Tenant-specific and tenant-independent metadata endpoints
Microsoft Entra ID publishes tenant-specific and tenant-independent endpoints.
Tenant-specific endpoints are designed for a particular tenant. The tenant-specific federation metadata includes information about the tenant, including tenant-specific issuer and endpoint information. Applications that restrict access to a single tenant use tenant-specific endpoints.
Tenant-independent endpoints provide information that is common to all Microsoft Entra tenants. This information applies to tenants hosted at login.microsoftonline.com and is shared across tenants. Tenant-independent endpoints are recommended for multitenant applications, since they are not associated with any particular tenant.
Federation metadata endpoints
Microsoft Entra ID publishes federation metadata at https://login.microsoftonline.com/<TenantDomainName>/FederationMetadata/2007-06/FederationMetadata.xml.
For tenant-specific endpoints, the TenantDomainName can be one of the following types:
A registered domain name of a Microsoft Entra tenant, such as: contoso.onmicrosoft.com.
The immutable tenant ID of the domain, such as aaaabbbb-0000-cccc-1111-dddd2222eeee.
For tenant-independent endpoints, the TenantDomainName is common. This document lists only the Federation Metadata elements that are common to all Microsoft Entra tenants that are hosted at login.microsoftonline.com.
For example, a tenant-specific endpoint might be https://login.microsoftonline.com/contoso.onmicrosoft.com/FederationMetadata/2007-06/FederationMetadata.xml. The tenant-independent endpoint is https://login.microsoftonline.com/common/FederationMetadata/2007-06/FederationMetadata.xml. You can view the federation metadata document by typing this URL in a browser.
Contents of federation metadata
The following section provides information needed by services that consume the tokens issued by Microsoft Entra ID.
Entity ID
The EntityDescriptor element contains an EntityID attribute. The value of the EntityID attribute represents the issuer, that is, the security token service (STS) that issued the token. It is important to validate the issuer when you receive a token.
The following metadata shows a sample tenant-specific EntityDescriptor element with an EntityID element.
You can replace the tenant ID in the tenant-independent endpoint with your tenant ID to create a tenant-specific EntityID value. The resulting value will be the same as the token issuer. The strategy allows a multitenant application to validate the issuer for a given tenant.
The following metadata shows a sample tenant-independent EntityID element. Please note, that the {tenant} is a literal, not a placeholder.
When a service receives a token that is issued by a Microsoft Entra tenant, the signature of the token must be validated with a signing key that is published in the federation metadata document. The federation metadata includes the public portion of the certificates that the tenants use for token signing. The certificate raw bytes appear in the KeyDescriptor element. The token signing certificate is valid for signing only when the value of the use attribute is signing.
A federation metadata document published by Microsoft Entra ID can have multiple signing keys, such as when Microsoft Entra ID is preparing to update the signing certificate. When a federation metadata document includes more than one certificate, a service that is validating the tokens should support all certificates in the document.
The following metadata shows a sample KeyDescriptor element with a signing key.
The KeyDescriptor element appears in two places in the federation metadata document; in the WS-Federation-specific section and the SAML-specific section. The certificates published in both sections will be the same.
In the WS-Federation-specific section, a WS-Federation metadata reader would read the certificates from a RoleDescriptor element with the SecurityTokenServiceType type.
The following metadata shows a sample RoleDescriptor element.
There are no differences in the format of tenant-specific and tenant-independent certificates.
WS-Federation endpoint URL
The federation metadata includes the URL that is Microsoft Entra ID uses for single sign-in and single sign-out in WS-Federation protocol. This endpoint appears in the PassiveRequestorEndpoint element.
The following metadata shows a sample PassiveRequestorEndpoint element for a tenant-specific endpoint.
The federation metadata includes the URL that Microsoft Entra ID uses for single sign-in and single sign-out in SAML 2.0 protocol. These endpoints appear in the IDPSSODescriptor element.
The sign-in and sign-out URLs appear in the SingleSignOnService and SingleLogoutService elements.
The following metadata shows a sample PassiveResistorEndpoint for a tenant-specific endpoint.
Similarly the endpoints for the common SAML 2.0 protocol endpoints are published in the tenant-independent federation metadata, as shown in the following sample.