Activity Onboard

Troubleshooting SAML errors

If you get an HTTP 400 error when testing your IdP integration, try the following troubleshooting steps.

Check that the user's sign-on email domain matches the claimed domain

Ensure the email domain of the user account you're using to test matches your claimed domain.

For instance, if you claimed a top-level domain, such as example.com, then users must sign in with <username>@example.com and not <username>@signon.example.com.

Check that the user is signing in through their identity provider

Users must authenticate through the integrated identity provider. An HTTP 400 error is returned if a user signs in using the Cisco or Microsoft social sign-in options or attempts to sign in directly through Okta.

Check that the <NameID> element in the SAML response is an email address

The value of the <NameId> element in the SAML response must be an email address. The email address must match the email specified in the user's SAML attributes. See SAML Response Requirements for details.

Check that the SAML response contains the correct attribute claims

The SAML response from your IdP to Security Cloud Sign On includes the required user attributes: firstName, lastName, and email. See SAML Response Requirements for details.

Check that the SAML response from your IdP is signed with SHA-256

SAML response from your identity provider must be signed with the SHA-256 signature algorithm. Security Cloud Sign On rejects assertions that are unsigned or signed with another algorithm.