{"id":3118,"date":"2012-04-18T13:38:37","date_gmt":"2012-04-18T17:38:37","guid":{"rendered":"http:\/\/onlineappsdba.com\/?p=3118"},"modified":"2012-04-18T13:38:37","modified_gmt":"2012-04-18T17:38:37","slug":"oif-sp-initiated-call-after-response-from-idp-redirecting-to-sp-fedspart20samlart-with-401-unauthorized","status":"publish","type":"post","link":"https:\/\/onlineappsdba.com\/index.php\/2012\/04\/18\/oif-sp-initiated-call-after-response-from-idp-redirecting-to-sp-fedspart20samlart-with-401-unauthorized\/","title":{"rendered":"OIF: SP initiated call after response from IdP redirecting to SP \/fed\/sp\/art20?SAMLart=** with 401 Unauthorized"},"content":{"rendered":"<p><strong>Oracle Identity Federation<\/strong> (OIF) is federation solution from Oracle that provides\u00a0<strong>cross domain<\/strong>\u00a0Single Sign-On (SSO). OIF can act as <strong>Service Provider<\/strong> (SP),<strong> Identity Provider<\/strong> (IdP), or <strong>both <\/strong>(IdP &amp; SP).<\/p>\n<p>I recently integrated two OIF instances, one acting as <strong>IdP<\/strong> and second acting as<strong> SP<\/strong>. Both OIF had their own <strong>Identity Store<\/strong> (as OID) where user with attribute <strong>employeeNumber<\/strong> (on IdP side)\u00a0was linked to user with attribute <strong>uid<\/strong> (on SP side).<\/p>\n<p><strong>Note<\/strong>: This type of federation is called as <strong>Linked Federation<\/strong>, other types are <a href=\"https:\/\/onlineappsdba.com\/index.php\/2012\/04\/01\/oracle-identity-federation-oif-for-beginners-idp-sp\/\"><strong>Transient<\/strong>, <strong>Mapped<\/strong>, and <strong>Attribute<\/strong> or <strong>Role-based Federation<\/strong><\/a>\u00a0 . Step by step integration of <strong>Linked-based federation<\/strong> in OIF\u00a0is covered\u00a0in <a href=\"http:\/\/st-curriculum.oracle.com\/obe\/fmw\/oif\/11g\/r1\/oif_linking\/oif_linking.htm\">Oracle By Example (OBE)<\/a>\u00a0<\/p>\n<p>To add further complexity to solution <a href=\"http:\/\/www.amazon.com\/Oracle-Identity-Access-Manager-Administrators\/dp\/1849682682\"><strong>OAM<\/strong> (Oracle Access Manager)<\/a>\u00a0was integarted\u00a0with OIF (SP side) as <a href=\"https:\/\/onlineappsdba.com\/index.php\/2012\/04\/03\/oam-integration-with-oif-authentication-engine-or-service-provider\/\">Service Provider Integration Module<\/a>\u00a0(i.e. OAM authentication was delegated to OIF SP and any user session at OIF should automatically create session at OAM).\u00a0<\/p>\n<p>During testing a resource protected in OAM by <strong>OIF Scheme<\/strong> (Challenge URL pointing\u00a0to <strong>http(s):\/\/OIF_SP_Host\/fed\/user\/sposso\u00a0<\/strong>)\u00a0, OAM was re-directing user browser to <strong>OIF_SP<\/strong> <strong>(\/fed\/user\/sposso?osso_spToken<\/strong>)\u00a0which in turn was redirecting to <strong>OIF_IdP\u00a0<\/strong>(<strong>\/fed\/idp\/samlv20?SAMLRequest<\/strong>) for authentication.<\/p>\n<p><strong>Note:<\/strong> Use browser tools like\u00a0<a href=\"http:\/\/www.blunck.info\/iehttpheaders.html\">IEHTTPHeaders (IE)<\/a>\u00a0\u00a0or <a href=\"https:\/\/addons.mozilla.org\/en-US\/firefox\/addon\/live-http-headers\/\">HTTP Header Plug-In(Firefox)<\/a>\u00a0to display\u00a0<strong>HTTP Header<\/strong> to see how URLs are redirected in user session.