SSO

Identity

19 sections
542 source tickets

Last synthesized: 2026-02-13 00:00 | Model: gpt-5-mini
Table of Contents

1. Identity changes and stale provisioning causing SSO mapping failures

125 tickets

2. Credential/Okta account recoveries and invite-based password resets

118 tickets

3. Expired or single-use SSO links and incorrect entry points causing blank pages or denied access

77 tickets

4. SAML / OIDC configuration mismatches (metadata, claims, redirect URI)

41 tickets

5. Duplicate/pre-existing accounts and account lockouts preventing SSO

50 tickets

6. BitLocker recovery prompt after Windows Hello / PIN sign-in failures

1 tickets

7. Offline vs online Windows sign-in mismatch requiring network/VPN for corporate credentials

4 tickets

8. Okta 'New sign-on detected' alerts from unrecognized device/browser causing security-notification confusion

2 tickets

9. Institutional Zoom access via LMS links rather than individual SSO accounts

1 tickets

10. Service-side outage causing SSO/MFA authentication failures despite local client changes

11 tickets

11. Applications enforcing SSO-only access for specific/shared accounts, disabling native credential login

38 tickets

12. Network-based Google sign-in restrictions blocking remote/home access

1 tickets

13. Okta SAML SSO and SCIM provisioning for O'Reilly Learning Platform

14 tickets

14. App access failures resolved by re-establishing Okta SSO session or backend recovery

33 tickets

15. SSO enablement and enforcement for a ChatGPT Team tenant and group-based rollout

3 tickets

16. Application-specific SSO access provisioning (IU Merch-Shop)

18 tickets

17. Direct Twilio Flex bookmark or subdomain blocked Salesforce-based login

3 tickets

18. Self Service Password Sync backend error causing SSO session invalidation and mass app logouts

1 tickets

19. Site-specific transient corporate sign-in failure resolved by admin intervention

1 tickets

1. Identity changes and stale provisioning causing SSO mapping failures
95% confidence
Problem Pattern

SSO and downstream application access failed when identity attributes, provisioning state, group assignments, or vendor account classification were out of sync between authoritative HR systems, intermediary feeds, IdPs (Okta/Azure/Auth0/Shibboleth), or vendor account systems. Symptoms included SAML non-success or credential-invalid responses; IdP errors such as “Sign‑in not possible” or “User account <id> is either invalid or not activated”; vendor messages like “Your user was not found” or “No access” immediately after sign‑in despite reported group membership; persistent login failures when IdP-managed credentials diverged from vendor-stored passwords; tenant/domain misrouting; and app-specific errors such as “No FederationID for SSO” or MEMBER_LOGIN_SSO_REQUIRED. Common triggers were name/email/username changes, failed imports/provisioning (HRFeed/CSV/SCIM), expired/misconfigured provisioning tokens, vendor API errors, cached session/state mismatches, missing app/group assignments, account-classification/realm mismatches, and IdP migrations.

Solution

Incidents were resolved by reconciling identity, provisioning, group/authorization, and vendor-side account state so SSO authentication and downstream authorization completed end-to-end. Remediations that restored access included reclassifying or re-linking vendor accounts that had been created with the wrong account type or realm, enabling SSO access where vendor accounts had been treated as external, and assigning users to the correct vendor realm/server URL or application group so the vendor provisioned the expected identity. Incomplete vendor-side setup states (for example pending invites or inactive accounts) were accepted or reactivated to stop login loops.

Mapping and attribute fixes resolved many failures: username/email mapping mismatches were corrected, usernames were changed to the canonical email when downstream systems expected that identifier, IdP SSO links (Okta/Auth0) were re-linked to the proper vendor account, and attribute-format rules that had excluded users from provisioning were repaired. Where IdP authentication succeeded but the vendor rejected access, restoring or recreating vendor-side accounts, aligning in-app permissions/licenses, and engaging vendor/backend teams to repair account records were required; in one case Marketing Cloud access returned only after the vendor configured the required FederationID/federation linkage because group assignment alone did not supply a FederationID.

Provisioning-specific remediations included renewing expired SCIM/provisioning tokens and applying the new token, repairing intermediary HRFeed/CSV imports so Workday-derived records created vendor accounts with the correct auth method, and removing or consolidating legacy/conflicting vendor-linked profiles. Vendor API errors were fixed so IdP systems could perform profile updates after attribute changes. A notable Workday-specific pattern was documented where Okta-managed credentials overwrote Workday-stored passwords (Workday Cloud Connect noted that resetting passwords in Workday was ineffective); resolution required reconciling the authoritative credential source and re-provisioning/re-linking the Workday account so Workday and downstream integrations (for example PowerBI data refreshes) used the correct identity. Attempts such as removing and re-adding Okta application groups were observed in casework but were not consistently effective without correcting the underlying provisioning/mapping state.

SAML metadata and tenant-routing issues were corrected after IdP migrations; tenant routing was restored in several cases by recognizing Okta hub routing by full email domain. Apple federation incidents were resolved by converting or re-linking affected Apple IDs into the organization’s Apple Business configuration, restoring device-based authenticators and macOS calendar sync after System Settings sign‑in loops and missing calendar entries. For LinkedIn Learning, failures to link student accounts were fixed by replacing outdated myCampus (Shibboleth) SSO links with current Auth0 endpoints and re-linking Auth0-backed student accounts so the vendor received the institutional identifier, addressing MEMBER_LOGIN_SSO_REQUIRED errors caused by private/personal emails being passed instead of an SSO identity.

