<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>question Nifi + NGINX+ OneLogin Authentication issue - SAML Authentication Request Identifier Cookie not found in Support Questions</title>
    <link>https://community.cloudera.com/t5/Support-Questions/Nifi-NGINX-OneLogin-Authentication-issue-SAML-Authentication/m-p/399194#M250440</link>
    <description>&lt;P&gt;Hi&amp;nbsp;&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;I have integrated Secured Nifi with NGINX and is integrated with Onelogin SAML 2.0 Custom Connector (Advanced)&lt;BR /&gt;&lt;BR /&gt;After entering credentials of one login it shows user logged in on onelogin portal,&lt;BR /&gt;But on Browser it redirects to&amp;nbsp;/nifi-api/access/saml/login/consumer this url and&amp;nbsp;&lt;BR /&gt;it shows&amp;nbsp;&lt;/P&gt;&lt;H2&gt;HTTP ERROR 401 Unauthorized&lt;/H2&gt;&lt;P&gt;URI:STATUS:MESSAGE:&lt;/P&gt;&lt;TABLE&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;/nifi-api/access/saml/login/consumer&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;401&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;Unauthorized&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;Few findings are-&amp;nbsp;&lt;BR /&gt;Recipient value in SAML payload is empty&amp;nbsp; and&amp;nbsp;&lt;BR /&gt;Cookie value is not matching with InResponseTo value in SAML Payload&lt;BR /&gt;Also not sure how to match it&lt;BR /&gt;&lt;BR /&gt;from nifi.user.log file i can see error:&lt;/P&gt;&lt;P&gt;SAML Authentication Request Identifier Cookie not found&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Can anyone please guide here?&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
    <pubDate>Fri, 20 Dec 2024 13:13:12 GMT</pubDate>
    <dc:creator>rsurti</dc:creator>
    <dc:date>2024-12-20T13:13:12Z</dc:date>
    <item>
      <title>Nifi + NGINX+ OneLogin Authentication issue - SAML Authentication Request Identifier Cookie not found</title>
      <link>https://community.cloudera.com/t5/Support-Questions/Nifi-NGINX-OneLogin-Authentication-issue-SAML-Authentication/m-p/399194#M250440</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;I have integrated Secured Nifi with NGINX and is integrated with Onelogin SAML 2.0 Custom Connector (Advanced)&lt;BR /&gt;&lt;BR /&gt;After entering credentials of one login it shows user logged in on onelogin portal,&lt;BR /&gt;But on Browser it redirects to&amp;nbsp;/nifi-api/access/saml/login/consumer this url and&amp;nbsp;&lt;BR /&gt;it shows&amp;nbsp;&lt;/P&gt;&lt;H2&gt;HTTP ERROR 401 Unauthorized&lt;/H2&gt;&lt;P&gt;URI:STATUS:MESSAGE:&lt;/P&gt;&lt;TABLE&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;/nifi-api/access/saml/login/consumer&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;401&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;Unauthorized&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;Few findings are-&amp;nbsp;&lt;BR /&gt;Recipient value in SAML payload is empty&amp;nbsp; and&amp;nbsp;&lt;BR /&gt;Cookie value is not matching with InResponseTo value in SAML Payload&lt;BR /&gt;Also not sure how to match it&lt;BR /&gt;&lt;BR /&gt;from nifi.user.log file i can see error:&lt;/P&gt;&lt;P&gt;SAML Authentication Request Identifier Cookie not found&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Can anyone please guide here?&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 20 Dec 2024 13:13:12 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/Nifi-NGINX-OneLogin-Authentication-issue-SAML-Authentication/m-p/399194#M250440</guid>
