public | topics | contentType | useCase | |||
---|---|---|---|---|---|---|
false |
|
|
error-management |
{
"error": "invalid_request",
"error_description": "the connection was disabled"
}
This message indicates that the Application doesn't have an active Connection associated.
- Navigate to Connections > Enterprise.
- Find your Connection, and click on Settings.
- Switch to the Applications tab.
- Enable at least one Application (if you don't see any in the list, you will need to create an application before proceeding).
{
"invalid_request": "Default App for IdP-Initiated is not configured. Make sure to configure that from connection settings or include client_id in RelayState parameter."
}
This error appears if you haven't provided the necessary information to support IdP-initiated login flows.
- Navigate to Connections > Enterprise.
- Find your Connection, and click on Settings.
- Switch to the IdP-Initiated tab.
- Select the Default Application and the Response Protocol used by that Application, and (optionally) specify any additional parameters you want passed to the Application.
::: panel SP-Initiated Login If you see this error when using a SP-initiated flow, one of the following is missing or empty:
- The
RelayState
parameter - The
InResponseTo
attribute in the SAML response
If these are missing or empty, Auth0 treats the login as IdP-initiated. You can fix this error by checking your configuration to ensure that both fields are populated and returned appropriately. :::
This error occurs when the identity provider doesn't return the RelayState
parameter along with its response.
Work with the identity provider to ensure that it returns the RelayState
parameter.
This error occurs if the value of the audience
element from the identity provider's SAML response doesn't match the value expected by Auth0. Auth0 expects the value to be the Entity ID for the Connection.
- Navigate to Connections > Enterprise. Find your Connection, and click on Setup Instructions.
- Under the Common Settings section, your Entity ID is the second parameter provided.
Make sure that the identity provider sends the correct audience
value in the SAML response.
There is an incorrect response protocol on the IdP-Initiated tab. The response protocol is the one used between Auth0 and the Application (not the remote identity provider). For example, if you set this value to SAML when your Application expects OpenID Connect or WS-Fed results in errors due to the incorrect configuration.
- Navigate to Connections > Enterprise.
- Find your Connection, and click on Settings.
- Switch to the IdP-Initiated tab.
- Check the value you have set in the Response Protocol field.
When ADFS is configured as SAML IdP, if the ADFS is relaying party trust Name ID
attribute isn't mapped the logout flow fails. For example, with the federated parameter v2/logout?federated&...
user isn't redirected to the ADFS SAML logout endpoint but redirects back to application callback URL directly. As a consequence, the user isn't logged out from the IdP in that case.
Add the Name ID
attribute as a rule on the SAML Relaying Party Trust.