Common issues with Azure AD include:


Case 1: SAML configuration error: SAML assertion is not signed, please make sure the SAML assertions are signed in your IDP/ SAML configuration error: SAML response is not signed. please make the SAML response signed in your IDP.




  1. Signing options in Freshworks SAML Azure(Using SAML) configuration should match signing options selected in IDP.

  2. Login to Freshworks Organisation

  3. Navigate to Security Page and proceed towards Configured SAML App

  4. Check Signing options in configured SAML app



  5. Navigate to Azure AD →Enterprise Applications - >Freshworks SAML app →Single Sign On →SAML Signing Certificate - >Signing options: Sign SAML Response




    Case 2: Error while authenticating user: the assertion of the response is not encrypted and the sp requires it


  1. In the case of Freshworks SAML app is selected in Azure IDP, then disable encrypted assertions in Freshworks Security→Azure ( Using SAML) app.

  2. Login to Freshworks Organisation

  3. Navigate to Security Page and then go to Configured SAML App

  4. Disable Encrypted Assertions in configured SAML app under Advanced Options



  1. If encrypted assertions are mandatory then enable encrypted assertions in Freshworks security→  Azure (Using SAML) and SAML app in Azure.


Generate .cer/.pem file

Follow the below steps to configure SLO from the IDP side.

  1. Download metadata from SAML APP.

  2.  tag value is the public key.

  3. Azure supports a public key with a header and footer. To create a new file with extension .pem or .cer with header and footer. Based on IDP either need to copy the public key value or to be uploaded created file.        
    example:

    -----BEGIN CERTIFICATE-----
    MIIC4DCCAcigAwIBAgIIA2mtqKkFQzcwDQYJKoZIhvcNAQELBQAwMDEuMCwGA1UE
    Awwlc2VjdXJpdHlyZXZhbXAudGVzdDEuZnJlc2h3b3Jrc2FwaS5pbzAeFw0yMDEx
    MDkxNDM1NTlaFw0zMDExMDkxNDM1NTlaMDAxLjAsBgNVBAMMJXNlY3VyaXR5cmV2
    YW1wLnRlc3QxLmZyZXNod29ya3NhcGkuaW8wggEiMA0GCSqGSIb3DQEBAQUAA4IB
    DwAwggEKAoIBAQDb+UnQu6x5TDX5rF5FH6QM5dIXD8x1zqKDxlWT7uHPYjmp6iQD
    HT7KZssIrd4NwcgpPoszYtkSedu0TvqXOEAbUbYxSdKgL5RwuHAQk1MGYDqw7oM1
    CKNOpu2SHdazTEeQrLXT9yL66xBmrhcPBXqNngS9sd+uID2DETfipOJgM48gUESA
    GXjNt8sEUHfPq4gnTE77rbRSVWIq+s4cu2nldvYm8KRvnfeWvAMqfTXB72eBe4d8
    qPS9dLLvmez7oMaojfarg8WZSCDKIEYZpmAcjwGdidUTvmYNbeKJTI5168DD7eEy
    gY5pHVCLYQ/K03XNJeVO4cO1U6fp6KHYOkxfAgMBAAEwDQYJKoZIhvcNAQELBQAD
    ggEBAFTVqQGirM6UTbwfWF27mn4N+J32xgFWL19PyMWaHpInq21Q2r/1Dlo95oqu
    U65d3y3HtzzSternVVYIBYJRtX/3gTjpsNqIl3udpeeOZoM2OBO8kQItrgcf5MzD
    mXpva4kUnpEKXop/8BOmg/DbzVYV6o0LT5wYS657WL6NrHGBF/FcQTh4Rl6oAqyy
    02Mi33TRFyXJpDCTxEXNmQBHT4QdH1W4cQjJRLosToNe7KC8qgUzdumOKUwZTvu+
    oI7Sl4fdz5sMhNr5+LeNh8kojj0SIKAb7bBjOcUFdLs1hlZfrS0NG4j7RB1X1I+T
    1shX5k3Ht7LAI/TgZ1crtBppdqM=
    -----END CERTIFICATE-----

  • Azure AD →Enterprise Applications - >Freshworks SAML app →Token Encryption →Upload .pem/.cer file →Activate Token encryption.


Case 3: Saml configuration error: invalid audience attribute in the Saml response. expected audience: null



  1. The metadata URL (entity URL) of SP, configured in the IDP is wrong. Make sure the correct value is configured in the Freshworks SAML app in Azure IDP.



