ACS endpoint never gets hit

I have 2 internal blazor sites for testing that saml. The SP initiates the SSO, which sends the request to the IdP. That works fine. I basically have the most minimal SendResponse method as possible. It follow the Blazor examples minus the Identity User information. I hard coded values just to get the test to work. No matter what I have tried, the SP ACS endpoint does not get hit. I have put the SP ACS url straight into the browser and it responds (fails since there is no response to receive). Below is the trace in the log files. Everything looks ok to me. Little help would be great! Thanks!

2025-09-19 14:38:56.989 -04:00 [DBG] Sending an SSO response to a partner service provider.
2025-09-19 14:38:56.990 -04:00 [DBG] The SSO session ID Zz8q506DAnRHaTbsljsKyIgb99G288hX has been retrieved from the saml-session cookie.
2025-09-19 14:38:56.990 -04:00 [DBG] SAML session state (Zz8q506DAnRHaTbsljsKyIgb99G288hX):
IdP state:
Pending response state:
Correlation ID: xI5v3AMERuB46RWNIJwrua4dgDqNbpnL
Partner name: https://localhost:44335/Presto/
Action: SendSamlResponse
In response to: _LBWEJBFCCVfh2ih2dXbqhIxIZXyWaUQe
Response URL: https://localhost:44335/Saml/Presto/AssertionConsumerService
Response binding: urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST
SSO session state:
Partner name: https://localhost:44335/Presto/
Name ID: <saml:NameID xmlns:saml=“urn:oasis:names:tc:SAML:2.0:assertion”>testuser</saml:NameID>
Session index: _OcvnLrQQUjUfq96QIgITLGNSZGKFOaJO

