock
      1. Adobe Stock credit packs for teams
      2. Adobe Stock for enterprise
      3. Use Adobe Stock for enterprise
      4. Adobe Stock License Approval
    2. Custom fonts
    3. Adobe Asset Link
      1. Overview
      2. Create user group
      3. Configure Adobe Experience Manager 6.x Assets
      4. Configure and install Adobe Asset Link
      5. Manage assets
      6. Adobe Asset Link for XD
    4. Adobe Sign
      1. Set up Adobe Sign for enterprise or Teams
      2. Adobe Sign - Team feature Administrator
      3. Manage Adobe Sign on the Admin Console
    5. Creative Cloud for enterprise - free membership
      1. Overview
      2. Getting started
  7. Deploy apps and updates
    1. Overview
      1. Deploy and deliver apps and updates
      2. Plan to deploy
      3. Prepare to deploy
    2. Create packages
      1. Package apps via the Admin Console
      2. Create Named User Licensing Packages
      3. Adobe templates for packages
      4. Manage packages
      5. Manage device licenses
      6. Serial number licensing
    3. Customize packages
      1. Customize the Creative Cloud desktop app
      2. Include extensions in your package
    4. Deploy Packages 
      1. Deploy packages
      2. Deploy Adobe packages with SCCM
      3. Deploy Adobe packages with ARD
      4. Install products in the Exceptions folder
      5. Uninstall Creative Cloud products
      6. Use Adobe provisioning toolkit enterprise edition
      7. Adobe Creative Cloud licensing identifiers
    5. Manage updates
      1. Change management for Adobe enterprise and teams customers
      2. Deploy updates
    6. Adobe Update Server Setup Tool (AUSST)
      1. AUSST Overview
      2. Set up the internal update server
      3. Maintain the internal update server
      4. Common use cases of AUSST   
      5. Troubleshoot the internal update server
    7. Adobe Remote Update Manager (RUM)
      1. Use Adobe Remote Update Manager
      2. Channel IDs for use with Adobe Remote Update Manager
      3. Resolve RUM errors
    8. Troubleshoot
      1. Troubleshoot Creative Cloud apps installation and uninstallation errors
      2. Query client machines to check if a package is deployed
      3. Creative Cloud package "Installation Failed" error message
    9. Create packages using Creative Cloud Packager (CC 2018 or earlier apps)
      1. About Creative Cloud Packager
      2. Creative Cloud Packager release notes
      3. Application packaging
      4. Create packages using Creative Cloud Packager
      5. Create named license packages
      6. Create packages with device licenses
      7. Create a license package
      8. Create packages with serial number licenses
      9. Packager automation
      10. Package non-Creative Cloud products
      11. Edit and save configurations
      12. Set locale at system level
  8. Manage your account
    1. Manage your Teams account
      1. Overview
      2. Update payment details
      3. Manage invoices
      4. Change contract owner
    2. Assign licenses to a Teams user
    3. Add products and licenses
    4. Renewals
      1. Teams membership: Renewals
      2. Enterprise in VIP: Renewals and compliance
    5. Purchase Request compliance
    6. Value Incentive Plan (VIP) in China
    7. VIP Select help
  9. Reports & logs
    1. Audit Log
    2. Assignment reports
    3. Content Logs
  10. Get help
    1. Contact Adobe Customer Care
    2. Support options for teams accounts
    3. Support options for enterprise accounts
    4. Support options for Experience Cloud
Megjegyzés:

This article does not apply to SSO setups using Google federation or Microsoft Azure Sync.

Refer to the following articles if your organization has set up SSO via any of these identity providers:

Overview

After successfully configuring SSO within the Adobe Admin Console, ensure that you clicked Download Adobe Metadata file and have saved the SAML XML Metadata file to your computer. Your identity provider requires this file to enable single sign-on. Import the XML configuration details properly into your identity provider (IdP). This is required for SAML integration with your IdP and will make sure that the data is configured properly.

If you have questions as to how to use the SAML XML Metadata file to configure your IdP, reach out to your IdP directly for instructions, which vary per IdP.

Download Adobe Metadata file

Basic troubleshooting

Issues with single sign-on are often caused by basic errors that are easy to overlook. In particular, check the following:

  • The user is assigned to a product profile with an entitlement.
  • The user name sent to SAML matches the user name in the enterprise dashboard.
  • Check all entries in Admin Console and your identity provider for spelling or syntax errors.
  • The Creative Cloud desktop app has been updated to the latest version.
  • The user is logging in to the correct place (Creative Cloud desktop app, Creative Cloud application, or Adobe.com)

Error "An error occurred" with button labeled "Try Again"

This error typically occurs after user authentication has succeeded and Okta has successfully forwarded the authentication response to Adobe.

In the Adobe Admin Console, validate the following:

On the Identity tab:

  • Ensure that the associated domain has been activated.

On the Products tab:

  • Ensure that the user is associated to the correct product nickname and in the domain you claimed to be configured as Federated ID.
  • Ensure that the product nickname has the correct entitlements assigned to it.

On the Users tab:

  • Ensure that the user name of the user is in the form of a complete email address.

Error "Access Denied" logging in

Possible causes for this error:

  • The user name or email address being sent in the SAML assertion does not match the information entered in the Admin Console.
  • The user isn't associated to the right product, or the product is not associated with the correct entitlement.
  • The SAML user name is coming across as something other than an email address. All users must be in the domain you claimed as part of the setup process.
  • Your SSO client uses JavaScript as part of the login process, and you're attempting to log in to a client that doesn't support JavaScript (such as Creative Cloud Packager).