<\/p>\n<p>After authentication at IdP (<span style=\"color: #ff0000;\">using default ldap authentication engine which is OID<\/span>), request was redirected back to OIF_SP (<strong>\/fed\/sp\/art20?SAMLart=<\/strong>) and error message on browser reported was<\/p>\n<p>____<br \/>\n<span style=\"color: #ff0000;\">From RFC 2068 Hypertext Transfer Protocol &#8212; HTTP\/1.1:<\/span><br \/>\n<span style=\"color: #ff0000;\">10.4.2 401 Unauthorized<\/span><\/p>\n<p><span style=\"color: #ff0000;\">The request requires user authentication. The response MUST include a WWW-Authenticate header field (section 14.46) containing a challenge applicable to the requested resource. The client MAY repeat the request with a suitable Authorization header field (section 14.8). If the request already included Authorization credentials, then the 401 response indicates that authorization has been refused for those credentials. If the 401 response contains the same challenge as the prior response, and the user agent has already attempted authentication at least once, then the user SHOULD be presented the entity that was given in the response, since that entity MAY include relevant diagnostic information. HTTP access authentication is explained in section 11.<\/span><br \/>\n____<\/p>\n<p>Note: Authorization related errors in OIF are mainly because of<strong> wrong nameID mapping done\u00a0beween OIF IdP and SP <\/strong>.<\/p>\n<p>&nbsp;<\/p>\n<p><strong><span style=\"text-decoration: underline;\">To troubleshoot OIF configuration issue<\/span><\/strong> &#8211;<\/p>\n<p><strong>1.<\/strong> First thing to check is look for any errors in <strong>wls_oif&lt;N&gt;.out<\/strong> at both <strong>SP<\/strong> and <strong>IDP<\/strong> side under $DOMAIN_HOME\/servers\/&lt;oif_server_name&gt;\/logs\/<\/p>\n<p>In my case error at IdP side in wls_oid&lt;N&gt;.out was<\/p>\n<p>___<br \/>\n<span style=\"color: #ff0000;\">&lt;Apr 17, 2012 4:48:30 PM BST&gt; &lt;Error&gt; &lt;oracle.security.fed.eventhandler.profiles.idp.sso.v20.AuthnRequestEventHandler&gt; &lt;FED-15003&gt; &lt;No value in user record for NameIDPolicy requested: urn:oasis:names:tc:SAML:1.1:nameid-format:<strong>emailAddress<\/strong>&gt;<\/span><br \/>\n___<\/p>\n<p><strong>Note<\/strong>: Value of attribute email for user\u00a0is NULL in\u00a0OID configured with IDP &amp; SP\u00a0but <strong>why is IDP trying to query emailAddress for user<\/strong> ?<\/p>\n<p>&nbsp;<\/p>\n<p>Error\u00a0at\u00a0SP side in <strong>wls_oid&lt;N&gt;.out<\/strong> was<br \/>\n___\u00a0<\/p>\n<p><span style=\"color: #ff0000;\">&lt;Apr 17, 2012 4:24:20 PM BST&gt; &lt;Error&gt; &lt;oracle.security.fed.eventhandler.authn.engines.osso.OssoFinishSPSSOEventHandler&gt; &lt;FED-15134&gt; &lt;The service providercould not map the identity provider response to a user&gt;<\/span><br \/>\n____<\/p>\n<p>Looking at error message on IdP and SP , it was clear that error was related to <strong>nameid-format<\/strong> (<span style=\"color: #ff0000;\">more on nameid-format or NameIDPolicy in SAML Token later<\/span>).<\/p>\n<p><strong>To debug what nameID format is requested by OIF SP<\/strong>, enable <strong>trace<\/strong> in OIF for logger <strong>oracle.security<\/strong> from Enterprise Manager (<strong>\/em<\/strong>)<\/p>\n<p>&nbsp;<\/p>\n<p><a href=\"https:\/\/onlineappsdba.com\/wp-content\/uploads\/2012\/04\/oif_trace.