2025-09-19 14:38:56.990 -04:00 [DBG] A SAML response is pending to the partner service provider https://localhost:44335/Presto/.
2025-09-19 14:38:56.990 -04:00 [DBG] Constructing a SAML response.
2025-09-19 14:38:56.990 -04:00 [DBG] Constructing a SAML assertion.
2025-09-19 14:38:56.990 -04:00 [DBG] SAML assertion: <saml:Assertion Version=“2.0” ID=“_gxJD7yMLoylG7AjQAY4KlW8ZuPSzcNzc” IssueInstant=“2025-09-19T18:38:56.99Z” xmlns:saml=“urn:oasis:names:tc:SAML:2.0:assertion”>saml:Issuerhttps://localhost:44325</saml:Issuer>saml:Subjectsaml:NameIDtestuser</saml:NameID><saml:SubjectConfirmation Method=“urn:oasis:names:tc:SAML:2.0:cm:bearer”><saml:SubjectConfirmationData NotOnOrAfter=“2025-09-19T18:41:56.99Z” Recipient=“https://localhost:44335/Saml/Presto/AssertionConsumerService” InResponseTo=“_LBWEJBFCCVfh2ih2dXbqhIxIZXyWaUQe” /></saml:SubjectConfirmation></saml:Subject><saml:Conditions NotBefore=“2025-09-19T18:35:56.99Z” NotOnOrAfter=“2025-09-19T18:41:56.99Z”>saml:AudienceRestrictionsaml:Audiencehttps://localhost:44335/Presto/</saml:Audience></saml:AudienceRestriction></saml:Conditions><saml:AuthnStatement AuthnInstant=“2025-09-19T18:38:56.99Z” SessionIndex=“_gxJD7yMLoylG7AjQAY4KlW8ZuPSzcNzc”>saml:AuthnContextsaml:AuthnContextClassRefurn:oasis:names:tc:SAML:2.0:ac:classes:unspecified</saml:AuthnContextClassRef></saml:AuthnContext></saml:AuthnStatement></saml:Assertion>
2025-09-19 14:38:56.990 -04:00 [DBG] Signing the SAML assertion.
2025-09-19 14:38:57.006 -04:00 [DBG] The X.509 certificate with subject name CN=www.idp.com, serial number 74F0EBFE22358DB8433138F9558C9AF9 and thumbprint A6A4AE4E0B378EC73678E5812690AF50E3EC3769 has been retrieved from the cache.
2025-09-19 14:38:57.006 -04:00 [DBG] The X.509 certificate with subject name CN=www.idp.com, serial number 74F0EBFE22358DB8433138F9558C9AF9 and thumbprint A6A4AE4E0B378EC73678E5812690AF50E3EC3769 is being validated.
2025-09-19 14:38:57.006 -04:00 [DBG] The certificate has been validated and expires on 12/31/2049 9:00:00 AM.
2025-09-19 14:38:57.006 -04:00 [DBG] Signing XML: <saml:Assertion Version=“2.0” ID=“_gxJD7yMLoylG7AjQAY4KlW8ZuPSzcNzc” IssueInstant=“2025-09-19T18:38:56.99Z” xmlns:saml=“urn:oasis:names:tc:SAML:2.0:assertion”>saml:Issuerhttps://localhost:44325</saml:Issuer>saml:Subjectsaml:NameIDtestuser</saml:NameID><saml:SubjectConfirmation Method=“urn:oasis:names:tc:SAML:2.0:cm:bearer”><saml:SubjectConfirmationData NotOnOrAfter=“2025-09-19T18:41:56.99Z” Recipient=“https://localhost:44335/Saml/Presto/AssertionConsumerService” InResponseTo=“_LBWEJBFCCVfh2ih2dXbqhIxIZXyWaUQe” /></saml:SubjectConfirmation></saml:Subject><saml:Conditions NotBefore=“2025-09-19T18:35:56.99Z” NotOnOrAfter=“2025-09-19T18:41:56.99Z”>saml:AudienceRestrictionsaml:Audiencehttps://localhost:44335/Presto/</saml:Audience></saml:AudienceRestriction></saml:Conditions><saml:AuthnStatement AuthnInstant=“2025-09-19T18:38:56.99Z” SessionIndex=“_gxJD7yMLoylG7AjQAY4KlW8ZuPSzcNzc”>saml:AuthnContextsaml:AuthnContextClassRefurn:oasis:names:tc:SAML:2.0:ac:classes:unspecified</saml:AuthnContextClassRef></saml:AuthnContext></saml:AuthnStatement></saml:Assertion>
2025-09-19 14:38:57.006 -04:00 [DBG] Digest algorithm: XML Encryption Syntax and Processing
