संपादित करें

इसके माध्यम से साझा किया गया


An app page shows an error message after the user signs in

In this scenario, Microsoft Entra ID signs the user in. But the application displays an error message and doesn't let the user finish the sign-in flow. The problem is that the app didn't accept the response that Microsoft Entra ID issued.

There are several possible reasons why the app didn't accept the response from Microsoft Entra ID. If there's an error message or code displayed, use the following resources to diagnose the error:

If the error message doesn't clearly identify what's missing from the response, try the following:

Tip

Steps in this article might vary slightly based on the portal you start from.

Attributes are missing from the SAML response

To add an attribute in the Microsoft Entra configuration that will be sent in the Microsoft Entra response, follow these steps:

  1. Sign in to the Microsoft Entra admin center as at least a Cloud Application Administrator.

  2. Browse to Identity > Applications > Enterprise applications > All applications.

  3. Enter the name of the existing application in the search box, and then select the application that you want to configure for single sign-on.

  4. After the app loads, select Single sign-on in the navigation pane.

  5. In the User Attributes section, select View and edit all other user attributes. Here you can change which attributes to send to the app in the SAML token when users sign in.

    To add an attribute:

    1. Select Add attribute. Enter the Name, and select the Value from the drop-down list.

    2. Select Save. You'll see the new attribute in the table.

  6. Save the configuration.

    The next time that the user signs in to the app, Microsoft Entra ID will send the new attribute in the SAML response.

The app cannot identify the user

Signing in to the app fails because the SAML response is missing an attribute such as a role. Or it fails because the app expects a different format or value for the NameID (User Identifier) attribute.

If you're using Microsoft Entra ID automated user provisioning to create, maintain, and remove users in the app, verify that the user has been provisioned to the SaaS app. For more information, see No users are being provisioned to a Microsoft Entra Gallery application.

Add an attribute to the Microsoft Entra app configuration

To change the User Identifier value, follow these steps:

  1. Sign in to the Microsoft Entra admin center as at least a Cloud Application Administrator.
  2. Browse to Identity > Applications > Enterprise applications > All applications.
  3. Select the app that you want to configure for SSO.
  4. After the app loads, select Single sign-on in the navigation pane.
  5. Under User attributes, select the unique identifier for the user from the User Identifier drop-down list.

Change the NameID format

If the application expects another format for the NameID (User Identifier) attribute, see the Edit nameID section to change the NameID format.

Microsoft Entra ID selects the format for the NameID attribute (User Identifier) based on the value that's selected or the format that's requested by the app in the SAML AuthRequest. For more information, see the "NameIDPolicy" section of Single sign-on SAML protocol.

The app expects a different signature method for the SAML response

To change which parts of the SAML token are digitally signed by Microsoft Entra ID, follow these steps:

  1. Sign in to the Microsoft Entra admin center as at least a Cloud Application Administrator.

  2. Browse to Identity > Applications > Enterprise applications > All applications.

  3. Select the application that you want to configure for single sign-on.

  4. After the application loads, select Single sign-on in the navigation pane.

  5. Under SAML Signing Certificate, select Show advanced certificate signing settings.

  6. Select the Signing Option that the app expects from among these options:

    • Sign SAML response
    • Sign SAML response and assertion
    • Sign SAML assertion

    The next time that the user signs in to the app, Microsoft Entra ID will sign the part of the SAML response that you selected.

The app expects the SHA-1 signing algorithm

By default, Microsoft Entra ID signs the SAML token by using the most-secure algorithm. We recommend that you don't change the signing algorithm to SHA-1 unless the app requires SHA-1.

To change the signing algorithm, follow these steps:

  1. Sign in to the Microsoft Entra admin center as at least a Cloud Application Administrator.

  2. Browse to Identity > Applications > Enterprise applications > All applications.

  3. Select the app that you want to configure for single sign-on.

  4. After the app loads, select Single sign-on from the navigation pane on the left side of the app.

  5. Under SAML Signing Certificate, select Show advanced certificate signing settings.

  6. Select SHA-1 as the Signing Algorithm.

    The next time that the user signs in to the app, Microsoft Entra ID will sign the SAML token by using the SHA-1 algorithm.

Next steps