Hi there,
maybe there's a trick I do not know of but you do - otherwise take this as a suggestion/feature request.
We renew our official certificates yearly which also affects federation - we use MS AD FS. We change all certificates to the public one - web server port, token signing, token encryption.
AD FS has a cool feature where a new signing/encryption certificate can be imported as secondary before the original (primary) expires. Thus all properly coded identity clients can refresh this from the metadata URL and see that there is now another legitimate certificate. After a grace period of a few days you switch the secondary certificate to primary.
Now my SAML authentication to ONTAP System Manager (FAS and AFF) is broken: "Message was signed, but signature could not be verified." This leads me to the conclusion that ONTAP does not properly handle the federation metadata and just evaluates this one-time instead of periodically retrieving AD FS metadata updates. Also the NetApp SAML Troubleshooting Guide makes no mention of a certificate change process or troubleshooting options. "saml repair" in Advanced has no effect. Therefore it seems a trip to the vault to recover the protected console passwords will be in order for a disable-enable SAML game.
Certificate management is a common operational task so NetApp ONTAP should handle this more intelligently - either by periodic metadata checks or at least some manual refresh capability, be it as part of the "repair" subcommand or something new like "metadata refresh" or what have you.
Thanks & regards,
Markus