Skip to content

Commit 60a3d18

Browse files
authored
Update error-code-aadsts76021-request-not-signed.md
Edit review per CI 9468
1 parent a3508f2 commit 60a3d18

1 file changed

Lines changed: 19 additions & 19 deletions

File tree

Lines changed: 19 additions & 19 deletions
Original file line numberDiff line numberDiff line change
@@ -1,51 +1,51 @@
11
---
2-
title: "Error AADSTS76021 (ApplicationRequiresSignedRequests) with SAML authentication: The request sent by client is not signed"
3-
description: Describes a problem in which a user receives the error AADSTS76021 when trying to sign-in
2+
title: "Error AADSTS76021 (ApplicationRequiresSignedRequests) in SAML authentication: The request sent by client is not signed"
3+
description: Discusses a problem in which a user receives error AADSTS76021 when trying to sign in.
44
ms.author: jarrettr
55
author: JarrettRenshaw
66
ms.topic: troubleshooting
77
ms.service: entra-id
88
ms.date: 01/14/2026
99
ms.custom: sap:Issues Signing In to Applications
1010
---
11-
# Error AADSTS76021 (ApplicationRequiresSignedRequests) with SAML authentication: The request sent by client is not signed
11+
# "The request sent by client is not signed" error AADSTS76021 in SAML authentication
1212

1313
## Summary
1414

15-
The error **AADSTS76021** occurs during federated authentication with Microsoft Entra ID when you use SAML-based Single Sign-On (SSO). This error indicates that the client didn't sign the request but the application requires signed requests. Even if the client signs the request, the signature might not be placed according to the SAML binding configuration.
15+
The **AADSTS76021** (ApplicationRequiresSignedRequests) error occurs during federated authentication by using Microsoft Entra ID when you use SAML-based Single Sign-On (SSO). This error indicates that the client didn't sign the request, but the application requires signed requests. Even if the client signs the request, the signature might not be placed according to the SAML binding configuration.
1616

17-
According to the [SAML specifications](https://docs.oasis-open.org/security/saml/v2.0/saml-bindings-2.0-os.pdf), two primary and most commonly used binding types exist:
17+
According to the [SAML specifications](https://docs.oasis-open.org/security/saml/v2.0/saml-bindings-2.0-os.pdf), the two primary and most commonly used binding types are:
1818

1919
- **HTTP-Redirect** [urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Redirect]: For HTTP get method (GET) requests, the signature is included as a query parameter in the URL.
2020
- **HTTP-POST** [urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST]: For HTTP POST requests, the signature is embedded within the XML payload of the SAML message.
2121

22-
If the application expects the signature in one location but the request uses another binding type, Microsoft Entra ID rejects the request, resulting in the **AADSTS76021** error.
22+
If the application expects the signature in one location but the request uses another binding type, Microsoft Entra ID rejects the request. This rejection causes the **AADSTS76021** error.
2323

2424
## Resolution
2525

2626
1. **Verify SAML binding type**
2727

2828
Check whether the application expects HTTP-Redirect or HTTP-POST.
2929

30-
2. **Ensure configuration matches**
30+
2. **Verify configuration matches**
3131

32-
Confirm that the Identity Provider (IdP) and Service Provider (SP) configurations align.
32+
Verify that the Identity Provider (IdP) and Service Provider (SP) configurations align.
3333

34-
3. **Validate signature placement**
34+
3. **te signature placement**
3535

36-
- For HTTP-Redirect: Signature must be in the query string.
37-
- For HTTP-POST: Signature must be inside the XML `<Signature>` element.
36+
- For HTTP-Redirect: The signature must be in the query string.
37+
- For HTTP-POST: The signature must be inside the XML `<Signature>` element.
3838

3939
4. **Update application or IdP configuration**
4040

4141
- Align binding type and signature placement.
42-
- In Microsoft Entra ID, confirm SAML settings under **Enterprise Applications > Single Sign-On**.
42+
- In Microsoft Entra ID, verify the SAML settings under **Enterprise Applications** > **Single Sign-On**.
4343

4444
## Examples
4545

4646
### Example 1: HTTP-Redirect binding (GET)
4747

48-
The signed request includes query parameters like the following example:
48+
The signed request includes query parameters such as the following example:
4949

5050
```
5151
https://contoso.com?
@@ -54,7 +54,7 @@ SAMLRequest=<Base64EncodedRequest>&RelayState=<StateValue>&SigAlg=http://www.w3.
5454

5555
### Example 2: HTTP-POST binding (POST)
5656

57-
The signed request includes a signature inside XML like the following example:
57+
The signed request includes a signature inside the XML, such as in the following example:
5858

5959
```xml
6060
<samlp:AuthnRequest>
@@ -78,17 +78,17 @@ SAML 2.0 defines several protocol bindings that map SAML request and response me
7878

7979
#### HTTP-Redirect binding
8080

81-
- **Description**: Uses HTTP GET requests where SAML messages are transmitted as query parameters.
81+
- **Description**: Uses HTTP GET requests in which SAML messages are transmitted as query parameters.
8282
- **Use case**: Common for initiating authentication requests.
8383

8484
#### HTTP-POST binding
8585

86-
- **Description**: Uses HTTP POST requests where SAML messages are embedded in the body as XML.
86+
- **Description**: Uses HTTP POST requests in which SAML messages are embedded in the body as XML.
8787
- **Use case**: Common for sending signed assertions securely.
8888

8989
#### HTTP-Artifact binding
9090

91-
- **Description**: Exchanges small artifacts through HTTP which are later resolved into full SAML messages.
91+
- **Description**: Exchanges small artifacts through HTTP. The artifacts are later resolved into full SAML messages.
9292
- **Use case**: Reduces message size in front-channel communication.
9393

9494
#### Simple Object Access Protocol (SOAP) binding
@@ -98,11 +98,11 @@ SAML 2.0 defines several protocol bindings that map SAML request and response me
9898

9999
#### Reverse SOAP (PAOS) binding
100100

101-
- **Description**: Reverse HTTP binding used for Enhanced Client or Proxy (ECP) profiles.
101+
- **Description**: Reverse HTTP binding that's used for Enhanced Client or Proxy (ECP) profiles.
102102
- **Use case**: Enables advanced client interactions.
103103

104104
[SAML Bindings Specification](https://docs.oasis-open.org/security/saml/v2.0/saml-bindings-2.0-os.pdf)
105105

106106
## Resources
107107

108-
For a full list of Active Directory authentication and authorization error codes, see [Microsoft Entra authentication and authorization error codes](/azure/active-directory/develop/reference-aadsts-error-codes).
108+
For a full list of Active Directory authentication and authorization error codes, see [Microsoft Entra authentication and authorization error codes](/azure/active-directory/develop/reference-aadsts-error-codes).

0 commit comments

Comments
 (0)