Failure in browser_ui/1_manage/group/group_saml_non_enforced_sso_spec.rb | Manage Group SAML SSO - Non enforced SSO lets group admin test settings
Full description
Manage Group SAML SSO - Non enforced SSO lets group admin test settings
File path
./qa/specs/features/ee/browser_ui/1_manage/group/group_saml_non_enforced_sso_spec.rb
Stack trace
Manage Group SAML SSO - Non enforced SSO lets group admin test settings
Failure/Error: expect(page).to have_content("<saml:Issuer>#{@saml_idp_service.idp_issuer}</saml:Issuer>")
expected to find text "<saml:Issuer>https://saml-idp-server.test:8443/simplesaml/saml2/idp/metadata.php</saml:Issuer>" in "Skip to content GitLab / Help S saml_sso_group_a87bbc11b84cccc6 Group information Epics 0 Issues 0 Merge requests 0 Security & Compliance CI/CD Packages and registries Analytics Wiki Settings Administration SAML SSO Usage Quotas Collapse sidebar saml_sso_group_a87bbc11b84cccc6 SAML Single Sign On Settings Unable to sign you in to the group with SAML due to \"Fingerprint mismatch\" SAML Single Sign On Manage your group’s membership while adding another level of security with SAML. Learn more To set up SAML authentication for your group through an identity provider like Azure, Okta, Onelogin, Ping Identity, or your custom SAML 2.0 provider: Review the process for configuring service providers in your identity provider — in this case, GitLab is the \"service provider\" or \"relying party\". Documentation for popular identity providers During this process, you’ll be asked for URLs from GitLab’s side. Use the URLs shown below. Set up assertions/attributes/claims (email, first_name, last_name) and NameID according to the documentation Fill in the fields below, turn on Enable SAML authentication for this group, and press Save changes Share the GitLab single sign-on URL with members so they can sign in to your group through your identity provider Assertion consumer service URL Also called \"Relying party service URL\" or \"Reply URL\" Identifier Also called \"Issuer\" or \"Relying party trust identifier\" GitLab metadata URL http://gitlab-group-saml.test/users/auth/group_saml/metadata?group_path=saml_sso_group_a87bbc11b84cccc6&token=g-jq_JUx Used to help configure your identity provider GitLab single sign-on URL http://gitlab-group-saml.test/groups/saml_sso_group_a87bbc11b84cccc6/-/saml/sso?token=g-jq_JUx Used by members to sign in to your group in GitLab Configuration Enable SAML authentication for this group Enforce SSO-only authentication for web activity for this group Enforce SSO-only authentication for Git and Dependency Proxy activity for this group Identity provider single sign-on URL Members will be forwarded here when signing in to your group. Get this from your identity provider, where it can also be called \"SSO Service Location\", \"SAML Token Issuance Endpoint\", or \"SAML 2.0/W-Federation URL\". Certificate fingerprint SHA1 fingerprint of the SAML token signing certificate. Get this from your identity provider, where it can also be called \"Thumbprint\". Default membership role Guest Reporter Developer Maintainer Owner Minimal Access This will be set as the access level of users added to the group. Verify SAML Configuration SCIM Token Generate a SCIM token to set up your System for Cross-Domain Identity Management. Generate a SCIM token Members User Identifier"
First happened in https://gitlab.com/gitlab-org/gitlab/-/jobs/3024838453.
Related test case: https://gitlab.com/gitlab-org/gitlab/-/quality/test_cases/347898.
Edited by Sanad Liaquat