Important Update: Archer Community Scheduled Maintenance on November 23–24 - New Community Launching Soon! Learn More..
2024-11-18 09:02 AM - edited 2024-11-18 09:29 AM
The below error is thrown in the UI when users attempt to login to Archer using Single Sign-On with Azure (as the Identity Provider) via a Microsoft MyApps Tile.
An unexpected error has occurred in the system. The error Log Reference ID is: xxxxxx-xxxxxx-xxxx. Please try your request again. If problems persist, please contact your system administrator.
Also, the above error replaces the user's Default Home Page and would allow the user to interact with Archer as expected after a page refresh. However, Archer may be prevented from loading entirely if the user has an existing tab or active session token.
Note: The Microsoft MyApps Tiles enable users to access Archer directly, bypassing the Logon Decision page. When a user clicks on the MyApps tile set up for Archer, they are taken straight to the platform without needing to choose a login method.
The Sign-on URL in the Azure application is not configured correctly.
To access Archer using Single Sign-On via a Microsoft MyApps Tile, ensure that the Sign-on URL in the Azure application is populated correctly.
Follow the steps below:
1. Login to Azure and open the configured application for SSO.
2. From the left pane, expand Manage and click on Single sign-on.
3. From the middle pane, select SAML under Select a single sign-on method.
4. In the Set up Single Sign-On with SAML page, go to the Basic SAML Configuration window and click on Edit.
5. In the window that appears, populate the Sign on URL with the below format.
[BaseURL]/Default.aspx?IDP=<Insert the Realm value here>
Note:
6. Then click on Save.
Follow the steps below to retrieve the value of the Realm:
1. Logon to an Archer Server and open the Archer Control Panel.
2. Double-click on the Instance name in the left pane to open the Instance settings.
3. Go to the Single Sign-On tab.
4. Locate the Realm field below the Identity Providers section.
5. Retrieve the value in the Realm field and insert it in the Sign-On URL as stated above.
Note: Hosted/SaaS clients would need to raise a support case to obtain the Realm value.
After retrieving the Realm value and updating the Sign-on URL in Azure with it as described above, the Microsoft MyApps tiles should begin authenticating users successfully as expected.