You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
title: AADSTS7500514 - A supported type of SAML response was not found with PingFederate
3
-
description: Describes an error code `AADSTS7500514` that's returned if a federated account try to authenticate with Microsoft Entra ID.
3
+
description: Describes an error code `AADSTS7500514` that's returned if a federated account tries to authenticate with Microsoft Entra ID.
4
4
ms.date: 04/17/2025
5
5
ms.author: bachoang
6
6
ms.service: entra-id
@@ -10,11 +10,11 @@ keywords: AADSTS50020
10
10
11
11
# AADSTS7500514 - A supported type of SAML response was not found with PingFederate
12
12
13
-
This article helps you troubleshoot error code `AADSTS7500514` that's returned if a PingFederate federated account try to authenticate with Microsoft Entra ID (formerly Azure Active Directory).
13
+
This article helps you troubleshoot error code `AADSTS7500514` that's returned if a PingFederate federated account tries to authenticate with Microsoft Entra ID (formerly Azure Active Directory).
14
14
15
15
## Symptoms
16
16
17
-
When a federated account tries to authenticate with an Microsoft Authentication Library (MSAL) or Active Directory Authentication Library (ADAL) based application, the sign-in fails. The following error message is displayed:
17
+
When a federated account tries to authenticate with Microsoft Entra ID from a Microsoft Authentication Library (MSAL) or Active Directory Authentication Library (ADAL) based application, the sign-in fails. The following error message is displayed:
18
18
19
19
```output
20
20
{
@@ -27,22 +27,22 @@ When a federated account tries to authenticate with an Microsoft Authentication
27
27
28
28
The error typically occurs in the following environment:
29
29
30
-
- A federated account that uses [PingFederate](https://www.pingidentity.com/software/pingfederate.html) as the identity provider is used for authentication.
30
+
- A federated account that uses [PingFederate](https://www.pingidentity.com/software/pingfederate.html) as the identity provider.
31
31
- The identity provider is configured to issue a SAML 1.1 token by using the WS-Trust protocol.
32
32
- The application uses one of the following APIs for authentication:
- Any PowerShell module that uses the MSAL or ADAL methods listed earlier.
36
36
37
37
## Cause
38
38
39
-
Since [ADAL has been deprecated](/entra/identity/monitoring-health/recommendation-migrate-from-adal-to-msal), this article focus on the MSAL.
39
+
Since [ADAL has been deprecated](/entra/identity/monitoring-health/recommendation-migrate-from-adal-to-msal), this article focuses on the MSAL.
40
40
41
41
This issue occurs if the SAML response from PingFederate does not contain the SAML version or uses a format that MSAL cannot recognize. This typically results from a misconfiguration on the PingFederate side for Microsoft Entra ID.
42
42
43
-
### How the issue occurs
43
+
### Root cause analysis: SAML token version detection
44
44
45
-
When authenticating a federated account, MSAL determines whether the account is managed account or federated account.
45
+
When authenticating a federated account, MSAL determines whether the account is a managed account or a federated account.
46
46
47
47
For managed accounts, MSAL uses the [Resource Owner Password Credentials grant flow](/entra/identity-platform/v2-oauth-ropc). For federated accounts, it uses the [SAML Assertion Grant flow](/azure/active-directory/develop/v2-saml-bearer-assertion) for authentication.
48
48
@@ -56,7 +56,7 @@ The issue typically occurs in step 1, where the client application needs to pars
56
56
-`<saml:Assertion>` node
57
57
-`<TokenType>` node
58
58
59
-
The following is an example AD FS SAML response from the `usernamemixed` endpoint:
59
+
The following is an example AD FS SAML response from the `/UserNameMixed` endpoint:
60
60
61
61
-**SAML Assertion**: major version = 1, minor version = 1
@@ -65,32 +65,32 @@ The following is an example AD FS SAML response from the `usernamemixed` endpoi
65
65
66
66
Example of PingFederate SAML response (SAML Assertion Grant flow step 1):
67
67
68
-
:::image type="content" source="media/error-code-aadsts7500514-supported-type-saml-response-not-found/pingid-saml-response.png" alt-text="AScreenshot of PingFederate SAML Response" lightbox="media/error-code-aadsts7500514-supported-type-saml-response-not-found/pingid-saml-response.png":::
68
+
:::image type="content" source="media/error-code-aadsts7500514-supported-type-saml-response-not-found/pingid-saml-response.png" alt-text="A screenshot of PingFederate SAML Response for SAML Assertion Grant flow step 1" lightbox="media/error-code-aadsts7500514-supported-type-saml-response-not-found/pingid-saml-response.png":::
69
69
70
-
After you compare these two response, you will found PingFederate returns a different TokenType value: `http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLV1.1` for the same SAML 1.1 token. However, MSAL does not support any TokenType value other than `urn:oasis:names:tc:SAML:1.0:assertion`.