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-3127\" title=\"oif_trace\" src=\"https:\/\/onlineappsdba.com\/wp-content\/uploads\/2012\/04\/oif_trace.jpg\" alt=\"\" width=\"432\" height=\"336\" srcset=\"https:\/\/onlineappsdba.com\/wp-content\/uploads\/2012\/04\/oif_trace.jpg 432w, https:\/\/onlineappsdba.com\/wp-content\/uploads\/2012\/04\/oif_trace-300x233.jpg 300w\" sizes=\"auto, (max-width: 432px) 100vw, 432px\" \/><\/a><br \/>\n\u00a0<\/p>\n<p>After enabling <strong>TRACE<\/strong> in OIF at SP side, access URL in OAM protected by OIF Authentication scheme and query what <strong>NameID format<\/strong> SP is requesting in SAML token (\u00a0This information is recorded in trace at\u00a0 $DOMAIN_HOME\/servers\/&lt;oif_server&gt;\/logs\/<strong>wls_oif-diagnotics.log<\/strong> )<\/p>\n<p>_____<\/p>\n<p>[2012-04-12T11:49:16.339+01:00] [wls_oif1] [TRACE] [] [oracle.security.fed.http.translator.SenderProtocolMessageTranslator]<br \/>\n[tid: [ACTIVE].ExecuteThread: &#8216;1&#8217; for queue: &#8216;weblogic.kernel.Default (self-tuning)&#8217;]<br \/>\n[userId: &lt;anonymous&gt;] [ecid: 004jV7Dh5Eo5e_r_CHXBig0007RO000IIb,0:1]<br \/>\n[SRC_CLASS: oracle.security.fed.http.translator.SenderProtocolMessageTranslator]<br \/>\n[APP: OIF#11.1.1.2.0] [SRC_METHOD: translateSAML2MessageToQuery]<br \/>\n[URI: \/fed\/user\/sposso] Outgoing QUERY message:<\/p>\n<p>&lt;samlp:AuthnRequest xmlns:samlp=&#8221;urn:oasis:names:tc:SAML:2.0:protocol&#8221; Destination=&#8221;<a href=\"http:\/\/idphost.idpdomain:8888\/fed\/idp\/samlv20\">http:\/\/idpHost.idpDomain:8888\/fed\/idp\/samlv20<\/a>&#8221; ForceAuthn=&#8221;false&#8221;<br \/>\nID=&#8221;id-MaNTZObsPFZEn7mqeHE1ETWAnAU-&#8221; IssueInstant=&#8221;2012-04-18T10:49:16Z&#8221; ProtocolBinding=&#8221;urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Artifact&#8221; Version=&#8221;2.0&#8243;&gt;<br \/>\n&lt;saml:Issuer xmlns:saml=&#8221;urn:oasis:names:tc:SAML:2.0:assertion&#8221;<br \/>\nFormat=&#8221;urn:oasis:names:tc:SAML:2.0:nameid-format:entity&#8221;&gt; http:\/\/spHost.spDomain:9888\/fed\/sp&lt;\/saml:Issuer&gt;<br \/>\n&lt;samlp:NameIDPolicy AllowCreate=&#8221;true&#8221; Format=&#8221;<strong>urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress<\/strong>&#8220;\/&gt;<br \/>\n&lt;\/samlp:AuthnRequest&gt;<br \/>\n_______<\/p>\n<p>If you notice in\u00a0SAML token requested by OIF SP, it is requesting <strong>nameid-format<\/strong> in<strong> NameIDPolicy<\/strong> as <strong>emailAddress<\/strong><\/p>\n<p>&nbsp;<\/p>\n<p><strong>Q:<\/strong> How to change OIF_SP to request\u00a0\u00a0for attribute <strong>employeeNumber<\/strong> at OIF_IdP and map\u00a0this to attribute<strong> uid<\/strong> at OIF_SP\u00a0?<\/p>\n<p><strong>A:<\/strong> To achieve this, configure <strong>OIF at SP side<\/strong>\u00a0(Service Provider) <strong>Default Authentication Request NameID format<\/strong> to <strong>Custom<\/strong> (or <strong>unspecified<\/strong>)\u00a0(<span style=\"color: #ff0000;\">first screen shot<\/span>)\u00a0and\u00a0update value of <strong>Custom<\/strong> (or<strong> unspecified<\/strong>) to <strong>employeeNumber<\/strong>.