Skip to content

Commit 5d258d5

Browse files
First pass
1 parent fa6a505 commit 5d258d5

2 files changed

Lines changed: 53 additions & 53 deletions

File tree

Lines changed: 51 additions & 50 deletions
Original file line numberDiff line numberDiff line change
@@ -1,59 +1,62 @@
11
---
2-
# Required metadata
3-
# For more information, see https://learn.microsoft.com/en-us/help/platform/learn-editor-add-metadata
4-
# For valid values of ms.service, ms.prod, and ms.topic, see https://learn.microsoft.com/en-us/help/platform/metadata-taxonomies
5-
6-
title: 'Error AADSTS76021 (ApplicationRequiresSignedRequests) with SAML authentication: The request sent by client is not signed'
2+
title: "Error AADSTS76021 (ApplicationRequiresSignedRequests) with SAML authentication: The request sent by client is not signed"
73
description: Describes a problem in which a user receives the error AADSTS76021 when trying to sign-in
8-
author: custorod # GitHub alias
9-
ms.author: custorod
4+
ms.author: jarrettr
5+
author: JarrettRenshaw
6+
ms.topic: troubleshooting
107
ms.service: entra-id
118
ms.topic: troubleshooting-problem-resolution
129
ms.date: 01/14/2026
13-
ms.subservice: authentication
10+
ms.custom: sap:Issues Signing In to Applications
1411
---
1512
# Error AADSTS76021 (ApplicationRequiresSignedRequests) with SAML authentication: The request sent by client is not signed
1613

17-
## Overview
18-
The error **AADSTS76021** occurs during federated authentication with Microsoft Entra ID when using SAML-based Single Sign-On (SSO). This error indicates that the request sent by the client is not signed while the application requires signed requests. Even if the request is signed, the signature might not be placed according to the SAML binding configuration.
14+
## Summary
15+
16+
The error **AADSTS76021** occurs during federated authentication with Microsoft Entra ID when using SAML-based Single Sign-On (SSO). This error indicates that the request sent by the client isn't signed while the application requires signed requests. Even if the request is signed, the signature might not be placed according to the SAML binding configuration.
1917

2018
According to [SAML specifications](https://docs.oasis-open.org/security/saml/v2.0/saml-bindings-2.0-os.pdf), two primary and most commonly used binding types exist:
2119

22-
- **HTTP-Redirect** [urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Redirect]: For HTTP GET requests, the signature is included as a query parameter in the URL.
20+
- **HTTP-Redirect** [urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Redirect]: For HTTP get method (GET) requests, the signature is included as a query parameter in the URL.
2321
- **HTTP-POST** [urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST]: For HTTP POST requests, the signature is embedded within the XML payload of the SAML message.
2422

25-
If the application expects the signature in one location but the request uses another binding type, Microsoft Entra ID will reject the request, resulting in **AADSTS76021**.
23+
If the application expects the signature in one location but the request uses another binding type, Microsoft Entra ID rejects the request, resulting in the **AADSTS76021** error.
2624

27-
---
25+
## Resolution
2826

29-
## Resolution Steps
30-
1. **Verify SAML Binding Type**
31-
- Check whether the application expects HTTP-Redirect or HTTP-POST.
27+
1. **Verify SAML binding type**
3228

33-
2. **Ensure Configuration Matches**
34-
- Confirm that the Identity Provider (IdP) and Service Provider (SP) configurations align.
29+
Check whether the application expects HTTP-Redirect or HTTP-POST.
3530

36-
3. **Validate Signature Placement**
37-
- For HTTP-Redirect: Signature must be in the query string.
38-
- For HTTP-POST: Signature must be inside the XML `<Signature>` element.
31+
2. **Ensure configuration matches**
3932

40-
4. **Update Application or IdP Configuration**
41-
- Align binding type and signature placement.
42-
- In Microsoft Entra ID, confirm SAML settings under **Enterprise Applications > Single Sign-On**.
33+
Confirm that the Identity Provider (IdP) and Service Provider (SP) configurations align.
4334

44-
---
35+
3. **Validate signature placement**
36+
37+
- For HTTP-Redirect: Signature must be in the query string.
38+
- For HTTP-POST: Signature must be inside the XML `<Signature>` element.
39+
40+
4. **Update application or IdP configuration**
41+
42+
- Align binding type and signature placement.
43+
- In Microsoft Entra ID, confirm SAML settings under **Enterprise Applications > Single Sign-On**.
4544

