Skip to content

Commit 1a1e54f

Browse files
committed
add new article
1 parent c1bb8e3 commit 1a1e54f

1 file changed

Lines changed: 98 additions & 15 deletions

File tree

Lines changed: 98 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -1,35 +1,118 @@
11
---
22
title: Error AADSTS650056 - Misconfigured application
3-
description: Describes a problem in which you receive an error message AADSTS650056 when signing in to SAML-based single sign-on configured app that has been configured to use Microsoft Entra ID as an Identity Provider (IdP).
4-
ms.date: 08/26/2022
5-
ms.reviewer: bernawy
3+
description: Provides solutions for the AADSTS650056 misconfiguration error.
4+
ms.date: 05/19/2025
5+
ms.reviewer: willfid
66
ms.service: entra-id
77
ms.custom: sap:Issues Signing In to Applications
88
---
9-
# Error AADSTS650056 - Misconfigured application
109

11-
This article describes a problem in which you receive the following error message when trying to sign into a SAML-based single sign-on (SSO) configured app that has been integrated with Microsoft Entra ID:
10+
# Error AADSTS650056 - Misconfigured application
1211

13-
> Error AADSTS650056 - Misconfigured application. This could be due to one of the following: the client has not listed any permissions for '{name}' in the requested permissions in the client's application registration. Or, the admin has not consented in the tenant. Or, check the application identifier in the request to ensure it matches the configured client application identifier. Or, check the certificate in the request to ensure it's valid. Please contact your admin to fix the configuration or consent on behalf of the tenant. Client app ID: {id}. Please contact your admin to fix the configuration or consent on behalf of the tenant.
12+
This article provides troubleshooting steps and solutions for the error message AADSTS650056: Misconfigured application.
1413

1514
## Symptoms
1615

17-
You receive error `AADSTS650056` when trying to sign into an application that has been setup to use Microsoft Entra ID for identity management using SAML-based SSO.
16+
When you try to sign in to a web application that uses Microsoft Entra ID, you might encounter the following error message:
17+
18+
> AADSTS650056: Misconfigured application. This could be due to one of the following: The client has not listed any permissions for 'AAD Graph' in the requested permissions in the client’s application registration. Or, The admin has not consented in the tenant. Or, Check the application identifier in the request to ensure it matches the configured client application identifier. Please contact your admin to fix the configuration or consent on behalf of the tenant.
1819
1920
## Cause
2021

