The purpose of this guide is to help diagnose issues with the setup or operation of the Nasuni File IQ Single Sign-On capability. The document provides:
The new Health Check in the Nasuni File IQ Status User Interface.
A Troubleshooting guide for commonly encountered issues.
Note: The following File IQ dashboards are only available on the premium version of File IQ.
Nasuni File IQ Single Sign-On Health Check
To verify the health status of the Single Sign-On in Nasuni File IQ, follow these steps:
Log in to the Nasuni File IQ User Interface as an Administrator: https://FILE_IQ_FQDN:8443
Click File IQ UI → Nasuni File IQ Status.
Navigate to the Nasuni File IQ Single Sign-On Health Check section.
Review the status:
A green checkmark indicates that SSO is functioning correctly.
A warning icon indicates that SSO is not configured or has potential issues, such as misconfigurations or connectivity problems.
If an issue is detected, click the provided troubleshooting links for further guidance.
Check Name | Failure Type | Description |
Nasuni File IQ Single Sign-On Configuration | WARNING | The health check should pass, but display an INFO message stating that SSO is not enabled. |
Nasuni File IQ Single Sign-On health check | ERROR | File IQ Single SSO will perform a connection test with the provider and indicate either a success or an error. Note: If SSO is not enabled, the health check displays the same warning as the configuration check. |
General Troubleshooting Tips
The following steps can help diagnose commonly faced issues when Nasuni File IQ users cannot log in to the Dashboard.
Microsoft Entra ID and Okta
Validate that Client ID, Secret, and Tenant ID are correct.
Validate that the Secret has not expired in Microsoft Entra ID.
Note: The Okta secret does not expire.
Nasuni File IQ Dashboard Logs
The File IQ Dashboard logs located in the Nasuni File IQ SSO User interface can help confirm if there are any error messages related to failed authentication or authorization.
To view the logs, follow these steps:
Log in to the Nasuni File IQ User Interface as an Administrator: https://FILE_IQ_FQDN:8443
Click Configuration —> Single Sign-on. The Nasuni File IQ Single Sign-On Configuration wizard page displays
Click the Download File IQ Dashboard logs link to access the logs file and review for any error messages.
Tip: Ensure cookies and JavaScript are enabled in the web browser used by the Nasuni File IQ Dashboard users.
Identity Provider-Specific Troubleshooting
Okta
Error Message | Possible cause | Resolution |
Okta validation failed
| Okta redirect URL is not set correctly. | You must access the Okta Admin Console and configure the redirect URL with the Nasuni File IQ FQDN. Also, ensure that all users connect to the Nasuni File IQ appliance with the FQDN, not the IP address. Expected sign-in redirect URI is: https://<FILE_IQ_FQDN>:3000/login/okta For more information, see: https://developer.okta.com/docs/guides/sign-into-web-app-redirect/main/ |
Okta validation failed with status code 401: Invalid value for Client ID or Tenant ID parameter | The provided Client ID or Tenant ID is incorrect in the Nasuni File IQ SSO Configuration. |
|
Okta validation failed with status code 401: The client secret supplied for a confidential client is invalid. | The Client Secret provided in the Nasuni File IQ SSO Configuration is incorrect or does not match the value configured in Okta. |
|
Okta validation succeeded during setup, but user cannot log in. The Nasuni File IQ SSO Test Configuration button returns a successful test, but the Nasuni File IQ user can still not log in to Nasuni File IQ Dashboard. | User not assigned to the Okta application or incorrect role or group mapping | User not assigned to the Okta application.
Incorrect Role or Group Mapping
Users can define which Okta groups are allowed to log in by setting the File IQ SSO setting, for example:
Check the Nasuni File IQ Dashboard logs for more information. |
Page not found message when trying to log in to Nasuni File IQ Dashboard | The sign-in/sign-out redirect URL is incorrect in the Okta Admin Console. | Review the configured URLs in the Okta Admin Console. Also, ensure that all users connect to the Nasuni File IQ appliance with the FQDN, not the IP address. |
Login failed. User not a member of one of the required groups | OpenID Connect ID Token Group claim not configured correctly. | User not assigned to the Okta application.
Incorrect Role or Group Mapping
Users can define which Okta groups are allowed to log in by setting the File IQ SSO setting, for example:
Check the Nasuni File IQ Dashboard logs for more details. |
OAuth validation error: HTTPSConnectionPool(host='mycompany.okta.com', port=443) | This error means that the Filer IQ cannot reach the identity provider (Azure AD or Okta) over the network. The most likely cause is that outbound firewall rules are blocking access to required endpoints. | To resolve this issue, ensure the Filer IQ has outbound access to the identity provider over port 443 (HTTPS). This typically involves updating firewall rules to allow communication with Azure AD or Okta endpoints such as login.microsoftonline.com or *.okta.com. DNS resolution (port 53) must also be permitted to resolve these domains. If the environment uses a proxy, ensure proxy settings are correctly configured and the identity provider domains are not blocked. |
Microsoft Entra ID
Error Message | Possible cause | Remediation |
Validation failed for the provided input in the Nasuni File IQ User Interface. Ensure all fields meet the required format and constraints. |
|
|
OAuth validation failed with status code 400: unauthorized_client - AADSTS700016 Application with identifier <IDENTIFIER> was not found in the directory 'MyCompany'. | This can happen if the application has not been installed by the administrator of the tenant or consented to by any user in the tenant. You might have sent your authentication request to the wrong tenant.
