Symptom
- In 2H2025 release, the Login Failures Error Log page under Admin Center has been enhanced to make it easier to understand and resolve SSO login issues. Administrators can now review recent errors and see guidance for common problems.
- When a SAML response is present in an error entry, a new Action column provides a View Details option, that opens a dialog showing the SAML response in a clear format. Detailed information is available in one place to help administrators take the next steps.
- Error logs previously contained only raw entries, making it difficult to identify issues or take corrective action. These improvements help to quickly review errors and gather necessary information, reducing delays in resolution.
- Troubleshooting, tips and tricks, and common errors for SAML SSO login to BizX
Image/data in this KBA is from SAP internal systems, sample data, or demo systems. Any resemblance to real data is purely coincidental.
Environment
- SAP SuccessFactors HCM Suite
- SAP Cloud Identity Services – Identity Authentication IAS
Reproducing the Issue
- Loging Issue for users while accessing the SF instance
- Error Logs can be viewed in Admin Center-> Login Failures Error Log
Resolution
In the Login Failures Error Log page you can access the SSO Error Logs which use to troubleshoot SSO issues. This facilitates troubleshooting and possible resolution without having to engage Support.
Access can be achieved by granting the required permission to the users:
- Go to Manage Permission Roles;
- Open the role that is assigned to the user;
- Click on Permission;
- In Manage Security -> Grant Manage SAML SSO Settings permission
Once you have the permission, you can access the tool. There, you can filter for date and the User affected, but only the date is required to do a search.
|
Error |
Analysis and Recommended Actions |
|
user account not exists or cannot find user account |
This is likely due:
<StatusCode Value="urn:oasis:names:t c:SAML:2.0:status:Success"/> in the Vie w Details.
|
|
Invalid user account /status |
: In provisioning |log review. it shows: com.successfactors.sso2.api.SSOException: invalid user account/status@sf_loaduser |
|
No signature present in assertions! |
In View Details, you can see the following message: <StatusMessage>User attribute configured for name-id format unspecified is not supported.</StatusMessage>This usually indicates that the user record in IAS does not have a login name value specified. Please review the user record in IAS and make sure the login name field is populated for users that need to log into SF. |
|
No signature present in assertions [login name matches] |
This indicates that there is an expired certificate – either between IAS-Successfactors or IAS-Corporate IdP and/or IdP certificate does not match with the certificate in IAS. To validate if the SF certificate on your IAS is expired, please follow the steps below:
If the certificate has expired, please follow 3595935 - SSO Certificate Renewal Procedure with SF-IAS Integration - SAP for Me to have it updated. If it’s not yet expired, then check whether the IdP have the correct and valid certificate. To validate that the certificate is the same, contact your corporate IDP to perform a metadata exchange on their side and then update the certificate on IAS side. To check the IdP certificate that is set in IAS:
To update the corporate IDP certificate on IAS, follow KBA 3432984 - How to Update Signing Certificates on IAS - SAP for Me |
|
Logout response failed with error code: urn:oasis:names:tc:SAML:2.0:status:Requester@logout_validate |
Indicates a problem with the SAML logout process, which can be due to various reasons, such as incorrect configuration or issues with the SAML metadata.
|
|
SSO is not enabled for the company company id |
Enable SAML SSO flag has been disabled in provisioning; please set it back to enabled. |
|
Missing SAML response of object name |
The SAML response returned from IDP is null. In the majority of cases, the IDP issuer was null in the SAML response. Please check IDP configurations. |
|
Error loading IDP metadata |
This indicates that there are no SAML assertion party records found or missing values in the SAML assertion party record. Please double check SAML assertion party records under -SF Admin Center → Monitoring Tool for SAP Cloud Identity Service Migration Progress → SAML Assertion Parties. |
|
No logout Request Info found in session | This means there is a mismatch of session index or Name Id; either the session has already expired or not found, or the NameID from the logout request was incorrect. Please check session valid time and NameID settings on the IDP |
|
SAML response not expected, the original request id: null, response is for x-session-id |
SAML response for SP-initiated login received without a proper request, possibly due to server routing requests to different nodes. Please ask the user to retry logging into SF again using proper login URLs. |
|
There is no related IdP Metadata found in BizX for issuer SAML_Issuer_name |
The SAML Issuer Name from the response does not match the value specified in SF BizX, i.e., the SAML_issuer_name value in the error message does not match that from the details’ SAML response issuer value. , see example below:
Please check whether there has been a change of SAML Issuer Name in IAS. If so, either change it back or modify SF SAML Issuer and corresponding URLs to match the new SAML issuer value in IAS.