Common client-side mitigations observed in tickets included clearing browser cache/cookies and forcing full sign-outs or using the canonical IdP URL (for example https://okta.iu.org/) to refresh cached session/group state for portals that showed “No access.”

Source Tickets (125)
2. Credential/Okta account recoveries and invite-based password resets
95% confidence
Problem Pattern

Users were unable to authenticate via Okta SSO or to open applications launched from Okta, seeing errors such as “Sign‑in not possible,” “Access denied,” “We couldn't authenticate you,” OneDrive error 2147942408, or silent failures opening linked SaaS resources (SharePoint, JFrog, Salesforce, Atlassian, Adobe, Microsoft 365). Failures commonly involved expired or incorrect saved credentials, locked/disabled accounts, missing or misdelivered password‑reset or invite emails (including to private/Gmail addresses), passkey/authenticator or device‑enrollment problems, and missing app licenses or incorrect group/app assignments. Mail‑client anomalies (outbound messages stuck in Drafts/Outbox, delayed deliveries, or profile corruption) sometimes coincided with SSO failures, and mail client authentication to Exchange could surface Okta password‑change prompts. Some users reported Windows credential‑expiry notifications that were confused with Okta password prompts; affected systems included Okta SSO and Okta‑authenticated SaaS (Microsoft 365/Teams/Outlook, OneDrive, SharePoint, Atlassian, Adobe, JFrog, Salesforce).

Solution

Access was restored by account‑specific Okta recoveries and administrative interventions. Administrators unlocked or reenabled locked/disabled accounts, performed admin‑initiated password resets, and retransmitted password‑reset links or invites to primary and alternate/private email addresses or by phone when self‑service emails failed. Support provided alternate Okta entry points (for example a UserHome session‑hint URL) when app‑specific SSO links failed and confirmed the canonical Okta login URL when users encountered multiple sign‑in pages. Application fixes included completing onboarding flows, resending invites (a resent 1Password invite enabled Secret Key creation in one case), and recreating or recovering application credentials; support also verified group/app assignments and application licenses (an absent Atlassian license resolved at least one failure). Investigations checked for saved/old passwords or password‑manager autofill injecting incorrect credentials; browser cache/history clearances sometimes produced temporary passkey sign‑in but permanent restoration required account recovery or passkey reconfiguration. Passkey failures were resolved by removing or reconfiguring passkey enrollments or by switching users to alternate Okta authenticators (for example Okta Verify). Device and app registration problems were resolved by completing device enrollment or reinstalling/re‑registering Company Portal so managed apps could be downloaded and authenticate via restored Okta sessions; when appropriate users were given temporary access via native/desktop clients or by launching target applications from their Okta dashboard tile or the dashboard’s alternative‑authentication/test option. When mail clients were affected, creating a new Outlook profile restored normal mail behavior and cleared queued/stuck outbound messages and bulk‑mail anomalies that coincided with SSO issues. Support documented vendor‑specific errors observed during SSO failures (for example OneDrive error 2147942408) and clarified authentication expectations where users were confused: support confirmed cases where Windows credential‑expiry notifications were unrelated to Okta SSO and explained why Exchange/mail‑client authentication flows could trigger Okta password‑change prompts or self‑service reset emails.

Source Tickets (118)
3. Expired or single-use SSO links and incorrect entry points causing blank pages or denied access
95% confidence
Problem Pattern

Users opened SSO links and encountered blank or endlessly loading IdP pages, OAuth/SAML redirect failures, 'outdated request' or 'blocked request' errors, login loops, immediate sign‑outs, 403 Forbidden responses, or browser 'server certificate not trusted'/trust warnings. Failures commonly occurred when using bookmarked or expired single‑use URLs, Okta app tiles pointing at generated/obsolete authRequest endpoints, incorrect custom domains, missing IdP app assignment or upstream sessions, stale browser session state (automatic upstream account selection), embedded/iframe authentication contexts, or device‑specific certificate/trust/client protection issues. Affected clients included web browsers, desktop/native apps, and embedded apps (including Microsoft Teams).

Solution

Expired, incorrect, or single‑use SSO entry points and stale client session state were identified and remediated across multiple incidents. Outdated endpoints (example: legacy libfb2c.b2clogin.com and obsolete Shibboleth/SAML URLs) and Okta app tiles that pointed at generated SAML authRequest URLs were replaced or corrected to current okta/login or vendor IdP SAML endpoints. Launching products from the Okta dashboard or using direct Okta bookmarks re‑established SSO linkages in many cases (examples: Mentimeter, CARE, LinkedIn Learning). Clearing browser cookies/cache, using private/incognito windows, or switching browsers restored access in numerous incidents (example: Cascade); intermittent indefinite loads sometimes resolved after retrying later (example: Conduktor).

Add‑ins and integrated clients that repeatedly prompted or denied access (example: Outlook–Salesforce) were resolved after the add‑in was reinstalled/re‑linked and the user performed an Okta/vendor authentication or used vendor temporary codes when local passwords had been disabled. Where an upstream session was required, creating or verifying an active upstream session re‑established access (examples: Twilio Flex required an active Salesforce session; an AI Chat Microsoft SSO sign‑in returned after Playground verification). An AWS SSO loop completed after the user registered an MFA method in their Okta profile.

