<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[SAML Auth with Azure AD]]></title><description><![CDATA[<p dir="auto">Don't see it officially documented anywhere so I'll put down what worked for me and where I'm stuck. Using fully updated community edition (Xen Orchestra commit a4118, xo-server 5.100.0, xo-web 5.101.0).</p>
<p dir="auto">XO instance is behind reverse proxy (Nginx Proxy Manager) pointed to Web UI's IP, port 443, HTTPS with websocket support and forced HTTPS redirection. Cert is valid. Public URL confirmed working.</p>
<ol>
<li>
<p dir="auto">Azure Active Directory &gt; Enterprise applications &gt; New application &gt; Create your own application &gt; Name: Xen Orchestra, Type: Non-gallery &gt; Create</p>
</li>
<li>
<p dir="auto">Azure Active Directory &gt; Enterprise applications &gt;Xen Orchestra &gt; Users and groups &gt; Added myself</p>
</li>
<li>
<p dir="auto">Azure Active Directory &gt; Enterprise applications &gt; Xen Orchestra &gt; Single sign-on &gt; SAML &gt; Basic SAML Configuration &gt;<br />
Identifier (Entity ID): https://&lt;Public URL&gt;<br />
Reply URL (Assertion Consumer Service URL): https://&lt;Public URL&gt;/signin/saml/callback</p>
</li>
<li>
<p dir="auto">XO &gt; Settings &gt; Plugins &gt; auth-saml (v0.9.0) &gt;<br />
Certificate: Copied contents of Certificate (Base64) (from Azure Active Directory &gt; Enterprise applications &gt; Xen Orchestra &gt; Single sign-on &gt; SAML &gt; SAML Signing Certificate)<br />
Entry point: Copied from Login URL (from Azure Active Directory &gt; Enterprise applications &gt; Xen Orchestra &gt; Single sign-on &gt; SAML &gt; Set up Xen Orchestra)<br />
Issuer: Copied from Application ID (from Azure Active Directory &gt; Enterprise applications &gt; Xen Orchestra &gt; Properties)<br />
Username field: <a href="http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddress" target="_blank" rel="noopener noreferrer nofollow ugc">http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddress</a><br />
Don't request an authentication context: Enabled (tried disabled too)</p>
</li>
</ol>
<p dir="auto">With any other Issuer I try, Microsoft gives an error that the application was not found.<br />
With the application ID, it's found but I get the following error:<br />
"Sorry, but we’re having trouble signing you in.<br />
AADSTS50011: The reply URL 'http://&lt;Public URL&gt;/signin/saml/callback' specified in the request does not match the reply URLs configured for the application '&lt;Application ID&gt;'. Make sure the reply URL sent in the request matches one added to your application in the Azure portal. Navigate to <a href="https://aka.ms/urlMismatchError" target="_blank" rel="noopener noreferrer nofollow ugc">https://aka.ms/urlMismatchError</a> to learn more about how to fix this. "</p>
<p dir="auto">Issue is, everywhere I can see, from the reverse proxy to my enterprise app, I'm using HTTPS. For some reason XO is sending the SAML request as http.</p>
<p dir="auto">I've tried replacing the HTTPS reply URL under Azure Active Directory &gt; App registrations &gt; Xen Orchestra &gt; Manifest with HTTP but it won't save. Was able to add the HTTP one on top of the HTTPS one, but same error.</p>
<p dir="auto">I see a single mention of it here: <a href="https://github.com/vatesfr/xen-orchestra/issues/3822" target="_blank" rel="noopener noreferrer nofollow ugc">https://github.com/vatesfr/xen-orchestra/issues/3822</a> as the last comment on the issue with no followup.</p>
<div class="row github-embeds-container">

<div class="col-md-6">
<div class="github-embed card">
<div class="card-body">

<div class="meta">
<img class="author-picture not-responsive" src="https://avatars.githubusercontent.com/u/102155?v=4" title="tbe" />
<a href="https://github.com/tbe"><span class="username">tbe</span></a> created this issue <span class="timeago" title="2018-12-31T22:31:45Z"></span> in <a href="//github.com/vatesfr/xen-orchestra">vatesfr/xen-orchestra</a>
</div>
<h3>
<span class="badge closed float-end">closed</span>
<a href="https://github.com/vatesfr/xen-orchestra/issues/3822">SAML Auth: Wrong callback URL</a>
<span class="number">#3822</span>
</h3>



</div>
</div>
</div>

