Code Fix: Every 30 days the Azure Active Directory security token expires, locking users out of K2 completely

  • 16 February 2021
  • 0 replies
  • 6 views

Badge +9
 

Code Fix: Every 30 days the Azure Active Directory security token expires, locking users out of K2 completely

KB002710

PRODUCT
K2 Five 5.0
K2 Five (5.0) September 2018 Cumulative Update
K2 Five (5.0) September 2018 Cumulative Update Fix Pack 3
LEGACY/ARCHIVED CONTENT
This article has been archived, and/or refers to legacy products, components or features. The content in this article is offered "as is" and will no longer be updated. Archived content is provided for reference purposes only. This content does not infer that the product, component or feature is supported, or that the product, component or feature will continue to function as described herein.

 

Issue Description

Every 30 days the Azure Active Directory security token expires due to rollover, locking users out of K2 completely presenting an error.

Error Message

The following error message is presented: “WIF10201: No valid key mapping found for securityToken”

Cause

The Azure certificate rollover issues new authentication certificates of which the new thumbprints do not match the previous certificate thumbprint.

Resolution

  1. Ensure you have K2 Five (5.0) installed.
  2. Download and Install the K2 Five (5.0) September 2018 Cumulative Update from K2 Partner and Customer Portal.
  3. Download K2 Five (5.0) September 2018 Cumulative Update FP03 from K2 Partner and Customer Portal.
  4. Install K2 Five (5.0) September 2018 Cumulative Update FP03 to apply the fix.
  5. It is recommended to refresh the browser cache.

 


0 replies

Be the first to reply!

Reply