Skip to main content
Nintex Community Menu Bar

Code Fix: Every 30 days the Azure Active Directory security token expires, locking users out of K2 completely

  • February 16, 2021
  • 0 replies
  • 6 views
  • Translate

Anelle
Nintex Employee
Forum|alt.badge.img+11
 

Code Fix: Every 30 days the Azure Active Directory security token expires, locking users out of K2 completely

KB002710

PRODUCT
K2 Five 5.0
K2 Five (5.0) September 2018 Cumulative Update
K2 Five (5.0) September 2018 Cumulative Update Fix Pack 3
LEGACY/ARCHIVED CONTENT
This article has been archived, and/or refers to legacy products, components or features. The content in this article is offered "as is" and will no longer be updated. Archived content is provided for reference purposes only. This content does not infer that the product, component or feature is supported, or that the product, component or feature will continue to function as described herein.

 

Issue Description

Every 30 days the Azure Active Directory security token expires due to rollover, locking users out of K2 completely presenting an error.

Error Message

The following error message is presented: “WIF10201: No valid key mapping found for securityToken”

Cause

The Azure certificate rollover issues new authentication certificates of which the new thumbprints do not match the previous certificate thumbprint.

Resolution

  1. Ensure you have K2 Five (5.0) installed.
  2. Download and Install the K2 Five (5.0) September 2018 Cumulative Update from K2 Partner and Customer Portal.
  3. Download K2 Five (5.0) September 2018 Cumulative Update FP03 from K2 Partner and Customer Portal.
  4. Install K2 Five (5.0) September 2018 Cumulative Update FP03 to apply the fix.
  5. It is recommended to refresh the browser cache.

 

Did this topic help you find an answer to your question?

Reply


Cookie policy

We use cookies to enhance and personalize your experience. If you accept you agree to our full cookie policy. Learn more about our cookies.

 
Cookie Settings