Skip to content

Commit 7a279ed

Browse files
Merge pull request #245283 from omondiatieno/enforce-signed-sam
reviewed article for freshness-enforce signed SAML signature verification
2 parents 2d4d9c3 + 0b72032 commit 7a279ed

File tree

1 file changed

+3
-3
lines changed

1 file changed

+3
-3
lines changed

articles/active-directory/manage-apps/howto-enforce-signed-saml-authentication.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.subservice: app-mgmt
99
ms.workload: identity
1010
ms.topic: conceptual
11-
ms.date: 06/29/2022
11+
ms.date: 07/18/2023
1212
ms.author: jomondi
1313
ms.reviewer: alamaral
1414
ms.collection: M365-identity-device-management
@@ -24,11 +24,11 @@ If enabled Azure Active Directory will validate the requests against the public
2424

2525
- Protocol not allowed for signed requests. Only SAML protocol is supported.
2626
- Request not signed, but verification is enabled.
27-
- No verification certificate configured for SAML request signature verification.
27+
- No verification certificate configured for SAML request signature verification. For more information about the certificate requirements, see [Certificate signing options](certificate-signing-options.md).
2828
- Signature verification failed.
2929
- Key identifier in request is missing and two most recently added certificates don't match with the request signature.
3030
- Request signed but algorithm missing.
31-
- No certificate matching with provided key identifier.
31+
- No certificate matching with provided key identifier.
3232
- Signature algorithm not allowed. Only RSA-SHA256 is supported.
3333

3434
> [!NOTE]

0 commit comments

Comments
 (0)