<iframe src="https://www.googletagmanager.com/ns.html?id=GTM-M74D8PB" height="0" width="0" style="display:none;visibility:hidden">
Loading
Skip to NavigationSkip to Main Content
Subsequent Inbound SAML Login Attempts Fail Following an Initial Successful Login
Single Sign-On
Okta Classic Engine
Okta Identity Engine
Overview
When using inbound SAML for authentication, users might encounter an issue where the initial login is successful, but subsequent login attempts fail, resulting in the following error:
 
400: Bad Request Error Code:
GENERAL_NONSUCCESS
 
400: Bad Request Error Code
 
 
In addition to seeing the above error in the User Interface (UI), the following errors will be seen in the System Log:
 
  • Create okta user
FAILURE:
 
ErrorMessage with the following validation errors: login field failed validation with value 'user@example.com': An object with this field already exists in the current organization.<br/>
 
Blank failure
 
  • Authenticate user via IDP
FAILURE: Unable To JIT
 
"FAILURE: Unable To JIT" error
 
Applies To
  • Single Sign-On
  • Inbound SAML
  • External SAML Identity Provider (IdP)
Cause

The user's IdP account has not been linked with a matching Okta account.

Solution

Enable Account matching with persistent name ID to link a user's IdP account with a matching Okta account based on Security best practices.

  1. In the Okta Admin Console, navigate to Security > Identity Providers.
  2. Select the desired Identity Provider. 
  3. Go to Actions > Configure Identity Provider.
  4. Click Edit and enable the option Use Persistent Name ID (Higher Security) under Authentication Settings > Account matching with Persistent Name ID.

 

 

NOTE: The incoming SAML assertion must use the following Name ID format:

 

urn:oasis:names:tc:SAML:2.0:nameid-format:persistent

 

The Name ID format is configured by the IdP. If assistance is needed with modifying the Name ID format, please reach out to the IdP.

Loading
Subsequent Inbound SAML Login Attempts Fail Following an Initial Successful Login