![]() ![]() ![]() To verify that the token is valid and actually originated from Azure AD, the application must validate the token’s signature using the public key exposed by Azure AD that is contained in the tenant’s federation metadata document. This token is signed by Azure AD using its private key before it is sent back to the application. When a user signs in to an application that uses Azure AD for authentication, Azure AD creates a security token that contains information about the user. In practical terms, this works in the following way: Azure AD uses a signing key that consists of a public and private key pair. “Azure AD uses public-key cryptography built on industry standards to establish trust between itself and the applications that use it. The application was working properly and all of a sudden, one day we got this error: WIF10201: No valid key mapping found for securityToken: ‘509SecurityToken’ and issuer: ‘’.Īfter a lot of search around, I finally found a blog post by Jeff Levinson that helped me find the answer: I recently ran into an issue with one of my applications that uses Azure Active Directory authentication.
0 Comments
Leave a Reply. |