</div>]]></description><link>https://xcp-ng.org/forum/topic/6174/saml-auth-with-azure-ad</link><generator>RSS for Node</generator><lastBuildDate>Thu, 05 Mar 2026 20:25:32 GMT</lastBuildDate><atom:link href="https://xcp-ng.org/forum/topic/6174.rss" rel="self" type="application/rss+xml"/><pubDate>Tue, 02 Aug 2022 19:39:56 GMT</pubDate><ttl>60</ttl><item><title><![CDATA[Reply to SAML Auth with Azure AD on Fri, 28 Nov 2025 10:08:48 GMT]]></title><description><![CDATA[<p dir="auto"><a class="plugin-mentions-user plugin-mentions-a" href="/forum/user/olivierlambert" aria-label="Profile: olivierlambert">@<bdi>olivierlambert</bdi></a><br />
Just to add another weird case of this situation I tell you my SAML-auth-adventures.</p>
<p dir="auto">I have just migrated a week ago from XOCE to XOA paid support this week and all the process was fine except the auth with the saml plugin.<br />
The commit I had in XOCE was [XO 5d92f - Master 3f604]. I compiled it the first week of this november so it wasn't very outdated.</p>
<p dir="auto">We use the MSEntraID SAML authentication and it was working fine in XOCE since at least one year ago.</p>
<p dir="auto">Mi process was like this:</p>
<ul>
<li>
<p dir="auto">First, I installed XOA and imported the configuration from my old XOCE. Everything was fine and all was imported succesfully (backups, users, acls, etc.), including my plugin configurations.<br />
Note that I reused the https server certificate/private key and used the same IP and the same DNS (beacuse I turned off my XOCE before starting XOA).</p>
</li>
<li>
<p dir="auto">Everything was working fine except the saml auth plugin. I had the same "Internal server error" problem.<br />
I looked at the xo-server logs and the error was "invalid document signature" so, as Olivier said, we changed the configuration in MSEntraID to set the "Sign SAML response and assertion" on.</p>
</li>
<li>
<p dir="auto">Once we changed the configuration I thought the plugin would work again, but surprisingly not. If I try again SAML validation i still got the "Internal server error".<br />
When i checked again the xo-server logs I saw ahother exception, this time with the error "SAML assertion audience mismatch" and a reference to the issuer configuration of the plugin.<br />
The exact error I got from xo-server logs using "journalctl -u xo-server -f -n 50" was: "xoa xo-server[2370]: Error: SAML assertion audience mismatch. Expected: &lt;id-of-MSEntraID-xo-validation&gt; Received: spn:&lt;id-of-MSEntraID-xo-validation&gt;"I didn't understand this, because the configuration was exactly the same as I had in XOCE. In fact, I turned off XOA and turned on again XOCE just to test the plugin. The result was that in XOCE the plugin worked well.</p>
</li>
<li>
<p dir="auto">After many tries and some time of impostor syndrome we found the solution:<br />
I don't know why, but in XOCE compiled at the beginning of november you have to configure the issuer field of the plugin with the &lt;id-of-MSEntraID-xo-validation&gt; (8digit-4digit-4digit-4digit-12digit).<br />
Instead, in XOA deployed also this november, you have to set the issuer field to you XOA URL: https://&lt;<a href="http://xo.company.net" target="_blank" rel="noopener noreferrer nofollow ugc">xo.company.net</a>&gt;/</p>
</li>
</ul>
<p dir="auto">I hope this will help, because it was a pain in the neck for us this week.</p>
<p dir="auto">BTW: <a class="plugin-mentions-user plugin-mentions-a" href="/forum/user/olivierlambert" aria-label="Profile: olivierlambert">@<bdi>olivierlambert</bdi></a> this "Internal server error" coming from an uncatched exception in the plugin was not very descriptive. Even a generic try-catch block just to show in the web interface the error would help...</p>
<p dir="auto">P.D.: I'm from Spain, so I do my best with my english <img src="https://xcp-ng.org/forum/assets/plugins/nodebb-plugin-emoji/emoji/android/1f60a.png?v=c63c1619ba5" class="not-responsive emoji emoji-android emoji--blush" style="height:23px;width:auto;vertical-align:middle" title=":blush:" alt="😊" /><br />
P.D. 2: Great job with all the Vates virtualization stack! You are the best!</p>
<p dir="auto">Dani</p>
