SAML Session State
A SAML session cookie is used to maintain session state in support of the SAML protocol.
By default, the SAML session cookie value is a key into SAML session state stored in the web server’s memory.
The SAML session cookie and associated SAML session state store are implementation details of the SAML library and the application shouldn’t attempt to access or manipulate either.
Unexpected SAML Responses
Often if an “SP-initiated SAML response was received unexpectedly” exception occurs, this is the result of the SAML session state not being present or accessible.
When a SAML authn request is sent, related state information is saved to correctly process the received SAML response.
If this state information isn’t present when a SAML response is received, it cannot be processed correctly and an exception is thrown.
Missing Cookie
The first step to identify the issue is to determine whether the SAML session cookie is included in the HTTP Post of the SAML response.
The default cookie name in SAML for ASP.NET is SAML_SessionId
. The default cookie name in SAML for ASP.NET Core is saml-session
.
The following examples refer to the saml-session
cookie but apply equally to the SAML_SessionId
cookie.
Browser Developer Tools
Use the browser developer tools (F12) to capture the network traffic to determine whether the cookie is present and, if not, why the browser didn’t send the cookie.
The following instructions apply to Chrome.
- Close all instances of the browser to ensure all session cookies are cleared.
- Open the browser including the browser developer tools (F12).
- Ensure the
Preserve log
checkbox is checked. - Initiate the SAML SSO sequence.
Network traffic and associated settings are under the Network
tab.
HTTP headers are displayed under the Headers
tab and cookies are displayed under the Cookies
tab.
HTTP Response Cookie
Locate the HTTP response containing the SAML authn request. By default, SAML authn requests are sent using an HTTP 302 redirect to the identity provider’s SSO service endpoint.
Check whether the HTTP response includes a set-cookie header for the SAML session cookie.
For example:
set-cookie: saml-session=2UsHd29ZaXnqpcyYDscw6WheUJ7FQ9vd; path=/; secure; samesite=none; httponly
If this response cookie isn’t present:
- Ensure the cookie isn’t included as a request cookie. If it is, close all browser instances to clear all session cookies and try again.
- Ensure there’s no application code or configuration, middleware or network infrastructure preventing the setting of this cookie.
If this response cookie is present:
- Ensure the
domain
, if specified, is correct. - Ensure the
path
is correct. The default path is “/”. - Ensure the
secure
flag is specified. This is a requirement of thesamesite
property and mandates the use of HTTPS. - Ensure the
samesite
property is set tonone
. This is required as SAML protocol exchanges are cross-site. - Ensure the
httponly
flag is specified.
If any of the set-cookie properties are incorrect, check whether any application code or configuration, middleware or network infrastructure is overriding these properties.
HTTP Request Cookie
Locate the HTTP request containing the SAML response. By default, SAML responses are sent using an HTTP Post to the service provider’s assertion consumer service endpoint.
Check whether the HTTP request includes a cookie header for the SAML session cookie.
For example:
cookie: saml-session=2UsHd29ZaXnqpcyYDscw6WheUJ7FQ9vd
If the cookie is present with the show filtered out request cookies
checkbox unchecked, the cookie is working correctly.
If the cookie is present only with the show filtered out request cookies
checkbox checked, the browser isn’t sending the cookie.
If this is the case, locate the information icon in the SAML session cookie row.
In the following example, this icon is in the SameSite column.
Hover over this icon to display the reason for the browser not sending the cookie.
In this example, the cookie was set with samesite
set to strict
rather than the required none
.
If the cookie has been filtered out:
- Update the
set-cookie
properties as required.
If the cookie is not present, even if the show filtered out request cookies
checkbox is checked:
- Update the
set-cookie
properties as required. In some cases, the browser developer tools won’t show the cookie even when theshow filtered out request cookies
checkbox is checked. - Ensure the application code or configuration, middleware or network infrastructure isn’t expiring the cookie.
Common Issues
- Attempting SSO over HTTP rather than HTTPS.
- Cookie policy that prevents
SameSite=None
being specified. - Different host names for the same application (e.g.
sp.com
vswww.sp.com
).
Exporting HAR Files
If the cause of a missing cookie cannot be determined, we may ask you to email the exported HAR file as an email attachment.
Make sure to Export HAR (with sensitive data)
. The sensitive data includes the cookies.
The HAR will be treated as confidential information.
Missing Session State
If the SAML session cookie is present but the SAML response is unexpected, it’s possible the SAML session state is not present. By default, SAML session state is stored in the web server’s memory.
The most common scenario is a multi-server environment where SSO is initiated on one web server but the SAML response is processed on another web server.
If this is the case, either sticky sessions must be configured in the load balancer or the SAML session state must be stored in a central repository, such as a database, that’s accessible to all the web servers.
Although less likely, another possibility is that the web application restarted which caused the SAML session state memory to be cleared.