You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: support/entra/entra-id/app-integration/error-code-aadsts7500514-supported-type-saml-response-not-found.md
+30-30Lines changed: 30 additions & 30 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,6 +1,6 @@
1
1
---
2
2
title: AADSTS7500514 - A supported type of SAML response was not found with PingFederate
3
-
description: Describes an error code `AADSTS7500514` that's returned if a federated account tries to authenticate with Microsoft Entra ID.
3
+
description: Describes error code `AADSTS7500514` that's returned if a federated account tries to authenticate by using Microsoft Entra ID.
4
4
ms.date: 04/17/2025
5
5
ms.author: bachoang
6
6
ms.service: entra-id
@@ -10,11 +10,11 @@ keywords: AADSTS50020
10
10
11
11
# AADSTS7500514 - A supported type of SAML response was not found with PingFederate
12
12
13
-
This article helps you troubleshoot error code `AADSTS7500514` that's returned if a PingFederate federated account tries to authenticate with Microsoft Entra ID (formerly Azure Active Directory).
13
+
This article helps you troubleshoot error code `AADSTS7500514` that's returned if a PingFederate federated account tries to authenticate by using Microsoft Entra ID (formerly Azure Active Directory).
14
14
15
15
## Symptoms
16
16
17
-
When a federated account tries to authenticate with Microsoft Entra ID from a Microsoft Authentication Library (MSAL) or Active Directory Authentication Library (ADAL)based application, the sign-in fails. The following error message is displayed:
17
+
When a federated account tries to authenticate by using Microsoft Entra ID from a Microsoft Authentication Library (MSAL)-based or Active Directory Authentication Library (ADAL)-based application, the sign-in fails. The following error message is displayed:
18
18
19
19
```output
20
20
{
@@ -32,74 +32,74 @@ The error typically occurs in the following environment:
32
32
- The application uses one of the following APIs for authentication:
- Any PowerShell module that uses the MSAL or ADAL methods listed earlier.
35
+
- Any PowerShell module that uses these MSAL or ADAL methods.
36
36
37
37
## Cause
38
38
39
-
Since[ADAL has been deprecated](/entra/identity/monitoring-health/recommendation-migrate-from-adal-to-msal), this article focuses on the MSAL.
39
+
Because[ADAL is now deprecated](/entra/identity/monitoring-health/recommendation-migrate-from-adal-to-msal), this article focuses on the MSAL.
40
40
41
-
This issue occurs if the SAML response from PingFederate doesn't contain the SAML version or uses a format that MSAL can't recognize. This typically results from a misconfiguration on the PingFederate side for Microsoft Entra ID.
41
+
This issue occurs if the SAML response from PingFederate doesn't contain the SAML version or uses a format that MSAL can't recognize. Typically, this situation is caused by a misconfiguration on the PingFederate side for Microsoft Entra ID.
42
42
43
43
### Root cause analysis: SAML token version detection
44
44
45
-
When authenticating a federated account, MSAL determines whether the account is a managed account or a federated account.
45
+
When MASL authenticates a federated account, it determines whether the account is a managed account or a federated account.
46
46
47
-
For managed accounts, MSAL uses the [Resource Owner Password Credentials grant flow](/entra/identity-platform/v2-oauth-ropc). For federated accounts, it uses the [SAML Assertion Grant flow](/azure/active-directory/develop/v2-saml-bearer-assertion) for authentication.
47
+
For managed accounts, MSAL uses the [Resource Owner Password Credentials grant flow](/entra/identity-platform/v2-oauth-ropc). For federated accounts, it uses the [SAML Assertion Grant flow](/azure/active-directory/develop/v2-saml-bearer-assertion).
