Skip to content
This repository has been archived by the owner on Aug 18, 2024. It is now read-only.

Change suggested ACS URL to enable more seamless SSO #7

Open
wants to merge 1 commit into
base: master
Choose a base branch
from

Conversation

kevin-david
Copy link

@kevin-david kevin-david commented Aug 6, 2021

With the suggested ACS URL here, things work, but there are many sign-in loops that sometimes seem to happen with certain applications - namely, Azure Data Explorer and the Azure portal.

Instead, if the AAD-tenant-specific SAML URL is used (found here: https://github.com/geekzter/azure-activedirectory-gsuite-federation), these sign in loops almost never occur. Since this was a change from a previous auth configuration, it required cookies to be cleared to work fully.

I discovered this today and my life has improved a lot 🙂

With the suggested ACS URL here, things work, but there are many sign-in loops that sometimes seem to happen with certain applications - namely, Azure Data Explorer and the Azure portal.

Instead, if the AAD-tenant-specific SAML URL is used (found here: https://github.com/geekzter/azure-activedirectory-gsuite-federation), these sign in loops almost never occur.
@jabradford
Copy link

This is interesting but maybe not fully correct? Changing the ACS as indicated causes a SAML error "Message: AADSTS90121: Invalid empty request." Looking at this document: https://learn.microsoft.com/en-us/entra/external-id/direct-federation , their indication is the Audience URI -or EntityID is what should be updated to the specific tenant. Doing this does enable SAML to work again though their indication is without the /saml ending \o/

Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants