Skip to main content
Nintex Community Menu Bar

Code Fix: Every 30 days the Azure Active Directory security token expires, locking users out of K2 completely

  • February 16, 2021
  • 0 replies
  • 41 views
  • Translate

Anelle
Nintex Employee
Forum|alt.badge.img+11
 

Code Fix: Every 30 days the Azure Active Directory security token expires, locking users out of K2 completely

KB002748

PRODUCT
K2 Five 5.2
K2 Five (5.2) Fix Pack 1

 

Issue Description

Every 30 days the Azure Active Directory security token expires due to rollover, locking users out of K2 completely and presenting an error.

Error Message

The following error is presented: “WIF10201: No valid key mapping found for securityToken”.

Cause

The Azure certificate rollover issues new authentication certificates of which the new thumbprints do not match the previous certificate thumbprint.

Resolution

  1. Ensure you have K2 Five (5.2) installed.
  2. Download the K2 Five (5.2) FP1 from K2 Partner and Customer Portal.
  3. Install the K2 Five (5.2) FP1 to apply the fix.
  4. It is recommended to refresh the browser cache.

 

Did this topic help you find an answer to your question?

Reply


Cookie policy

We use cookies to enhance and personalize your experience. If you accept you agree to our full cookie policy. Learn more about our cookies.

 
Cookie Settings