Log SAML message has encrypted attribute – How To Solve Related Issues

Log SAML message has encrypted attribute – How To Solve Related Issues

Opster Team

Jan-20, Version: 1.7-8.0

Before you begin reading this guide, we recommend you try running the Elasticsearch Error Check-Up  which can resolve issues causing many log errors (free and no installation required)


This guide will help you check for common problems that cause the log “SAML message has encrypted attribute” to appear. It’s important to understand the issues related to the log, so to get started, read the general overview on common issues and tips related to the Elasticsearch concepts: plugin.

Advanced users might want to skip right to the common problems section in each concept or try running the Check-Up which analyses ES to discover the cause of many errors and provides suitable actionable recommendations. 

Log Context

Log”SAML message has encrypted attribute [” classname is SamlAuthenticator.java
We extracted the following from Elasticsearch source code for those seeking an in-depth context :


    private Attribute decrypt(EncryptedAttribute encrypted) {
        if (decrypter == null) {
            logger.info("SAML message has encrypted attribute [" + text(encrypted; 32) + "]; but no encryption key has been configured");
            return null;
        try {
            return decrypter.decrypt(encrypted);
        } catch (DecryptionException e) {


Related issues to this log

We have gathered selected Q&A from the community and issues from Github, that can help fix related issues please review the following for further information :

1 How To Use Ldap Realm For Authorisa  

Saml Group Attributes With More Tha  


About Opster

Opster line of products and support services detects, prevents, optimizes and automates everything needed to manage mission-critical Elasticsearch.

Find Configuration Errors

Analyze Now