Skip to content

Commit d6e9802

Browse files
Acrolinx updates
1 parent b06c46c commit d6e9802

4 files changed

Lines changed: 20 additions & 20 deletions

File tree

support/entra/entra-id/app-integration/error-code-AADSTS50105-user-not-assigned-role.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,12 +1,12 @@
11
---
2-
title: Error AADSTS50105 - The signed in user is not assigned to a role for the application.
2+
title: Error AADSTS50105 - The signed in user isn't assigned to a role for the application.
33
description: Describes a problem in which you receive the AADSTS50105 error when you sign in to a SAML-based configured app with Microsoft Entra SSO.
44
ms.date: 07/19/2023
55
ms.reviewer: bernawy
66
ms.service: entra-id
77
ms.custom: sap:Issues Signing In to Applications
88
---
9-
# Error AADSTS50105 - The signed in user is not assigned to a role for the application
9+
# Error AADSTS50105 - The signed in user isn't assigned to a role for the application
1010

1111
## Summary
1212

@@ -16,7 +16,7 @@ This article provides a resolution to the AADSTS50105 error that occurs during f
1616

1717
## Symptoms
1818

19-
You receive the following error message when you try to sign in to an application that has been set up to use Microsoft Entra ID for identity management using SAML-based Single Sign-On (SSO):
19+
You receive the following error message when you try to sign in to an application that has been set up to use Microsoft Entra ID for identity management using SAML-based single sign-on (SSO):
2020

2121
>Error AADSTS50105 - The signed in user is not assigned to a role for the application.
2222

support/entra/entra-id/app-integration/error-code-AADSTS75005-not-a-valid-saml-request.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,20 +1,20 @@
11
---
2-
title: Error AADSTS75005 - The request is not a valid Saml2 protocol message
2+
title: Error AADSTS75005 - The request isn't a valid Saml2 protocol message
33
description: Describes a problem in which you receive AADSTS75005 error when signing in to SAML-based single sign-on configured app.
44
ms.date: 08/26/2022
55
ms.reviewer: bernawy
66
ms.service: entra-id
77
ms.custom: sap:Issues Signing In to Applications
88
---
9-
# Error AADSTS75005 - The request is not a valid Saml2 protocol message
9+
# Error AADSTS75005 - The request isn't a valid Saml2 protocol message
1010

1111
## Summary
1212

13-
This article describes a problem in which you receive the error message "Error AADSTS75005 - The request is not a valid Saml2 protocol message." when you try to sign into an apapplication that has been integrated with Microsoft Entra ID.
13+
This article describes a problem in which you receive the error message "Error AADSTS75005 - The request isn't a valid Saml2 protocol message." when you try to sign into an application that has been integrated with Microsoft Entra ID.
1414

1515
## Symptoms
1616

17-
You receive error `AADSTS75005` when trying to sign into an application that has been set up to use Microsoft Entra ID for identity management using SAML-based SSO.
17+
You receive error `AADSTS75005` when trying to sign into an application that has been set up to use Microsoft Entra ID for identity management using SAML-based single sign-on (SSO).
1818

1919
## Cause
2020

support/entra/entra-id/app-integration/reply-url-redirected-to-localhost.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -14,18 +14,18 @@ This article describes a problem in which Microsoft Entra ID is sending the toke
1414

1515
## Symptoms
1616

17-
During single sign-on, if the sign-in request does not contain an explicit reply URL (Assertion Consumer Service URL) then Microsoft Entra ID will select any of the configured reply URLs for that application. Even if the application has an explicit reply URL configured, the user may be to redirected `https://127.0.0.1:444`.
17+
During single sign-on, if the sign-in request doesn't contain an explicit reply URL (Assertion Consumer Service URL) then Microsoft Entra ID selects any of the configured reply URLs for that application. Even if the application has an explicit reply URL configured, the user might be to redirected `https://127.0.0.1:444`.
1818

1919
When the application was added as a non-gallery app, Microsoft Entra ID created this reply URL as a default value. This behavior has changed and Microsoft Entra no longer adds this URL by default.
2020

2121
## Cause
2222

23-
The user has not been granted access to the application in Microsoft Entra ID.
23+
The user hasn't been granted access to the application in Microsoft Entra ID.
2424