| Application ID Is Incorrect or Not Registered
If it’s not found, ensure you are in the correct tenant (check the directory switcher at the top-right). If missing, re-register the application. The Application Is Not Assigned to the Tenant If the application exists but is not assigned to the <Customer> directory:
If it’s missing, you might need to re-register the app in the correct tenant. Admin Consent Is Required If the application requires admin consent, contact an administrator to grant the consent. Verify Redirect URIs In the App registration settings, go to Authentication → Check Redirect URIs. Ensure the URI matches the one Nasuni File IQ Dashboard uses (e.g., https://FILE_IQ_FQDN/login/azuread) Also, ensure that all users connect to the Nasuni File IQ appliance with the FQDN, not the IP address. |
OAuth validation failed with status code 401: invalid_client - AADSTS7000215 Invalid client secret provided. Ensure the secret being sent in the request is the client secret value, not the client secret ID, for a secret added to the app. |
| Ensure you use the client secret value, not the Client Secret ID. In Microsoft Entra ID, when you create a Client Secret, you get:
To confirm the correct value:
If you don't have the value (it is hidden after creation), generate a new client secret and update it in the Nasuni File IQ Entra ID SSO configuration. Verify that the Client Secret has not expired. To verify the Client Secret is active:
If expired, generate a new client secret and update Grafana. Verify That the Application Has the Right Permissions If the application is missing API permissions, the authentication might fail. To ensure the correct permissions:
|
OAuth validation failed with status code 400: invalid_request - AADSTS90002 Tenant 'xxxx' not found. Check to ensure you have the correct tenant ID and are signing into the correct cloud. Check with your subscription administrator; this might happen if there are no active subscriptions for the tenant. | The Tenant ID provided in the Nasuni File IQ SSO configuration is incorrect or does not match the value configured in the Microsoft Entra ID.
| Verify That the Tenant ID Is Correct The Tenant ID must match the one assigned to your Microsoft Entra ID organization. To confirm the Tenant ID: Go to Microsoft Entra ID: https://entra.microsoft.com.
Verify the Tenant Exists and is Active If the tenant has no active subscriptions, it might not be accessible. To verify the tenant:
Check If the Application is Assigned to the Correct Tenant If the application was registered in a different Azure AD Tenant, you must use the correct Tenant ID for authentication. To check if the application is assigned to the correct tenant:
|
Entra validation succeeded during the Nasuni File IQ SSO setup, but the user cannot login | Allowed groups might not be configured. | Configure Allowed Groups Microsoft Entra ID groups can be used to limit user access to the Nasuni File IQ Dashboard. For more information about managing groups in Microsoft Entra ID, see Manage Microsoft Entra groups and group membership. To limit access to authenticated users who are members of one or more Entra ID groups, set Allowed Groups to a comma- or space-separated list of group object IDs in the Nasuni File IQ SSO configuration. To find object IDs for a specific group on the Azure portal, go to Microsoft Entra ID Manage Groups. Find a group's Object ID by clicking the group and clicking Properties. The object ID is listed under Object ID. For example, to give access only to members of the group with an Object ID of 8bab1c86-8fba-33e5-2089-1d1c80ec2343d, set the following in the Nasuni File IQ SSO Entra configuration: Allowed Groups = 8bab1c86-8fba-33e5-2089-1d1c80ec267d. |
Nasuni Sign-in error page displayed when user logs in to Nasuni File IQ Dashboard | The sign-in/sign-out redirect URL is incorrect in the Microsoft Entra ID Admin User Interface. | Fix the Redirect URLs in the Microsoft Admin UI. Also, ensure that all users connect to the Nasuni File IQ appliance with the FQDN, not the IP address. |
Error “AADSTS900971: No reply address provided” displayed when user logs in to Nasuni File IQ Dashboard | The Graph API Permissions were not properly granted in the Microsoft Entra ID Admin User Interface. | Check the “Configure the Required Graph API Permissions in the Azure Portal” section in the File IQ Single Sign-On (SSO) document, especially the last step about Granting admin consent. |
OAuth validation error: HTTPSConnectionPool(host='login.microsoftonline.com', port=443) | This error means that the Filer IQ cannot reach the identity provider (Azure AD or Okta) over the network. The most likely cause is that outbound firewall rules are blocking access to required endpoints. | To resolve this issue, ensure the Filer IQ has outbound access to the identity provider over port 443 (HTTPS). This typically involves updating firewall rules to allow communication with Azure AD or Okta endpoints such as login.microsoftonline.com or *.okta.com. DNS resolution (port 53) must also be permitted to resolve these domains. If the environment uses a proxy, ensure proxy settings are correctly configured and the identity provider domains are not blocked. |
Troubleshooting References
Provider | Resource |
Microsoft Entra ID | Problems signing in to SAML-based Single Sign-On configured apps |
Microsoft Entra ID | |
Microsoft Entra ID | Microsoft Entra authentication & authorization error codes - Microsoft identity platform |
Okta |