Integrations that were intolerant of frequent reauthentication were mitigated by placing affected users into vendor no‑SSO groups or migrating users into vendor SSO teams. Atlassian/Confluence issues were frequently cleared by removing Atlassian cookies and launching products from the Okta portal; one Jira dashboard failure was traced to a missing Okta app assignment and was fixed after correcting assignment and link. A licensing exception for Viva Goals required a vendor refund and tenant CSV export. A Mac Self Service+ modal authentication popup caused by a platform outage was cleared by a backend fix; a temporary local workaround moved the modal to the screen edge to reduce obstruction.

Embedded SSO flows that failed inside iframes were resolved by adding the CMS and vendor origins to Okta trusted origins and allowing iframe embedding (example: Storyblok–Cloudinary), which removed authentication loops and cleared 'blocked request' warnings. LinkedIn Learning incidents varied: some were cleared by tile account confirmation or using the Okta bookmark, while LMS365‑embedded AICC content launched in Microsoft Teams produced a pop‑up that never completed and only played correctly when opened in a full web browser; no complete in‑Teams remediation was recorded. A Trello desktop app produced a 403 on an Okta SAML URL while the website remained accessible; desktop access later recovered.

Some device‑specific incidents manifested as browser/server certificate trust errors or 403s on private tablets and other client devices when accessing Okta or Office resources (example: a Samsung tablet reporting 'server certificate is not trusted' that prevented the Office365 tile from opening). Support attempted alternate browsers and launching via Okta bookmarks; no definitive fix was recorded for the certificate/trust cases and they appeared related to device certificate stores, client‑side protection software, or browser trust settings.

Where user agents automatically reused an existing upstream account and prevented entering alternate credentials (example: secondary Microsoft/service account sign‑in blocked by automatic personal account selection), resolving stale session state or using a separate/private browser session restored the ability to present alternate credentials.

4. SAML / OIDC configuration mismatches (metadata, claims, redirect URI)
95% confidence
Problem Pattern

SAML, OIDC, or OAuth sign‑in and token exchanges failed when identity provider (IdP) and service provider (SP) configuration, metadata, runtime secrets, tenant targeting, or claim mappings did not match. Common symptoms included SAML responses returning non‑success status codes (for example SSO_LOGIN_SAML_RESPONSE_STATUS_CODE_NOT_SUCCESS), OIDC 400 errors claiming the redirect_uri must exactly match a registered Login redirect URI, OAuth token exchanges failing with HTTP 401 when client secrets were missing or not injected, and provider‑specific errors such as Salesforce Marketing Cloud reporting the Federation ID could not be found. Failures also manifested as missing name/email/role/group claims, users authenticating to the wrong IdP tenant, and embedded/vendor widgets breaking after SSO activation.

Solution

Issues were resolved by restoring exact alignment between IdP and SP configuration, fixing runtime integration points, and addressing vendor integration specifics so SAML/OIDC/OAuth exchanges, role mappings, provisioning, and embedded widgets completed successfully. Key resolutions and observations included:

• Replaced incorrect federation/metadata URLs with the provider’s correct metadata endpoint and created SAML connections that used the service’s required SP Entity ID/Issuer and ACS/Callback URL, resolving IdP‑initiated and SP‑initiated mismatches.
• Corrected OIDC client settings so the registered Login redirect URI matched exactly (scheme, hostname, path and case), which cleared OIDC 400 errors stating the redirect_uri must be a Login redirect URI in the client app settings.
• Restored OAuth token exchanges by replacing expired or rotated OAuth/OIDC client secrets and ensuring client secrets were available to the application runtime (example: an OAUTH_CLIENT_SECRET stored in a Kubernetes Secret had not been injected into backend pods; making it available and redeploying restored token handling and removed HTTP 401 Unauthorized errors).
• Corrected SAML assertions and attribute values so name/role/group claims contained the exact strings the service expected; fixing a group assertion string restored correct role assignment in multiple incidents.
• Investigated SAML responses with non‑success status codes and traced them to IdP‑side configuration faults, incorrect SP metadata, or vendor‑side blocking; IdP configuration changes or vendor fixes cleared Responder/Unauthorized responses in specific integrations (example: LinkedIn Learning case handled by another team).
• Resolved provisioning and username‑mapping gaps by connecting the IdP application to the appropriate environment and correcting provisioning/username mappings so stage/UAT users existed and mapped correctly; when SSO and password reset were unavailable, some mitigations used an application’s alternative authentication option.
• Addressed SSO certificate rotation by verifying SP metadata that contained both expiring and newly rotated certificates, confirming IdP metadata consumption behavior, and ensuring the IdP or consumer UI referenced metadata containing the active certificate; those actions cleared expiring‑certificate warnings.
• Performed domain verification where required by adding DNS TXT tokens and verifying org domains before enabling SAML SSO when vendor platforms required verified domains for SSO to function.
• Collected SSO orchestration inputs and scheduled cutovers when integrations required supplying SSO endpoint, Entity ID/Issuer, and public certificate and when enabling SSO disabled normal username/password login; common requested values included OKTA_BASE_URL, OKTA_CLIENT_ID, OKTA_CLIENT_SECRET and all login redirect URIs, plus whether an IdP‑initiated login URI was required.
• Documented licensing and provisioning limits encountered (for example SCIM provisioning unavailable on lower‑tier plans requiring Enterprise licenses) and adjusted expectations during remediation.
• Corrected tenant/targeting and IdP‑app integration issues where users signed into the wrong Okta org or the IdP application was pointed at the wrong tenant; determining the correct sign‑in target and adjusting the EntraID/Azure AD application integration restored access and dashboard visibility.
• Addressed vendor widget integration issues discovered during SSO activation by allowing the vendor console domain to be reachable from the site. Example: Cloudinary Media Library/Widget integrations stopped working after SAML SSO was enabled until the vendor domain (console.cloudinary.com) was whitelisted for the Media Library Widget; whitelisting restored access to uploaded media from the careers site.
• For Salesforce Marketing Cloud, troubleshooting included verifying Okta application configuration and confirming the user’s Federation ID and account status in Salesforce core. In cases where those checks were correct but SSO still failed with a Federation ID not found error, the issue required escalation to the Marketing Cloud/SalesTech team because Marketing Cloud can use a separate SSO instance/port or account mapping distinct from core Salesforce.
• For specific SaaS examples (Anthropic Claude), created and enabled IdP SSO applications, configured the org to enable SSO, and established IdP group‑to‑role mappings using the provider’s group names; JIT provisioning was kept disabled and admins added users to mapped groups for SSO enforcement.