70
+
After you compare these two responses, you will find PingFederate returns a different TokenType value: `http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLV1.1` for the same SAML 1.1 token. However, MSAL does not support any TokenType value other than `urn:oasis:names:tc:SAML:1.0:assertion`.
71
71
72
72
When the identity provider returns a different or unexpected value in the SAML response, MSAL may incorrectly interpret the token as SAML 2.0. As a result, it uses the corresponding `grant_type` value during step 2 of the SAML Assertion Grant flow.
73
73
74
-
Example of the request sent from MASL application with PingFederate (SAML Assertion Grant flow step 2):
74
+
Example of the request sent from MSAL application with PingFederate (SAML Assertion Grant flow step 2):
75
75
76
-
:::image type="content" source="media/error-code-aadsts7500514-supported-type-saml-response-not-found/pingid-saml-response-2.png" alt-text="AScreenshot of PingFederate SAML Response" lightbox="media/error-code-aadsts7500514-supported-type-saml-response-not-found/pingid-saml-response-2.png":::
76
+
:::image type="content" source="media/error-code-aadsts7500514-supported-type-saml-response-not-found/pingid-saml-response-2.png" alt-text="A screenshot of request sent from MSAL application with PingFederate in SAML Assertion Grant flow step 2." lightbox="media/error-code-aadsts7500514-supported-type-saml-response-not-found/pingid-saml-response-2.png":::
77
77
78
-
Example of the request sent from MASL application with AD FS :
78
+
Example of the request sent from MSAL application with AD FS :
79
79
80
-
:::image type="content" source="media/error-code-aadsts7500514-supported-type-saml-response-not-found/pingid-saml-response-3.png" alt-text="AScreenshot of PingFederate SAML Response" lightbox="media/error-code-aadsts7500514-supported-type-saml-response-not-found/pingid-saml-response-3.png":::
80
+
:::image type="content" source="media/error-code-aadsts7500514-supported-type-saml-response-not-found/pingid-saml-response-3.png" alt-text="A screenshot of request sent from MSAL application with AD FS in SAML Assertion Grant flow step 2." lightbox="media/error-code-aadsts7500514-supported-type-saml-response-not-found/pingid-saml-response-3.png":::
81
81
82
82
In this step, the value of the `grant_type` parameter must align with the actual version of the SAML token. The following values are used:
83
83
84
-
-`urn:ietf:params:oauth:grant-type:saml2-bearer` – for SAML 2.0 tokens
85
-
-`urn:ietf:params:oauth:grant-type:saml1_1-bearer` – for SAML 1.1 tokens
84
+
- urn:ietf:params:oauth:grant-type:saml2-bearer - for SAML 2.0 tokens
85
+
- urn:ietf:params:oauth:grant-type:saml1_1-bearer - for SAML 1.1 tokens
86
86
87
-
In the case of a PingFederate account, MSAL uses the incorrect`grant_type` based on its misinterpretation of the SAML version. This results in a version mismatch between the `grant_type` parameter and the SAML token included in the assertion that causes the authentication error.
87
+
In the case of a PingFederate account, MSAL uses the `saml2-bearer` as the`grant_type` based on its misinterpretation of the SAML version. This results in a version mismatch between the `grant_type` parameter and the SAML token included in the assertion that causes the authentication error.
88
88
89
-
## SOlution
89
+
## Solution
90
90
91
-
To resolve this issue, ensure that PingFederate is configured to align with Microsoft Entra ID requirements. Follow the steps below:
91
+
To resolve this issue, ensure that PingFederate is configured to align with Microsoft Entra ID requirements. For step-by-step instructions, review the following articles.
92
92
93
-
-[Creating a connection to Microsoft Entra ID](https://docs.pingidentity.com/integrations/azure/azure_ad_and_office_365_integration_guide/pf_azuread_office365_integration_creating_a_connection_to_azure_active_directory.html)
93
+
-[Creating a connection to Microsoft Entra ID](https://docs.pingidentity.com/integrations/azure/azure_ad_and_office_365_integration_guide/pf_azuread_office365_integration_creating_a_connection_to_azure_active_directory.html).
94
94
95
95
During Microsoft Entra ID connection setup, pay special attention to the following settings:
96
96
@@ -103,9 +103,6 @@ To resolve this issue, ensure that PingFederate is configured to align with Micr
During Configuring WS-Trust STS, select **SAML 1.1 for Office 365** as the Default Token Type.
106
+
When you configure WS-Trust STS, make sure that you select **SAML 1.1 for Office 365** as the Default Token Type.
107
107
108
-
109
-
## Clean up resources
110
-
111
-
After resolving the issue, test the changes in your environment to ensure that the error no longer occurs when using MSAL or ADAL for authentication. Make any necessary adjustments to your application's authentication logic as needed.
108
+
[!INCLUDE [Azure Help Support](../../../includes/azure-help-support.md)]
0 commit comments