4645
## Examples
4746

48-
### Example 1: HTTP-Redirect Binding (GET)
49-
Signed request includes query parameters:
47+
### Example 1: HTTP-Redirect binding (GET)
48+
49+
The signed request includes query parameters like the following example:
50+
5051
```
5152
https://contoso.com?
5253
SAMLRequest=<Base64EncodedRequest>&RelayState=<StateValue>&SigAlg=http://www.w3.org/2000/09/xmldsig#rsa-sha256&Signature=<Base64Signature>
5354
```
5455

55-
### Example 2: HTTP-POST Binding (POST)
56-
Signed request includes signature inside XML:
56+
### Example 2: HTTP-POST binding (POST)
57+
58+
The signed request includes a signature inside XML like the following example:
59+
5760
```xml
5861
<samlp:AuthnRequest>
5962
<ds:Signature xmlns:ds="http://www.w3.org/2000/09/xmldsig#">
@@ -70,39 +73,37 @@ Signed request includes signature inside XML:
7073
</samlp:AuthnRequest>
7174
```
7275

73-
---
76+
### SAML 2.0 bindings
7477

75-
## More Information
76-
77-
### SAML 2.0 Bindings
7878
SAML 2.0 defines several protocol bindings that map SAML request and response message exchanges onto standard communication protocols. These bindings specify rules for message encoding, signature placement, and transport security.
7979

80-
### 1. HTTP-Redirect Binding
80+
#### HTTP-Redirect binding
81+
8182
- **Description**: Uses HTTP GET requests where SAML messages are transmitted as query parameters.
82-
- **Use Case**: Common for initiating authentication requests.
83+
- **Use case**: Common for initiating authentication requests.
84+
85+
#### HTTP-POST binding
8386

84-
### 2. HTTP-POST Binding
8587
- **Description**: Uses HTTP POST requests where SAML messages are embedded in the body as XML.
86-
- **Use Case**: Common for sending signed assertions securely.
88+
- **Use case**: Common for sending signed assertions securely.
89+
90+
#### HTTP-Artifact binding
91+
92+
- **Description**: Exchanges small artifacts through HTTP which are later resolved into full SAML messages.
93+
- **Use case**: Reduces message size in front-channel communication.
8794

88-
### 3. HTTP-Artifact Binding
89-
- **Description**: Exchanges small artifacts via HTTP, which are later resolved into full SAML messages.
90-
- **Use Case**: Reduces message size in front-channel communication.
95+
#### Simple Object Access Protocol (SOAP) binding
9196

92-
### 4. SOAP Binding
9397
- **Description**: Uses SOAP over HTTP for back-channel communication.
94-
- **Use Case**: Common for artifact resolution and management operations.
98+
- **Use Ccase**: Common for artifact resolution and management operations.
99+
100+
#### Reverse SOAP (PAOS) binding
95101

96-
### 5. PAOS Binding
97102
- **Description**: Reverse HTTP binding used for Enhanced Client or Proxy (ECP) profiles.
98-
- **Use Case**: Enables advanced client interactions.
103+
- **Use case**: Enables advanced client interactions.
99104

100105
[SAML Bindings Specification](https://docs.oasis-open.org/security/saml/v2.0/saml-bindings-2.0-os.pdf)
101106

102-
---
107+
## Resources
103108

104-
For a full list of Active Directory Authentication and authorization error codes, see [Microsoft Entra authentication and authorization error codes](/azure/active-directory/develop/reference-aadsts-error-codes).
105-
106-
[!INCLUDE [Azure Help Support](../../../includes/azure-help-support.md)]
107-
108-
---
109+
For a full list of Active Directory Authentication and authorization error codes, see [Microsoft Entra authentication and authorization error codes](/azure/active-directory/develop/reference-aadsts-error-codes).

support/entra/toc.yml

Lines changed: 2 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -106,9 +106,8 @@ items:
106106
href: entra-id/app-integration/send-notification-details.md
107107
- name: Troubleshoot sign-in to apps
108108
items:
109-
- name: Error AADSTS76021 - Request sent by client is not signed
110-
href: ./entra-id/app-integration/error-code-aadsts76021-request-not-signed.md
111-
displayName: AADSTS76021 ApplicationRequiresSignedRequests
109+
- name: Error AADSTS76021 - Request sent by client is not signed
110+
href: entra-id/app-integration/error-code-aadsts76021-request-not-signed.md
112111
- name: AADSTS7500514 - A supported type of SAML response was not found
113112
href: entra-id/app-integration/error-code-aadsts7500514-supported-type-saml-response-not-found.md
114113
- name: Error code AADSTS50173 - The provided grant has expired due to it being revoked

0 commit comments

Comments
 (0)