Troubleshoot Elastic Cloud SSO
Serverless ECH
Double check the saml_idp.sso_url provided during IdP registration. This should be the HTTP-POST binding URL to your IdP’s SAML application. Elastic Cloud will redirect to this URL during sign in.
There could be a variety of issues that might result in sign in failure. Try tracing the SAML request and response with a SAML tracer. You should see a SAMLRequest field when redirecting to your IdP, and a SAMLResponse field when redirecting to the Cloud ACS.
If there was an error in your IdP, there may be a non-success Status field which should describe the error that occurred.
If the SAML response was successful, double-check the components of the SAML response:
- The
DestinationandRecipientshould match theacsprovided by the Elastic Cloud IdP registration API. - An
AttributeStatementnamedemailshould be sent with the email matching a domain claimed by your Elastic Cloud organization. If the domain of the email doesn’t match a claimed domain, the authentication flow will not complete. - The
AudienceRestrictionAudienceshould match thesp_entity_idprovided by the Elastic Cloud IdP registration API. - The
Issuershould match the value provided to the Elastic Cloud IdP registration API. - The signature of the SAML response should be verifiable by the certificate provided during IdP configuration in Cloud.