COManage Troubleshooting Guide¶
A resource for COManage administrators to find solutions to commonly encountered problems.
COManage Troubleshooting Items¶
This section contains some of the issues you may encounter when interacting with the OSG COManage.
The COManage petition is stuck in the "confirmed" state¶
This may happen if there are issues when confirming the user's email address. We have seen this occur if a user clicks the confirmation link then closes the tab too quickly.
-
Under the
People
drop-down on the left, click onMy Population
-
Browse to the
CO Person
record. -
Scroll down to the
Role Attributes
, click the gear icon, selectEdit
, and set the status for theRole
toActive
. -
Verify that the overall status of the
CO Person
record isActive
. If not, change it toActive
as well. -
Click on
Autogenerate Identifiers
on the right, so that the necessary identifiers are created. -
Now that the necessary identifiers exist for the
CO Person
record, the LDAP DN can be computed and the record provisioned in LDAP. To make sure, click onProvisioned Services
and thenProvision
.
The COManage petition is stuck in the "Approved" state¶
This may happen when the approver has internet issues while attempting to approve a CO Petition.
-
Navigate to the Petitioner's CO Person page (this can be done directly from the CO Petition under the
Attched Identities
section). -
If the CO Person is missing identifiers of types
UID
andOSG ID
, clickAutogenerate Identifiers
on the right side of the page. -
If, on the CO Person page, the CO Person's status and Role status are both
Approved
:-
In the
Status
dropdown in the Person Attributes section, change the CO Person's status toActive
fromApproved
. -
Click on the gear icon for the CO Person's Role attribute, then click "Edit", this will bring you to the CO Person Role page
-
On the CO Person Role page, set the Role Attribute
Status
toActive
fromApproved
, then click save.
-
To verify that the fix worked, navigate back to the related CO Person page and click Provisioned Services
near the Autogenerate Identifiers
.
Confirm that the Status
column for every row says "Provisioned" instead of "Not Provisioned" (you may need to wait a few minutes and refresh the page).
Valid Tiger User is unauthorized with Dex credentials¶
Under certain circumstances Dex may not be able to match a user to their COManage identity, possibly due to incorrect and/or missing organization identities/identifiers.
Symptoms¶
- Tiger-Dex credentials missing some or all of a users group permissions.
- User unable to connect to the Tiger cluster.
-
Error message from Tiger involving an unauthorized user.
- Example error message:
kubectl get pods -n osg-dev
Error from server (Forbidden): pods is forbidden: User "[email protected]" cannot list resource "pods" in API group "" in the namespace "osg-dev""
-
Empty groups in the Dex response after logging in with SSO
Next actions¶
- Ensure that the user's LDAP record contains the attribute
uid
, which shares the same value as the COManage identifier used as a source for the LDAP provisioner target.- LDAP attributes and their COManage sources can be found here
- Have the user log in
- Have the user fetch a new Dex token
Explanation of SAML -> CILogon OIDC sub claim -> LDAP matching used in Dex.¶
How the OAuth2 server does the following:
- Receives appropriate SAML attributes from the campus Identity provider.
- Uses those attributes to find the user in the CILogon user database, from which the CILogon OIDC sub claim is obtained.
- Performs an LDAP search using a filter of
(uid=<CILogon OIDC sub claim value>)
. - Retrieves configured LDAP attributes from the record it has found, and sends those values out as claims with names as configured.