AADSTS900236: The SAML authentication request property 'Scoping/ProxyCount' is not supported and must not be set.

JaparJarkynbyek 41 Reputation points
2020-08-18T07:56:32.997+00:00

Hello I am building SAML SSO with Azure AD Non-gallery Application. My SP side is built by Spring Boot. When I send SSO Login request to Azure AD I did received following error:

18292-image.png

I copied trouble shooting details and pasted into Azure test side. And I got following resolution which is non sensible:

Root cause: Unsupported authentication context compare in the signing request (SAML request)
Resolution:
Azure AD only supports Auth context compare equal to “exact”. You need to work with the service provider to change the comparison method to “exact” or remove the comparison option from the RequestedAuthContext element.

18263-image.png

Can anybody help me solving this problem?

Azure App Configuration
Azure App Configuration
An Azure service that provides hosted, universal storage for Azure app configurations.
209 questions
Azure Spring Apps
Azure Spring Apps
An Azure platform as a service for running Spring Boot applications at cloud scale. Previously known as Azure Spring Cloud.
109 questions
Microsoft Entra ID
Microsoft Entra ID
A Microsoft Entra identity service that provides identity management and access control capabilities. Replaces Azure Active Directory.
19,569 questions
0 comments No comments
{count} votes

Accepted answer
  1. soumi-MSFT 11,716 Reputation points Microsoft Employee
    2020-08-18T09:21:11.283+00:00

    @JaparJarkynbyek , Thank you for reaching out. This error is coming up due to a non-supported value being set for the scoping element in the AuthnRequest. The following values for the scoping element are not supported by AAD.

    • ProxyCount attribute
    • IDPListOption
    • RequesterID element

    You can refer to this extract of the nonsupported saml authnRequest for your reference:

      <saml:Issuer>https://terena.org/sp</saml:Issuer>  
      <samlp:NameIDPolicy  
    Format="urn:oasis:names:tc:SAML:2.0:nameid-format:transient"  
    AllowCreate="true"/>  
      <samlp:Scoping>  
        <samlp:RequesterID>https://eventr.geant.org/mellon/metadata</samlp:RequesterID> ----> <samlp:RequesterID> Not supported  
      </samlp:Scoping>  
    </samlp:AuthnRequest>  
    

    Moreover, the Scoping element, which includes a list of identity providers, is optional in AuthnRequest elements, You can try removing this from your AuthnRequest and then give it a try.

    Hope this helps.

    Do let us know if this helps and if there are any more queries around this, please do let us know so that we can help you further. Also, please do not forget to accept the response as Answer; if the above response helped in answering your query.


0 additional answers

Sort by: Most helpful