How to resolve:

  • Verify the dashboard configuration for the user: user information and product profile.
  • Run a SAML trace and validate that the information being sent matches the dashboard, and then correct any inconsistencies.

Error "Another user is currently logged in"

The error "another user is currently logged in" occurs when the attributes sent in the SAML assertion do not match the email address that was used to start the login process.

Check and ensure that the user's email address to log in matches the following:

  • User's email address listed in the Admin Console
  • User's username passed back in the NameID field of the SAML Assertion

Error "The Issuer in the SAML response did not match the issuer configured for the identity provider"

IDP Issuer in the SAML Assertion is different from what has been configured in the Inbound SAML. Look for typos (such as http vs https). When checking the IDP Issuer string with the customer SAML system, you're looking for an EXACT match to the string they provided. This issue comes up sometimes because a slash was missing at the end.​​

If you need assistance with this error, provide a SAML trace and values you entered in the Adobe dashboard.

Error "The digital signature in the SAML response did not validate with the identity provider's certificate"

This issue occurs when your directory's certificate has expired. To update the certificate, you must download the certificate or metadata from Identity provider and upload it in the Adobe Admin Console.

For example, follow the steps below if your IdP is Microsoft AD FS:

  1. Open the AD FS Management application on your server, and within the folder AD FS > Service > Endpoints, select the Federation Metadata.

    Metadata location

  2. Use a browser to navigate to the URL provided against Federation Metadata and download the file. For example, https://<your AD FS hostname>/FederationMetadata/2007-06/FederationMetadata.xml.

    Megjegyzés:

    Accept any warnings if prompted.

  3. Sign in to your Adobe Admin Console and navigate to Settings Identity > Directories. Select the directory to update and click  Configure on the SAML provider card.

    Then, upload the IdP metadata file and Save.

Error "The current time is before the time-range specified in the assertion conditions"

Windows-based IdP Server:

1. Ensure that the system clock is synchronized with an accurate time server.

Check the accuracy system clock against your time server with this command; the "Phase Offset" value should be a small fraction of a second:

w32tm /query /status /verbose

You can cause an immediate resynchronization the system clock with the Time Server with the following command:

w32tm /resync

If the system clock is set correctly and you are still seeing the above error, you may must adjust the time-skew setting to increase the tolerance of the difference between clocks between the server and client.

2. Increase the allowed difference in system clock between servers.

From a Powershell window with administrative rights, set the allowed skew value to 2 minutes. Check whether you are able to log in, and then either increase or decrease the value depending on the result.

Determine the current time-skew setting for the relevant Relying Party Trust with the following command:

Get-ADFSRelyingPartyTrust | Format-List -property Identifier,Name,NotBeforeSkew

The Relying Party Trust is identified by the URL shown in the "Identifier" field of the output of the previous command for that particular configuration. This URL is also shown in the ADFS Management utility in the properties window for the relevant Relying Party Trust on the "Identifiers" tab in the field "Relying Party Trusts", as shown in the screenshot below.

Set the time skew to 2 minutes with the following command, substituting the Identifier address accordingly:

Set-ADFSRelyingPartyTrust –TargetIdentifier 'https://www.okta.com/saml2/service-provider/xxxxxxxxxxxxxxxxxxxx' –NotBeforeSkew 2  

UNIX-based IdP Server

Ensure that the system clock is set correctly either using the ntpd service, or manually with the ntpdate command from a root shell or with sudo as shown below (note that if the time is offset by more than 0.5 seconds, the change will not happen immediately, but it will slowly correct the system clock). Ensure that the timezone is also set correctly.

# ntpdate -u pool.ntp.org

Megjegyzés:

This works with identity providers such as Shibboleth.

Error 401 unauthorized credentials

This error occurs when the application does not support Federated login and must be logged into as an Adobe ID. FrameMaker, RoboHelp, and Adobe Captivate are examples of applications with this requirement.

Error "Inbound SAML login failed with message: The SAML response contained no assertions"

​Check the login workflow.  If you're able to access the sign-in page on another machine or network but not internally, the problem could be a block agent string.  Also, run a SAML trace and confirm that ​​First Name, Last Name, and Username as a properly formatted email address​​​​ are in the SAML subject.

Error 400 bad request / Error "The status of the SAML request was not successful" / SAML certification validation failed

Validate that the proper SAML assertion is being sent:

  • Not having a NameID element in the subject. Validate that the Subject element contains a NameId element. It must be equal to the Email attribute, which should be the email address of the user that you want to authenticate.
  • Spelling errors, especially easily overlooked ones like https vs http.
  • Validate that the correct certificate was provided. IDPs must be configured to use uncompressed SAML request/responses.

A utility such as SAML Tracer for Firefox can help unpack the assertion and display it for inspection. If you need assistance from Adobe Customer Care, you will be asked for this file. For details, see how to perform a SAML trace.

The following working example may help in properly formatting your SAML assertion:

Letöltés

With Microsoft ADFS:

  1. Every Active Directory account must have an email address listed in Active Directory to successfully log in (event log: The SAML response does not have NameId in the assertion). Check this first.
  2. Access the dashboard
  3. Click the Identity tab and the domain.
  4. Click Edit Configuration.
  5. Locate IDP Binding. Switch to HTTP-POST and then save. 
  6. Retest the login experience.
  7. If it works but you prefer the prior setting, simply switch back to HTTP-REDIRECT and reupload the metadata into ADFS.

With other IdPs:

  1. Encountering error 400 means that a successful login was rejected by your IdP.
  2. Check your IdP logs for the source of the error.
  3. Correct the issue and try again.
Adobe logó

Bejelentkezés a fiókba