MicroStrategy ONE

This page applies to MicroStrategy 2021 Update 4 and newer versions.

Use Signed Authn Requests for SAML in MicroStrategy 2021 Update 4

In the MicroStrategy 2021 Update 4 SAML workflow, there’s a change to the Spring Security SAML project for the signature. Follow the steps in this topic if your setup meets following the conditions:

  • Your SAML works correctly prior to MicroStrategy 2021 update 4. No change is done on IdP side.

  • After migrating the same configuration files to 2021 Update 4 environments, the SAML redirection is normal.

  • After entering the SAML user name and password in the login page, the login fails.

Troubleshooting

Check the SAML response network trace. If you see the following response and there’s no assertion appended, follow the solution below.

Copy
urn:oasis:names:tc:SAML:2.0:status:Responder

Solution

In IdPMetadata.xml, add WantAuthnRequestsSigned="true".

MicroStrategy has encountered one ADFS case where this parameter is a must-have for SAML to work properly.