{}

Our Brands

Welcome to the Schneider Electric Website

Welcome to our website.
How can we help you today?
'Failed to verify the anti-forgery token' when attempting to login to the Web Application
Issue
When attempting to log into the PME Web Apps the login page will show an error message stating, "An unexpected error occurred while trying to authenticate the user" and will fail to log in, please see error below:
error message for login web apps
When looking into the syslog the error messages will state the following:
Failed to verify the anti-forgery token.
LogClientExtendedInformation: System.Web.Mvc.HttpAntiForgeryException (0x80004005): The anti-forgery token could not be decrypted. If this application is hosted by a Web Farm or cluster, ensure that all machines are running the same version of ASP.NET Web Pages and that the <machineKey> configuration specifies explicit encryption and validation keys. AutoGenerate cannot be used in a cluster.
at System.Web.Helpers.AntiXsrf.AntiForgeryTokenSerializer.Deserialize(String serializedToken)
at System.Web.Helpers.AntiXsrf.AntiForgeryWorker.Validate(HttpContextBase httpContext, String cookieToken, String formToken)
at System.Web.Helpers.AntiForgery.Validate(String cookieToken, String formToken)
at Framework.Web.Security.AntiForgerySupport.ValidateRequestHeader(HttpRequestBase request, Boolean onlyCheckIfUserAuthenticated)
at Framework.Web.Filters.WebAuthorizeAttribute.PerformAntiForgeryTokenValidation(HttpContextBase httpContext)

and also

Product Line
Power Monitoring Expert 2020
Power Monitoring Expert 2021
Power Monitoring Expert 2022
Power Monitoring Expert 2023

Environment
Power Monitoring Expert Web Applications

Cause
The IIS configuration is trying to use the machine key to authenticate the user logging in but the configuration for the machine key is no longer working under the automatic generation setting

Resolution
  1. Open IIS Manager
  2. Select Default Web Site on the left under Connections
  3. Double-click Machine Keys
  4. Make sure Validation method = SHA1, Encryption method = AES
  5. De-select both Automatically generate at runtime and Generate a unique key for each application checkbox
  6. On the right under Actions, click Generate Keys
  7. Copy the two keys.
  8. For each web page under Default Web Site, perform these steps:
    1. Click Machine Keys
    2. Make sure Validation method = SHA1, Encryption method = AES
    3. De-select both Automatically generate at runtime and Generate a unique key for each application checkbox
    4. Paste the generated keys from Step 6 into their respective fields.
  9. Restart IIS
  10. Restart App mod services

Schneider Electric Ireland

'Failed to verify the anti-forgery token' when attempting to login to the Web Application
Issue
When attempting to log into the PME Web Apps the login page will show an error message stating, "An unexpected error occurred while trying to authenticate the user" and will fail to log in, please see error below:
error message for login web apps
When looking into the syslog the error messages will state the following:
Failed to verify the anti-forgery token.
LogClientExtendedInformation: System.Web.Mvc.HttpAntiForgeryException (0x80004005): The anti-forgery token could not be decrypted. If this application is hosted by a Web Farm or cluster, ensure that all machines are running the same version of ASP.NET Web Pages and that the <machineKey> configuration specifies explicit encryption and validation keys. AutoGenerate cannot be used in a cluster.
at System.Web.Helpers.AntiXsrf.AntiForgeryTokenSerializer.Deserialize(String serializedToken)
at System.Web.Helpers.AntiXsrf.AntiForgeryWorker.Validate(HttpContextBase httpContext, String cookieToken, String formToken)
at System.Web.Helpers.AntiForgery.Validate(String cookieToken, String formToken)
at Framework.Web.Security.AntiForgerySupport.ValidateRequestHeader(HttpRequestBase request, Boolean onlyCheckIfUserAuthenticated)
at Framework.Web.Filters.WebAuthorizeAttribute.PerformAntiForgeryTokenValidation(HttpContextBase httpContext)

and also
 
Product Line
Power Monitoring Expert 2020
Power Monitoring Expert 2021
Power Monitoring Expert 2022
Power Monitoring Expert 2023
 
Environment
Power Monitoring Expert Web Applications
 
Cause
The IIS configuration is trying to use the machine key to authenticate the user logging in but the configuration for the machine key is no longer working under the automatic generation setting

Resolution
  1. Open IIS Manager
  2. Select Default Web Site on the left under Connections
  3. Double-click Machine Keys
  4. Make sure Validation method = SHA1Encryption method = AES
  5. De-select both Automatically generate at runtime and Generate a unique key for each application checkbox
  6. On the right under Actions, click Generate Keys
  7. Copy the two keys.
  8. For each web page under Default Web Site, perform these steps:
    1. Click Machine Keys
    2. Make sure Validation method = SHA1Encryption method = AES
    3. De-select both Automatically generate at runtime and Generate a unique key for each application checkbox
    4. Paste the generated keys from Step 6 into their respective fields.
  9. Restart IIS
  10. Restart App mod services

Schneider Electric Ireland

Explore more
Range:
Explore more
Range:
Users group

Discuss this topic with experts

Visit our Community for first-hand insights from experts and peers on this topic and more.
Users group

Discuss this topic with experts

Visit our community and get advice from experts and peers on this topic and more
Explore more
Range:
Explore more
Range:
Your browser is out of date and has known security issues.

It also may not display all features of this website or other websites.

Please upgrade your browser to access all of the features of this website.

Latest version for Google Chrome, Mozilla Firefox or Microsoft Edgeis recommended for optimal functionality.
Your browser is out of date and has known security issues.

It also may not display all features of this website or other websites.

Please upgrade your browser to access all of the features of this website.

Latest version for Google Chrome, Mozilla Firefox or Microsoft Edgeis recommended for optimal functionality.