Hi, Im facing issue after set up IG with OSP together installed in 1 server using port 8080. Initially it able to work, but randomly sometimes it suddenly unable to login anymore with LDAP users (tested 2 builds with both with edir and AD users). It seems it is very unstable and inconsistence where suddenly im unable to login with the user. It just keeps looping me at the login page, im not sure what i can do anymore.
Attached is catalina log and OSP log.
Preamble: [OIDP idm] Priority Level: WARNING Java: internal.osp.oidp.service.configuration.ConfigurationManager.initialize() [446] thread=main Elapsed time: 1.604 milliseconds Time: 2024-10-15T00:07:11.650+0800 Log Data: Validation of authentication service configuration resulted in one or more warnings: Validation messages (8): 1) Warning: AuthenticationService[OSP Configuration (id=auth)]/Authentication/Protocols/OAuth2Protocol/OAuth2Clients/Client[id=formbuilder,uri=https://demoig99:8443/formbuilder/oauth.html] This public client is set to allow non-user-interactive authorization grants. This is not recommended by RFC 6819 section 5.2.3.2. 2) Warning: AuthenticationService[OSP Configuration (id=auth)]/Authentication/Protocols/OAuth2Protocol/OAuth2Clients/Client[id=rptw,uri=http://demoig99:8080/IDMRPT/oauth.html] This public client is set to allow non-user-interactive authorization grants. This is not recommended by RFC 6819 section 5.2.3.2. 3) Warning: AuthenticationService[OSP Configuration (id=auth)]/Authentication/Protocols/OAuth2Protocol/OAuth2Clients/Client[id=cx,uri=https://demoig99:8443/cx/oauth.html] This public client is set to allow non-user-interactive authorization grants. This is not recommended by RFC 6819 section 5.2.3.2. 4) Warning: AuthenticationService[OSP Configuration (id=auth)]/Authentication/Protocols/OAuth2Protocol/OAuth2Clients/Client[id=ig,uri=https://demoig99:8443/oauth.html] This public client is set to allow non-user-interactive authorization grants. This is not recommended by RFC 6819 section 5.2.3.2. 5) Information: AuthenticationService[OSP Configuration (id=auth)]/LDAPDataSource[LDAP Directory Data Source (id=idm_idv)]/Server[Server1.demo.com:389] The OSP-system-specified bind timeout value will be used. 6) Information: AuthenticationService[OSP Configuration (id=auth)]/LDAPDataSource[LDAP Directory Data Source (id=idm_idv)]/Server[Server1.demo.com:389] The OSP-system-specified read timeout value will be used. 7) Information: AuthenticationService[OSP Configuration (id=auth)]/FileDataSource[CSV File Data Source (id=firstFile)] No filename specified; assuming path specifies both path and filename. 8) Information: AuthenticationService[OSP Configuration (id=auth)]/JDBCIDataSource[File User Instance Datasource (id=ds-file-instance-data)] No JNDI environment context name; JNDI datasource name specifies both context and name. Preamble: [OIDP idm] Priority Level: WARNING Java: internal.osp.oidp.service.source.AuthPluginManager.autoConfigure() [338] thread=main Time: 2024-10-15T00:07:12.206+0800 Log Data: Unable to auto configure authentication plugins for 'Authentication Source for File Users' Instance Data(id=as-file-instance-data)' because no suitable authentication plugins were found. Preamble: [Tenant idm] Priority Level: WARNING Java: internal.osp.framework.OSPTenant$ProbeTlsTask.run() [3912] thread=osp-common-thread-1-3 Time: 2024-10-15T00:07:13.750+0800 Log Data: Server is not configured for Transport Layer Security (TLS) Preamble: [OIDP idm] Txn: j7p_UYpHEe-UTAAMKcZRjw Priority Level: WARNING Java: internal.osp.oidp.service.source.ldap.LDAPSource.search() [734] thread=http-nio-8080-exec-8 Elapsed time: 133.936 milliseconds Time: 2024-10-15T00:15:43.115+0800 Log Data: Admin search: Admin search: Preamble: [OIDP idm] Txn: kjGZ0YpHEe-UTAAMKcZRjw Priority Level: WARNING Java: internal.osp.oidp.service.source.ldap.LDAPSource.search() [734] thread=http-nio-8080-exec-10 Elapsed time: 356.86 milliseconds Time: 2024-10-15T00:15:47.184+0800 Log Data: Admin search: Admin search:
Trying to set it up using HTTPS with port 8443, but it still doesnt work as well.
Im accessing to C:\netiq\idm\apps\idgov\bin\configutil.cmd to change to HTTPS using below guide.
https://www.microfocus.com/documentation/identity-governance/4.3/install-guide/t4aewza6ye7r.html
configutil.cmd
server.xml
Certificate is self-signed and still valid.