<iframe src="https://www.googletagmanager.com/ns.html?id=GTM-M74D8PB" height="0" width="0" style="display:none;visibility:hidden">
Loading
Skip to NavigationSkip to Main Content
Missing InResponseTo Field in SAML Response During SP-Initiated Flow when Using Custom Login Page with Okta
Single Sign-On
All Engines
Okta Classic Engine
Okta Identity Engine
Overview

In a Service Provider (SP)-initiated Single Sign-On (SSO) flow, Okta provides a SAML response featuring an InResponseTo field containing the ID of the SP's SAML request. This field is used by the SP for request validation.

However, when using a custom login page for an application, the SAML request parameters are not preserved on the login page, leading to the absence of the InResponseTo field in the SAML response. This can result in SP authentication failure. This article elaborates on the cause of this issue and offers a possible resolution.
 

Applies To
  • Service Provider (SP)-initiated flow
  • Single Sign-On (SSO)
  • Custom application login page
  • Custom login page with the Okta sign-in widget embedded
Cause
When employing a custom login page for an application, Okta preserves only the app context (such as the app URL) and not the entire SAML request. This is also true for a custom login page with the Okta sign-in widget embedded. Consequently, the InResponseTo field is missing in the SAML response, causing the SP authentication to fail.
Solution

The features of a custom login page may not be fully utilizable if the SP necessitates the InResponseTo field to be included in the generated SAML assertion. Here are potential solutions:

  1. Consider using Okta's default login page in place of a custom login page.

  2. Modify the SP's authentication requirements to accept authentication without the InResponseTo field.

Loading
Missing InResponseTo Field in SAML Response During SP-Initiated Flow when Using Custom Login Page with Okta