SecurityTokenInvalidAudienceException: IDX10214: Audience validation failed
IDX10214
: Check this section if you are using Microsoft.Identity.Web
version 1.4.1 or similar and you get this exception (literally copied, and you have to change the log levels in appsettings.json
to get to see this):
info: Microsoft.AspNetCore.Authentication.JwtBearer.JwtBearerHandler[1]
Failed to validate the token.
Microsoft.IdentityModel.Tokens.SecurityTokenInvalidAudienceException: IDX10214: Audience validation failed. Audiences: 'System.String'. Did not match: validationParameters.ValidAudience: 'System.String' or validationParameters.ValidAudiences: 'System.String'.
at Microsoft.IdentityModel.Tokens.Validators.ValidateAudience(IEnumerable`1 audiences, SecurityToken securityToken, TokenValidationParameters validationParameters)
at Microsoft.Identity.Web.Resource.RegisterValidAudience.ValidateAudience(IEnumerable`1 audiences, SecurityToken securityToken, TokenValidationParameters validationParameters)
at Microsoft.IdentityModel.Tokens.Validators.ValidateAudience(IEnumerable`1 audiences, SecurityToken securityToken, TokenValidationParameters validationParameters)
at System.IdentityModel.Tokens.Jwt.JwtSecurityTokenHandler.ValidateAudience(IEnumerable`1 audiences, JwtSecurityToken jwtToken, TokenValidationParameters validationParameters)
at System.IdentityModel.Tokens.Jwt.JwtSecurityTokenHandler.ValidateTokenPayload(JwtSecurityToken jwtToken, TokenValidationParameters validationParameters)
at System.IdentityModel.Tokens.Jwt.JwtSecurityTokenHandler.ValidateToken(String token, TokenValidationParameters validationParameters, SecurityToken& validatedToken)
at Microsoft.AspNetCore.Authentication.JwtBearer.JwtBearerHandler.HandleAuthenticateAsync()
Would be so much more helpful to actually see the value of those System.String
's. And if it didn't matter whether you use a GUID or something memorizable and readable.
Essentially you have to add the Audience
property to appsettings.json
and that must be equal to the Application ID URI
in the Azure portal. I had no luck whatsoever hacking the ClientId
and have that match the Application ID URI
. That isn't the final solution to this - AFAIK that must still be equal to the Application (client) ID
in the Azure portal, i.e. a GUID without any prefixes or suffixes.
As far as I know, this error clearly states that audience that came in your SAML-token is different from the value in your Startup configuration. It might be helpful to compare these values. Sometimes the validation fails due to case-sensitive comparison, so you should pay attention in which case your audiencies are in token and configuration.
According to the source code (Saml2Response) and as Anders Abel pointed out, ValidAudience
property is initialized from SPOptions.EntityId
that you configure here:
var spOptions = new SPOptions
{
EntityId = new EntityId("https://localhost:44373/Saml2"),
ReturnUrl = new Uri("https://localhost:44373"),
MinIncomingSigningAlgorithm = "http://www.w3.org/2000/09/xmldsig#rsa-sha1",
};
So you should compare the EntityId
value, that you have configured with the value in your saml-token, which might look like this:
<saml:Audience>The value here should be the same as in your startup configuration</saml:Audience>