Skip to content

Commit 1186c1f

Browse files
Merge pull request #241657 from omondiatieno/debug-saml
Reviewed content for freshness
2 parents b3e8f54 + ccfc8ee commit 1186c1f

File tree

1 file changed

+12
-12
lines changed

1 file changed

+12
-12
lines changed

articles/active-directory/manage-apps/debug-saml-sso-issues.md

Lines changed: 12 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -9,13 +9,13 @@ ms.service: active-directory
99
ms.subservice: app-mgmt
1010
ms.topic: troubleshooting
1111
ms.workload: identity
12-
ms.date: 05/27/2022
12+
ms.date: 06/15/2023
1313
ms.custom: enterprise-apps
1414
---
1515

1616
# Debug SAML-based single sign-on to applications
1717

18-
Learn how to find and fix [single sign-on](what-is-single-sign-on.md) issues for applications in Azure Active Directory (Azure AD) that use SAML-based single sign-on.
18+
In this article, you learn how to find and fix [single sign-on](what-is-single-sign-on.md) issues for applications in Azure Active Directory (Azure AD) that use SAML-based single sign-on.
1919

2020
## Before you begin
2121

@@ -33,10 +33,10 @@ To download and install the My Apps Secure Sign-in Extension, use one of the fol
3333
To test SAML-based single sign-on between Azure AD and a target application:
3434

3535
1. Sign in to the [Azure portal](https://portal.azure.com) as a global administrator or other administrator that is authorized to manage applications.
36-
1. In the left blade, select **Azure Active Directory**, and then select **Enterprise applications**.
37-
1. From the list of enterprise applications, select the application for which you want to test single sign-on, and then from the options on the left select **Single sign-on**.
36+
1. In the left navigation pane, select **Azure Active Directory**, and then select **Enterprise applications**.
37+
1. From the list of enterprise applications, select the application for which you want to test single sign-on, and then from the options on the left, select **Single sign-on**.
3838
1. To open the SAML-based single sign-on testing experience, go to **Test single sign-on** (step 5). If the **Test** button is greyed out, you need to fill out and save the required attributes first in the **Basic SAML Configuration** section.
39-
1. In the **Test single sign-on** blade, use your corporate credentials to sign in to the target application. You can sign in as the current user or as a different user. If you sign in as a different user, a prompt will ask you to authenticate.
39+
1. In the **Test single sign-on** page, use your corporate credentials to sign in to the target application. You can sign in as the current user or as a different user. If you sign in as a different user, a prompt asks you to authenticate.
4040

4141
![Screenshot showing the test SAML SSO page](./media/debug-saml-sso-issues/test-single-sign-on.png)
4242

@@ -54,10 +54,10 @@ To debug this error, you need the error message and the SAML request. The My App
5454

5555
### To resolve the sign-in error with the My Apps Secure Sign-in Extension installed
5656

57-
1. When an error occurs, the extension redirects you back to the Azure AD **Test single sign-on** blade.
58-
1. On the **Test single sign-on** blade, select **Download the SAML request**.
57+
1. When an error occurs, the extension redirects you back to the Azure AD **Test single sign-on** page.
58+
1. On the **Test single sign-on** page, select **Download the SAML request**.
5959
1. You should see specific resolution guidance based on the error and the values in the SAML request.
60-
1. You'll see a **Fix it** button to automatically update the configuration in Azure AD to resolve the issue. If you don't see this button, then the sign-in issue isn't due to a misconfiguration on Azure AD.
60+
1. You see a **Fix it** button to automatically update the configuration in Azure AD to resolve the issue. If you don't see this button, then the sign-in issue isn't due to a misconfiguration on Azure AD.
6161

6262
If no resolution is provided for the sign-in error, we suggest that you use the feedback textbox to inform us.
6363

@@ -66,7 +66,7 @@ If no resolution is provided for the sign-in error, we suggest that you use the
6666
1. Copy the error message at the bottom right corner of the page. The error message includes:
6767
- A CorrelationID and Timestamp. These values are important when you create a support case with Microsoft because they help the engineers to identify your problem and provide an accurate resolution to your issue.
6868
- A statement identifying the root cause of the problem.
69-
1. Go back to Azure AD and find the **Test single sign-on** blade.
69+
1. Go back to Azure AD and find the **Test single sign-on** page.
7070
1. In the text box above **Get resolution guidance**, paste the error message.
7171
1. Select **Get resolution guidance** to display steps for resolving the issue. The guidance might require information from the SAML request or SAML response. If you're not using the My Apps Secure Sign-in Extension, you might need a tool such as [Fiddler](https://www.telerik.com/fiddler) to retrieve the SAML request and response.
7272
1. Verify that the destination in the SAML request corresponds to the SAML Single Sign-on Service URL obtained from Azure AD.
@@ -75,13 +75,13 @@ If no resolution is provided for the sign-in error, we suggest that you use the
7575

7676
## Resolve a sign-in error on the application page
7777

78-
You might sign in successfully and then see an error on the application's page. This occurs when Azure AD issued a token to the application, but the application doesn't accept the response.
78+
You might sign in successfully and then see an error on the application's page. This error occurs when Azure AD issued a token to the application, but the application doesn't accept the response.
7979

8080
To resolve the error, follow these steps, or watch this [short video about how to use Azure AD to troubleshoot SAML SSO](https://www.youtube.com/watch?v=poQCJK0WPUk&list=PLLasX02E8BPBm1xNMRdvP6GtA6otQUqp0&index=8):
8181

8282
1. If the application is in the Azure AD Gallery, verify that you've followed all the steps for integrating the application with Azure AD. To find the integration instructions for your application, see the [list of SaaS application integration tutorials](../saas-apps/tutorial-list.md).
8383
1. Retrieve the SAML response.
84-
- If the My Apps Secure Sign-in extension is installed, from the **Test single sign-on** blade, select **download the SAML response**.
84+
- If the My Apps Secure Sign-in extension is installed, from the **Test single sign-on** page, select **download the SAML response**.
8585
- If the extension isn't installed, use a tool such as [Fiddler](https://www.telerik.com/fiddler) to retrieve the SAML response.
8686
1. Notice these elements in the SAML response token:
8787
- User unique identifier of NameID value and format
@@ -95,4 +95,4 @@ To resolve the error, follow these steps, or watch this [short video about how t
9595

9696
## Next steps
9797

98-
Now that single sign-on is working to your application, you could [Automate user provisioning and de-provisioning to SaaS applications](../app-provisioning/user-provisioning.md) or [get started with Conditional Access](../conditional-access/app-based-conditional-access.md).
98+
Now that single sign-on is working to your application, you could [Automate user provisioning and deprovisioning to SaaS applications](../app-provisioning/user-provisioning.md) or [get started with Conditional Access](../conditional-access/app-based-conditional-access.md).

0 commit comments

Comments
 (0)