Troubleshooting Authentication Server

The following sections provide guidance for specific issues that may be experienced while configuring Authentication Server.

Logging into Blue Prism after enabling Authentication Server

Where a Blue Prism deployment has been configured to require all user authentication to be routed via Authentication Server but where Authentication Server is not available,  please contact Blue Prism Support for guidance.

Once Authentication Server has been enabled, you must ensure that a Blue Prism native administrator user remains in the system. Please ensure you have taken a full and verifiable backup of your Blue Prism database before contacting Blue Prism Support.

Error message displays when attempting to sign in using Authentication Server

If the message Unexpected browser error. You will now be returned to the sign-in screen. displays when a user attempts to sign in using Authentication Server, the following should be checked:

  • Is the Authentication Server URL accessible from the user's device, and has the the correct Authentication Server URL been entered on the Security - Sign-on Settings screen?
    • Validate that the correct Authentication Server URL has been configured in Blue Prism under System > Security - Sign-on Settings. If no users can currently log in to view the URL on this page, you can view the URL by running the following query against your Blue Prism database:

      Copy
      SELECT authenticationserverurl FROM BPASysConfig
    • Validate that Authentication Server is running and reachable from the user’s machine by entering the URL for the Discovery document in a browser: <authentication server URL>/.well-known/openid-configuration

      If successful the page will load containing some JSON with details of the Authentication Server as shown below:

      If the page cannot be reached you may need to restart the site from the application pool in IIS. For more details, click here.

    • Validate that you can browse to the correct Authentication Server URL by opening IIS Manager (inetmgr.exe) and locating the Blue Prism - Authentication Server website. Right‑click the website and click Manage Website > Browse. The Authentication Server website will open in your default browser. For more details on troubleshooting Hub sites such as Authentication Server, click here.

  • Is there a network problem?
    • Check that the SSL certificate is valid. For more details, click here.

    • Check that a proxy is not preventing Blue Prism from connecting to Authentication Server.

      If you need to disable it, you can do so under Internet Properties > Local Area Network (LAN) Settings by deselecting the option Use a proxy server for your LAN. For more details on configuring proxy settings, click here.

  • Has the WebView2 runtime been installed on the machine that runs the Blue Prism interactive client?

Logging into Authentication Server using Active Directory authentication

If login failures or performance issues are encountered during the login process via Active Directory, system administrators can check if further Active Directory settings need to be added to the Authentication Server appsettings.json file. To edit the appsettings.json file:

  1. Open Windows Explorer and navigate to the Authentication Server install location.

    To check the install location, open Internet Information Services (IIS) Manager, select the Authentication Server site and click Explore.

  2. Back up the appsettings.json file.

  3. Open the appsettings.json file in a text editor.
  4. Locate the Ims section of the file.
  5. If not already present, add an ActiveDirectory section.

    If the ActiveDirectory section is already present, you might see other settings in that section based on your Active Directory configuration, so the examples in the sections below are only illustrative.

  6. Save the file if you have made any changes.

Authentication Server must be restarted after any changes have been made to the appsettings.json file.

To restart Authentication Server:

  1. Open Internet Information Services (IIS) Manager.
  2. In the list of connections, select Blue Prism - Authentication Server.

    This is the default site name – if you have used a custom site name, select the appropriate connection.

  3. Click Restart from the Manage Website controls.

Check if the Active Directory timeout limit needs to be configured

When Authentication Server attempts to query a Domain Controller, by default it will wait five seconds for a response before triggering a System.TimeoutException error. However, this value can be configured if required in the following scenarios:

  • If users are experiencing performance issues when logging in via Active Directory and the logs show several instances of System.TimeoutException: Timeout after 5 seconds, the value may need to be decreased. The range is between 1 and 60 seconds.
  • If users are being prevented from logging in via Active Directory and the logs show several instances of System.TimeoutException: Timeout after 5 seconds, the value may need to be increased. The range is between 1 and 60 seconds.

To configure the Active Directory timeout limit:

  1. In the ActiveDirectory section of the appsettings.json file, add a QueryTimeoutSeconds setting and a value depending on your scenario, see example below for a decreased value.

    Copy
    {
        "Ims" : {
            "ActiveDirectory": {
                    "QueryTimeoutSeconds": 3
            }
        }
    }
  2. Save the file.
  3. Restart Authentication Server.

Check if the Active Directory domains used during login need to be manually configured

To reduce the time taken for the Active Directory cache to be populated during user login, system administrators can manually configure trusted Active Directory domains that will be queried during the login process.If at least one Active Directory domain is manually configured, these settings will be used during the login process to query only the configured domain(s), rather than programmatically identifying which domains can be queried.

When a new domain is added to Active Directory, it must also be added to the configuration. Otherwise it will be ignored and users belonging to this domain will not be able to log in until the configuration has been updated.

Any Active Directory domains that meet one or more of the following criteria can be manually configured if using Authentication Server 4.6:

  • Contain users that must be able to log in.
  • Contain security groups that are assigned directly to Hub or Interact roles in Authentication Server.
  • Contain parent security groups which include security groups that are directly assigned to Hub or Interact roles in Authentication Server.