These actions collectively restored SAML/OIDC/OAuth sign‑in, token exchanges, role/claim mappings, certificate handling, provisioning, tenant targeting, and vendor widget integrations across the impacted systems.

5. Duplicate/pre-existing accounts and account lockouts preventing SSO
90% confidence
Problem Pattern

Users were unable to authenticate to federated applications or access SSO-protected services because identity mapping or account state at the IdP, federated broker, or service provider was incorrect or blocked. Symptoms included explicit SAML failures (for example SSO_LOGIN_SAML_RESPONSE_STATUS_CODE_NOT_SUCCESS), account-selection loops when multiple IdPs were present, apps missing from the dashboard despite successful IdP authentication, recurring or unexpected password prompts, “user already exists” or failed-login messages, verification/activation links routing to the wrong tenant, outbound-email verification failures, and service-side lockout messages from federated brokers (for example OpenAthens’ “tried to enter it too many times”) where IdP logs showed no anomaly and password-reset emails were not delivered.

Solution

Issues were resolved by aligning account state and identity mappings across the IdP, federated brokers, and service providers, and by removing, merging, or reconnecting duplicate, personal, or unlicensed accounts so the institutional federated identity became the single credential. Administrators reactivated or unblocked accounts and re-granted access when service-side locks prevented SSO; in one case reactivation and re-provisioning restored Salesforce SSO access and the user logged in within 24 hours. When third-party brokers (for example OpenAthens) presented lockout messages while IdP logs appeared normal, support focused on the service provider/broker side: the service-side lock was cleared and password-reset/verification emails from the SP were corrected or re-sent so users could complete resets. Where the IdP showed successful authentication but the target application remained inaccessible, locks or blocks inside the target application were cleared, affected users were removed and re-added to IdP-managed groups to reset linkages, and required licenses/approval workflows were assigned and allowed to complete before retrying SSO. Duplicate accounts and username/UPN variants were deleted, merged, or corrected; integrations and device agents that retained stale local credentials (for example Salesforce Outlook add-in or Jamf Connect) were re-authenticated to stop periodic password-mismatch prompts; and outbound-email/verification problems (for example ‘email not verified’ bouncebacks or messages appearing from an unintended campus alias) were resolved by correcting primary/sender email mappings in the integrated platform and re-running the platform’s verification. For service accounts created as pure Microsoft Accounts that could not use IdP federation, SSO was disabled on that account and the service provider’s local activation path was used so a local password could be set. When applications presented an account-selection screen that routed to a personal account (for example Adobe or LinkedIn flows), users were returned to the Work/School/enterprise account option or the external personal link was removed so the institutional IdP sign-in flowed correctly.

6. BitLocker recovery prompt after Windows Hello / PIN sign-in failures
85% confidence
Problem Pattern

User was locked out of a Windows workstation where Windows Hello facial recognition, PIN entry, and password entry did not authenticate. A BitLocker-style blue Recovery Password screen appeared with a Recovery Key ID, preventing normal sign-in. After the recovery screen was used, the Windows sign-in still prompted for a PIN that was not accepted.

Solution

The device was unlocked by entering the BitLocker recovery password supplied by the technician at the blue Recovery Password screen. After the BitLocker unlock, the user used Windows' "Sign-in options" to authenticate with their Okta password instead of the PIN/Windows Hello, which restored access to the workstation.

Source Tickets (1)
7. Offline vs online Windows sign-in mismatch requiring network/VPN for corporate credentials
90% confidence
Problem Pattern

Windows sign-in failed with “username or password incorrect” or returned repeatedly to the same setup/login screen even though the same credentials authenticated successfully to Okta/Microsoft web services. Failures occurred when the device was not authenticating against the corporate identity backend (for example before network/VPN connection, device enrollment, or Company Portal registration) and could occur during initial setup or normal sign-in. Symptoms included sign-in loops, transient success followed by failure, inconsistent behavior between internal vs external email aliases, inability to reach services authenticated via Okta/myCampus (Salesforce, CARE, EPOS), and in some cases BitLocker recovery prompts after multiple failed attempts. Users sometimes reported that administrative password resets did not restore local sign-in while the device remained offline from the identity provider.