21-
The `Issuer` attribute sent from the application to Microsoft Entra ID in the SAML request doesn’t match the Identifier value configured for the application in Microsoft Entra ID.
22+
This error usually occurs due to one of the following reasons:
23+
24+
- The Issuer provided in the SAMLRequest is not valid.
25+
- The application does not have the required permissions to call Microsoft Graph APIs.
26+
- The admin has not consented to the permissions for the application on behalf of the tenant.
27+
28+
## Solution 1 for SAML Authentication flows - The Issuer provided in the SAMLRequest is not valid
29+
30+
In the SAML request below, the Issuer value must match the Identifier (Entity ID) configured in the enterprise application. This value is also known as the Identifier URI or App ID URI. For example, a SAML request might look like this:
31+
32+
```
33+
<samlp:AuthnRequest xmlns="urn:oasis:names:tc:SAML:2.0:metadata" ID="id6c1c178c166d486687be4aaf5e482730" Version="2.0" IssueInstant="2013-03-18T03:28:54.1839884Z" xmlns:samlp="urn:oasis:names:tc:SAML:2.0:protocol"> <Issuer xmlns="urn:oasis:names:tc:SAML:2.0:assertion">https://www.contoso.com</Issuer> </samlp:AuthnRequest>
34+
```
35+
36+
In this example, the Identifier URI is `https://www.contoso.com`.
37+
38+
To fix a mismatch, do one of the following:
39+
40+
- Update the Identifier in the enterprise application to match the Issuer in the SAML request.
41+
- Update the SaaS application configuration on the vendor side so that it passes the correct Issuer.
42+
43+
44+
## Solution 2: Verify application permissions and consent
45+
46+
If your organization owns the application, follow these steps:
47+
48+
1. Sign in to the [Azure portal](https://portal.azure.com), go to the **App registrations**, select your app registration, and then select **API permissions**.
49+
2. Make sure that the application has at least the **User.Read** delegated permission from **Microsoft Graph**.
50+
3. Check the **Status** to verify whether the permissions are consented to. For example:
51+
- If the permission isn't consented to, it will appear as **Pending** or blank.
52+
- If successfully consented, it will appear as "Granted for [Tenant Name]".
53+
54+
Example of a consented permission:
55+
56+
:::image type="content" source="./media/error-code-aadsts650056-misconfigured-app-graph/graph-api-permissions.png" alt-text="Screenshot of adding Graph API permissions." :::
57+
58+
If your organization isn't the application owner, follow these steps:
59+
60+
1. Sign in to the application by using Global Administrator account. You should see a consent screen prompting you to grant permissions. Make sure that you select the **Consent on behalf of your organization** option before proceeding.
61+
62+
Example of the consent screen:
63+
:::image type="content" source="./media/error-code-aadsts650056-misconfigured-app-graph/consent-permissions.png" alt-text="Screenshot of consent screen" :::
64+
2. If you don't see the consent screen, delete the application from the **Enterprise applications** section in Microsoft Entra ID and try signing in again.
65+
66+
If the error persists, proceed to the next solution.
67+
68+
## Solution 3: Manually build the consent URL
69+
70+
If the application is designed to access a specific resource, you may not be able to use the **Consent** button from the Azure portal, you may need to manually generate a consent URL, and open the URL to grant permissions to the application.
71+
72+
### For the authorization V1 endpoint:
73+
74+
The consent URL will look like this:
75+
76+
```HTTP
77+
https://login.microsoftonline.com/{Tenant-Id}/oauth2/authorize?response\_type=code
78+
&client\_id={App-Id}
79+
&resource={App-Uri-Id}
80+
&scope=openid
81+
&prompt=consent
82+
```
2283

23-
## Resolution
84+
For example:
2485

25-
Ensure that the `Issuer` attribute in the SAML request matches the Identifier value configured in Microsoft Entra ID.
86+
```HTTP
87+
https://login.microsoftonline.com/contoso.onmicrosoft.com/oauth2/authorize
88+
?response\_type=code
89+
&client\_id=044abcc4-914c-4444-9c3f-48cc3140b6b4
90+
&resource=https://vault.azure.net/
91+
&scope=openid
92+
&prompt=consent
93+
```
94+
### For the authorization V2 endpoint:
2695

27-
Verify that the value in the Identifier textbox matches the value for the identifier value displayed in the error.
96+
The consent URL will look like this:
2897

29-
For more information about the Issuer attribute, see [Single Sign-On SAML protocol](/azure/active-directory/develop/single-sign-on-saml-protocol).
98+
```HTTP
99+
https://login.microsoftonline.com/{Tenant-Id}/oauth2/v2.0/authorize
100+
?response_type=code
101+
&client_id={App-Id}
102+
&scope=openid+{App-Uri-Id}/{Scope-Name}
103+
&prompt=consent
104+
```
30105

31-
## More Information
106+
For example:
32107

33-
For a full list of Active Directory authentication and authorization error codes see [Microsoft Entra authentication and authorization error codes](/azure/active-directory/develop/reference-aadsts-error-codes).
108+
```HTTP
109+
https://login.microsoftonline.com/contoso.onmicrosoft.com/oauth2/v2.0/authorize
110+
?response_type=code
111+
&client_id=044abcc4-914c-4444-9c3f-48cc3140b6b4
112+
&scope=openid+https://vault.azure.net/user_impersonation
113+
&prompt=consent
114+
```
34115

35-
[!INCLUDE [Azure Help Support](../../../includes/azure-help-support.md)]
116+
- If the application is accessing itself as the resource, the **{App-Id}** and **{App-Uri-Id}** will be the same.
117+
- You can get the **{App-Id}** and **{App-Uri-Id}** from the application owner.
118+
- The **{Tenant-Id}** corresponds to your tenant identifier, which can be either your domain or your directory ID.

0 commit comments

Comments
 (0)