If using Authentication Server 4.7, only Active Directory domains which meet the following criteria should be manually configured:

  • Contain users that have an alternative User Principal Name (UPN) suffix that is different to the Domain Name System (DNS) name of the Active Directory domain. For example, corp.dir.company.com (DNS name) and company.com (alias suffix), where [email protected] is the UPN.

The manual configuration requires adding the Active Directory domain name, forest name, and security identifier in the Authentication Server appsettings.json file for each required domain. To do this:

  1. In the ActiveDirectory section of the appsettings.json file, add a TrustedDomains section.
  2. Add the required information for each domain, for example:

    • DomainName – The name of the Active Directory domain(s) that will be manually configured.

    • ForestName – The name of the forest in which the Active Directory domain resides.

    • Sid – The security identifier for the Active Directory domain.

    Copy
    {
      "Ims": {
        "ActiveDirectory": {
                "TrustedDomains": [
                {
                 "DomainName": "domain.com",
                 "ForestName": "my.domain.com",
                 "Sid": "S-1-27-1-3452"
                },
               {
                 "DomainName": "company.com",
                 "ForestName": "my.company.com",
                 "Sid": "S-2-23-1-3458"
               },
               {
                 "DomainName": "enterprise.com",
                 "ForestName": "enterprise.com",
                 "Sid": "S-3-23-1-3459"
               }
            ]
        },
  3. Save the file.
  4. Restart Authentication Server.

Check if cache settings for stored Active Directory domains need to be configured

To further improve performance during the login process, the behavior of the cache that stores the discovered domains can be configured by setting a refresh interval and a maximum cache duration in the Authentication Server appsettings.json file.

  • The refresh interval is the interval in minutes at which the cached data will be updated from Active Directory. The value can be set between 5 and 1440 minutes. The default value is 5.
  • The maximum cache duration is the amount of time in minutes that the data will be held in the cache before it is invalidated. The value can be set between 5 and 1440 minutes. The default value is 30 if using Authentication Server 4.6. If using Authentication Server 4.7, the default value is 1440.

    These two settings must be configured as a pair, and the maximum cache duration should be set higher than the refresh interval. If one or both settings are not configured, the default values will be used.

The cache is populated in Authentication Server when:

  • Starting or restarting the Authentication Server site.
  • Enabling Active Directory authentication in Blue Prism Hub > Authentication settings.

    The cache is not populated in Authentication Server unless Active Directory authentication has been enabled.

To add the cache settings to the Authentication Server appsettings.json file:

  1. In the ActiveDirectory section, add the MaxCacheDurationMinutes and CacheRefreshIntervalMinutes settings and their values, for example:

    Copy
    {
        "Ims" : {
            "ActiveDirectory": {
                    "MaxCacheDurationMinutes": 60,
                    "CacheRefreshIntervalMinutes": 10
            }
  2. Save the file.
  3. Restart Authentication Server.

Check if Domain Controller name mappings need to be configured

The following error message may display when searching for Active Directory users or security groups, and when adding or editing Active Directory domains: Invalid credentials. Please check your credentials. This could occur if the domain of interest is on a different network from the network on which Authentication Server is running.

If you are certain that you have provided the correct credentials when you created an Active Directory domain record, you can configure Domain Controller name mappings in the appsettings.json file so Active Directory queries for the domain specified in DomainName are directed to the endpoint defined in DomainControllerName.

To do this:

  1. In the ActiveDirectory section of the appsettings.json file, add a DomainControllerNameMappings section.
  2. Add the required information for each domain and Domain Controller, for example:

    • DomainName – The name of your Active Directory domain or the DNS name of the domain.

    • DomainControllerName – The DNS name of the domain or the FQDN of a Domain Controller in the domain.

    Copy
    {
      "Ims": {
        "ActiveDirectory": {
                        "DomainControllerNameMappings": [
                        { 
                            "DomainName": "company.com",
                            "DomainControllerName": "server-id.company.com"
                        },     
                        { 
                            "DomainName": "my.company.com",
                            "DomainControllerName": "server-id.my.company.com"
                        }
                    ],
  3. Save the file.
  4. Restart Authentication Server.

Error message displays in the output CSV file when running the mapping function for the first time

The message An error occurred when creating the Authentication Server user record could display in the output CSV file when running the mapping function for the first time in the following scenarios:

  • If the service account you created in Hub for communication between Blue Prism and Authentication Server has not been granted the Authentication Server API permission.

  • If the client ID and client secret of the service account have not been correctly added in the Client Details section of the Authentication Server Integration tab on the Blue Prism Server Configuration Details screen.

  • When mapping users from Blue Prism to Authentication Server, if the user you are trying to map already exists in the Authentication Server database, the mapping function will check for the FirstName, LastName and Email details. If one of these already exists in Authentication Server, the user record will not be mapped.
  • If the machine you run the command on is not able to access the Authentication Server website.

Authentication Server users only have access to the Home and Digital Exchange tabs when they sign into the Blue Prism interactive client

Authentication Server manages users' access to Blue Prism and Hub, however, roles and permissions are managed locally in each application. Please contact your Blue Prism system administrators to assign you the necessary roles and permissions to view the entire Blue Prism application.