Skip to content

Commit 331a6de

Browse files
authored
freshness updates
1 parent 36675e9 commit 331a6de

File tree

1 file changed

+17
-6
lines changed

1 file changed

+17
-6
lines changed

articles/active-directory/manage-apps/application-sign-in-problem-application-error.md

Lines changed: 17 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.subservice: app-mgmt
99
ms.workload: identity
1010
ms.topic: troubleshooting
11-
ms.date: 07/11/2017
11+
ms.date: 09/06/2022
1212
ms.author: ergreenl
1313
ms.collection: M365-identity-device-management
1414
---
@@ -17,7 +17,14 @@ ms.collection: M365-identity-device-management
1717

1818
In this scenario, Azure Active Directory (Azure AD) signs the user in. But the application displays an error message and doesn't let the user finish the sign-in flow. The problem is that the app didn't accept the response that Azure AD issued.
1919

20-
There are several possible reasons why the app didn't accept the response from Azure AD. If the error message doesn't clearly identify what's missing from the response, try the following:
20+
There are several possible reasons why the app didn't accept the response from Azure AD. If there is an error message or code displayed, use the following resources to diagnose the error:
21+
22+
* [Azure AD Authentication and authorization error codes](../develop/reference-aadsts-error-codes.md)
23+
24+
* [Troubleshooting consent prompt errors](application-sign-in-unexpected-user-consent-error.md)
25+
26+
27+
If the error message doesn't clearly identify what's missing from the response, try the following:
2128

2229
- If the app is the Azure AD gallery, verify that you followed the steps in [How to debug SAML-based single sign-on to applications in Azure AD](./debug-saml-sso-issues.md).
2330

@@ -58,13 +65,13 @@ To add an attribute in the Azure AD configuration that will be sent in the Azure
5865

5966
The next time that the user signs in to the app, Azure AD will send the new attribute in the SAML response.
6067

61-
## The app doesn't identify the user
68+
## The app cannot identify the user
6269

6370
Signing in to the app fails because the SAML response is missing an attribute such as a role. Or it fails because the app expects a different format or value for the **NameID** (User Identifier) attribute.
6471

6572
If you're using [Azure AD automated user provisioning](../app-provisioning/user-provisioning.md) to create, maintain, and remove users in the app, verify that the user has been provisioned to the SaaS app. For more information, see [No users are being provisioned to an Azure AD Gallery application](../app-provisioning/application-provisioning-config-problem-no-users-provisioned.md).
6673

67-
## Add an attribute to the Azure AD app configuration
74+
### Add an attribute to the Azure AD app configuration
6875

6976
To change the User Identifier value, follow these steps:
7077

@@ -87,7 +94,7 @@ To change the User Identifier value, follow these steps:
8794

8895
8. Under **User attributes**, select the unique identifier for the user from the **User Identifier** drop-down list.
8996

90-
## Change the NameID format
97+
### Change the NameID format
9198

9299
If the application expects another format for the **NameID** (User Identifier) attribute, see [Editing nameID](../develop/active-directory-saml-claims-customization.md#editing-nameid) to change the NameID format.
93100

@@ -155,4 +162,8 @@ To change the signing algorithm, follow these steps:
155162

156163
## Next steps
157164

158-
[How to debug SAML-based single sign-on to applications in Azure AD](./debug-saml-sso-issues.md).
165+
* [How to debug SAML-based single sign-on to applications in Azure AD](./debug-saml-sso-issues.md).
166+
167+
* [Azure AD Authentication and authorization error codes](../develop/reference-aadsts-error-codes.md)
168+
169+
* [Troubleshooting consent prompt errors](application-sign-in-unexpected-user-consent-error.md)

0 commit comments

Comments
 (0)