Skip to content

Commit c73efa6

Browse files
authored
Update error-code-aadsts7500514-supported-type-saml-response-not-found.md
Edit review per CI 4680
1 parent 6b4e2d7 commit c73efa6

1 file changed

Lines changed: 30 additions & 30 deletions

File tree

support/entra/entra-id/app-integration/error-code-aadsts7500514-supported-type-saml-response-not-found.md

Lines changed: 30 additions & 30 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
title: AADSTS7500514 - A supported type of SAML response was not found with PingFederate
3-
description: Describes an error code `AADSTS7500514` that's returned if a federated account tries to authenticate with Microsoft Entra ID.
3+
description: Describes error code `AADSTS7500514` that's returned if a federated account tries to authenticate by using Microsoft Entra ID.
44
ms.date: 04/17/2025
55
ms.author: bachoang
66
ms.service: entra-id
@@ -10,11 +10,11 @@ keywords: AADSTS50020
1010

1111
# AADSTS7500514 - A supported type of SAML response was not found with PingFederate
1212

13-
This article helps you troubleshoot error code `AADSTS7500514` that's returned if a PingFederate federated account tries to authenticate with Microsoft Entra ID (formerly Azure Active Directory).
13+
This article helps you troubleshoot error code `AADSTS7500514` that's returned if a PingFederate federated account tries to authenticate by using Microsoft Entra ID (formerly Azure Active Directory).
1414

1515
## Symptoms
1616

17-
When a federated account tries to authenticate with Microsoft Entra ID from a Microsoft Authentication Library (MSAL) or Active Directory Authentication Library (ADAL) based application, the sign-in fails. The following error message is displayed:
17+
When a federated account tries to authenticate by using Microsoft Entra ID from a Microsoft Authentication Library (MSAL)-based or Active Directory Authentication Library (ADAL)-based application, the sign-in fails. The following error message is displayed:
1818

