[Enter feedback here]
recently the upload of metadata xml fails for SAP Netweaver. The error is The Blade extension/Microsoft_AAD_IAM/Blade/SamlBlade failed to supply all the required parameters. The missing the required parameter(s): 'signOnUrl'
⚠Do not edit this section. It is required for docs.microsoft.com ➟ GitHub issue linking.
@dverbiest1 Thanks for the feedback ! I have assigned this issue to content author to investigate and update the document as appropriate.
Experiencing the same issue with a different identity provider
The issue is that 'SignOnUrl' is not part of the SPSSODescriptor in SAML 2.0 metadata.. Therefore it cannot be a mandatory field when importing metadata. If MS requires it somehow, they should define a metadata-extension
@tvdijen This is a bug in the portal right now. The fix is getting deployed and it should be live by end of this week.
@Taaqif Please see my comment above.
Great, thanks!
There is actually a metadata extension defined that does exactly what you guys want for the SignOnURL.. http://docs.oasis-open.org/security/saml/Post2.0/sstc-request-initiation-cs-01.pdf
If, for convenience, you want to support importing this setting from the metadata XML, you may want to consider using this extension
@tvdijen I know but they are optional per the specification. Right now the portal is expecting this as mandatory, so we are removing that check.
@jeevansd have you an idea when you deliver a new release without this error ? it block some process in our company to create azure application with SAML authentification.
thanks
@xaviertop What's holding you back from manually entering the settings instead of the XML upload?
@tvdijen yes i can add this manually but i have a workflow which create azure application automatically and set saml configuration on it
AWS SSO federation metadata not accepted as well:
The blade Extension/Microsoft_AAD_IAM/Blade/SamlBlade failed to supply all the required parameters. The missing the required parameter(s) 'signOnUrl, logoutUrl'.
Yes, this is known issue for multiple applications now. As I have said before the fix is already in the deployment.
@jeevansd any update on this - it is a really big problem? Already in deployment means that it should work now?
This issue is resolved now. You can verify this in the portal also.
Most helpful comment
@tvdijen I know but they are optional per the specification. Right now the portal is expecting this as mandatory, so we are removing that check.