I uninstalled and installed the SP again. Now that error has gone.
Now I'm getting a different error that some people reported earlier . "This service requires cookies. Please ensure that they are enabled and try your going back to your desired resource and trying to login again"
The IDP log contains the below lines.
...
17:26:05.669 - DEBUG [org.opensaml.ws.message.decoder.BaseMessageDecoder:81] - Successfully decoded message.
17:26:05.669 - DEBUG [org.opensaml.common.binding.decoding.BaseSAMLMessageDecoder:190] - Checking SAML message intended destination endpoint against receiver endpoint
17:26:05.669 - DEBUG [org.opensaml.common.binding.decoding.BaseSAMLMessageDecoder:209] - Intended message destination endpoint:
https://shaji.fischer.com:8443/idp/profile/SAML2/Redirect/SSO
17:26:05.669 - DEBUG [org.opensaml.common.binding.decoding.BaseSAMLMessageDecoder:210] - Actual message receiver endpoint:
https://shaji.fischer.com:8443/idp/profile/SAML2/Redirect/SSO
17:26:05.669 - DEBUG [org.opensaml.common.binding.decoding.BaseSAMLMessageDecoder:218] - SAML message intended destination endpoint matched recipient endpoint
17:26:05.669 - DEBUG [edu.internet2.middleware.shibboleth.idp.profile.saml2.SSOProfileHandler:325] - Decoded request from relying party 'secure'
17:26:05.670 - DEBUG [org.opensaml.saml2.metadata.provider.ChainingMetadataProvider:199] - Checking child metadata provider for entity descriptor with entity ID: secure
17:26:05.670 - DEBUG [org.opensaml.saml2.metadata.provider.AbstractMetadataProvider:509] - Searching for entity descriptor with an entity ID of secure
17:26:05.670 - DEBUG [org.opensaml.saml2.metadata.provider.AbstractMetadataProvider:166] - Metadata document does not contain an EntityDescriptor with the ID secure
17:26:05.670 - DEBUG [org.opensaml.saml2.metadata.provider.AbstractMetadataProvider:170] - Metadata document contained an EntityDescriptor with the ID secure, but it was no longer valid
17:26:05.670 - DEBUG [org.opensaml.saml2.metadata.provider.ChainingMetadataProvider:199] - Checking child metadata provider for entity descriptor with entity ID: secure
17:26:05.670 - DEBUG [org.opensaml.saml2.metadata.provider.AbstractMetadataProvider:509] - Searching for entity descriptor with an entity ID of secure
17:26:05.670 - DEBUG [edu.internet2.middleware.shibboleth.common.relyingparty.provider.SAMLMDRelyingPartyConfigurationManager:126] - Looking up relying party configuration for secure
17:26:05.670 - DEBUG [edu.internet2.middleware.shibboleth.common.relyingparty.provider.SAMLMDRelyingPartyConfigurationManager:132] - No custom relying party configuration found for secure, looking up configuration based on metadata groups.
17:26:05.670 - DEBUG [org.opensaml.saml2.metadata.provider.ChainingMetadataProvider:199] - Checking child metadata provider for entity descriptor with entity ID: secure
17:26:05.670 - DEBUG [org.opensaml.saml2.metadata.provider.AbstractMetadataProvider:509] - Searching for entity descriptor with an entity ID of secure
17:26:05.670 - DEBUG [org.opensaml.saml2.metadata.provider.AbstractMetadataProvider:166] - Metadata document does not contain an EntityDescriptor with the ID secure
17:26:05.670 - DEBUG [org.opensaml.saml2.metadata.provider.AbstractMetadataProvider:170] - Metadata document contained an EntityDescriptor with the ID secure, but it was no longer valid
17:26:05.671 - DEBUG [org.opensaml.saml2.metadata.provider.ChainingMetadataProvider:199] - Checking child metadata provider for entity descriptor with entity ID: secure
17:26:05.671 - DEBUG [org.opensaml.saml2.metadata.provider.AbstractMetadataProvider:509] - Searching for entity descriptor with an entity ID of secure
17:26:05.671 - DEBUG [edu.internet2.middleware.shibboleth.common.relyingparty.provider.SAMLMDRelyingPartyConfigurationManager:155] - No custom or group-based relying party configuration found for secure. Using default relying party configuration.
17:26:05.671 - DEBUG [edu.internet2.middleware.shibboleth.idp.profile.saml2.SSOProfileHandler:198] - Creating login context and transferring control to authentication engine
17:26:05.673 - DEBUG [edu.internet2.middleware.shibboleth.idp.util.HttpServletHelper:166] - Storing LoginContext to StorageService partition loginContexts, key 93a5a262-f84e-48a0-9224-d01b1b7d3dc3
17:26:05.673 - DEBUG [edu.internet2.middleware.shibboleth.idp.profile.saml2.SSOProfileHandler:211] - Redirecting user to authentication engine at
https://shaji.fischer.com:8443/idp/AuthnEngine
17:26:05.675 - DEBUG [edu.internet2.middleware.shibboleth.idp.authn.AuthenticationEngine:203] - Processing incoming request
17:26:05.675 - DEBUG [edu.internet2.middleware.shibboleth.idp.util.HttpServletHelper:326] - Looking up LoginContext with key 93a5a262-f84e-48a0-9224-d01b1b7d3dc3 from StorageService parition: loginContexts
17:26:05.675 - DEBUG [edu.internet2.middleware.shibboleth.idp.util.HttpServletHelper:332] - Retrieved LoginContext with key 93a5a262-f84e-48a0-9224-d01b1b7d3dc3 from StorageService parition: loginContexts
17:26:05.675 - DEBUG [edu.internet2.middleware.shibboleth.idp.authn.AuthenticationEngine:233] - Beginning user authentication process.