      <dc:creator>rsurti</dc:creator>
      <dc:date>2024-12-20T13:13:12Z</dc:date>
    </item>
    <item>
      <title>Re: Nifi + NGINX+ OneLogin Authentication issue - SAML Authentication Request Identifier Cookie not found</title>
      <link>https://community.cloudera.com/t5/Support-Questions/Nifi-NGINX-OneLogin-Authentication-issue-SAML-Authentication/m-p/399250#M250457</link>
      <description>&lt;P&gt;&lt;FONT size="3"&gt;&lt;a href="https://community.cloudera.com/t5/user/viewprofilepage/user-id/119797"&gt;@rsurti&lt;/a&gt;&amp;nbsp;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="3"&gt;The issue described suggests a mismatch or misconfiguration in the SAML integration with NiFi and NGINX. The following analysis and potential solutions&amp;nbsp; should address your findings&lt;/FONT&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;P&gt;&lt;FONT size="3"&gt;&lt;STRONG&gt;SAML Payload Issues&lt;/STRONG&gt;:&lt;/FONT&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;FONT size="3"&gt;&lt;STRONG&gt;Empty Recipient Value&lt;/STRONG&gt;: The &lt;FONT color="#FF0000"&gt;Recipient &lt;/FONT&gt;in the SAML assertion should match the ACS (Assertion Consumer Service) URL configured in NiFi. If it is empty, this indicates a misconfiguration in the SAML IdP (OneLogin).&lt;/FONT&gt;&lt;/LI&gt;&lt;LI&gt;&lt;FONT size="3"&gt;&lt;STRONG&gt;Cookie and &lt;/STRONG&gt;&lt;FONT color="#FF0000"&gt;InResponseTo&lt;/FONT&gt;&lt;STRONG&gt; Mismatch&lt;/STRONG&gt;: The &lt;FONT color="#FF0000"&gt;InResponseTo&lt;/FONT&gt; attribute in the SAML response should correspond to the SAML request identifier issued by NiFi. If the cookie storing the SAML request ID is missing or mismatched, authentication fails.&lt;/FONT&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;&lt;FONT size="3"&gt;&lt;STRONG&gt;NiFi Error: &lt;/STRONG&gt;&lt;FONT color="#FF0000"&gt;SAML Authentication Request Identifier Cookie not found&lt;/FONT&gt;:&lt;/FONT&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;FONT size="3"&gt;This suggests that the browser is not sending back the SAML request ID cookie, or NiFi cannot recognize it. This could happen if:&lt;/FONT&gt;&lt;UL&gt;&lt;LI&gt;&lt;FONT size="3"&gt;The cookie is not set or overwritten by NGINX.&lt;/FONT&gt;&lt;/LI&gt;&lt;LI&gt;&lt;FONT size="3"&gt;The cookie is being blocked or dropped due to cross-domain or SameSite restrictions.&lt;/FONT&gt;&lt;/LI&gt;&lt;LI&gt;&lt;FONT size="3"&gt;NGINX is misconfigured to handle or forward SAML cookies.&lt;/FONT&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;H3&gt;&lt;FONT size="3"&gt;&lt;STRONG&gt;Probable Causes&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/H3&gt;&lt;OL&gt;&lt;LI&gt;&lt;P&gt;&lt;FONT size="3"&gt;&lt;STRONG&gt;NiFi Configuration&lt;/STRONG&gt;:&lt;/FONT&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;FONT size="3"&gt;Misconfigured &lt;FONT color="#FF0000"&gt;nifi.security.user.saml&lt;/FONT&gt; properties in &lt;FONT color="#FF0000"&gt;nifi.properties.&lt;/FONT&gt;&lt;/FONT&gt;&lt;/LI&gt;&lt;LI&gt;&lt;FONT size="3"&gt;ACS URL mismatch between NiFi and OneLogin.&lt;/FONT&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;&lt;FONT size="3"&gt;&lt;STRONG&gt;NGINX Configuration&lt;/STRONG&gt;:&lt;/FONT&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;FONT size="3"&gt;Improper handling of cookies, particularly the SAML request identifier cookie.