|
|
The issuer in response is not valid, expect valid IAS issuer https://<IASURL> |
Root cause would be mismatch of SAML issuer in SF vs SAML issuer name in IAS. Please make sure both match each other by validating metadata |
|
The SP entity id is not in the audience list, sp_entity_id |
Caused by wrong SP entity id in IAS. See example below of mismatch between expected entity id in error message vs that from the SAML response. Please ask your IAS admin to double check the entity id in your IAS admin console and make sure it matches the expected value. By default, SF SP entity id would be in the format:
|
|
User doesn’t have login permission |
The user displayed on the User column and/or in the SAML response does not have the login permission. Please grant the necessary permission if this is a valid user. |
|
User account is locked |
The user displayed on the User column and/or in the SAML response has a locked account. Please unlock in SF instance via Reset User Account page if this is a valid user. |
|
The digital signature of the received SAML2 message is invalid |
Please check that the signing certificate from IAS and the certificate for the IAS SAML Assertion Party record in SF match each other. If not, update SF with the latest SAML signing certificate from IAS. |
|
Client ip does not fall in the permitted range |
This error means that the user trying to login is using an IP address that does not fall into the range of the configured IP Restrictions. To resolve, you can go to Admin Center > IP Restriction Management > and add the IP address of the user trying to login. Adding an IP Restriction | SAP Help Portal
If partner has access to provisioning -> Verify via provisioning ->Access provisioning -> Company settings-> Restrict access to IP range check if IP restriction is updated Note : In provisioning |log review. it shows: com.successfactors.sso2.api.SSOException: invalid user account/status@sf_loaduser |
|
Format null unknown |
This error is coming from the customer’s Identity Provider (IdP) settings where an invalid name policy was selected. An example of a name ID with no policy specific which will cause the error: <NameID>I827_22</NameID> What a name ID with a supported policy will typically look like: <saml2:NameID Format="urn:oasis:names:tc:SAML:1.1:nameid-format:unspecified">testuser</saml2:NameID> |
| Certificate time not valid |
This means that the certificate in SSO Settings has expired AND the SAML Verifying Certificate Valid Period is set to YES. To fix this, you need to update the certificate with a new valid certificate. If you do not have a certificate yet, you can temporarily update SAML Verifying Certificate Valid Period to NO until a new certificate is available. |
| Didn't get an assertion in ArtifactResponse |
In SP-initiated scenarios, when the Identity Provider (IdP) can't process the Authn Request from the Service Provider (SP), the SAML Response may lack the required Example: Since the error originates from the IdP, you should ask the IdP administrator to analyze and provide the cause of the failure. |
| No company for sp-initiated login.@sf_login_init |
If you have Corporate Identity Provider configuration with IAS as proxy, please check if Corporate Identity Provider configuration is correct. Check in IAS if Metadata and Certificate are correct for Corporate Identity Provider Set up. |
Other SSO error scenarios and failures that might not appear on the Login Failures Error Logs:
|
Error |
Analysis and Recommended Actions |
|
AADSTS650056: Misconfigured application |
Customers need to contact their IDP Team (Azure) to update the correct URL (Entity ID) on the Azure side. |
|
AADSTS50011: The reply URL '..' specified in the request does not match the reply URLs configured for the application '..’ |
Customers need to contact their IDP Team (Azure) to update the correct URL (Reply URL) on the Azure side. |
|
Errors from IdP:
SSOv2 Error(16) Unable to find SAML SSO/SP Connector object matching SAML Authn Request |
This means that we are sending the entityID as ‘https://www.successfactors.com/companyID’, while the IdP has it configured as ‘https://www.successfactors.com’
The reason is that in provisioning "Send request as Company-Wide issuer" is set to YES, which means that SF will send the companyID in the entityID as: https://www.successfactors.com/companyID
To resolve this, either disable the option in Provisioning > Single Sign On Settings or have the IdP update the EntityID on their side to include the companyID
|
|
The RelayState “[#####] is invalid. It must start with ‘/’ or be a valid URL and from a safe domain |
This is common using ADFS as the corporate Identity Provider for SAML 2.0 Single Sign On. This error could be quite misleading as although it is pointing to a Relay State issue, the issue is caused by the Claim Rules.
