Skip to content

Commit 4dd9f93

Browse files
authored
Improve error code AADSTS50000 documentation.
Edit review per CI 3603
1 parent f948228 commit 4dd9f93

File tree

1 file changed

+23
-23
lines changed

1 file changed

+23
-23
lines changed
Lines changed: 23 additions & 23 deletions
Original file line numberDiff line numberDiff line change
@@ -1,15 +1,15 @@
11
---
22
title: Error AADSTS50000 - There was an error issuing a token or an issue with our sign-in service
3-
description: Provides a solution to the AADSTS50000 error that occurs when you try to sign in to an Azure app using Microsoft Entra ID.
3+
description: Provides a solution to the AADSTS50000 error that occurs when you try to sign in to an Azure app by using Microsoft Entra ID.
44
ms.service: entra-id
55
ms.date: 03/12/2025
66
ms.author: bachoang
77
ms.custom: sap:Issues Signing In to Applications
88
---
99

10-
# Error AADSTS50000 with issuing a token or an issue with sign-in service
10+
# Error AADSTS50000 getting a token or signing in to an Azure app
1111

12-
The AADSTS50000 error can occur during the authentication process or token acquisition flow using the token endpoint. Multiple causes can lead to these errors, and this article provides common scenarios and their resolutions.
12+
The AADSTS50000 error can occur during the authentication process or token acquisition flow that uses the token endpoint. These errors can have multiple causes. This article provides common scenarios and resolutions for this error.
1313

1414
## Symptoms
1515

@@ -19,68 +19,68 @@ When a user tries to sign in to an application that's integrated into Microsoft
1919
2020
## Cause 1: The user password is expired, invalid, or out of sync
2121

22-
This issue is common in hybrid environments. The user's federated account password may be out of sync between the on-premises Active Directory and Microsoft Entra ID. Additionally, this issue can also occur when a user session is being revoked.
22+
This issue is common in hybrid environments. The user's federated account password might be out of sync between the on-premises Active Directory and Microsoft Entra ID. Additionally, this issue can also occur when a user session is being revoked.
2323

2424
### Solution for cause 1
2525

26-
Reset the user password, and then verify the new password can successfully authenticate to Microsoft Entra ID.
26+
Reset the user password, and then verify that the new password can successfully authenticate to Microsoft Entra ID.
2727

2828
## Cause 2: Parameters are incorrectly configured in the token acquisition request
2929

30-
This commonly occurs in the on-behalf-of (OBO) flow. Certain parameters required for token acquisition may be missing or invalid.
30+
This problem commonly occurs in the on-behalf-of (OBO) flow. Certain parameters that are required for token acquisition might be missing or invalid.
3131

3232
### Solution for cause 2
3333

34-
Make sure the client ID is valid and other required parameters are configured correctly. For more information, see [Microsoft identity platform and OAuth 2.0 On-Behalf-Of flow](/entra/identity-platform/v2-oauth2-on-behalf-of-flow).
34+
Make sure that the client ID is valid and that other required parameters are configured correctly. For more information, see [Microsoft identity platform and OAuth 2.0 On-Behalf-Of flow](/entra/identity-platform/v2-oauth2-on-behalf-of-flow).
3535

3636
## Cause 3: Consent-related issues
3737

3838
This issue can occur in an OAuth2 Device code grant flow to the token endpoint. After the user signs in to a browser window and accepts the consent dialog, this error occurs.
3939

4040
### Solution 3 for cause 3: Verify application consent settings
4141

42-
1. Go to the [Azure portal](https://portal.azure.com), make sure that the client application (Service Principal) exists in the tenant's **Enterprise Applications** page. You can search for the application by App ID.
43-
2. Verify that the user has the ability to consent to the application. Check user settings in the **Enterprise Applications** page or review relevant policies affecting user consent.
42+
1. In the [Azure portal](https://portal.azure.com), make sure that the client application (Service Principal) exists on the tenant's **Enterprise Applications** page. You can search for the application by App ID.
43+
2. Verify that the user can consent to the application. Check the user settings on the **Enterprise Applications** page or review relevant policies that affect user consent.
4444

4545
## Cause 4: Symmetric signing key is used in the application or service principal object
4646

47-
Microsoft Identity Platform (v2 endpoint) tokens must be signed by a certificate (asymmetric key). Errors may occur if a symmetric signing key is used.
47+
Microsoft Identity Platform (v2 endpoint) tokens must be signed by a certificate (asymmetric key). Errors might occur if a symmetric signing key is used.
4848

