locked
How can I add Auth0 as Claims Provider into ADFS? RRS feed

  • Question

  • Hello.

    I want to use Auth0 as an Claims Provider for my application. So here is the flow:
    Web Application --> ADFS --> Auth0 --> Social

    I've red this link and did whatever it says; in order to add Auth0 as a Claims Provider  into ADFS I've used the SAML Metadata URL. As a result  I can now select Auth0 as IdP (or CP in ADFS terms) on ADFS login page and it redirects user to log in on Auth0. And client can authenticate on Auth0 with no doubt. But, when ADFS receives the HTTP POST SAML response from Auth0 it throws an error "MSIS0050: SAML Response does not match SAML request.". And thus, client cannot login to web app.

    Here are the details of the exception:

        Encountered error during federation passive request. 

        Additional Data 

        Protocol Name: 
        Saml 

        Relying Party: 


        Exception details: 
        Microsoft.IdentityServer.Web.UnsupportedSamlResponseException: MSIS0050: SAML Response does not match SAML request. Request ID: id-2252c816-02de-423c-b518-703cbfd26055, response InResponseTo: 
           at Microsoft.IdentityServer.Web.Protocols.Saml.SamlProtocolHandler.GetSecurityTokenFromSignInResponse(ProtocolContext context)
           at Microsoft.IdentityServer.Web.PassiveProtocolListener.ProcessProtocolRequest(ProtocolContext protocolContext, PassiveProtocolHandler protocolHandler)
           at Microsoft.IdentityServer.Web.PassiveProtocolListener.OnGetContext(WrappedHttpListenerContext context)

    So, What can be the problem here? Can you please help me on this?

         
    Thursday, October 18, 2018 8:51 AM

All replies

  • This may help:

    https://medium.com/the-new-control-plane/connecting-adfs-with-social-logins-958aa8b327b7

    Thursday, October 18, 2018 5:53 PM