Solution

Support identified the root cause as the device failing to authenticate against the corporate identity backend (Okta/Microsoft), causing Windows to fall back to cached or local credential checks that did not match the online account mapping. Resolutions in confirmed cases required the device to authenticate to the identity provider: users connected the laptop to the network or established VPN and completed Okta/Microsoft authentication using their institutional email and existing password, after which Windows sign-in or enrollment succeeded. Where the issue appeared during initial setup, replacement devices that had already completed device enrollment/Company Portal registration signed in successfully while the original devices required network-based authentication. Support noted that administrative password resets sometimes did not restore sign-in until the device could contact the identity backend. As a temporary mitigation in at least one incident, support instructed the user to sign in via the Windows “Other user” option to gain access. Repeated incorrect sign-in attempts occasionally triggered BitLocker recovery prompts; those cases were resolved by using the device’s BitLocker recovery key to regain access. Affected systems observed across incidents included Dell notebooks, BitLocker, Okta/Microsoft SSO, Company Portal/device enrollment, and services authenticated via myCampus/Okta such as CARE, EPOS, and Salesforce.

8. Okta 'New sign-on detected' alerts from unrecognized device/browser causing security-notification confusion
90% confidence
Problem Pattern

Users received Okta "New sign-on detected" security emails containing device/browser, timestamp, IP and geolocation details after sign-ins from a new or unrecognized device or browser, or after clearing cookies/using private/incognito mode. Alerts often caused user concern about account compromise and sometimes coincided with inability to access SSO-protected applications (for example, Salesforce) or login failures across browsers. Affected systems included Okta SSO, browser-based authentication flows, corporate email notifications, and downstream apps.

Solution

Support confirmed these alerts were routine Okta behavior for sign-ins from a new or unrecognized device or browser, or following cookie deletion/Incognito use. Alert messages included device and browser identifiers, OS, timestamp, IP address and an IP-based geolocation (examples seen: CHROMIUM_EDGE on Windows 10 from Leverkusen; CHROME on Windows 11 from Berlin). In reviewed incidents users either verified the activity as legitimate or were uncertain; where verification occurred, no account compromise was identified and the notification was treated as an informational/security alert. A matched Salesforce ticket recorded an Okta notification (CHROME - Windows 11, IP 94.139.30.93, Berlin) and reported login failures, but no confirmed resolution was recorded in that case.

Source Tickets (2)
9. Institutional Zoom access via LMS links rather than individual SSO accounts
90% confidence
Problem Pattern

Users reported being unable to sign into the Zoom desktop app with their institutional email and not seeing an SSO sign-in option; the app prompted for credentials and users were unsure whether instructors had personal Zoom accounts or if teaching access was provided differently. Affected systems included the Zoom client, institutional SSO identity, and the myCampus/course-management LMS where course resources and meeting rooms were expected.

Solution

Support clarified that instructors did not possess provisioned personal Zoom accounts for teaching; course management had been assigned virtual Zoom rooms and those rooms were accessed through links published in myCampus. For access to non-course or ad-hoc Zoom rooms, course planning or course-management teams were used to request separate Zoom room assignments.

Source Tickets (1)
10. Service-side outage causing SSO/MFA authentication failures despite local client changes
91% confidence
Problem Pattern

Single sign‑on (Okta) authentication flows failed to complete despite correct credentials or successful MFA, leaving users repeatedly at login prompts, being abruptly logged out, or receiving provider‑specific or generic errors. Affected systems included Azure AD/Microsoft sign‑in (error 135011), Salesforce SSO, Jamf/Jamf Connect, Conduktor, LinkedIn Learning, Teams, Outlook, and myCampus integrations. Failures commonly produced generic/blank or provider errors and HTTP status codes such as 403 or 500, often followed upstream vendor outages, redeploys, or backend/configuration changes, and were sometimes browser- or platform-specific (mobile/device access occasionally remained functional).

Solution

Investigations repeatedly found root causes in upstream/vendor systems (Okta/Ascend outages, vendor redeploys, or backend/configuration changes) rather than local client misconfiguration. Final restorations were performed by service owners or vendors: for example, Okta/Ascend outages resolved and authentication resumed; Conduktor’s Okta SSO was restored after a DevOps redeploy/reconfiguration; LinkedIn Learning and myCampus integrations were restored by vendor/backend fixes; Jamf institutional sign‑in was restored by Jamf; CARE’s Okta SSO was restored by a backend fix; and a Microsoft/Azure AD sign‑in via Okta that produced error 135011 was resolved after upstream remediation. Multiple Salesforce SSO incidents were resolved by vendor/backend fixes; in several cases both SSO and direct vendor login (including password‑reset) were unavailable, making the institution’s Okta applications portal (https://okta.iu.org/) a useful short‑term access path. Symptom details observed across incidents included generic/blank errors, provider-specific messages, and HTTP 403 or 500 responses (Conduktor exhibited 403 then 500 in one incident). Common interim workarounds documented during incidents included launching applications from the Okta dashboard (though the dashboard occasionally showed the same failure and required vendor/DevOps engagement) and clearing browser cookies and re‑signing in. Investigations regularly excluded local causes (for example 1Password) and audit logs typically showed no administrative tampering. Across all documented cases, final restoration of authentication depended on upstream/vendor‑side remediation rather than local client configuration changes.