4949
### Solution for cause 4
5050

51-
#### Step 1: Check if symmetric key is used in application object
51+
#### Step 1: Check whether symmetric key is used in application object
5252

5353
1. In the Azure portal, go to the **App Registrations**.
5454
2. In the **Manage** section, select **Manifest**.
55-
3. Check if there is an entry exists in the `keyCredentials` section with `type=Symmetric` and `usage=Sign`.
55+
3. Check whether an entry exists in the `keyCredentials` section that includes `type=Symmetric` and `usage=Sign`.
5656

57-
:::image type="content" source="./media/error-code-aadsts50000-issuing-token-sign-in-service/manifest-sample.png" alt-text="Application Manifest Key Credentials" lightbox="/media/error-code-aadsts50000-issuing-token-sign-in-service/manifest-sample.png":::
57+
:::image type="content" source="./media/error-code-aadsts50000-issuing-token-sign-in-service/manifest-sample.png" alt-text="Screenshot that shows the Application Manifest Key Credentials code" lightbox="/media/error-code-aadsts50000-issuing-token-sign-in-service/manifest-sample.png":::
5858

5959
Alternatively, use the Microsoft Graph PowerShell cmdlet [Get-MgApplication](/powershell/module/azuread/get-azureadapplicationkeycredential) to retrieve key credentials.
6060

61-
#### Step 2: Check if symmetric key is used in service principal object
61+
#### Step 2: Check whether symmetric key is used in service principal object
6262

6363
1. If the application is not found in the **App Registrations** page in the Azure portal, browse to the **Enterprise Applications** page.
6464
2. Locate the application, and then get the **Object ID** of the Service Principal.
65-
3. Use [Get-MgServicePrincipal](/powershell/module/microsoft.graph.applications/get-mgserviceprincipal?view=graph-powershell-1.0) to retrieve key credentials.
65+
3. Use [Get-MgServicePrincipal](/powershell/module/microsoft.graph.applications/get-mgserviceprincipal?view=graph-powershell-1.0) to retrieve the key credentials.
6666

6767
#### Step 3: Remove symmetric signing key
6868

69-
If the symmetric key exists, use:
69+
If the symmetric key exists:
7070

71-
- [Remove-MgApplicationKey](/powershell/module/microsoft.graph.applications/remove-mgapplicationkey) to remove the symmetric key for the app registration.
72-
- [Remove-MgServicePrincipalKey](/powershell/module/microsoft.graph.applications/remove-mgserviceprincipalkey) to remove the symmetric key for the service principal object.
71+
- Use [Remove-MgApplicationKey](/powershell/module/microsoft.graph.applications/remove-mgapplicationkey) to remove the symmetric key for the app registration.
72+
- Use [Remove-MgServicePrincipalKey](/powershell/module/microsoft.graph.applications/remove-mgserviceprincipalkey) to remove the symmetric key for the service principal object.
7373

7474
If a signing key is required, use a signing certificate instead. For more information, see [SAML-based single sign-on: Configure a signing certificate](/graph/application-saml-sso-configure-api?tabs=http%2Cpowershell-script#step-6-configure-a-signing-certificate).
7575

7676
## Cause 5: No delegated permission exposed in the resource application (web API)
7777

78-
This error can occur in the following scenario:
78+
This error might occur in the following scenario:
7979

80-
- You have a multitenant resource application registered in tenant A. This application exposes only **Application Permission** type.
81-
- In a different tenant B, you have a client application registered. In the **API permission** page for this application, you configure the permission for the resource application registered in the other tenant.
82-
- Then, you use an OAuth 2 delegated grant flow (for instance auth code grant flow) to request an access token for the resource app with the `/.default` for the web API scope.
80+
- You have a multitenant resource application that's registered in Tenant A. This application exposes only the **Application Permission** type.
81+
- In Tenant B, you have a client application registered. In the **API permission** page for this application, you configure the permission for the resource application that's registered in Tenant A.
82+
- You use an OAuth 2 delegated grant flow (for instance auth code grant flow) to request an access token for the resource app that uses `/.default` as the value of the web API scope.
8383

8484
### Solution for cause 5
8585

86-
Configure the resource application to expose the delegated permission and consent to that delegated permission in the client application.
86+
Configure the resource application to expose the delegated permission, and then consent to that delegated permission in the client application.

0 commit comments

Comments
 (0)