48
48
49
-
There are two steps involved in the SAML Assertion Grant flow:
49
+
The SAML Assertion Grant flow has two steps:
50
50
51
-
1. The client application authenticates to the federated identity provider to obtain a SAML token.
52
-
2. The client then uses the obtained SAML token to get an OAuth 2.0 JWT token from Microsoft Entra ID.
51
+
- The client application authenticates to the federated identity provider to obtain a SAML token.
52
+
- The client uses the obtained SAML token to get an OAuth 2.0 JWT token from Microsoft Entra ID.
53
53
54
-
The issue typically occurs in step 1, where the client application needs to parse the SAML response from the identity provider to determine the SAML version. MSAL looks for the following attribute values in the identity provider's SAML response to determine the version of the SAML token:
54
+
The authentication error typically occurs in step 1, in which the client application has to parse the SAML response from the identity provider to determine the version of the SAML token. MSAL looks for the following attributes in the identity provider's SAML response:
55
55
56
56
-`<saml:Assertion>` node
57
57
-`<TokenType>` node
58
58
59
-
The following is an example AD FS SAML response from the `/UserNameMixed` endpoint:
59
+
The following is an example AD FS SAML response from the `/UserNameMixed` endpoint:
60
60
61
61
-**SAML Assertion**: major version = 1, minor version = 1
:::image type="content" source="media/error-code-aadsts7500514-supported-type-saml-response-not-found/adfs-saml-response.png" alt-text="Screenshot of ADFS SAML Response." lightbox="media/error-code-aadsts7500514-supported-type-saml-response-not-found/adfs-saml-response.png":::
65
65
66
-
Example of PingFederate SAML response (SAML Assertion Grant flow step 1):
66
+
Example of a PingFederate SAML response (SAML Assertion Grant flow step 1):
67
67
68
-
:::image type="content" source="media/error-code-aadsts7500514-supported-type-saml-response-not-found/pingid-saml-response.png" alt-text="A screenshot of PingFederate SAML Response for SAML Assertion Grant flow step 1" lightbox="media/error-code-aadsts7500514-supported-type-saml-response-not-found/pingid-saml-response.png":::
68
+
:::image type="content" source="media/error-code-aadsts7500514-supported-type-saml-response-not-found/pingid-saml-response.png" alt-text="Screenshot of PingFederate SAML Response for SAML Assertion Grant flow step 1." lightbox="media/error-code-aadsts7500514-supported-type-saml-response-not-found/pingid-saml-response.png":::
69
69
70
-
After you compare these two responses, you will find PingFederate returns a different TokenType value: `http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLV1.1` for the same SAML 1.1 token. However, MSAL doesn't support any TokenType value other than `urn:oasis:names:tc:SAML:1.0:assertion`.
70
+
When you compare these responses, you find that PingFederate returns a different TokenType value (`http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLV1.1`) for the same SAML 1.1 token. However, MSAL doesn't support any TokenType value other than `urn:oasis:names:tc:SAML:1.0:assertion`.
71
71
72
-
When the identity provider returns a different or unexpected value in the SAML response, MSAL may incorrectly interpret the token as SAML 2.0. As a result, it uses the corresponding `grant_type` value during step 2 of the SAML Assertion Grant flow.
72
+
If the identity provider returns a different or unexpected value in the SAML response, MSAL might incorrectly interpret the token as SAML 2.0. In this case, it uses the corresponding `grant_type` value during step 2 of the SAML Assertion Grant flow.
