You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/develop/single-sign-on-saml-protocol.md
+48-42Lines changed: 48 additions & 42 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -11,7 +11,7 @@ ms.service: active-directory
11
11
ms.subservice: develop
12
12
ms.workload: identity
13
13
ms.topic: conceptual
14
-
ms.date: 08/24/2021
14
+
ms.date: 02/05/2022
15
15
ms.author: kenwith
16
16
ms.custom: aaddev
17
17
ms.reviewer: paulgarn
@@ -32,13 +32,13 @@ The protocol diagram below describes the single sign-on sequence. The cloud serv
32
32
33
33
To request a user authentication, cloud services send an `AuthnRequest` element to Azure AD. A sample SAML 2.0 `AuthnRequest` could look like the following example:
@@ -87,23 +87,28 @@ If `SPNameQualifier` is specified, Azure AD will include the same `SPNameQualifi
87
87
Azure AD ignores the `AllowCreate` attribute.
88
88
89
89
### RequestedAuthnContext
90
+
90
91
The `RequestedAuthnContext` element specifies the desired authentication methods. It is optional in `AuthnRequest` elements sent to Azure AD. Azure AD supports `AuthnContextClassRef` values such as `urn:oasis:names:tc:SAML:2.0:ac:classes:Password`.
91
92
92
93
### Scoping
94
+
93
95
The `Scoping` element, which includes a list of identity providers, is optional in `AuthnRequest` elements sent to Azure AD.
94
96
95
97
If provided, don't include the `ProxyCount` attribute, `IDPListOption` or `RequesterID` element, as they aren't supported.
96
98
97
99
### Signature
100
+
98
101
A `Signature` element in `AuthnRequest` elements is optional. Azure AD does not validate signed authentication requests if a signature is present. Requestor verification is provided for by only responding to registered Assertion Consumer Service URLs.
99
102
100
103
### Subject
104
+
101
105
Don't include a `Subject` element. Azure AD doesn't support specifying a subject for a request and will return an error if one is provided.
102
106
103
107
## Response
108
+
104
109
When a requested sign-on completes successfully, Azure AD posts a response to the cloud service. A response to a successful sign-on attempt looks like the following sample:
<samlp:StatusMessage>AADSTS75006: An error occurred while processing a SAML2 Authentication request. AADSTS90011: The SAML authentication request property 'NameIdentifierPolicy/SPNameQualifier' is not supported.
@@ -244,9 +250,9 @@ The `NotBefore` and `NotOnOrAfter` attributes specify the interval during which
244
250
245
251
This contains a URI that identifies an intended audience. Azure AD sets the value of this element to the value of `Issuer` element of the `AuthnRequest` that initiated the sign-on. To evaluate the `Audience` value, use the value of the `App ID URI` that was specified during application registration.
246
252
247
-
```
253
+
```xml
248
254
<AudienceRestriction>
249
-
<Audience>https://www.contoso.com</Audience>
255
+
<Audience>https://www.contoso.com</Audience>
250
256
</AudienceRestriction>
251
257
```
252
258
@@ -256,15 +262,15 @@ Like the `Issuer` value, the `Audience` value must exactly match one of the serv
256
262
257
263
This contains claims about the subject or user. The following excerpt contains a sample `AttributeStatement` element. The ellipsis indicates that the element can include multiple attributes and attribute values.
0 commit comments