In ADFS, please ensure you have added two Claim Rules in the for your Relying Party Trust in as per section 3.8 in the following blog post. |
|
Login page keeps loading |
This issue could be due to following scenarios: 1)Incorrect certificate of their IDP configured on their IAS Admin Console. This can be verified with the IAS Admin Troubleshooting Logs with the X-IDS-ID they can gather from the SAML Trace. If it is showing up with "Signature validation of SAML2Assertion failed. Signature validation of SAML2Assertion failed. Caused by: Signature not valid!".. then the customer should be in contact with their IDP team to verify the certificate. 2) Login Name is used as a Subject Name Identifier but on IAS, the user’s Login Name is empty. Verify whether the user trying to login have a Login Name. |
|
Active zonesession exists for user |
If the feature "Disallow concurrent login sessions" is enabled, then users will not be allowed to log in with more than one session concurrently. For example: if a user has an open session using Edge browser, they will not be able to login to another session using Chrome until they have logged out of the initial session. For more details See KBA: 2524768 - Restrict Concurrent BizX Sessions |
|
Decrypt assertion fail |
The assertion information is being encrypted with the certificate. Ensure that the customer uses the correct certificate from SuccessFactors. Use Scenario#1 from 2707993 - [SSO] Metadata file for SSO | How to generate it for either SF x IDP and Outbound SSO scenarios |
|
Validate response fail |
Check if the certificate being sent from IDP matches the certificate setup on the Asserting Party on their SSO Settings from Provisioning. Check if there’s an error message that says “The response is not signed correctly” – this means that the response is not signed or it is signed with the wrong certificate. |
|
Validate assertion fail |
Check if there’s a message saying “the assertion is not signed correctly” – this could either mean that (1) the assertion is not signed or (2) it is signed with the wrong certificate. |
|
Validate assertion fail now [<timestamp on SF at moment of the error>] is before Condition NotBefore [<timestamp sent by SSO on SAML request>] |
The error is due to the time on BizX and on the SSO being more than 2 minutes with difference as SuccessFactors. SF only has a buffer that allows up to 2 minutes difference. To resolve this issue, please change the server time (SSO) to less than 2 minutes from SuccessFactors which our servers are synchronized with the following servers:
|
|
Signature validation failed in assertion: Signature cryptographic validation not successful@versign
|
This indicates that the SSO certificate in BizX does not match from IAS. Customer needs to update the certificate in BizX with the certificate from IAS’s metadata file, which they can get from admin console. |
Limitations:
- Currently only errors that would result in SAML response from IDP back to SuccessFactors can be shown,
- Login errors due to IDP configurations and/or errors that do not result in SAML response back to SF, e.g. configuration error between IAS and corporate IDP, are not captured
Other Debug Tips:
-
Review error message
-
Inspect the decoded SAML assertion or response in the “View Details” page, and check the following parameters:
-
- Status Codes:
First, check if the SAML <Status> is success or an error. If you see something like <StatusCode Value="urn:oasis:names:tc:SAML:2.0:status:Responder"> or a second <StatusCode Value="...:InvalidNameIDPolicy"/>, the IdP is explicitly signaling an error (like the NameID policy issue). That tells you the assertion wasn’t even issued due to a policy problem.
-
- Issuer:
This is the tag indicating what is the <issuer> value sent by the IdP. This needs to match the value setup in the Provisioning.
-
- Destination:
This value should match the AssertionConsumerSrevice URL which was provided by SuccessFactors for this company and Datacenter combination. Make sure the “company=” value matches the Company ID in Provisioning.
-
- Timestamps:
Look at IssueInstant, NotBefore, and NotOnOrAfter. Are they within a reasonable range of the current time?
-
-
-
- If NotBefore is in the future or NotOnOrAfter is in the past relative to your SP’s clock, you’ve got a timing issue (likely clock skew or an overly short validity window).
-
- Audience:
-
Find the <Issuer> value. Does it exactly match your SP/IDP’s entity ID/issuer? If not, that's a problem (audience mismatch).
Example: <ns2:Issuer>iastenant.accounts.ondemand.com</ns2:Issuer>
-
- NameID:
Check the Format and value of the <NameID>.
-
-
-
- Is the Format what you expect (e.g., an email address format vs. persistent)?
- Does the value look correct (e.g., an actual username or email and not something unexpected)?
- If the format is wrong, you likely have the NameID policy issue discussed earlier.
- If the NameID is missing or empty, that's also a problem – the SP might require a specific identifier to map the user.