Case 4: Saml configuration error: invalid issuer attribute in the Saml response. expected issuer value:

  1. Azure AD Identifier configured in Freshworks Security →Azure(Using SAML) is not matching with entity id sent by IDP in the SAML response. 

  2. Hence provide a valid Issuer URL(Entity Id) copied from the Freshworks SAML app from Azure(as shown below) and paste it into Freshworks Security →Azure(Using SAML) app's Issuer URL field.


Case 5: We're Sorry, but something went wrong.

  1. When encrypted assertions are enabled on the SP side and public key details are not provided on the IDP side.

  2. Make sure the public key field is not empty


Case 6: Error in Processing SAML Response


  1. Verify Encrypted assertions enabled for Freshworks SSO Azure (using SAML).

  2. Option #1: Disable encrypted assertions in Freshworks SSO Azure (using SAML) if encrypted assertions are not enabled in Azure AD.

  3. Option #1: Follow the below steps to configure the public key in IDP and enable encrypted in IDP

  4. Download metadata from Freshworks SSO Azure (using SAML).

  5.  tag value is the public key.

  6. Azure supports a public key with a header and footer. To create a new file with extension .pem or .cer with header and footer. Based on IDP either need to copy the public key value or to be uploaded created file.        
    example:

    -----BEGIN CERTIFICATE-----
    MIIC4DCCAcigAwIBAgIIA2mtqKkFQzcwDQYJKoZIhvcNAQELBQAwMDEuMCwGA1UE
    Awwlc2VjdXJpdHlyZXZhbXAudGVzdDEuZnJlc2h3b3Jrc2FwaS5pbzAeFw0yMDEx
    MDkxNDM1NTlaFw0zMDExMDkxNDM1NTlaMDAxLjAsBgNVBAMMJXNlY3VyaXR5cmV2
    YW1wLnRlc3QxLmZyZXNod29ya3NhcGkuaW8wggEiMA0GCSqGSIb3DQEBAQUAA4IB
    DwAwggEKAoIBAQDb+UnQu6x5TDX5rF5FH6QM5dIXD8x1zqKDxlWT7uHPYjmp6iQD
    HT7KZssIrd4NwcgpPoszYtkSedu0TvqXOEAbUbYxSdKgL5RwuHAQk1MGYDqw7oM1
    CKNOpu2SHdazTEeQrLXT9yL66xBmrhcPBXqNngS9sd+uID2DETfipOJgM48gUESA
    GXjNt8sEUHfPq4gnTE77rbRSVWIq+s4cu2nldvYm8KRvnfeWvAMqfTXB72eBe4d8
    qPS9dLLvmez7oMaojfarg8WZSCDKIEYZpmAcjwGdidUTvmYNbeKJTI5168DD7eEy
    gY5pHVCLYQ/K03XNJeVO4cO1U6fp6KHYOkxfAgMBAAEwDQYJKoZIhvcNAQELBQAD
    ggEBAFTVqQGirM6UTbwfWF27mn4N+J32xgFWL19PyMWaHpInq21Q2r/1Dlo95oqu
    U65d3y3HtzzSternVVYIBYJRtX/3gTjpsNqIl3udpeeOZoM2OBO8kQItrgcf5MzD
    mXpva4kUnpEKXop/8BOmg/DbzVYV6o0LT5wYS657WL6NrHGBF/FcQTh4Rl6oAqyy
    02Mi33TRFyXJpDCTxEXNmQBHT4QdH1W4cQjJRLosToNe7KC8qgUzdumOKUwZTvu+
    oI7Sl4fdz5sMhNr5+LeNh8kojj0SIKAb7bBjOcUFdLs1hlZfrS0NG4j7RB1X1I+T
    1shX5k3Ht7LAI/TgZ1crtBppdqM=
    -----END CERTIFICATE-----

  7. Azure AD →Enterprise Applications - >Freshworks SAML app →Token Encryption →Upload .pem/.cer file →Activate Token encryption.

Case 7: 10. {{UserEmail}}  cannot be logged in as this user is not part of this organization



  1. As the error says, this user is not part of org, verify whether a user is already present within the same organization or not

  2. If the user is logging in with valid credentials from Azure and facing a login issue, then

  3. Verify user presence in Organisation

  4. In Azure, check User Attributes & Claims.

  5. A unique User identifier should be set to user.mail.

  6. Also verify the user profile and what data was sent as part of user.mail, which should match with the user email in FreshId.