|
1 | 1 | --- |
2 | 2 | title: Error AADSTS650056 - Misconfigured application |
3 | | -description: Describes a problem in which you receive an error message AADSTS650056 when signing in to SAML-based single sign-on configured app that has been configured to use Microsoft Entra ID as an Identity Provider (IdP). |
4 | | -ms.date: 08/26/2022 |
5 | | -ms.reviewer: bernawy |
| 3 | +description: Provides solutions for the AADSTS650056 misconfiguration error. |
| 4 | +ms.date: 05/19/2025 |
| 5 | +ms.reviewer: willfid |
6 | 6 | ms.service: entra-id |
7 | 7 | ms.custom: sap:Issues Signing In to Applications |
8 | 8 | --- |
9 | | -# Error AADSTS650056 - Misconfigured application |
10 | 9 |
|
11 | | -This article describes a problem in which you receive the following error message when trying to sign into a SAML-based single sign-on (SSO) configured app that has been integrated with Microsoft Entra ID: |
| 10 | +# Error AADSTS650056 - Misconfigured application |
12 | 11 |
|
13 | | -> Error AADSTS650056 - Misconfigured application. This could be due to one of the following: the client has not listed any permissions for '{name}' in the requested permissions in the client's application registration. Or, the admin has not consented in the tenant. Or, check the application identifier in the request to ensure it matches the configured client application identifier. Or, check the certificate in the request to ensure it's valid. Please contact your admin to fix the configuration or consent on behalf of the tenant. Client app ID: {id}. Please contact your admin to fix the configuration or consent on behalf of the tenant. |
| 12 | +This article provides troubleshooting steps and solutions for the error message AADSTS650056: Misconfigured application. |
14 | 13 |
|
15 | 14 | ## Symptoms |
16 | 15 |
|
17 | | -You receive error `AADSTS650056` when trying to sign into an application that has been setup to use Microsoft Entra ID for identity management using SAML-based SSO. |
| 16 | +When you try to sign in to a web application that uses Microsoft Entra ID, you might encounter the following error message: |
| 17 | + |
| 18 | +> AADSTS650056: Misconfigured application. This could be due to one of the following: The client has not listed any permissions for 'AAD Graph' in the requested permissions in the client’s application registration. Or, The admin has not consented in the tenant. Or, Check the application identifier in the request to ensure it matches the configured client application identifier. Please contact your admin to fix the configuration or consent on behalf of the tenant. |
18 | 19 |
|
19 | 20 | ## Cause |
20 | 21 |
|
21 | | -The `Issuer` attribute sent from the application to Microsoft Entra ID in the SAML request doesn’t match the Identifier value configured for the application in Microsoft Entra ID. |
| 22 | +This error usually occurs due to one of the following reasons: |
| 23 | + |
| 24 | +- The Issuer provided in the SAMLRequest is not valid. |
| 25 | +- The application does not have the required permissions to call Microsoft Graph APIs. |
| 26 | +- The admin has not consented to the permissions for the application on behalf of the tenant. |
| 27 | + |
| 28 | +## Solution 1 for SAML Authentication flows - The Issuer provided in the SAMLRequest is not valid |
| 29 | + |
| 30 | +In the SAML request below, the Issuer value must match the Identifier (Entity ID) configured in the enterprise application. This value is also known as the Identifier URI or App ID URI. For example, a SAML request might look like this: |
| 31 | + |
| 32 | +``` |
| 33 | +<samlp:AuthnRequest xmlns="urn:oasis:names:tc:SAML:2.0:metadata" ID="id6c1c178c166d486687be4aaf5e482730" Version="2.0" IssueInstant="2013-03-18T03:28:54.1839884Z" xmlns:samlp="urn:oasis:names:tc:SAML:2.0:protocol"> <Issuer xmlns="urn:oasis:names:tc:SAML:2.0:assertion">https://www.contoso.com</Issuer> </samlp:AuthnRequest> |
| 34 | +``` |
| 35 | + |
| 36 | +In this example, the Identifier URI is `https://www.contoso.com`. |
| 37 | + |
| 38 | +To fix a mismatch, do one of the following: |
| 39 | + |
| 40 | +- Update the Identifier in the enterprise application to match the Issuer in the SAML request. |
| 41 | +- Update the SaaS application configuration on the vendor side so that it passes the correct Issuer. |
| 42 | + |
| 43 | + |
| 44 | +## Solution 2: Verify application permissions and consent |
| 45 | + |
| 46 | +If your organization owns the application, follow these steps: |
| 47 | + |