Example for IAS integrated tenant, default value should be:
<ns2:NameID Format="urn:oasis:names:tc:SAML:1.1:nameid-format:unspecified">
Other examples: <ns2:NameID Format="urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress">
-
- Signature & Certificate:
-
Confirm that a <Signature> element is present if your SP requires signed assertions/responses. Inspect the Key Info or X.509 certificate data within the signature.
-
-
-
- You can copy it and compare with the certificate configured in your SP.
- If they don't match, the SP will reject it.
- If the signature element is completely missing (and your SP expects one), the SP will also reject it for not being signed.
-
-
</ds:X509Certificate>: This tag indicates the beginning of the SAML verifying certificate sent by the IdP. You can use this to verify if the certificates match between the IdP and what is set up in provisioning.
-
- Endpoints (Recipient and InResponseTo):
- Check the Recipient attribute in the SubjectConfirmationData – it should be the URL of your SP’s ACS endpoint. If it’s pointing somewhere else or has a typo, the SP will drop the assertion.
- Similarly, if this was an SP-initiated login, the InResponseTo should match the ID of the AuthnRequest that the SP sent initially. A mismatch there can cause the SP to ignore the response as it doesn't recognize it as the answer to its login request.
- Endpoints (Recipient and InResponseTo):
SAML 2.0 Provisioning tips when working in the SSO Settings screen:
- What are the different sections in the SSO settings screen in provisioning?
Note: This section isn't a guide to the SSO setup screen. Here we are merely capturing quick tips for common questions.
Enable SAML SSO: radio button to signal whether SAML SSO is enabled for the current SF tenant or not
SAML Asserting Parties (or also know as IdP): SAML assertion parties are now exposed on Admin Center from the 2511 release onward, the Monitoring Tool has been enhanced to display the following newly added details for SAML assertion parties:
-
-
- SAML Assertion Party Name
- SAML Issuer
- SAML Enabled (flag)
- SAML Verifying Certificate Validity Period
- Identity Authentication Integrated (flag)
-
- How to add new asserting party in SSO Settings?
- This is no longer supported. Please see Deprecation of Manage Asserting Parties Page as Add asserting party button is no more available. Reference KBA: 3422297 - Provisioning option to Add an Asserting Party in SSO Settings is removed - SAP for Me
- To update any asserting party information in provisioning:
- In SSO Settings asserting party page you need to hit the "update asserting party" button. If you hit the Save button at the top of the screen instead, this will not save the changes.
- This applies to saving changes to the redirection URL as well as the other related sections below, such as SP initiated logout, login, etc.. Note that for SAML SSO to work, the Enable SAML flag value need to be set to "Enabled".
- Direct Corp IDP to SF integration will be deprecated, migrate to IAS as soon as possible. With SF to IAS integration, only 1 IAS asserting party will be supported.
- If you want to connect multiple Corp IDPs, you can setup multiple Corp IDP within IAS, and define conditional authentication rules so different set of users could use different Corp IDP to login
- Guidance on Migrating to Identity Authentication in SAP Cloud Identity Services
- What are Redirection URLs?
-
- These are used to redirect the users to the different customer-defined URLs if the end user runs into one of the matching scenarios.
- If your tenant is already integrated with IAS, you can update the redirect URLs on Admin Center --> Manage SAML SSO Settings page:
- If IAS is the real IDP, click the Manage Non-SAML setting button, and update the redirect URLs
- If IAS is proxy to a corporate IdP, click the Edit button next to the corporate IdP record, and update the redirect URLs
- What are the SAML v2 : SP-initiated logout, SP-initiated login, etc..?:
- Use these sections if you want to setup SP-initiated URLs, global IdP logout URLs, etc.
- If you are integrated with IAS, these values would be set by automated process, we recommend that you leave the settings as is as default values. To view the default settings, please see the corresponding Help guide Default Tenant Configurations for HCM Suite and Identity Authentication | SAP Help Portal
- Remember these are also specific to the asserting party, so any changes made here need to be saved using the "update asserting party" button
Note: If you are using SP-initiated logins, the deeplink and continue session redirect URL's should be blank. As stated above, any changes made here need to be saved using the "update asserting party" button.
- Common SSO Settings:
- The sections are self-explanatory. Please note that Partial Organizational SSO will be deprecated by Nov 2026, please migrate to SAP Cloud Identity Service (IAS) for authentication, and migrate existing those users using SF username/password for login under partial SSO to use IAS username/password for login instead. Please note that if you make changes here, you should use the "SAVE" button at the top of the screen below the save token button.
