Skip to content

Commit 13b2a2d

Browse files
authored
Update troubleshooting-signature-validation-errors.md
1 parent 787b3c6 commit 13b2a2d

1 file changed

Lines changed: 8 additions & 7 deletions

File tree

support/entra/entra-id/app-integration/troubleshooting-signature-validation-errors.md

Lines changed: 8 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Troubleshoot Access Token Signature Validation Errors
33
description: Helps you troubleshoot access token signature validation errors and provides solutions in some scenarios.
4-
ms.date: 08/06/2025
4+
ms.date: 08/08/2025
55
ms.reviewer: willfid
66
ms.service: entra-id
77
ms.custom: sap:Developing or Registering apps with Microsoft identity platform
@@ -24,7 +24,7 @@ When a resource provider validates an access token's signature, signature valida
2424
2525
## Step 2: Validate the audience claim of the access token
2626

27-
If you send a Microsoft Graph access token to a non-Microsoft Graph resource provider, you will get a signature validation error. Only Microsoft Graph can validate such token. The value of a Microsoft Graph token's `aud` claim is one of the following:
27+
If you send a Microsoft Graph access token to a non-Microsoft Graph resource provider, you get a signature validation error. Only Microsoft Graph can validate such token. The value of a Microsoft Graph token's `aud` claim is one of the following:
2828

2929
- `https://graph.microsoft.us`
3030
- `https://graph.microsoft.us/`
@@ -48,7 +48,7 @@ If you use a Microsoft authentication library like Microsoft Authentication Libr
4848

4949
If you have configured a tenant ID, the `MetadataAddress` would be `https://login.microsoftonline.com/{tenant-id}/v2.0/.well-known/openid-configuration`. If you have configured an `Authority` like `https://login.microsoftonline.us/{tenant-id}`, the `MetadataAddress` would be `https://login.microsoftonline.us/{tenant-id}/v2.0/.well-known/openid-configuration`.
5050

51-
The OpenId Connect Metadata endpoint includes the `jwks_uri` property (also known as discovery keys endpoint), which specifies the location of signing keys. Depending on which OpenId Connect Metadata endpoint is used, it will return a different URL for the `jwks_uri` property. Here's a table that provides a few examples:
51+
The OpenId Connect Metadata endpoint includes the `jwks_uri` property (also known as discovery keys endpoint), which specifies the location of signing keys. Depending on which OpenId Connect Metadata endpoint is used, it returns a different URL for the `jwks_uri` property. Here's a table that provides a few examples:
5252

5353
| Metadata endpoint | Discovery keys endpoint |
5454
| --- | --- |
@@ -122,7 +122,7 @@ Assume that the access token is issued from Microsoft Entra ID instead of Azure
122122

123123
We don't recommend using both OAuth2 and SAML for the same application. To resolve this issue, keep your application separate for OAuth2 and SAML by using one of the following methods:
124124

125-
- Create a new app registration for OAuth2 (recommended method)
125+
- Create a new app registration for OAuth2 (recommended method).
126126
- Convert the enterprise application to use OAuth2 only.
127127

128128
To do so, disable SAML SSO by setting the `preferredSingleSignOnMode` property on the `servicePrincipal` to `null` or `oidc`.
@@ -136,7 +136,7 @@ We don't recommend using both OAuth2 and SAML for the same application. To resol
136136

137137
Make sure you set the OpenId Connect Metadata configuration based on whether the access token is issued from Microsoft Entra ID or Azure AD B2C, or if adding `?appid={application-id}`.
138138

139-
Generally configuring the Microsoft Entra ID `Instance` and `Tenant`, or `Authority` correctly can resolve signature validation errors.
139+
Generally, configuring the Microsoft Entra ID `Instance` and `Tenant`, or `Authority` correctly can resolve signature validation errors.
140140

141141
- `Instance`
142142

@@ -154,7 +154,7 @@ Generally configuring the Microsoft Entra ID `Instance` and `Tenant`, or `Author
154154

155155
So, `Authority` would be like `https://login.microsoftonline.com/contoso.onmicrosoft.com`.
156156

157-
Generally the `MetadataAddress` is built based on the `Instance`/`Tenant`/`Authority` configuration and will automatically concatenate `/.well-known/openid-configuration` at the end. The following sections provide examples of manually specifying the `MetadataAddress`.
157+
Generally, the `MetadataAddress` is built based on the `Instance`/`Tenant`/`Authority` configuration and will automatically concatenate `/.well-known/openid-configuration` at the end. The following sections provide examples of manually specifying the `MetadataAddress`.
158158

159159
### Example 1: Use Microsoft Identity Web
160160

@@ -226,7 +226,7 @@ For more details, see [Microsoft Identity Web customization](https://github.com/
226226

227227
Refer to [Configure your App Service or Azure Functions app to use Microsoft Entra sign-in](/azure/app-service/configure-authentication-provider-aad).
228228

229-
### Exempale 4: Use Azure API Management
229+
### Example 4: Use Azure API Management
230230

231231
Refer to [Secure an Azure API Management API with Azure AD B2C](/azure/active-directory-b2c/secure-api-management?tabs=app-reg-ga).
232232

@@ -235,3 +235,4 @@ Refer to [Secure an Azure API Management API with Azure AD B2C](/azure/active-di
235235
[Validate tokens](/entra/identity-platform/access-tokens#validate-tokens)
236236

237237
[!INCLUDE [Azure Help Support](../../../includes/azure-help-support.md)]
238+

0 commit comments

Comments
 (0)