\u00a0 You also need to select option <strong>Map User via Attribute Query<\/strong> (with value like (&amp;(<strong>uid<\/strong>=%<strong>enumuid%<\/strong>))) (<span style=\"color: #ff0000;\">first screenshot<\/span>)<\/p>\n<p><strong>Note<\/strong>: You also need to configure <strong>OIF at\u00a0IdP side<\/strong> (Identity Provider) <strong>custom<\/strong> (or <strong>unspecified<\/strong>) to<strong>\u00a0enabled<\/strong> with value as <strong>employeeNumber<\/strong> (<span style=\"color: #ff0000;\">second screenshot<\/span>) and configure <strong>Attribute Mapping and Filters<\/strong> (for SP at IdP side) to <strong>return employeeNumber <\/strong>as<strong> enumid<\/strong> (third and fourth screenshot)<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p><a href=\"https:\/\/onlineappsdba.com\/wp-content\/uploads\/2012\/04\/SP_NAMEID_1.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-3119\" title=\"SP_NAMEID_1\" src=\"https:\/\/onlineappsdba.com\/wp-content\/uploads\/2012\/04\/SP_NAMEID_1.jpg\" alt=\"\" width=\"448\" height=\"234\" srcset=\"https:\/\/onlineappsdba.com\/wp-content\/uploads\/2012\/04\/SP_NAMEID_1.jpg 448w, https:\/\/onlineappsdba.com\/wp-content\/uploads\/2012\/04\/SP_NAMEID_1-300x156.jpg 300w\" sizes=\"auto, (max-width: 448px) 100vw, 448px\" \/><\/a><\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>Configuration at <strong>IdP\u00a0<\/strong>side for <strong>Identity\u00a0Provider<\/strong>\u00a0<\/p>\n<p>&nbsp;<\/p>\n<p><a href=\"https:\/\/onlineappsdba.com\/wp-content\/uploads\/2012\/04\/IDP_NAMEID_2.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-3121\" title=\"IDP_NAMEID_2\" src=\"https:\/\/onlineappsdba.com\/wp-content\/uploads\/2012\/04\/IDP_NAMEID_2.jpg\" alt=\"\" width=\"448\" height=\"206\" srcset=\"https:\/\/onlineappsdba.com\/wp-content\/uploads\/2012\/04\/IDP_NAMEID_2.jpg 448w, https:\/\/onlineappsdba.com\/wp-content\/uploads\/2012\/04\/IDP_NAMEID_2-300x137.jpg 300w\" sizes=\"auto, (max-width: 448px) 100vw, 448px\" \/><\/a><\/p>\n<p>&nbsp;<\/p>\n<p>To configure SP metadata at IDP side from OIF_IdP\u00a0: <strong>Administration<\/strong> -&gt; <strong>Federations<\/strong> -&gt; select SP metadata (registered earlier)\u00a0and click <strong>edit<\/strong> -&gt; select tab <strong>Oracle Identity Federation Settings<\/strong> and click <strong>Edit<\/strong> next to<strong> Attribute Mapping and Filters<\/strong><\/p>\n<p>&nbsp;<\/p>\n<p>\u00a0<a href=\"https:\/\/onlineappsdba.com\/wp-content\/uploads\/2012\/04\/idp_sp_mapping.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-3130\" title=\"idp_sp_mapping\" src=\"https:\/\/onlineappsdba.com\/wp-content\/uploads\/2012\/04\/idp_sp_mapping.jpg\" alt=\"\" width=\"385\" height=\"533\" srcset=\"https:\/\/onlineappsdba.com\/wp-content\/uploads\/2012\/04\/idp_sp_mapping.jpg 385w, https:\/\/onlineappsdba.com\/wp-content\/uploads\/2012\/04\/idp_sp_mapping-216x300.jpg 216w\" sizes=\"auto, (max-width: 385px) 100vw, 385px\" \/><\/a><br \/>\n.<\/p>\n<p>\u00a0<a href=\"https:\/\/onlineappsdba.com\/wp-content\/uploads\/2012\/04\/idp_sp_mapping_2.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-3131\" title=\"idp_sp_mapping_2\" src=\"https:\/\/onlineappsdba.com\/wp-content\/uploads\/2012\/04\/idp_sp_mapping_2.jpg\" alt=\"\" width=\"448\" height=\"216\" srcset=\"https:\/\/onlineappsdba.com\/wp-content\/uploads\/2012\/04\/idp_sp_mapping_2.jpg 448w, https:\/\/onlineappsdba.com\/wp-content\/uploads\/2012\/04\/idp_sp_mapping_2-300x144.jpg 300w\" sizes=\"auto, (max-width: 448px) 100vw, 448px\" \/><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Oracle Identity Federation (OIF) is federation solution from Oracle that provides\u00a0cross domain\u00a0Single Sign-On (SSO). OIF can act as Service Provider [&hellip;]<\/p>\n","protected":false},"author":115,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[42],"tags":[],"class_list":["post-3118","post","type-post","status-publish","format-standard","hentry","category-troubleshooting"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.8 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>OIF: SP initiated call after response from IdP redirecting to SP \/fed\/sp\/art20?SAMLart=** with 401 Unauthorized -<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/onlineappsdba.com\/index.php\/2012\/04\/18\/oif-sp-initiated-call-after-response-from-idp-redirecting-to-sp-fedspart20samlart-with-401-unauthorized\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"OIF: SP initiated call after response from IdP redirecting to SP \/fed\/sp\/art20?SAMLart=** with 401 Unauthorized -\" \/>\n<meta property=\"og:description\" content=\"Oracle Identity Federation (OIF) is federation solution from Oracle that provides\u00a0cross domain\u00a0Single Sign-On (SSO). OIF can act as Service Provider [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/onlineappsdba.com\/index.php\/2012\/04\/18\/oif-sp-initiated-call-after-response-from-idp-redirecting-to-sp-fedspart20samlart-with-401-unauthorized\/\" \/>\n<meta property=\"article:published_time\" content=\"2012-04-18T17:38:37+00:00\" \/>\n<meta property=\"og:image\" content=\"http:\/\/onlineappsdba.com\/wp-content\/uploads\/2012\/04\/oif_trace.jpg\" \/>\n<meta name=\"author\" content=\"Masroof Ahmad\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Masroof Ahmad\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/onlineappsdba.com\/index.php\/2012\/04\/18\/oif-sp-initiated-call-after-response-from-idp-redirecting-to-sp-fedspart20samlart-with-401-unauthorized\/\",\"url\":\"https:\/\/onlineappsdba.com\/index.php\/2012\/04\/18\/oif-sp-initiated-call-after-response-from-idp-redirecting-to-sp-fedspart20samlart-with-401-unauthorized\/\",\"name\":\"OIF: SP initiated call after response from IdP redirecting to SP \/fed\/sp\/art20?SAMLart=** with 401 Unauthorized -\",\"isPartOf\":{\"@id\":\"https:\/\/onlineappsdba.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/onlineappsdba.com\/index.php\/2012\/04\/18\/oif-sp-initiated-call-after-response-from-idp-redirecting-to-sp-fedspart20samlart-with-401-unauthorized\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/onlineappsdba.com\/index.php\/2012\/04\/18\/oif-sp-initiated-call-after-response-from-idp-redirecting-to-sp-fedspart20samlart-with-401-unauthorized\/#primaryimage\"},\"thumbnailUrl\":\"http:\/\/onlineappsdba.com\/wp-content\/uploads\/2012\/04\/oif_trace.jpg\",\"datePublished\":\"2012-04-18T17:38:37+00:00\",\"author\":{\"@id\":\"https:\/\/onlineappsdba.com\/#\/schema\/person\/909a876ed58d400faf82caf81d61bfdb\"},\"breadcrumb\":{\"@id\":\"https:\/\/onlineappsdba.com\/index.php\/2012\/04\/18\/oif-sp-initiated-call-after-response-from-idp-redirecting-to-sp-fedspart20samlart-with-401-unauthorized\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/onlineappsdba.com\/index.php\/2012\/04\/18\/oif-sp-initiated-call-after-response-from-idp-redirecting-to-sp-fedspart20samlart-with-401-unauthorized\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/onlineappsdba.com\/index.php\/2012\/04\/18\/oif-sp-initiated-call-after-response-from-idp-redirecting-to-sp-fedspart20samlart-with-401-unauthorized\/#primaryimage\",\"url\":\"http:\/\/onlineappsdba.com\/wp-content\/uploads\/2012\/04\/oif_trace.jpg\",\"contentUrl\":\"http:\/\/onlineappsdba.com\/wp-content\/uploads\/2012\/04\/oif_trace.