2025-09-19 14:38:57.006 -04:00 [DBG] Signature algorithm: xmldsig-more namespace
2025-09-19 14:38:57.006 -04:00 [DBG] Signature certificate subject: CN=www.idp.com, serial number: 74F0EBFE22358DB8433138F9558C9AF9, thumbprint: A6A4AE4E0B378EC73678E5812690AF50E3EC3769
2025-09-19 14:38:57.009 -04:00 [DBG] Signed XML: <saml:Assertion Version=“2.0” ID=“_gxJD7yMLoylG7AjQAY4KlW8ZuPSzcNzc” IssueInstant=“2025-09-19T18:38:56.99Z” xmlns:saml=“urn:oasis:names:tc:SAML:2.0:assertion”>saml:Issuerhttps://localhost:44325</saml:Issuer>Gayz4UQyJno27eqEr5Xnvm0jsr5lcJQE7fYImEKDLz0=SY7rD9cLmTUsFbZVS6xbz9xJpgkpTnGRNEOIVuEzzfbJR/QeJUGnoMiyrHcssFE/39h4g8/9jRbW2BqbCHu7so1ihxZSlClmc2Na8xeGJNvIjilzcNXPIuC+oiGvc/bAANmTB/FYmha0U99BuUa2dhqz+lduOaUY2K3pGRlyWJkz9b2/Y2mETm2un28k4I5tfTEydvfbiNqiZTzXuKmz6OqYMoj+B2VOE/SzsWW16YMgnGGPY+dZ5FKQdjB9+DV5U1+vE7xUCOmjsz6aleD7IlO4VFPWRnf8rY9i/jWAhXRKKEBGKcl28TM38T5kSrHX3yHdlnU5cF0si/C72r4L2g==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saml:Subjectsaml:NameIDtestuser</saml:NameID><saml:SubjectConfirmation Method=“urn:oasis:names:tc:SAML:2.0:cm:bearer”><saml:SubjectConfirmationData NotOnOrAfter=“2025-09-19T18:41:56.99Z” Recipient=“https://localhost:44335/Saml/Presto/AssertionConsumerService” InResponseTo=“_LBWEJBFCCVfh2ih2dXbqhIxIZXyWaUQe” /></saml:SubjectConfirmation></saml:Subject><saml:Conditions NotBefore=“2025-09-19T18:35:56.99Z” NotOnOrAfter=“2025-09-19T18:41:56.99Z”>saml:AudienceRestrictionsaml:Audiencehttps://localhost:44335/Presto/</saml:Audience></saml:AudienceRestriction></saml:Conditions><saml:AuthnStatement AuthnInstant=“2025-09-19T18:38:56.99Z” SessionIndex=“_gxJD7yMLoylG7AjQAY4KlW8ZuPSzcNzc”>saml:AuthnContextsaml:AuthnContextClassRefurn:oasis:names:tc:SAML:2.0:ac:classes:unspecified</saml:AuthnContextClassRef></saml:AuthnContext></saml:AuthnStatement></saml:Assertion>
2025-09-19 14:38:57.009 -04:00 [DBG] SAML response: <samlp:Response ID=“_0aDGujm4ylO7rz0z78HOvpEtSyKsvyVT” InResponseTo=“_LBWEJBFCCVfh2ih2dXbqhIxIZXyWaUQe” Version=“2.0” IssueInstant=“2025-09-19T18:38:56.99Z” Destination=“https://localhost:44335/Saml/Presto/AssertionConsumerService” xmlns:samlp=“urn:oasis:names:tc:SAML:2.0:protocol”><saml:Issuer xmlns:saml=“urn:oasis:names:tc:SAML:2.0:assertion”>https://localhost:44325</saml:Issuer>samlp:Status<samlp:StatusCode Value=“urn:oasis:names:tc:SAML:2.0:status:Success” /></samlp:Status><saml:Assertion Version=“2.0” ID=“_gxJD7yMLoylG7AjQAY4KlW8ZuPSzcNzc” IssueInstant=“2025-09-19T18:38:56.99Z” xmlns:saml=“urn:oasis:names:tc:SAML:2.0:assertion”>saml:Issuerhttps://localhost:44325</saml:Issuer>Gayz4UQyJno27eqEr5Xnvm0jsr5lcJQE7fYImEKDLz0=SY7rD9cLmTUsFbZVS6xbz9xJpgkpTnGRNEOIVuEzzfbJR/QeJUGnoMiyrHcssFE/39h4g8/9jRbW2BqbCHu7so1ihxZSlClmc2Na8xeGJNvIjilzcNXPIuC+oiGvc/bAANmTB/FYmha0U99BuUa2dhqz+lduOaUY2K3pGRlyWJkz9b2/Y2mETm2un28k4I5tfTEydvfbiNqiZTzXuKmz6OqYMoj+B2VOE/SzsWW16YMgnGGPY+dZ5FKQdjB9+DV5U1+vE7xUCOmjsz6aleD7IlO4VFPWRnf8rY9i/jWAhXRKKEBGKcl28TM38T5kSrHX3yHdlnU5cF0si/C72r4L2g==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saml:Subjectsaml:NameIDtestuser</saml:NameID><saml:SubjectConfirmation Method=“urn:oasis:names:tc:SAML:2.0:cm:bearer”><saml:SubjectConfirmationData NotOnOrAfter=“2025-09-19T18:41:56.99Z” Recipient=“https://localhost:44335/Saml/Presto/AssertionConsumerService” InResponseTo=“_LBWEJBFCCVfh2ih2dXbqhIxIZXyWaUQe” /></saml:SubjectConfirmation></saml:Subject><saml:Conditions