2525
## Resolution
2626

2727
Delete the unused reply URLs configured for the application.
2828

29-
On the SAML-based SSO configuration page, in the **Reply URL (Assertion Consumer Service URL)** section, delete unused or default Reply URLs created by the system. For example, `https://127.0.0.1:444/applications/default.aspx`.
29+
On the SAML-based single sign-on (SSO) configuration page, in the **Reply URL (Assertion Consumer Service URL)** section, delete unused, or default Reply URLs created by the system. For example, `https://127.0.0.1:444/applications/default.aspx`.
3030

3131

support/entra/entra-id/app-integration/troubleshoot-sign-in-saml-based-apps.md

Lines changed: 10 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -1,38 +1,38 @@
11
---
2-
title: Problems signing in to SAML-based Single Sign-On configured apps
3-
description: Guidance for the specific errors when signing into an application you have configured for SAML-based federated Single Sign-On with Microsoft Entra ID.
2+
title: Problems signing in to SAML-based single sign-on configured apps
3+
description: Guidance for the specific errors when signing into an application you have configured for SAML-based federated single sign-on with Microsoft Entra ID.
44
ms.date: 07/18/2023
55
ms.reviewer: bernawy
66
ms.service: entra-id
77
ms.custom: sap:Issues Signing In to Applications
88
---
99

10-
# Problems signing in to SAML-based Single Sign-On configured apps
10+
# Problems signing in to SAML-based single sign-on configured apps
1111

1212
## Summary
1313

14-
This article provides guidance on resolving problems signing in to SAML-based Single Sign-On configured apps.
14+
This article provides guidance on resolving problems signing in to SAML-based single sign-on configured apps.
1515

1616
## Resolution
1717

18-
To troubleshoot the sign-in issues below, we recommend the following to better diagnosis and automate the resolution steps:
18+
To troubleshoot these sign-in issues, we recommend the following to better diagnosis and automate the resolution steps:
1919

2020
- Install the [My Apps Secure Browser Extension](/azure/active-directory/manage-apps/my-apps-deployment-plan) to help Microsoft Entra ID to provide better diagnosis and resolutions when using the testing experience in the Azure portal.
21-
- Reproduce the error using the testing experience in the app configuration page in the Azure portal. Learn more on [Debug SAML-based Single Sign-On applications](/azure/active-directory/manage-apps/debug-saml-sso-issues)
21+
- Reproduce the error using the testing experience in the app configuration page in the Azure portal. Learn more on [Debug SAML-based single sign-on applications](/azure/active-directory/manage-apps/debug-saml-sso-issues)
2222

23-
If you use the [testing experience](/azure/active-directory/manage-apps/debug-saml-sso-issues) in the Azure portal with the My Apps Secure Browser Extension, you don't need to manually follow the steps below to open the SAML-based Single Sign-On configuration page.
23+
If you use the [testing experience](/azure/active-directory/manage-apps/debug-saml-sso-issues) in the Azure portal with the My Apps Secure Browser Extension, you don't need to manually follow these steps to open the SAML-based single sign-on configuration page.
2424

25-
To open the SAML-based Single Sign-On configuration page:
25+
To open the SAML-based single sign-on configuration page:
2626

2727
1. Open the [**Azure portal**](https://portal.azure.com/) and sign in as a **Global Administrator** or **Coadmin**.
2828
1. Open the **Microsoft Entra Extension** by selecting **All services** at the top of the main left-hand navigation menu.
2929
1. Type **“Microsoft Entra ID"** in the filter search box and select the **Microsoft Entra ID** item.
3030
1. Select **Enterprise Applications** from the Microsoft Entra left-hand navigation menu.
3131
1. Select **All Applications** to view a list of all your applications.
3232

33-
If you do not see the application you want show up here, use the **Filter** control at the top of the **All Applications List** and set the **Show** option to **All Applications**.
33+
If you don't see the application you want to show up here, use the **Filter** control at the top of the **All Applications List** and set the **Show** option to **All Applications**.
3434

35-
1. Select the application you want to configure for Single Sign-On.
35+
1. Select the application you want to configure for single sign-on.
3636
1. Once the application loads, select **Single Sign-On** from the application’s left-hand navigation menu.
3737
1. Select SAML-based SSO.
3838

0 commit comments

Comments
 (0)