11. Applications enforcing SSO-only access for specific/shared accounts, disabling native credential login
93% confidence
Problem Pattern

After Okta/SSO enablement or account migrations, users were unable to sign in to SaaS applications using native usernames/passwords because SSO had been enforced. Native login pages showed access‑denied or “account not found” messages, password‑reset emails were not delivered or resets did not restore access, and some apps were missing from the Okta dashboard; direct service URLs or client add‑ins sometimes bypassed the browser SSO session and produced token/identity errors. Affected accounts were often unprovisioned, locked, disabled, or missing Okta app assignments, causing read‑only access by direct link but preventing authenticated edits.

Solution

Access failures after Okta/SSO enablement or migrations were resolved by correcting application-to-Okta linkage, account state, and Okta app assignment status. Administrators reactivated or unlocked disabled accounts, completed provisioning and Okta application assignments, reauthorized SSO connections where necessary (for example GitLab), and confirmed users had completed Okta verification so apps appeared in the Okta dashboard. Multiple incidents were resolved when users launched applications from the Okta dashboard/app tile rather than via direct/native login URLs (examples included Salesforce, Atlassian/Jira, Trello, Datadog, Miro, Egencia, LinkedIn Learning, and Workday). Datadog access was restored after an administrator granted the Okta app assignment and the user completed Okta verification. Salesforce instances that enforced SSO were accessible via Okta SSO and did not require a separate local password, resolving repeated password-reset emails for some users. Workday issues where password-reset emails were not delivered or direct login failed were resolved by signing in through Okta SSO and, when needed, administrators performing account resets via Okta. Miro editing access was restored in several cases by reassigning users to free or legacy accounts until the Okta integration completed; paid licenses were handled through the software request process. Recorded mismatches also included Outlook add‑in failures where the add‑in maintained a separate token/identity state from the browser SSO session and produced incorrect‑password or “Exchange identity token could not be verified” errors and interacted poorly with password‑reset flows tied to decommissioned phones.

12. Network-based Google sign-in restrictions blocking remote/home access
80% confidence
Problem Pattern

Users attempting Google sign-in from home or other remote networks received the error "this account is not allowed to sign in with the network" and were initially unable to authenticate via the Google platform. The issue presented as a blocked or denied sign-in tied to network context rather than credential failure, affecting Google-based SSO access for remote/home sessions.

Solution

Support reviewed Google platform authentication logs and confirmed a successful login event on 14 January. No configuration changes were documented in the ticket; the apprentice later confirmed they were able to sign in successfully and the ticket was closed.

Source Tickets (1)
13. Okta SAML SSO and SCIM provisioning for O'Reilly Learning Platform
91% confidence
Problem Pattern

Administrators requested SAML SSO and SCIM provisioning for third‑party SaaS and external learning platforms. Reported symptoms included vendor‑specific integration forms and metadata exchange gaps, requests for vendor admin credentials or missing IdP/SCIM artifacts, SCIM provisioning failures (for example “Error authenticating: Unauthorized”), vendor refusal or limitation of SSO linking, one‑time manual account linking on first access, uncertainty about SCIM versus just‑in‑time provisioning and license consumption, requirements to enforce group‑based access controls using dynamic IdP group membership, and identity‑ownership confusion when integrations used non‑Okta identity platforms (for example Auth0) or required a per‑user auth_identifier.

Solution

Multiple SAML SSO and SCIM provisioning efforts were implemented or evaluated across third‑party SaaS and external learning providers; outcomes depended on each vendor’s protocol support and willingness to accept standard IdP/SCIM artifacts.

• O’Reilly Learning Platform: vendor integration form was completed, SAML SSO was configured using vendor metadata, SCIM provisioning was implemented, and automated provisioning/deprovisioning were verified.
• LinkedIn Learning (IU Learning Hub DEV): SSO for the DEV catalog was investigated; test users required an initial manual O365 account linking on first access and the designated test account lacked a LinkedIn license. Questions about SCIM versus just‑in‑time provisioning and license consumption were documented.
• Frontify: SSO connection was completed and handling of external agency users (non‑@iu.org accounts) was clarified with stakeholders.
• Freshdesk / Freshworks: the Freshdesk SSO app was enabled in Okta for the requested user so authentication and access were routed through Okta.
• Docker Hub: SAML metadata and ACS/Entity ID details were exchanged and Okta metadata was supplied; SCIM provisioning failed with the vendor returning “Error authenticating: Unauthorized.”
• short.io: an Okta SSO application was created after vendor admin credentials were coordinated and specified users were assigned to the app.
• Supabase (managed account for Hackathon 2025): SAML SSO was implemented by exporting and supplying SAML metadata and provisioning/assigning users to the Okta application.
• Hightouch: SAML sign‑on configuration and SCIM provisioning were started; SCIM identifiers and Okta app group assignment were completed, while SCIM role mappings and the IdP certificate remained outstanding at reporting.
• HashiCorp Cloud Platform / Terraform: the vendor declined to link HCP SSO accounts to HCP Terraform user accounts and recommended alternate account types; Okta configuration details were supplied but vendor‑side limitations prevented linking.
• External learning providers (IU Learning Hub / Haufe Lernwelt and partners): investigations found those organizations managed their own identity infrastructure and central federation from the IU Okta instance was not possible; external IT teams were notified.
• Auth0 / UniNow review (Hochschulsport ZHS München): the vendor supported SAML/DFN‑AAI and OpenID Connect/OAuth but required attribute release (email, name, course/matriculation) and cohort/isolation capabilities that appeared not achievable with available vendor configuration.
• UniMerch / CosmoShop: SimpleSAMLphp and the shop’s SAML plugin were identified as the service‑provider components; SAML SP metadata (Login URL, ACS/Service Provider Entity ID) and attribute/claim needs (email, name, and group membership for internal staff) were collected and routing requirements for internal staff through Okta were documented.
• Handshake (external career platform): SSO via SAML required a per‑student auth_identifier; teams were uncertain whether existing systems contained that identifier and ownership was clarified — Auth0 was owned by DevOps (contact provided) while Okta support remained with the Okta team. A timebox was noted because an event deadline required SSO configuration before July.