73
73
74
-
Example of the request sent from MSAL application with PingFederate (SAML Assertion Grant flow step 2):
74
+
Example of the request sent from MSAL application by using PingFederate (SAML Assertion Grant flow step 2):
75
75
76
-
:::image type="content" source="media/error-code-aadsts7500514-supported-type-saml-response-not-found/pingid-saml-response-2.png" alt-text="A screenshot of request sent from MSAL application with PingFederate in SAML Assertion Grant flow step 2." lightbox="media/error-code-aadsts7500514-supported-type-saml-response-not-found/pingid-saml-response-2.png":::
76
+
:::image type="content" source="media/error-code-aadsts7500514-supported-type-saml-response-not-found/pingid-saml-response-2.png" alt-text="Screenshot of request sent from MSAL application with PingFederate in SAML Assertion Grant flow step 2." lightbox="media/error-code-aadsts7500514-supported-type-saml-response-not-found/pingid-saml-response-2.png":::
77
77
78
-
Example of the request sent from MSAL application with AD FS:
78
+
Example of the request that's sent from the MSAL application by using AD FS:
79
79
80
-
:::image type="content" source="media/error-code-aadsts7500514-supported-type-saml-response-not-found/pingid-saml-response-3.png" alt-text="A screenshot of request sent from MSAL application with AD FS in SAML Assertion Grant flow step 2." lightbox="media/error-code-aadsts7500514-supported-type-saml-response-not-found/pingid-saml-response-3.png":::
80
+
:::image type="content" source="media/error-code-aadsts7500514-supported-type-saml-response-not-found/pingid-saml-response-3.png" alt-text="Screenshot of request sent from MSAL application by using AD FS in SAML Assertion Grant flow step 2." lightbox="media/error-code-aadsts7500514-supported-type-saml-response-not-found/pingid-saml-response-3.png":::
81
81
82
-
In this step, the value of the `grant_type` parameter must align with the actual version of the SAML token. One of the following values are used by MSAL application:
82
+
In this step, the value of the `grant_type` parameter must align with the actual version of the SAML token. One of the following values is used by the MSAL application:
83
83
84
84
- urn:ietf:params:oauth:grant-type:saml2-bearer - for SAML 2.0 tokens
85
85
- urn:ietf:params:oauth:grant-type:saml1_1-bearer - for SAML 1.1 tokens
86
86
87
-
In the PingFederate example, MSAL uses the `saml2-bearer` as the `grant_type` based on its misinterpretation of the SAML version. This results in a version mismatch between the `grant_type` parameter and the SAML token included in the assertion that causes the authentication error.
87
+
In the PingFederate example, MSAL uses the `saml2-bearer` as the `grant_type` based on its misinterpretation of the SAML version. This causes a version mismatch between the `grant_type` parameter and the SAML token that's included in the assertion that causes the authentication error.
88
88
89
89
## Solution
90
90
91
-
To resolve this issue, ensure that PingFederate is configured to align with Microsoft Entra ID requirements. For step-by-step instructions, review the following articles.
91
+
To resolve this issue, make sure that PingFederate is configured to align with Microsoft Entra ID requirements. For step-by-step instructions, review the following articles:
92
92
93
93
-[Creating a connection to Microsoft Entra ID](https://docs.pingidentity.com/integrations/azure/azure_ad_and_office_365_integration_guide/pf_azuread_office365_integration_creating_a_connection_to_azure_active_directory.html).
94
94
95
-
During Microsoft Entra ID connection setup, pay special attention to the following settings:
95
+
During Microsoft Entra ID connection setup, pay special attention to the settings in the following steps:
96
96
97
97
1. Configure the connection protocols.
98
-
2. On the **Connection Template** tab, select **Do not use a template for this connection**. Click**Next**.
99
-
3. On the **Connection Type** tab select **Browser SSO Profiles**.
100
-
4. In the Protocol list, select WS-Federation.
101
-
5. In the **WS-Federation Token Type list**, select **SAML 1.1**.
102
-
6. If you want to support active federation, select the **WS-Trust STS**check box.
98
+
2. On the **Connection Template** tab, select **Do not use a template for this connection**, and then select**Next**.
99
+
3. On the **Connection Type** tab, select **Browser SSO Profiles**.
100
+
4. In the Protocol list, select **WS-Federation**.
101
+
5. In the **WS-Federation Token Type** list, select **SAML 1.1**.
102
+
6. If you want to support active federation, select the **WS-Trust STS**checkbox.
0 commit comments