NotBefore=“2025-09-19T18:35:56.99Z” NotOnOrAfter=“2025-09-19T18:41:56.99Z”>saml:AudienceRestrictionsaml:Audiencehttps://localhost:44335/Presto/</saml:Audience></saml:AudienceRestriction></saml:Conditions><saml:AuthnStatement AuthnInstant=“2025-09-19T18:38:56.99Z” SessionIndex=“_gxJD7yMLoylG7AjQAY4KlW8ZuPSzcNzc”>saml:AuthnContextsaml:AuthnContextClassRefurn:oasis:names:tc:SAML:2.0:ac:classes:unspecified</saml:AuthnContextClassRef></saml:AuthnContext></saml:AuthnStatement></saml:Assertion></samlp:Response>
2025-09-19 14:38:57.009 -04:00 [DBG] SSO session state for saml-session-Zz8q506DAnRHaTbsljsKyIgb99G288hX-SamlState is being saved to the distributed cache.
2025-09-19 14:38:57.009 -04:00 [DBG] Sending the SAML response.
2025-09-19 14:38:57.009 -04:00 [DBG] Sending a SAML message over HTTP-Post.
2025-09-19 14:38:57.010 -04:00 [DBG] Creating an HTTP Post HTML form.
2025-09-19 14:38:57.010 -04:00 [DBG] SAML response: <samlp:Response ID=“_0aDGujm4ylO7rz0z78HOvpEtSyKsvyVT” InResponseTo=“_LBWEJBFCCVfh2ih2dXbqhIxIZXyWaUQe” Version=“2.0” IssueInstant=“2025-09-19T18:38:56.99Z” Destination=“https://localhost:44335/Saml/Presto/AssertionConsumerService” xmlns:samlp=“urn:oasis:names:tc:SAML:2.0:protocol”><saml:Issuer xmlns:saml=“urn:oasis:names:tc:SAML:2.0:assertion”>https://localhost:44325</saml:Issuer>samlp:Status<samlp:StatusCode Value=“urn:oasis:names:tc:SAML:2.0:status:Success” /></samlp:Status><saml:Assertion Version=“2.0” ID=“_gxJD7yMLoylG7AjQAY4KlW8ZuPSzcNzc” IssueInstant=“2025-09-19T18:38:56.99Z” xmlns:saml=“urn:oasis:names:tc:SAML:2.0:assertion”>saml:Issuerhttps://localhost:44325</saml:Issuer>Gayz4UQyJno27eqEr5Xnvm0jsr5lcJQE7fYImEKDLz0=SY7rD9cLmTUsFbZVS6xbz9xJpgkpTnGRNEOIVuEzzfbJR/QeJUGnoMiyrHcssFE/39h4g8/9jRbW2BqbCHu7so1ihxZSlClmc2Na8xeGJNvIjilzcNXPIuC+oiGvc/bAANmTB/FYmha0U99BuUa2dhqz+lduOaUY2K3pGRlyWJkz9b2/Y2mETm2un28k4I5tfTEydvfbiNqiZTzXuKmz6OqYMoj+B2VOE/SzsWW16YMgnGGPY+dZ5FKQdjB9+DV5U1+vE7xUCOmjsz6aleD7IlO4VFPWRnf8rY9i/jWAhXRKKEBGKcl28TM38T5kSrHX3yHdlnU5cF0si/C72r4L2g==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saml:Subjectsaml:NameIDtestuser</saml:NameID><saml:SubjectConfirmation Method=“urn:oasis:names:tc:SAML:2.0:cm:bearer”><saml:SubjectConfirmationData NotOnOrAfter=“2025-09-19T18:41:56.99Z” Recipient=“https://localhost:44335/Saml/Presto/AssertionConsumerService” InResponseTo=“_LBWEJBFCCVfh2ih2dXbqhIxIZXyWaUQe” /></saml:SubjectConfirmation></saml:Subject><saml:Conditions NotBefore=“2025-09-19T18:35:56.99Z” NotOnOrAfter=“2025-09-19T18:41:56.99Z”>saml:AudienceRestrictionsaml:Audiencehttps://localhost:44335/Presto/</saml:Audience></saml:AudienceRestriction></saml:Conditions><saml:AuthnStatement AuthnInstant=“2025-09-19T18:38:56.99Z” SessionIndex=“_gxJD7yMLoylG7AjQAY4KlW8ZuPSzcNzc”>saml:AuthnContextsaml:AuthnContextClassRefurn:oasis:names:tc:SAML:2.0:ac:classes:unspecified</saml:AuthnContextClassRef></saml:AuthnContext></saml:AuthnStatement></saml:Assertion></samlp:Response>
2025-09-19 14:38:57.010 -04:00 [DBG] Relay state:
2025-09-19 14:38:57.010 -04:00 [DBG] URL: https://localhost:44335/Saml/Presto/AssertionConsumerService
2025-09-19 14:38:57.010 -04:00 [DBG] HTML form:

Since your browser doesn't support JavaScript, you must press the Continue button to proceed.

Please wait.

2025-09-19 14:38:57.010 -04:00 [DBG] Response markup is scheduled to include Browser Link script injection.
2025-09-19 14:38:57.010 -04:00 [DBG] The SAML message has been sent over HTTP-Post.
2025-09-19 14:38:57.010 -04:00 [DBG] The SAML response was successfully sent.
2025-09-19 14:38:57.010 -04:00 [DBG] SAML session state (Zz8q506DAnRHaTbsljsKyIgb99G288hX):
IdP state:
SSO session state:
Partner name: https://localhost:44335/Presto/
Name ID: <saml:NameID xmlns:saml=“urn:oasis:names:tc:SAML:2.0:assertion”>testuser</saml:NameID>
Session index: _OcvnLrQQUjUfq96QIgITLGNSZGKFOaJO
SSO session state:
Partner name: https://localhost:44335/Presto/
Name ID: <saml:NameID xmlns:saml=“urn:oasis:names:tc:SAML:2.0:assertion”>testuser</saml:NameID>
Session index: _gxJD7yMLoylG7AjQAY4KlW8ZuPSzcNzc

2025-09-19 14:38:57.010 -04:00 [DBG] Sending an SSO response to the partner service provider https://localhost:44335/Presto/ has completed successfully.

The HTTP Post of the SAML response should be sent to https://localhost:44335/Saml/Presto/AssertionConsumerService.

Where do you end up in the browser?

Are you still at the IdP?

If you’re following the same pattern as the BlazorIdentityProvider example project, after calling await _samlIdentityProvider.SendSsoAsync do you return new EmptyResult()?

If there’s still an issue, I suggest using the browser developer tools to take a look at the network traffic.

Yes that is the ACS url that is within the configuration. The browser just stays on the IdP, no errors. I am following the same pattern as the BlazorIdentityProvider example. See below is the very simple call that is being made:

public async Task SendSsoResponse()
{
try
{
// The user is logged in at the identity provider.
// Respond to the authn request by sending a SAML response containing a SAML assertion to the SP.
await _samlIdentityProvider.SendSsoAsync(“testuser”);
}
catch (Exception ex)
{
_logger.LogError(ex, ex.Message);
}
return new EmptyResult();
}

There is nothing in the network developer tools that looks like anything is ever posted to the ACS url.

I can’t see any obvious issues and we know from the SAML log that SendSsoAsync is returning successfully.

I suggest using the browser developer tools to take a look at the network traffic. There must be an HTTP response being returned to the browser. This might give some clues.

Also, compare yourProgram.cs with that of BlazorIdentityProvider. Perhaps there’s some middleware etc causing issues.

If there’s still an issue, please enable the SAML trace and send the log file as an email attachment to support@componentspace.com mentioning your forum post.

Thanks for getting back to me! I did test with the developer tools and there was no network traffic that attempts to go to the ACS url. Just stays on the IdP.

Is there a different “saml” trace than the one that is already pasted in this thread?

What is the HTTP response? Is it just a 200 status back to the same IdP page?

Yes, it’s the same SAML trace. However, I’d like to see the actual log file rather than it being pasted into the forum just in case I’m missing something.

The only other suggestion is to start modifying your app to match the example app until it’s working to identify what difference is causing the issue.

ok I will compare everything and make sure it matches.