17:26:05.675 - DEBUG [edu.internet2.middleware.shibboleth.idp.authn.AuthenticationEngine:237] - Existing IdP session available for principal null
17:26:05.675 - DEBUG [edu.internet2.middleware.shibboleth.idp.authn.AuthenticationEngine:279] - Filtering configured LoginHandlers: {urn:oasis:names:tc:SAML:2.0:ac:classes:PreviousSession=edu.internet2.middleware.shibboleth.idp.authn.provider.PreviousSessionLoginHandler@13e00b, urn:oasis:names:tc:SAML:2.0:ac:classes:unspecified=edu.internet2.middleware.shibboleth.idp.authn.provider.RemoteUserLoginHandler@da2ebd}
17:26:05.676 - DEBUG [edu.internet2.middleware.shibboleth.idp.authn.AuthenticationEngine:344] - Filtering out previous session login handler because there are no active authentication methods
17:26:05.676 - DEBUG [edu.internet2.middleware.shibboleth.idp.authn.AuthenticationEngine:463] - Selecting appropriate login handler from filtered set {urn:oasis:names:tc:SAML:2.0:ac:classes:unspecified=edu.internet2.middleware.shibboleth.idp.authn.provider.RemoteUserLoginHandler@da2ebd}
17:26:05.676 - DEBUG [edu.internet2.middleware.shibboleth.idp.authn.AuthenticationEngine:496] - Authenticating user with login handler of type edu.internet2.middleware.shibboleth.idp.authn.provider.RemoteUserLoginHandler
17:26:05.676 - DEBUG [edu.internet2.middleware.shibboleth.idp.util.HttpServletHelper:166] - Storing LoginContext to StorageService partition loginContexts, key db69381a-bba3-41b6-a3aa-b26d54c46e13
17:26:05.676 - DEBUG [edu.internet2.middleware.shibboleth.idp.authn.provider.RemoteUserLoginHandler:75] - Redirecting to
https://shaji.fischer.com:8443/idp/Authn/RemoteUser
17:26:05.678 - DEBUG [edu.internet2.middleware.shibboleth.idp.authn.provider.RemoteUserAuthServlet:47] - Remote user identified as null returning control back to authentication engine
17:26:05.678 - DEBUG [edu.internet2.middleware.shibboleth.idp.authn.AuthenticationEngine:144] - Returning control to authentication engine
17:26:05.678 - DEBUG [edu.internet2.middleware.shibboleth.idp.util.HttpServletHelper:326] - Looking up LoginContext with key db69381a-bba3-41b6-a3aa-b26d54c46e13 from StorageService parition: loginContexts
17:26:05.678 - DEBUG [edu.internet2.middleware.shibboleth.idp.util.HttpServletHelper:332] - Retrieved LoginContext with key db69381a-bba3-41b6-a3aa-b26d54c46e13 from StorageService parition: loginContexts
17:26:05.678 - DEBUG [edu.internet2.middleware.shibboleth.idp.authn.AuthenticationEngine:203] - Processing incoming request
17:26:05.678 - DEBUG [edu.internet2.middleware.shibboleth.idp.util.HttpServletHelper:326] - Looking up LoginContext with key db69381a-bba3-41b6-a3aa-b26d54c46e13 from StorageService parition: loginContexts
17:26:05.678 - DEBUG [edu.internet2.middleware.shibboleth.idp.util.HttpServletHelper:332] - Retrieved LoginContext with key db69381a-bba3-41b6-a3aa-b26d54c46e13 from StorageService parition: loginContexts
17:26:05.679 - DEBUG [edu.internet2.middleware.shibboleth.idp.authn.AuthenticationEngine:513] - Completing user authentication process
17:26:05.679 - DEBUG [edu.internet2.middleware.shibboleth.idp.authn.AuthenticationEngine:572] - Validating authentication was performed successfully
17:26:05.679 - DEBUG [edu.internet2.middleware.shibboleth.idp.authn.AuthenticationEngine:675] - Updating session information for principal null
...
I dont understand why this line came : " Metadata document contained an EntityDescriptor with the ID secure, but it was no longer valid"
and it doent not contain "validUntil" attribute.
I even tried with MetadataProvider attribute in relying-party.xml with attribue requireValidMetadata set to false. But still the error exist.
Thanks for your time.