AADB2C90168: The HTTP-Redirect request does not contain the required parameter 'Signature' for a signed request.
Hi Team,
We are configuring a SAML Identity provider following the steps on this documentation:
https://learn.microsoft.com/en-us/azure/active-directory-b2c/identity-provider-generic-saml?tabs=windows&pivots=b2c-custom-policy
When we click the external IdP button for the SAML sign-in, we get the error;
AADB2C90168: The HTTP-Redirect request does not contain the required parameter 'Signature' for a signed request.
This is the Claims Provider in my Extensions.xml
<ClaimsProvider>
<Domain>theevolvedgroup.com</Domain>
<DisplayName>TEGroup</DisplayName>
<TechnicalProfiles>
<TechnicalProfile Id="TEGroup-SAML2">
<DisplayName>TEGroup</DisplayName>
<Description>Login with your SAML identity provider account</Description>
<Protocol Name="SAML2" />
<Metadata>
<Item Key="PartnerEntity">https://login.microsoftonline.com/2cc974a9-f2ac-4a1d-92dc-e76b757eb9fd/federationmetadata/2007-06/federationmetadata.xml?appid=79f94c59-bb36-4115-beb6-54cd738b0e13</Item>
<Item Key="IssuerUri">https://humanlistening.b2clogin.com/humanlistening.onmicrosoft.com/B2C_1A_signup_signin</Item>
<!-- Add this to explicitly set POST binding -->
<Item Key="ProtocolBinding">urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST</Item>
<Item Key="IdpInitiatedProfileEnabled">false</Item>
<Item Key="WantsSignedRequests">true</Item>
<Item Key="AuthenticationRequestsSigned">true</Item>
<Item Key="XmlSignatureAlgorithm">Sha256</Item>
<Item Key="ResponsesSigned">true</Item>
<Item Key="WantsSignedAssertions">true</Item>
</Metadata>
<CryptographicKeys>
<Key Id="SamlMessageSigning" StorageReferenceId="B2C_1A_SAMLSigningCert"/>
</CryptographicKeys>
<OutputClaims>
<OutputClaim ClaimTypeReferenceId="issuerUserId" PartnerClaimType="assertionSubjectName" />
<OutputClaim ClaimTypeReferenceId="givenName" PartnerClaimType="first_name" />
<OutputClaim ClaimTypeReferenceId="surname" PartnerClaimType="last_name" />
<OutputClaim ClaimTypeReferenceId="displayName" PartnerClaimType="http://schemas.microsoft.com/identity/claims/displayname" />
<OutputClaim ClaimTypeReferenceId="email" />
<OutputClaim ClaimTypeReferenceId="identityProvider" DefaultValue="theevolvedgroup.com" />
<OutputClaim ClaimTypeReferenceId="authenticationSource" DefaultValue="socialIdpAuthentication" />
</OutputClaims>
<OutputClaimsTransformations>
<OutputClaimsTransformation ReferenceId="CreateRandomUPNUserName" />
<OutputClaimsTransformation ReferenceId="CreateUserPrincipalName" />
<OutputClaimsTransformation ReferenceId="CreateAlternativeSecurityId" />
<OutputClaimsTransformation ReferenceId="CreateSubjectClaimFromAlternativeSecurityId" />
</OutputClaimsTransformations>
<UseTechnicalProfileForSessionManagement ReferenceId="SM-Saml-idp" />
</TechnicalProfile>
</TechnicalProfiles>
</ClaimsProvider>
<ClaimsProvider>
<DisplayName>Session Management</DisplayName>
<TechnicalProfiles>
<TechnicalProfile Id="SM-Saml-idp">
<DisplayName>Session Management Provider</DisplayName>
<Protocol Name="Proprietary" Handler="Web.TPEngine.SSO.SamlSSOSessionProvider, Web.TPEngine, Version=1.0.0.0, Culture=neutral, PublicKeyToken=null" />
<Metadata>
<Item Key="IncludeSessionIndex">false</Item>
<Item Key="RegisterServiceProviders">false</Item>
<Item Key="WantsSignedRequest">true</Item>
<Item Key="BindingType">HttpPost</Item>
</Metadata>
</TechnicalProfile>
</TechnicalProfiles>
</ClaimsProvider>
and this is the setup for Azure AD Single Sign-On with SAML:
SAML Certificate in Azure AD is also set to
Active
.
We checked on the PartnerEntity
metadata and it returns the expected xml.
We would appreciate your help to resolve this issue.
Thanks