- Migration to SAP Cloud Identity Authentication (IAS/IPS)
- How to Update the SAML verifying certificate?
- If the IdP SAML verification certificate is expiring or if the certificate being sent is not correct, you may need to amend the values in provisioning. If your tenant is already integrated with SAP Cloud Identity Services (IAS) as IdP, SAP will update IAS’s verification certificate automatically for you, so you can ignore the below steps.
- Make sure the new certificate is in Base64 format.
- To check, open the certificate in a text editor, and verify that you can see "BEGIN CERTIFICATE" and "END CERTIFICATE" tags in it.
- Make sure the correct asserting party is selected from the "SAML Asserting Parties" drop-down menu.
- Make a backup from the existing certificate by copying and pasting currently values from provisioning into a new text file.
- Copy and paste the full text from the new certificate into the provisioning settings.
- Click "Update the asserting party" button to save the changes.
- If the certificate was saved successfully, then you should that the values above the certificate field are showing the valid period and status of the certificate you just updated.
- See the attached guide "Update SAML cert SSO.pdf" for detailed steps with screenshots.
- Where to find the SSO error log in provisioning -> SSO settings page?
- The SSO Error log is located at the bottom of the SSO Settings page.
- Click the "SSO Log Viewer" link to access.
Additional notes:
-
- See the attached guide "Find SSO error log.pdf" for detailed steps with screenshots.
- In addition to the above SSO Error logs, a SAML Trace for the impacted user login should be collected to track complete SAML exchange between SuccessFactors and the SSO Provider.
- KBA on how to capture SAML Trace-> 2461862 - Collecting SAML traces with Chrome, Edge or Firefox.
- How to locate the Stack Trace from the SSO error logs?
- In the SSO Log Viewer screen there is a table with different elements. once you have identified an error for which you want to see details, hit the "Toggle SSO error detail..." button to see the full details.
- Once you have the details expanded, you can view the stack trace from the corresponding section
- Typically the important information will be at the bottom of the stack trace after the "caused by:" line.
- See attached guide "Find Stack trace.pdf" for detailed steps with screenshots.
- How to decode a SAML response if it's not showing as an XML?
- At times the SAML Response in the Log Viewer may show as a long string of characters, rather than an XML message. In this case it is probably encoded in Base64.
- To decode the message, copy the full line(s) of text, and use a Base64 decoder (or SAML decoder) to decode the message into a readable XML format.
- You can do this using Notepad++ as well as some online decoding tools (you can search for SAML decoder in Google and you will find many)
- Here's how to capture SAML trace: 3632258 - How to Capture SAML Traces including network logs in Chrome, Edge, or Firefox
See Also
Improved Analysis of SSO Login Errors
- KBA 2721917 - [SSO] Receiving Error when click logon link during Session Time out
- KBA 2707993 - [SSO] Metadata file for SSO | How to generate it for either SF x IDP and Outbound SSO scenarios
- KBA 2233329 - [SSO] The assertion must contain the service provider www.successfactors.com - Single Sign On
- KBA 2091975 - [SSO] Deeplinks within E-mail Notifications are not functional while on SSO
- KBA 2844142 - [SSO] Single Sign-On incorrectly redirecting to Onboarding with error message "Your seamless login has failed" - SuccessFactors Platform
- KBA 3595935 - [SSO] Certificate Renewal Procedure with SF-IAS Integration
- KBA 3432984 - How to Update Signing Certificates on IAS
Keywords
SSO Login Errors in Successfactors , SF, Login Failures Error Log, Login ,SF, success factors, PLT, platform, biz x, bizx, SSO, logs, hints, troubleshoot, how to, response, company-wide, issuer, ACS, user has no login permission for company, Validate response fail for companyId, SSO error, single sign-on error, SSO issue, SSO troubleshooting, SAML Issuer , SSO, Error messages include "The subject (___) in SAML response does not exist in BizX", SAML response does not exist in BizX, certificate, sign certificate, third party certificate, IdP Certificate , KBA , LOD-SF-PLT-SEL , SSO Errors & Logs , LOD-SF-PLT-SAM , SAML SSO First Time Setup , How To , Login Failures, mismatch, NameID , KBA , LOD-SF-PLT-SEL , SSO Errors & Logs , LOD-SF-PLT-IAS , Identity Authentication Services (IAS) With BizX , LOD-SF-RMK-ICS , Internal Career Site Builder (CSB, IAS, etc ...) , How To
SAP Knowledge Base Article - Public