Events
Apr 9, 3 PM - Apr 10, 12 PM
Code the Future with AI and connect with Java peers and experts at JDConf 2025.
Register NowThis browser is no longer supported.
Upgrade to Microsoft Edge to take advantage of the latest features, security updates, and technical support.
In this article, you learn how to find and fix single sign-on issues for applications in Microsoft Entra ID that use SAML-based single sign-on.
We recommend installing the My Apps Secure Sign-in Extension. This browser extension makes it easy to gather the SAML request and SAML response information that you need to resolve issues with single sign-on. In case you can't install the extension, this article shows you how to resolve issues both with and without the extension installed.
To download and install the My Apps Secure Sign-in Extension, use one of the following links.
To test SAML-based single sign-on between Microsoft Entra ID and a target application:
Sign in to the Microsoft Entra admin center as at least a Cloud Application Administrator.
Browse to Identity > Applications > Enterprise applications > All applications.
From the list of enterprise applications, select the application for which you want to test single sign-on, and then from the options on the left, select Single sign-on.
On the Select a single sign-on method pane, select SAML.
To open the SAML-based single sign-on testing experience, go to Test single sign-on (step 5). If the Test button is greyed out, you need to fill out and save the required attributes first in the Basic SAML Configuration section.
In the Test single sign-on page, use your corporate credentials to sign in to the target application. You can sign in as the current user or as a different user. If you sign in as a different user, a prompt asks you to authenticate.
If you're able to sign in, the test is successful. In this case, Microsoft Entra ID issued a SAML response token to the application. The application used the SAML token to successfully sign you in.
If you have an error on the company sign-in page or the application's page, use one of the next sections to resolve the error.
When you try to sign in, you might see an error on your company sign-in page that's similar to the following example.
To debug this error, you need the error message and the SAML request. The My Apps Secure Sign-in Extension automatically gathers this information and displays resolution guidance on Microsoft Entra ID.
If no resolution is provided for the sign-in error, we suggest that you use the feedback textbox to inform us.
You might sign in successfully and then see an error on the application's page. This error occurs when Microsoft Entra ID issued a token to the application, but the application doesn't accept the response.
To resolve the error, follow these steps, or watch this short video about how to use Microsoft Entra ID to troubleshoot SAML SSO:
If the application is in the Microsoft Entra Gallery, verify that you followed all the steps for integrating the application with Microsoft Entra ID. To find the integration instructions for your application, see the list of SaaS application integration tutorials.
Retrieve the SAML response.
Notice these elements in the SAML response token:
User unique identifier of NameID value and format
Claims issued in the token
Certificate used to sign the token.
For more information on the SAML response, see Single Sign-on SAML protocol.
Now that you're done reviewing the SAML response, see Error on an application's page after signing in for guidance on how to resolve the problem.
If you're still not able to sign in successfully, you can ask the application vendor what is missing from the SAML response.
Now that single sign-on is working to your application, you could Automate user provisioning and deprovisioning to SaaS applications or get started with Conditional Access.
Events
Apr 9, 3 PM - Apr 10, 12 PM
Code the Future with AI and connect with Java peers and experts at JDConf 2025.
Register NowTraining
Module
Implement and monitor the integration of enterprise apps for SSO - Training
Deploying and monitoring enterprise applications to Azure solutions can ensure security. Explore how to deploy on-premises and cloud based apps to users.
Certification
Microsoft Certified: Identity and Access Administrator Associate - Certifications
Demonstrate the features of Microsoft Entra ID to modernize identity solutions, implement hybrid solutions, and implement identity governance.