Overall outcomes: integrations succeeded when vendors accepted standard SAML metadata and SCIM credentials and supported provisioning. Failures or incomplete outcomes were caused by vendor‑side limitations (explicit refusal to link SSO), missing or mismatched IdP/SCIM artifacts, SCIM authentication errors from vendor endpoints, missing licenses for test accounts, vendor configuration constraints that prevented cohort‑ or attribute‑based access restrictions, and identity‑platform ownership gaps (for example integrations using Auth0 instead of Okta) that introduced coordination delays. Several integrations required explicit group‑membership attributes or group‑to‑app assignments to enforce access for dynamic internal groups.

14. App access failures resolved by re-establishing Okta SSO session or backend recovery
92% confidence
Problem Pattern

Users experienced intermittent Okta SSO failures producing repeated “session expired” or “Please sign in again” prompts, authentication loops that rejected valid credentials, missing app tiles, or Okta failing to present a sign‑in. Failures were often application‑ or endpoint‑specific (native/desktop or mobile clients failed while browser access worked) and correlated with browser session state (private/InPrivate sessions or automatic cache/cookie clearing), multiple Microsoft accounts in a single browser session, VPN/IP/location changes that triggered conditional access, vendor/backend loss of SSO linkage or entitlements, or per‑account Okta license/renewal state. Affected systems included Microsoft Teams and M365, Atlassian products, Adobe services, Jamf Connect on macOS, CARE/campus portals, and newly provisioned Windows 11 devices (error 801c03ed).

Solution

Access failures were resolved by re‑establishing valid Okta sessions, remediating endpoint state, or recovering vendor/backend integrations. Common observed resolutions: re‑authenticating at the Okta portal and immediately launching the application tile restored access in many incidents; disabling automatic browser cache/cookie clearing or avoiding private/InPrivate sessions allowed Okta cookies to persist and stopped daily reauthentication loops; using an incognito/private window sometimes isolated conflicts from multiple Microsoft accounts (Teams loaded in incognito while the main session failed). Network changes and conditional‑access events (including VPN/GSM IP changes) were associated with session invalidation; reconnecting and re‑authenticating after the network change cleared those cases, and logs occasionally showed failed Azure AD group operations (for example Copilot license groups) correlated with the behavior. Password resets restored access for some users but were sometimes temporary when session or backend state remained inconsistent. Vendor/backend fixes that restored SSO linkage, entitlements, or group membership resolved cases where credentials were valid but the application/backend had lost linkage. For Jamf/Jamf Connect on macOS, signing in via the Jamf Connect menu‑bar “Connect” dialog with the current Okta/IU password consistently restored authentication; running sudo jamf recon alone did not always clear persistent state. A newly delivered Windows 11 device that failed initial Okta sign‑in with error 801c03ed regained connectivity after a restart and retry. Severely corrupted or never‑initialized endpoints sometimes required a factory macOS reinstall or device replacement. When native clients failed but browser access worked, browser sign‑in was used to isolate endpoint problems from session or backend issues. Account‑specific Okta license problems were observed where a user received continuous license renewal prompts that interfered with login; those incidents were resolved when an administrator performed the account license renewal and applied requested account metadata updates. Support used live troubleshooting sessions (for example via Microsoft Teams) to observe flows and confirm recovery; user reluctance to sign out and re‑authenticate frequently prolonged remediation.

15. SSO enablement and enforcement for a ChatGPT Team tenant and group-based rollout
90% confidence
Problem Pattern

Administrators requested SSO enablement and a decision on enforcing SSO for a tenant and for targeted user groups. Some cloud SaaS products either lack SSO/MFA/SCIM support or restrict SSO to a single IdP, producing symptoms such as inability to enable or enforce tenant/group SSO, absent provisioning or activity logs, and uncertainty about supporting multiple identity providers or mixed authentication models (SSO for one population and username/password for another). Affected systems included ChatGPT Team tenants, Postman Basic, Haiilo, and connected identity stores (e.g., AD, Okta, Auth0).