&lt;/FONT&gt;&lt;/LI&gt;&lt;LI&gt;&lt;FONT size="3"&gt;Incorrect forwarding of headers or paths for SAML requests and responses.&lt;/FONT&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;&lt;FONT size="3"&gt;&lt;STRONG&gt;OneLogin Configuration&lt;/STRONG&gt;:&lt;/FONT&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;FONT size="3"&gt;The SAML application in OneLogin is not configured to provide a valid &lt;FONT color="#FF0000"&gt;Recipient &lt;/FONT&gt;or ACS URL.&lt;/FONT&gt;&lt;/LI&gt;&lt;LI&gt;&lt;FONT size="3"&gt;Mismatched SAML settings such as entity ID, ACS URL, or signature settings.&lt;/FONT&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;H3&gt;&lt;FONT size="3"&gt;&lt;STRONG&gt;Steps to Resolve&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/H3&gt;&lt;H4&gt;&lt;FONT size="3"&gt;&lt;STRONG&gt;1. Verify and Update NiFi Configuration&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/H4&gt;&lt;P&gt;&lt;FONT size="3"&gt;Ensure the &lt;FONT color="#FF0000"&gt;nifi.properties&lt;/FONT&gt; file has the correct SAML configurations:&lt;/FONT&gt;&lt;/P&gt;&lt;LI-SPOILER&gt;&lt;FONT size="3"&gt;nifi.security.user.saml.idp.metadata.url=&amp;lt;OneLogin SAML Metadata URL&amp;gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="3"&gt;nifi.security.user.saml.sp.entity.id=&amp;lt;NiFi Entity ID&amp;gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="3"&gt;nifi.security.user.saml.sp.base.url=https://&amp;lt;nifi-url&amp;gt; # Same as what users access&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="3"&gt;nifi.security.user.saml.authentication.expiration=12 hours&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="3"&gt;nifi.security.user.saml.request.identifier.name=nifi-request-id&lt;/FONT&gt;&lt;/LI-SPOILER&gt;&lt;P&gt;&lt;FONT size="3"&gt;The &lt;FONT color="#FF0000"&gt;nifi.security.user.saml.sp.base.url&lt;/FONT&gt; must match the &lt;FONT color="#FF0000"&gt;Recipient &lt;/FONT&gt;value in the SAML response.&lt;/FONT&gt;&lt;BR /&gt;&lt;STRONG&gt;2. Check OneLogin SAML Connector Configuration&lt;/STRONG&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Ensure the &lt;STRONG&gt;Recipient&lt;/STRONG&gt; value in OneLogin matches the NiFi ACS URL:&lt;UL&gt;&lt;LI&gt;ACS URL: &lt;FONT color="#FF0000"&gt;https://&amp;lt;nifi-url&amp;gt;/nifi-api/access/saml/login/consumer&lt;/FONT&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;LI&gt;Verify that the SAML settings in OneLogin include:&lt;UL&gt;&lt;LI&gt;Audience (Entity ID): Matches &lt;FONT color="#FF0000"&gt;nifi.security.user.saml.sp.entity.id.&lt;/FONT&gt;&lt;/LI&gt;&lt;LI&gt;ACS URL: Matches &lt;FONT color="#FF0000"&gt;nifi.security.user.saml.sp.base.url.&lt;/FONT&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;H4&gt;&lt;FONT size="3"&gt;&lt;STRONG&gt;3. Debug and Adjust NGINX Configuration&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/H4&gt;&lt;UL&gt;&lt;LI&gt;&lt;FONT size="3"&gt;Ensure NGINX is not interfering with SAML cookies&lt;/FONT&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;LI-SPOILER&gt;&lt;FONT size="3"&gt;proxy_pass https://&amp;lt;nifi-host&amp;gt;:9444;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="3"&gt;proxy_set_header Host $host;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="3"&gt;proxy_set_header X-Forwarded-Proto https;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="3"&gt;proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="3"&gt;proxy_cookie_path / "/; SameSite=None; Secure";&lt;/FONT&gt;&lt;/LI-SPOILER&gt;&lt;P&gt;&lt;FONT size="3"&gt;Add debug logging to check if cookies are being forwarded correctly.