AuthTokenEpRequestFailed on ALB when integrating with corporate OIDC provider

0

Hi, we try to to integrate an ALB with our own OIDC provider (which again is behind an NLB/ALB in different VPC + AWS account, but with public IP and DNS) as described here: https://docs.aws.amazon.com/elasticloadbalancing/latest/application/listener-authenticate-users.html#oidc-requirements

When requesting the protected URL, the ALB redirects us to configured AuthorizationEndpoint. After entering credentials we are redirected back to the ALB but getting an 500 HTTP status code. We enabled access log of ALB, but we only get an error_reason "AuthTokenEpRequestFailed". Regarding the docs (https://docs.aws.amazon.com/elasticloadbalancing/latest/application/load-balancer-access-logs.html#access-log-entry-format) this means "There is an error response (non-2XX) from the token endpoint."

But we don't see any access logs on the token endpoint of the OIDC provider. We also don't see any log entries on the ALB of the OIDC provider.

Is there anything else we can do to get more information what goes wrong ? How to get the more information on the failed request, that the ALB is executing (url, response code....) ?

tgunsch
已提问 3 个月前331 查看次数
2 回答
0

Hello,

HTTP 500 error will occur in this setup if the load balancer is unable to communicate with the IdP token endpoint or the IdP user info endpoint

The following would be my recommendation to troubleshoot this issue:

  1. Verify that the IdP's DNS is publicly resolvable.

  2. Verify that the security groups for your load balancer and the network ACLs for your VPC allow outbound access to these endpoints.

  3. Verify that your VPC has internet access. If you have an internal-facing load balancer, use a NAT gateway to enable internet access.

You can also check metrics like ELBAuthError, ELBAuthFailure under "AWS/ApplicationELB” namespace for more information.

AWS
支持工程师
已回答 3 个月前
0

Hi,

thanks for your answer. Yes we checked them all:

  1. The IdP DNs is resolveable from internet (we have an ALB with public IP's in front) and also the tls certificate is valid.
  2. We checked this by changing the oidc configuration of the ALB from our own IDP to our corporate IDP (which is internet facing). With the corpororate IDP the setup is working.
  3. Yes, the VPC has internet access.

What we also encounter: In the Monitoring View of the IDP-ALB (i.e. the ALB in front of our own IDP), we see "Client TLS Negotiation Errors". Are there any requirements regarding the Certificate of the IDP aside that it must be a "public" Certificate ? Any restrictions key length ?

tgunsch
已回答 3 个月前

您未登录。 登录 发布回答。

一个好的回答可以清楚地解答问题和提供建设性反馈,并能促进提问者的职业发展。

回答问题的准则