1919
```output
2020
{
@@ -32,74 +32,74 @@ The error typically occurs in the following environment:
3232
- The application uses one of the following APIs for authentication:
3333
- MSAL `AcquireTokenByUserNamePassword` method.
3434
- ADAL `AcquireToken`(string resource, string clientId, UserCredential userCredential) method.
35-
- Any PowerShell module that uses the MSAL or ADAL methods listed earlier.
35+
- Any PowerShell module that uses these MSAL or ADAL methods.
3636

3737
## Cause
3838

39-
Since [ADAL has been deprecated](/entra/identity/monitoring-health/recommendation-migrate-from-adal-to-msal), this article focuses on the MSAL.
39+
Because [ADAL is now deprecated](/entra/identity/monitoring-health/recommendation-migrate-from-adal-to-msal), this article focuses on the MSAL.
4040

41-
This issue occurs if the SAML response from PingFederate doesn't contain the SAML version or uses a format that MSAL can't recognize. This typically results from a misconfiguration on the PingFederate side for Microsoft Entra ID.
41+
This issue occurs if the SAML response from PingFederate doesn't contain the SAML version or uses a format that MSAL can't recognize. Typically, this situation is caused by a misconfiguration on the PingFederate side for Microsoft Entra ID.
4242

4343
### Root cause analysis: SAML token version detection
4444

45-
When authenticating a federated account, MSAL determines whether the account is a managed account or a federated account.
45+
When MASL authenticates a federated account, it determines whether the account is a managed account or a federated account.
4646

47-
For managed accounts, MSAL uses the [Resource Owner Password Credentials grant flow](/entra/identity-platform/v2-oauth-ropc). For federated accounts, it uses the [SAML Assertion Grant flow](/azure/active-directory/develop/v2-saml-bearer-assertion) for authentication.
47+
For managed accounts, MSAL uses the [Resource Owner Password Credentials grant flow](/entra/identity-platform/v2-oauth-ropc). For federated accounts, it uses the [SAML Assertion Grant flow](/azure/active-directory/develop/v2-saml-bearer-assertion).
4848

49-
There are two steps involved in the SAML Assertion Grant flow:
49+
The SAML Assertion Grant flow has two steps:
5050

51-
1. The client application authenticates to the federated identity provider to obtain a SAML token.
52-
2. The client then uses the obtained SAML token to get an OAuth 2.0 JWT token from Microsoft Entra ID.
51+
- The client application authenticates to the federated identity provider to obtain a SAML token.
52+
- The client uses the obtained SAML token to get an OAuth 2.0 JWT token from Microsoft Entra ID.
5353

54-
The issue typically occurs in step 1, where the client application needs to parse the SAML response from the identity provider to determine the SAML version. MSAL looks for the following attribute values in the identity provider's SAML response to determine the version of the SAML token:
54+
The authentication error typically occurs in step 1, in which the client application has to parse the SAML response from the identity provider to determine the version of the SAML token. MSAL looks for the following attributes in the identity provider's SAML response:
5555

5656
- `<saml:Assertion>` node
5757
- `<TokenType>` node
5858

59-
The following is an example AD FS SAML response from the `/UserNameMixed` endpoint:
59+
The following is an example AD FS SAML response from the `/UserNameMixed` endpoint:
6060

6161
- **SAML Assertion**: major version = 1, minor version = 1
6262
- **TokenType**: `urn:oasis:names:tc:SAML:1.0:assertion`
6363

6464
:::image type="content" source="media/error-code-aadsts7500514-supported-type-saml-response-not-found/adfs-saml-response.png" alt-text="Screenshot of ADFS SAML Response." lightbox="media/error-code-aadsts7500514-supported-type-saml-response-not-found/adfs-saml-response.png":::
6565

66-
Example of PingFederate SAML response (SAML Assertion Grant flow step 1):
66+
Example of a PingFederate SAML response (SAML Assertion Grant flow step 1):
6767

68-
:::image type="content" source="media/error-code-aadsts7500514-supported-type-saml-response-not-found/pingid-saml-response.png" alt-text="A screenshot of PingFederate SAML Response for SAML Assertion Grant flow step 1" lightbox="media/error-code-aadsts7500514-supported-type-saml-response-not-found/pingid-saml-response.png":::
68+
:::image type="content" source="media/error-code-aadsts7500514-supported-type-saml-response-not-found/pingid-saml-response.png" alt-text="Screenshot of PingFederate SAML Response for SAML Assertion Grant flow step 1." lightbox="media/error-code-aadsts7500514-supported-type-saml-response-not-found/pingid-saml-response.png":::
6969

70-
After you compare these two responses, you will find PingFederate returns a different TokenType value: `http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLV1.1` for the same SAML 1.1 token. However, MSAL doesn't support any TokenType value other than `urn:oasis:names:tc:SAML:1.0:assertion`.
70+
When you compare these responses, you find that PingFederate returns a different TokenType value (`http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLV1.1`) for the same SAML 1.1 token. However, MSAL doesn't support any TokenType value other than `urn:oasis:names:tc:SAML:1.0:assertion`.