&lt;/FONT&gt;&lt;/P&gt;&lt;H4&gt;&lt;FONT size="3"&gt;&lt;STRONG&gt;4. Troubleshoot Cookie Handling&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/H4&gt;&lt;UL&gt;&lt;LI&gt;&lt;FONT size="3"&gt;Check the browser developer tools (under &lt;FONT color="#FF0000"&gt;Application &amp;gt; Cookies&lt;/FONT&gt;) to verify that the SAML request identifier cookie is being set and returned.&lt;/FONT&gt;&lt;/LI&gt;&lt;LI&gt;&lt;FONT size="3"&gt;Ensure the &lt;FONT color="#FF0000"&gt;SameSite=None&lt;/FONT&gt; and &lt;FONT color="#FF0000"&gt;Secure&lt;/FONT&gt; flags are set for the cookies.&lt;/FONT&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;H4&gt;&lt;FONT size="3"&gt;&lt;STRONG&gt;5. Check SAML Logs for Errors&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/H4&gt;&lt;UL&gt;&lt;LI&gt;&lt;FONT size="3"&gt;In the &lt;/FONT&gt;&lt;FONT color="#FF0000"&gt;nifi-user.log&lt;/FONT&gt;&lt;FONT size="3"&gt; file, look for logs that provide details on the failed SAML authentication, including:&lt;/FONT&gt;&lt;UL&gt;&lt;LI&gt;&lt;FONT size="3"&gt;Missing cookies.&lt;/FONT&gt;&lt;/LI&gt;&lt;LI&gt;&lt;FONT color="#FF0000"&gt;InResponseTo&lt;/FONT&gt;&lt;FONT size="3"&gt; mismatch.&lt;/FONT&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;H4&gt;&lt;STRONG&gt;6. Test the Flow&lt;/STRONG&gt;&lt;/H4&gt;&lt;UL&gt;&lt;LI&gt;After making the adjustments, perform the following:&lt;OL&gt;&lt;LI&gt;Clear browser cookies.&lt;/LI&gt;&lt;LI&gt;Initiate the SAML login process from the NiFi GUI.&lt;/LI&gt;&lt;LI&gt;Check if the &lt;FONT color="#FF0000"&gt;Recipient&lt;/FONT&gt; and &lt;FONT color="#FF0000"&gt;InResponseTo&lt;/FONT&gt; values align in the SAML assertion and request.&lt;/LI&gt;&lt;/OL&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;Use a SAML debugging tool like &lt;A href="https://addons.mozilla.org/en-US/firefox/addon/saml-tracer/" target="_new" rel="noopener"&gt;&lt;SPAN&gt;SAML&lt;/SPAN&gt;&lt;SPAN&gt;-tracer&lt;/SPAN&gt;&lt;SPAN&gt; (browser&lt;/SPAN&gt;&lt;SPAN&gt; extension)&lt;/SPAN&gt;&lt;/A&gt; to inspect the SAML request/response flows before that enable debug&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Enable detailed logging in NiFi for SAML authentication by modifying &lt;FONT color="#FF0000"&gt;logback.xml&lt;/FONT&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;LI-SPOILER&gt;&amp;lt;logger name="org.apache.nifi.web.security.saml" level="&lt;FONT color="#FF0000"&gt;DEBUG&lt;/FONT&gt;" /&amp;gt;&lt;/LI-SPOILER&gt;&lt;P&gt;Let me know if you need further assistance! Happy hadooping&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 22 Dec 2024 17:45:57 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/Nifi-NGINX-OneLogin-Authentication-issue-SAML-Authentication/m-p/399250#M250457</guid>
      <dc:creator>Shelton</dc:creator>
      <dc:date>2024-12-22T17:45:57Z</dc:date>
    </item>
    <item>
      <title>Re: Nifi + NGINX+ OneLogin Authentication issue - SAML Authentication Request Identifier Cookie not found</title>
      <link>https://community.cloudera.com/t5/Support-Questions/Nifi-NGINX-OneLogin-Authentication-issue-SAML-Authentication/m-p/400326#M250798</link>
      <description>&lt;P&gt;Still not working&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 14 Jan 2025 14:19:44 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/Nifi-NGINX-OneLogin-Authentication-issue-SAML-Authentication/m-p/400326#M250798</guid>