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/onlineappsdba.com\/index.php\/2012\/04\/18\/oif-sp-initiated-call-after-response-from-idp-redirecting-to-sp-fedspart20samlart-with-401-unauthorized\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/onlineappsdba.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"OIF: SP initiated call after response from IdP redirecting to SP \/fed\/sp\/art20?SAMLart=** with 401 Unauthorized\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/onlineappsdba.com\/#website\",\"url\":\"https:\/\/onlineappsdba.com\/\",\"name\":\"\",\"description\":\"Oracle Implementation &amp; Training Experts\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/onlineappsdba.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/onlineappsdba.com\/#\/schema\/person\/909a876ed58d400faf82caf81d61bfdb\",\"name\":\"Masroof Ahmad\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/onlineappsdba.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/10f9db7bdbbd7f9ccfbe9b2d208e5978fc28315e9c704383e639a926ea0fce5f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/10f9db7bdbbd7f9ccfbe9b2d208e5978fc28315e9c704383e639a926ea0fce5f?s=96&d=mm&r=g\",\"caption\":\"Masroof Ahmad\"},\"url\":\"https:\/\/onlineappsdba.com\/index.php\/author\/masroof\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"OIF: SP initiated call after response from IdP redirecting to SP \/fed\/sp\/art20?SAMLart=** with 401 Unauthorized -","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/onlineappsdba.com\/index.php\/2012\/04\/18\/oif-sp-initiated-call-after-response-from-idp-redirecting-to-sp-fedspart20samlart-with-401-unauthorized\/","og_locale":"en_US","og_type":"article","og_title":"OIF: SP initiated call after response from IdP redirecting to SP \/fed\/sp\/art20?SAMLart=** with 401 Unauthorized -","og_description":"Oracle Identity Federation (OIF) is federation solution from Oracle that provides\u00a0cross domain\u00a0Single Sign-On (SSO). OIF can act as Service Provider [&hellip;]","og_url":"https:\/\/onlineappsdba.com\/index.php\/2012\/04\/18\/oif-sp-initiated-call-after-response-from-idp-redirecting-to-sp-fedspart20samlart-with-401-unauthorized\/","article_published_time":"2012-04-18T17:38:37+00:00","og_image":[{"url":"http:\/\/onlineappsdba.com\/wp-content\/uploads\/2012\/04\/oif_trace.jpg","type":"","width":"","height":""}],"author":"Masroof Ahmad","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Masroof Ahmad","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/onlineappsdba.com\/index.php\/2012\/04\/18\/oif-sp-initiated-call-after-response-from-idp-redirecting-to-sp-fedspart20samlart-with-401-unauthorized\/","url":"https:\/\/onlineappsdba.com\/index.php\/2012\/04\/18\/oif-sp-initiated-call-after-response-from-idp-redirecting-to-sp-fedspart20samlart-with-401-unauthorized\/","name":"OIF: SP initiated call after response from IdP redirecting to SP \/fed\/sp\/art20?SAMLart=** with 401 Unauthorized -","isPartOf":{"@id":"https:\/\/onlineappsdba.