7171

72-
When the identity provider returns a different or unexpected value in the SAML response, MSAL may incorrectly interpret the token as SAML 2.0. As a result, it uses the corresponding `grant_type` value during step 2 of the SAML Assertion Grant flow.
72+
If the identity provider returns a different or unexpected value in the SAML response, MSAL might incorrectly interpret the token as SAML 2.0. In this case, it uses the corresponding `grant_type` value during step 2 of the SAML Assertion Grant flow.
7373

74-
Example of the request sent from MSAL application with PingFederate (SAML Assertion Grant flow step 2):
74+
Example of the request sent from MSAL application by using PingFederate (SAML Assertion Grant flow step 2):
7575

76-
:::image type="content" source="media/error-code-aadsts7500514-supported-type-saml-response-not-found/pingid-saml-response-2.png" alt-text="A screenshot of request sent from MSAL application with PingFederate in SAML Assertion Grant flow step 2." lightbox="media/error-code-aadsts7500514-supported-type-saml-response-not-found/pingid-saml-response-2.png":::
76+
:::image type="content" source="media/error-code-aadsts7500514-supported-type-saml-response-not-found/pingid-saml-response-2.png" alt-text="Screenshot of request sent from MSAL application with PingFederate in SAML Assertion Grant flow step 2." lightbox="media/error-code-aadsts7500514-supported-type-saml-response-not-found/pingid-saml-response-2.png":::
7777

78-
Example of the request sent from MSAL application with AD FS :
78+
Example of the request that's sent from the MSAL application by using AD FS:
7979

80-
:::image type="content" source="media/error-code-aadsts7500514-supported-type-saml-response-not-found/pingid-saml-response-3.png" alt-text="A screenshot of request sent from MSAL application with AD FS in SAML Assertion Grant flow step 2." lightbox="media/error-code-aadsts7500514-supported-type-saml-response-not-found/pingid-saml-response-3.png":::
80+
:::image type="content" source="media/error-code-aadsts7500514-supported-type-saml-response-not-found/pingid-saml-response-3.png" alt-text="Screenshot of request sent from MSAL application by using AD FS in SAML Assertion Grant flow step 2." lightbox="media/error-code-aadsts7500514-supported-type-saml-response-not-found/pingid-saml-response-3.png":::
8181

82-
In this step, the value of the `grant_type` parameter must align with the actual version of the SAML token. One of the following values are used by MSAL application:
82+
In this step, the value of the `grant_type` parameter must align with the actual version of the SAML token. One of the following values is used by the MSAL application:
8383

8484
- urn:ietf:params:oauth:grant-type:saml2-bearer - for SAML 2.0 tokens
8585
- urn:ietf:params:oauth:grant-type:saml1_1-bearer - for SAML 1.1 tokens
8686

87-
In the PingFederate example, MSAL uses the `saml2-bearer` as the `grant_type` based on its misinterpretation of the SAML version. This results in a version mismatch between the `grant_type` parameter and the SAML token included in the assertion that causes the authentication error.
87+
In the PingFederate example, MSAL uses the `saml2-bearer` as the `grant_type` based on its misinterpretation of the SAML version. This causes a version mismatch between the `grant_type` parameter and the SAML token that's included in the assertion that causes the authentication error.
8888

8989
## Solution
9090

91-
To resolve this issue, ensure that PingFederate is configured to align with Microsoft Entra ID requirements. For step-by-step instructions, review the following articles.
91+
To resolve this issue, make sure that PingFederate is configured to align with Microsoft Entra ID requirements. For step-by-step instructions, review the following articles:
9292

9393
- [Creating a connection to Microsoft Entra ID](https://docs.pingidentity.com/integrations/azure/azure_ad_and_office_365_integration_guide/pf_azuread_office365_integration_creating_a_connection_to_azure_active_directory.html).
9494

95-
During Microsoft Entra ID connection setup, pay special attention to the following settings:
95+
During Microsoft Entra ID connection setup, pay special attention to the settings in the following steps:
9696

9797
1. Configure the connection protocols.
98-
2. On the **Connection Template** tab, select **Do not use a template for this connection**. Click **Next**.
99-
3. On the **Connection Type** tab select **Browser SSO Profiles**.
100-
4. In the Protocol list, select WS-Federation.
101-
5. In the **WS-Federation Token Type list**, select **SAML 1.1**.
102-
6. If you want to support active federation, select the **WS-Trust STS** check box.
98+
2. On the **Connection Template** tab, select **Do not use a template for this connection**, and then select **Next**.
99+
3. On the **Connection Type** tab, select **Browser SSO Profiles**.
100+
4. In the Protocol list, select **WS-Federation**.
101+
5. In the **WS-Federation Token Type** list, select **SAML 1.1**.
102+
6. If you want to support active federation, select the **WS-Trust STS** checkbox.
103103

104104
- [Configuring WS-Trust STS](https://docs.pingidentity.com/integrations/azure/azure_ad_and_office_365_integration_guide/pf_azuread_office365_integration_configuring_ws_trust_sts.html)
105105

0 commit comments

Comments
 (0)