Troubleshooting RBAC and OpCo Issues
Authentication Failed for the SP User, Tenant User, or OpCo User
Problem
Description: Service provider (SP) user, tenant user, or OpCo user authentication does not work.
Solution
The CSP administrator, SP administrator, or OpCo administrator must check the authentication method that is set for the SP user, tenant user, or OpCo user respectively.
- Log in to Administration portal (Global level) and select Administration > Authentication.
The Authentication page appears.
- Check the authentication method for the SP user and the
tenant user.
If the authentication method is set as Local, follow these steps:
- Log in to central infrastructure and run the source/etc/keystone/keystonerc command.
root@centralinfravm:~# source /etc/keystone/keystonerc
- Type Openstack and press Enter.
root@centralinfravm:~# openstack Password:
- Enter the keystone administrator password.
- Execute the ‘user list command and check
whether the user name is listed in the keystone.
root@centralinfravm:~# openstack user list
- If the user name is listed, then try to set the password
by using the Forgot Password link on the Administration
Portal login page. See Resetting Your Password
If the user name is not available then the CSP administrator or the SP administrator must add the user in CSO. See Add Service Provider and OpCo Users .
- If the user does not receive an e-mail with the passcode,
then set the password through Openstack command.
root@centralinfravm:~# openstack user set -password <password> <username>
- Log in to central infrastructure and run the source/etc/keystone/keystonerc command.
If the authentication method is set as Authentication with SSO Server, then follow these steps:
- Check whether the user name is listed in the SSO server
- Ensure that the SSO server SAML meta data is correct. Navigate to Administration > Authentication > Single Sign-On Server s > Edit to check the SAML metdata.
- Ensure that the DNS name of the JCS server is correct in the client server.
- Ensure that the portal URLs are mapped correctly in SSO and CSO server.
- Check whether the same user name is created in CSO with same role.
- Ensure that the tenant name is mapped correctly in CSO and SSO server.
If the authentication method is set as Authentication and Authorization with SSO Server, then follow these steps:
- Ensure that the user has created the user name in correct pattern in CSO for authentication and authorization
- Ensure that the role mapping is created correctly in CSO. A mapping between the roles defined in CSO and the roles defined in external SSO or identity-provider must be provided.
- Check whether the user name and role is created correctly in SSO server.
- Ensure that the service provider and tenant metadata URL for SAML2 of SSO server is configured correctly.
Authorization Failed for the SP User, Tenant User, or OpCo User
Problem
Description: SP user, tenant user, or OpCo user authorization does not work. While accessing some UI pages or features, Insufficient privileges error message is displayed.
Solution
To resolve the issue:
The CSP administrator, SP administrator or Opco administrator must check the user mapped role in CSO.
- Log in to Administration Portal and select Administration
> Roles.
The Roles page appears.
- Check whether the role type is predefined or custom role, and then check the privileges assigned to that user. Select the role name and click the pencil icon to view the privileges assigned to the user.
- Log in to Administration Portal and select Administration
> Roles.
Check the browser console for Java Script error.
Check the privilege that is causing the error. Check whether that privilege is assigned to the user.
Using a web browser, check the following REST API output while logging in to CSO with the user account.
- Access the Request URL https://<<central ms
IP address >>/iamsvc/get-user-capabilities.
The output of the rest API must have the capabilities of the logged in user.
- Check whether the UI assigned capabilities are matched
in the REST API output.
The JSON output file will list all the capabilities.
If there are any issues with privileges in the JSON output file, contact Juniper Networks Technical Support team.
- Access the Request URL https://<<central ms
IP address >>/iamsvc/get-user-capabilities.
Password to Onboard OpCo is Not Received or has Expired
Problem
Description: OpCo administrative user did not receive any e-mail with login credentials or OpCo administrator password has expired.
Solution
To resolve the issue:
Access the URL for Administration Portal. Enter the user name and click Forget Password link on the login page to setup the new password. See Resetting Your Password.
If the OpCo administrative user did not receive the e-mail, then use Openstack command to set the password for the OpCo administrator.
root@centralinfravm:~# source /etc/keystone/keystonerc root@centralinfravm:~# openstack user list root@centralinfravm:~# openstack user set -password <password> <username>
Check the role assignment list to see if there is any issue with the role assignment.
- Log in to central infrastructure vm and execute the source /etc/keystone/keystonerc command.
root@centralinfravm:~# source /etc/keystone/keystonerc
- Log in to Openstack and check the output of user list,
role list and role assignment list.
root@centralinfravm:~# openstack user list root@centralinfravm:~# openstack role list root@centralinfravm:~# openstack role assignment list
For further troubleshooting, copy all the log files from the infra VM
/var/log/apache2
into a folder, compress the file in *.zip format and contact Juniper Networks Technical Support team.
- Log in to central infrastructure vm and execute the source /etc/keystone/keystonerc command.