Solution

Tenant SSO and group enforcement for the ChatGPT Team tenant were completed: tenant SSO was enabled, the target group was updated with the provided user email list, notification emails were prepared and sent to affected users, and SSO enforcement was applied to the target group as part of the rollout. Separately, non-destructive security testing was performed against a Postman Basic subscription; checks included unauthenticated checks for password reuse and weak institutional passwords with cross-checks against previously obtained credential datasets, and findings were documented. The Postman Basic license did not provide SSO, MFA enforcement, automated provisioning/deprovisioning (SCIM), or last-activity timestamps, which prevented centralized enforcement or lifecycle automation within that product during the engagement; identified risks (password reuse, weak institutional passwords, exposed credentials, and potential privilege escalation) and the licensing limitation were recorded for follow-up. For the Haiilo Employee Advocacy platform, the vendor stated the service was cloud-based and supported access via SSO or via invitation/email-and-password; because the organisation uses two identity providers (Okta for employees and Auth0 for students) the question of whether Haiilo supports multiple IdPs or a mixed authentication model was unresolved and the request was forwarded to the specialist/vendor team for confirmation.

16. Application-specific SSO access provisioning (IU Merch-Shop)
91% confidence
Problem Pattern

Users could not access third‑party applications via Okta SSO or the app’s SSO. Symptoms included immediate SSO failure messages (for example “Login über SSO fehlgeschlagen”), silent failures, login loops or repeated credential prompts, missing application tiles, or successful Okta sign‑in but missing application‑specific entitlements (internal prices, missing UI tabs, or absent cost‑center billing). Affected systems included Okta and target applications such as IU Shop (Merch‑Shop), Atlassian/Service Center, Moses, Tivian, PebblePad, CARE/academy 5 and other department‑managed apps.

Solution

Access incidents were resolved by confirming the user had an application account and that it was correctly linked to the organisation’s Okta assignment or access group. For Okta‑managed applications technicians added the user to the app’s Okta access group or enabled the application’s SSO linkage and allowed time for changes to propagate (propagation ranged from several minutes to, in some cases, hours or until the next day when tickets showed no documented remediation). When users completed Okta SSO but lacked application features (for example internal IU prices, the “Streuartikel” tab, or cost‑center billing options), support verified and corrected application‑side entitlements and role assignments or escalated to the application owner/vendor (examples: Shop IT/brand‑platforms). Cases presenting as login loops (notably Atlassian/Service Center) were resolved by enabling or whitelisting the user’s Atlassian account so the Okta‑linked identity could complete authentication. When users saw explicit SSO error messages (for example “Login über SSO fehlgeschlagen”) or the app tile was missing from the Okta dashboard, support investigated whether the failure originated in Okta assignment versus the target application and treated application‑side faults as vendor/owner issues when appropriate. For applications not managed by central IT (for example PebblePad or other department‑owned systems), support confirmed they could not restore accounts and directed requesters to the application owner or vendor. Some incidents cleared without recorded remediation and were closed as resolved or marked “Won’t Do.”

17. Direct Twilio Flex bookmark or subdomain blocked Salesforce-based login
80% confidence
Problem Pattern

Users experienced Twilio/Flex access failures when authenticating via Salesforce SSO. Symptoms included unexpected authentication popups when opening Flex-only URLs or bookmarks (e.g., https://flex.twilio.com), browser-side JavaScript errors such as "TypeError: Cannot read properties of null (reading addEventListener)", and silent or failed first-attempt logins that sometimes succeeded on immediate retry. Affected components included Salesforce SSO, Twilio/Flex, and web browsers.

Solution

Support identified three recurring causes and corresponding outcomes. In multiple cases a bookmarked Flex-only subdomain bypassed the Salesforce-integrated entry point; access succeeded after users launched Twilio via the Salesforce-integrated link or the main Twilio login URL and replaced the incorrect bookmark. In incidents following Salesforce password resets, SSO propagation delays produced client-side JavaScript errors ("TypeError: Cannot read properties of null (reading addEventListener)"); support waited for propagation and engaged Twilio/SSO engineers, who adjusted the SSO handoff and allowed the flow to complete. Some failures were transient and produced no explicit error; those resolved after an immediate retry of the login attempt. Support actions therefore included confirming the entry point used, checking for recent identity changes and propagation status, retrying logins for transient failures, and escalating to Twilio/SSO teams for browser-side errors that required server-side adjustments.

Source Tickets (3)
18. Self Service Password Sync backend error causing SSO session invalidation and mass app logouts
90% confidence
Problem Pattern

Self Service Password Sync / Self Service Portal reported an internal error after a desktop app crash, which led to SSO re-login failures and multiple applications (desktop Claude, Discord, Outlook, Teams) being logged out or showing sync/launch errors. Users could not re-establish SSO sessions and no specific error codes were recorded.

Solution

Support applied a backend fix to the Self Service Password Sync / Self Service Portal. After the backend change, the affected desktop app (Claude) was restarted and returned to normal operation; related SSO sign-ins and sync behavior for the other apps recovered and the incident was closed.

Source Tickets (1)
19. Site-specific transient corporate sign-in failure resolved by admin intervention
50% confidence
Problem Pattern

User could not authenticate to the corporate sign-in service (CPG-CORP) from a specific office location (Bonn) on their first day there; the ticket reported inability to sign in with no specific error messages and affected a single user/workstation within the office network.

Solution

An administrator manually intervened and restored the affected user's sign-in to the corporate authentication service; the user confirmed successful login afterward. No additional technical remediation steps, diagnostics, or error details were recorded in the ticket.

Source Tickets (1)
Back to Summaries
An unhandled error has occurred. Reload X