| 48 | +1. Sign in to the [Azure portal](https://portal.azure.com), go to the **App registrations**, select your app registration, and then select **API permissions**. |
| 49 | +2. Make sure that the application has at least the **User.Read** delegated permission from **Microsoft Graph**. |
| 50 | +3. Check the **Status** to verify whether the permissions are consented to. For example: |
| 51 | + - If the permission isn't consented to, it will appear as **Pending** or blank. |
| 52 | + - If successfully consented, it will appear as "Granted for [Tenant Name]". |
| 53 | + |
| 54 | + Example of a consented permission: |
| 55 | + |
| 56 | + :::image type="content" source="./media/error-code-aadsts650056-misconfigured-app-graph/graph-api-permissions.png" alt-text="Screenshot of adding Graph API permissions." ::: |
| 57 | + |
| 58 | +If your organization isn't the application owner, follow these steps: |
| 59 | + |
| 60 | +1. Sign in to the application by using Global Administrator account. You should see a consent screen prompting you to grant permissions. Make sure that you select the **Consent on behalf of your organization** option before proceeding. |
| 61 | + |
| 62 | + Example of the consent screen: |
| 63 | +:::image type="content" source="./media/error-code-aadsts650056-misconfigured-app-graph/consent-permissions.png" alt-text="Screenshot of consent screen" ::: |
| 64 | +2. If you don't see the consent screen, delete the application from the **Enterprise applications** section in Microsoft Entra ID and try signing in again. |
| 65 | + |
| 66 | +If the error persists, proceed to the next solution. |
| 67 | + |
| 68 | +## Solution 3: Manually build the consent URL |
| 69 | + |
| 70 | +If the application is designed to access a specific resource, you may not be able to use the **Consent** button from the Azure portal, you may need to manually generate a consent URL, and open the URL to grant permissions to the application. |
| 71 | + |
| 72 | +### For the authorization V1 endpoint: |
| 73 | + |
| 74 | +The consent URL will look like this: |
| 75 | + |
| 76 | +```HTTP |
| 77 | +https://login.microsoftonline.com/{Tenant-Id}/oauth2/authorize?response\_type=code |
| 78 | +&client\_id={App-Id} |
| 79 | +&resource={App-Uri-Id} |
| 80 | +&scope=openid |
| 81 | +&prompt=consent |
| 82 | +``` |
22 | 83 |
|
23 | | -## Resolution |
| 84 | +For example: |
24 | 85 |
|
25 | | -Ensure that the `Issuer` attribute in the SAML request matches the Identifier value configured in Microsoft Entra ID. |
| 86 | +```HTTP |
| 87 | +https://login.microsoftonline.com/contoso.onmicrosoft.com/oauth2/authorize |
| 88 | +?response\_type=code |
| 89 | +&client\_id=044abcc4-914c-4444-9c3f-48cc3140b6b4 |
| 90 | +&resource=https://vault.azure.net/ |
| 91 | +&scope=openid |
| 92 | +&prompt=consent |
| 93 | +``` |
| 94 | +### For the authorization V2 endpoint: |
26 | 95 |
|
27 | | -Verify that the value in the Identifier textbox matches the value for the identifier value displayed in the error. |
| 96 | +The consent URL will look like this: |
28 | 97 |
|
29 | | -For more information about the Issuer attribute, see [Single Sign-On SAML protocol](/azure/active-directory/develop/single-sign-on-saml-protocol). |
| 98 | +```HTTP |
| 99 | +https://login.microsoftonline.com/{Tenant-Id}/oauth2/v2.0/authorize |
| 100 | +?response_type=code |
| 101 | +&client_id={App-Id} |
| 102 | +&scope=openid+{App-Uri-Id}/{Scope-Name} |
| 103 | +&prompt=consent |
| 104 | +``` |
30 | 105 |
|
31 | | -## More Information |
| 106 | +For example: |
32 | 107 |
|
33 | | -For a full list of Active Directory authentication and authorization error codes see [Microsoft Entra authentication and authorization error codes](/azure/active-directory/develop/reference-aadsts-error-codes). |
| 108 | +```HTTP |
| 109 | +https://login.microsoftonline.com/contoso.onmicrosoft.com/oauth2/v2.0/authorize |
| 110 | +?response_type=code |
| 111 | +&client_id=044abcc4-914c-4444-9c3f-48cc3140b6b4 |
| 112 | +&scope=openid+https://vault.azure.net/user_impersonation |
| 113 | +&prompt=consent |
| 114 | +``` |
34 | 115 |
|
35 | | -[!INCLUDE [Azure Help Support](../../../includes/azure-help-support.md)] |
| 116 | +- If the application is accessing itself as the resource, the **{App-Id}** and **{App-Uri-Id}** will be the same. |
| 117 | +- You can get the **{App-Id}** and **{App-Uri-Id}** from the application owner. |
| 118 | +- The **{Tenant-Id}** corresponds to your tenant identifier, which can be either your domain or your directory ID. |
0 commit comments