You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: support/entra/entra-id/app-integration/error-code-aadsts50000-issuing-token-sign-in-service.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,5 +1,5 @@
1
1
---
2
-
title: Error AADSTS50000 - There was an error issuing a token or an issue with our sign-in service
2
+
title: Error AADSTS50000 - There Was an Error Issuing a Token or an Issue with Our Sign-In Service
3
3
description: Provides a solution to the AADSTS50000 error that occurs when you try to sign in to an Azure app by using Microsoft Entra ID.
4
4
ms.service: entra-id
5
5
ms.date: 03/12/2025
@@ -37,7 +37,7 @@ Make sure that the client ID is valid and that other required parameters are con
37
37
38
38
This issue can occur in an OAuth2 Device code grant flow to the token endpoint. After the user signs in to a browser window and accepts the consent dialog, this error occurs.
39
39
40
-
### Solution 3 for cause 3: Verify application consent settings
40
+
### Solution for cause 3: Verify application consent settings
41
41
42
42
1. In the [Azure portal](https://portal.azure.com), make sure that the client application (Service Principal) exists on the tenant's **Enterprise Applications** page. You can search for the application by App ID.
43
43
2. Verify that the user can consent to the application. Check the user settings on the **Enterprise Applications** page or review relevant policies that affect user consent.
@@ -54,7 +54,7 @@ Microsoft Identity Platform (v2 endpoint) tokens must be signed by a certificate
54
54
2. In the **Manage** section, select **Manifest**.
55
55
3. Check whether an entry exists in the `keyCredentials` section that includes `type=Symmetric` and `usage=Sign`.
56
56
57
-
:::image type="content" source="./media/error-code-aadsts50000-issuing-token-sign-in-service/manifest-sample.png" alt-text="Screenshot that shows the Application Manifest Key Credentials code" lightbox="./media/error-code-aadsts50000-issuing-token-sign-in-service/manifest-sample.png":::
57
+
:::image type="content" source="./media/error-code-aadsts50000-issuing-token-sign-in-service/manifest-sample.png" alt-text="Screenshot that shows the Application Manifest Key Credentials code." lightbox="./media/error-code-aadsts50000-issuing-token-sign-in-service/manifest-sample.png":::
58
58
59
59
Alternatively, use the Microsoft Graph PowerShell cmdlet [Get-MgApplication](/powershell/module/azuread/get-azureadapplicationkeycredential) to retrieve key credentials.
60
60
@@ -83,4 +83,4 @@ This error might occur in the following scenario:
83
83
84
84
### Solution for cause 5
85
85
86
-
Configure the resource application to expose the delegated permission, and then consent to that delegated permission in the client application.
86
+
Configure the resource application to expose the delegated permission, and then consent to that delegated permission in the client application.
0 commit comments