we’re trying to implement authentication via Azure Active Directory, using the SAML protocol.
We’re following the instructions, but we’re unsure about this part:
keystore: path to the JKS keystore keystore-password: password to access the keystore. If omitted, encryption-cert-password will be used instead encryption-cert-name: name of the certificate whose public key the SAML Assertion is encrypted with encryption-cert-password: password of the certificate whose public key the SAML Assertion is encrypted
We tried generating the keystore using the following command (shiny.pem was exported from Azure):
sudo keytool -importcert -file /home/user/shiny.pem -alias shinystore -keypass password -keystore keystore.jks
… but after adding the required fields to the yaml, any attempt to sign in is followed by an error saying that validation failed.
Does anyone have any ideas about what to do?