This article outlines steps to troubleshoot and resolve the common 400 non_success error, seen when configuring Entra ID as an Identity Provider (IdP). The associated error message is:
Unable to validate incoming SAML Assertion.
- Microsoft Entra ID / Azure Active Directory (AAD)
- Identity Providers (IdP)
Two common scenarios can trigger this error:
Scenario 1
Okta System Logs show the error:
The Issuer in the SAML response did not match the Issuer configured for the Identity Provider.
This can occur if:
- The IdP Issuer URI provided by Microsoft lacks a trailing slash ("/") at the end, causing validation to fail.
- The certificate downloaded from the Entra ID portal has a default file extension of .cer, which needs to be changed to .crt.
Scenario 2
Okta System Logs show the error:
The Identity Provider specified Conditions, but did not designate us as the target for these conditions. Found "{0}", expected "{1}".
This happens when:
- The Entity ID configured in Entra ID is incorrect.
Resolution for Scenario 1
Solution 1: Update the IdP Issuer URI
- Log in to the Okta Admin Dashboard and navigate to Security > Identity Providers.
- Click the Edit button to update the IdP Issuer URI.
- If there is no "/" character at the end of the IdP Issuer URI, add one.
- Click Save to save changes.
Solution 2: Reapply the SAML Entra ID SAML Signing Certificate
- Log in to the Entra ID portal and re-download the certificate from the SAML Signing Certificate area.
- Change the extension of the certificate from .cer to .crt
- Log in to the tenant's admin console and navigate to the "Identity Provider" configuration page.
- Edit Entra ID IdP setting.
- Remove the old certificate and upload the new version.
Resolution for Scenario 2
- Log in to the Okta Admin Dashboard, navigate to Security > Identity Providers > select the configured Identity Provider for Entra ID.
- Click on Actions > Configure Identity Provider.
- Copy the Audience URI.
-
Log in to the Entra Admin Center and go to Applications > Enterprise Applications > <Okta Application>.
- Click on Single Sign-On.
- Click Edit next to the Basic SAML Configuration header.
- Paste the Audience URI from step 3 in the Identifier (Entity ID) field.
- Click Save to save the changes.
If these resolutions do not work, open a case with Okta support and include any pertinent Okta System Log messages, plus the actions already taken to troubleshoot the issue.