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/onlineappsdba.com\/index.php\/2012\/04\/18\/oif-sp-initiated-call-after-response-from-idp-redirecting-to-sp-fedspart20samlart-with-401-unauthorized\/#primaryimage"},"image":{"@id":"https:\/\/onlineappsdba.com\/index.php\/2012\/04\/18\/oif-sp-initiated-call-after-response-from-idp-redirecting-to-sp-fedspart20samlart-with-401-unauthorized\/#primaryimage"},"thumbnailUrl":"http:\/\/onlineappsdba.com\/wp-content\/uploads\/2012\/04\/oif_trace.jpg","datePublished":"2012-04-18T17:38:37+00:00","author":{"@id":"https:\/\/onlineappsdba.com\/#\/schema\/person\/909a876ed58d400faf82caf81d61bfdb"},"breadcrumb":{"@id":"https:\/\/onlineappsdba.com\/index.php\/2012\/04\/18\/oif-sp-initiated-call-after-response-from-idp-redirecting-to-sp-fedspart20samlart-with-401-unauthorized\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/onlineappsdba.com\/index.php\/2012\/04\/18\/oif-sp-initiated-call-after-response-from-idp-redirecting-to-sp-fedspart20samlart-with-401-unauthorized\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/onlineappsdba.com\/index.php\/2012\/04\/18\/oif-sp-initiated-call-after-response-from-idp-redirecting-to-sp-fedspart20samlart-with-401-unauthorized\/#primaryimage","url":"http:\/\/onlineappsdba.com\/wp-content\/uploads\/2012\/04\/oif_trace.jpg","contentUrl":"http:\/\/onlineappsdba.com\/wp-content\/uploads\/2012\/04\/oif_trace.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/onlineappsdba.com\/index.php\/2012\/04\/18\/oif-sp-initiated-call-after-response-from-idp-redirecting-to-sp-fedspart20samlart-with-401-unauthorized\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/onlineappsdba.com\/"},{"@type":"ListItem","position":2,"name":"OIF: SP initiated call after response from IdP redirecting to SP \/fed\/sp\/art20?SAMLart=** with 401 Unauthorized"}]},{"@type":"WebSite","@id":"https:\/\/onlineappsdba.com\/#website","url":"https:\/\/onlineappsdba.com\/","name":"","description":"Oracle Implementation &amp; Training Experts","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/onlineappsdba.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/onlineappsdba.com\/#\/schema\/person\/909a876ed58d400faf82caf81d61bfdb","name":"Masroof Ahmad","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/onlineappsdba.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/10f9db7bdbbd7f9ccfbe9b2d208e5978fc28315e9c704383e639a926ea0fce5f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/10f9db7bdbbd7f9ccfbe9b2d208e5978fc28315e9c704383e639a926ea0fce5f?s=96&d=mm&r=g","caption":"Masroof Ahmad"},"url":"https:\/\/onlineappsdba.com\/index.php\/author\/masroof\/"}]}},"_links":{"self":[{"href":"https:\/\/onlineappsdba.com\/index.php\/wp-json\/wp\/v2\/posts\/3118","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/onlineappsdba.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/onlineappsdba.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/onlineappsdba.com\/index.php\/wp-json\/wp\/v2\/users\/115"}],"replies":[{"embeddable":true,"href":"https:\/\/onlineappsdba.com\/index.php\/wp-json\/wp\/v2\/comments?post=3118"}],"version-history":[{"count":0,"href":"https:\/\/onlineappsdba.com\/index.php\/wp-json\/wp\/v2\/posts\/3118\/revisions"}],"wp:attachment":[{"href":"https:\/\/onlineappsdba.com\/index.php\/wp-json\/wp\/v2\/media?parent=3118"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/onlineappsdba.com\/index.php\/wp-json\/wp\/v2\/categories?post=3118"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/onlineappsdba.com\/index.php\/wp-json\/wp\/v2\/tags?post=3118"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}