      <dc:creator>rsurti</dc:creator>
      <dc:date>2025-01-14T14:19:44Z</dc:date>
    </item>
    <item>
      <title>Re: Nifi + NGINX+ OneLogin Authentication issue - SAML Authentication Request Identifier Cookie not found</title>
      <link>https://community.cloudera.com/t5/Support-Questions/Nifi-NGINX-OneLogin-Authentication-issue-SAML-Authentication/m-p/400327#M250799</link>
      <description>&lt;P&gt;Works for few users connected to Lan , but not working for user connect to wifi&amp;nbsp; under same&amp;nbsp; network&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 14 Jan 2025 14:21:07 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/Nifi-NGINX-OneLogin-Authentication-issue-SAML-Authentication/m-p/400327#M250799</guid>
      <dc:creator>rsurti</dc:creator>
      <dc:date>2025-01-14T14:21:07Z</dc:date>
    </item>
    <item>
      <title>Re: Nifi + NGINX+ OneLogin Authentication issue - SAML Authentication Request Identifier Cookie not found</title>
      <link>https://community.cloudera.com/t5/Support-Questions/Nifi-NGINX-OneLogin-Authentication-issue-SAML-Authentication/m-p/400742#M250956</link>
      <description>&lt;P&gt;&lt;a href="https://community.cloudera.com/t5/user/viewprofilepage/user-id/119797"&gt;@rsurti&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If SAML authentication works for LAN users but not for users on Wi-Fi, even when both are on the same network, it suggests differences in how the network or devices are configured for each connection type.&lt;/P&gt;&lt;P&gt;Here’s how you can troubleshoot and resolve this issue:&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;DNS Resolution&lt;/STRONG&gt;: Check if Wi-Fi users can resolve the identity provider (IdP) and service provider (SP) URLs correctly.&lt;/P&gt;&lt;DIV class="contain-inline-size rounded-md border-[0.5px] border-token-border-medium relative bg-token-sidebar-surface-primary dark:bg-gray-950"&gt;&amp;nbsp;&lt;/DIV&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;nslookup idp.example.com&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Capture SAML requests/responses using browser developer tools (Network tab). Look for differences in:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;STRONG&gt;Redirect URLs&lt;/STRONG&gt;&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;Assertions&lt;/STRONG&gt;&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;Error codes&lt;/STRONG&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;STRONG&gt;Common issues include:&lt;/STRONG&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Misconfigured callback URLs.&lt;/LI&gt;&lt;/UL&gt;&lt;H3&gt;&lt;FONT size="4"&gt;&lt;STRONG&gt;Device Configuration&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/H3&gt;&lt;UL&gt;&lt;LI&gt;Check if device firewalls or VPNs are interfering with SAML traffic over Wi-Fi.&lt;/LI&gt;&lt;LI&gt;Ensure browser settings (e.g., cookie policies) do not block SAML cookies.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;Connect a user to LAN and Wi-Fi simultaneously (if possible) to identify differences in routing or access.&lt;/P&gt;&lt;P&gt;Please revert Happy hadooping&lt;/P&gt;</description>
      <pubDate>Mon, 20 Jan 2025 13:41:21 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/Nifi-NGINX-OneLogin-Authentication-issue-SAML-Authentication/m-p/400742#M250956</guid>
      <dc:creator>Shelton</dc:creator>
      <dc:date>2025-01-20T13:41:21Z</dc:date>
    </item>
  </channel>
</rss>

