Skip to main content

This content has been archived and is no longer being updated. Links may not function; however, this content may be relevant to outdated versions of the product.

Support Article

SAML: Logout failure

SA-38454

Summary



Logout from SAML is failing after a change at IDP side. Developer started using SHA256 instead of SHA1 for signature method. The login is working fine.


Error Messages



java.security.SignatureException: Signature encoding error

followed with:

java.io.IOException: ObjectIdentifier mismatch: <1.2.3.4>

Steps to Reproduce

  1. Login using sso url.
  2. Click Logout.

Root Cause



The "Logout (SLO) protocol binding" for IDP auth was using "HTTP Redirect" after moving to SHA256 at IDP.

Resolution

In case of SHA-256 signature encoding at IDP, for SLO it is mandatory to use only SOAP binding for "Logout (SLO) protocol binding" in the IDP auth of the SAML configuration.

Published June 9, 2017 - Updated October 8, 2020

Was this useful?

0% found this useful

Have a question? Get answers now.

Visit the Collaboration Center to ask questions, engage in discussions, share ideas, and help others.

Did you find this content helpful?

Want to help us improve this content?

We'd prefer it if you saw us at our best.

Pega Community has detected you are using a browser which may prevent you from experiencing the site as intended. To improve your experience, please update your browser.

Close Deprecation Notice
Contact us