]]></description><link>https://xcp-ng.org/forum/post/100152</link><guid isPermaLink="true">https://xcp-ng.org/forum/post/100152</guid><dc:creator><![CDATA[Dani]]></dc:creator><pubDate>Fri, 28 Nov 2025 10:08:48 GMT</pubDate></item><item><title><![CDATA[Reply to SAML Auth with Azure AD on Tue, 18 Nov 2025 15:49:11 GMT]]></title><description><![CDATA[<p dir="auto">On the bottom of each documentation page, there's an "Edit this page" link you can use to contribute <img src="https://xcp-ng.org/forum/assets/plugins/nodebb-plugin-emoji/emoji/android/1f642.png?v=c63c1619ba5" class="not-responsive emoji emoji-android emoji--slightly_smiling_face" style="height:23px;width:auto;vertical-align:middle" title=":)" alt="🙂" /></p>
]]></description><link>https://xcp-ng.org/forum/post/99734</link><guid isPermaLink="true">https://xcp-ng.org/forum/post/99734</guid><dc:creator><![CDATA[olivierlambert]]></dc:creator><pubDate>Tue, 18 Nov 2025 15:49:11 GMT</pubDate></item><item><title><![CDATA[Reply to SAML Auth with Azure AD on Tue, 18 Nov 2025 15:25:45 GMT]]></title><description><![CDATA[<p dir="auto"><a class="plugin-mentions-user plugin-mentions-a" href="/forum/user/ferrao" aria-label="Profile: ferrao">@<bdi>ferrao</bdi></a> Hey thanks, yes you are welcome to send a PR to improve the docs. It is based on <a href="https://docusaurus.io/" target="_blank" rel="noopener noreferrer nofollow ugc">Docusaurus</a>, it is in the <code>docs</code> directory in <a href="https://github.com/vatesfr/xen-orchestra/tree/master/docs" target="_blank" rel="noopener noreferrer nofollow ugc">https://github.com/vatesfr/xen-orchestra/tree/master/docs</a>. Then pages are in the 2nd level <code>docs</code> directory.</p>
]]></description><link>https://xcp-ng.org/forum/post/99733</link><guid isPermaLink="true">https://xcp-ng.org/forum/post/99733</guid><dc:creator><![CDATA[nathanael-h]]></dc:creator><pubDate>Tue, 18 Nov 2025 15:25:45 GMT</pubDate></item><item><title><![CDATA[Reply to SAML Auth with Azure AD on Fri, 14 Nov 2025 13:59:02 GMT]]></title><description><![CDATA[<p dir="auto"><a class="plugin-mentions-user plugin-mentions-a" href="/forum/user/olivierlambert" aria-label="Profile: olivierlambert">@<bdi>olivierlambert</bdi></a> can we report documentation issues or can we contribute to docs? I would fix myself if I can.</p>
]]></description><link>https://xcp-ng.org/forum/post/99608</link><guid isPermaLink="true">https://xcp-ng.org/forum/post/99608</guid><dc:creator><![CDATA[ferrao]]></dc:creator><pubDate>Fri, 14 Nov 2025 13:59:02 GMT</pubDate></item><item><title><![CDATA[Reply to SAML Auth with Azure AD on Fri, 14 Nov 2025 13:58:09 GMT]]></title><description><![CDATA[<p dir="auto"><a class="plugin-mentions-user plugin-mentions-a" href="/forum/user/thenorthernlight" aria-label="Profile: TheNorthernLight">@<bdi>TheNorthernLight</bdi></a> I think this one is the most accurate: <a href="https://help.vates.tech/kb/en-us/48-plugins/162-saml-azure-guide" target="_blank" rel="noopener noreferrer nofollow ugc">https://help.vates.tech/kb/en-us/48-plugins/162-saml-azure-guide</a></p>
<p dir="auto">I've followed it and it worked, however there's two caveats:</p>
<ol>
<li>You need to use XOA 5.112, which is on the latest channel as today and not the stable channel.</li>
<li>You need to Sign SAML response and assertion. To do that, Go to Microsoft Entra ID → Enterprise applications → Xen Orchestra → Single sign-on → SAML.</li>
</ol>
<p dir="auto">After those settings I could login with Azure ID / Entra ID / Whatever Microsoft calls today.</p>
]]></description><link>https://xcp-ng.org/forum/post/99607</link><guid isPermaLink="true">https://xcp-ng.org/forum/post/99607</guid><dc:creator><![CDATA[ferrao]]></dc:creator><pubDate>Fri, 14 Nov 2025 13:58:09 GMT</pubDate></item><item><title><![CDATA[Reply to SAML Auth with Azure AD on Tue, 28 Oct 2025 02:33:01 GMT]]></title><description><![CDATA[<p dir="auto"><a class="plugin-mentions-user plugin-mentions-a" href="/forum/user/pierrebrunet" aria-label="Profile: pierrebrunet">@<bdi>pierrebrunet</bdi></a> Are you aware if there is an official guide on how to use this with AzureAD ?</p>
]]></description><link>https://xcp-ng.org/forum/post/98878</link><guid isPermaLink="true">https://xcp-ng.org/forum/post/98878</guid><dc:creator><![CDATA[TheNorthernLight]]></dc:creator><pubDate>Tue, 28 Oct 2025 02:33:01 GMT</pubDate></item><item><title><![CDATA[Reply to SAML Auth with Azure AD on Sun, 19 Oct 2025 08:28:56 GMT]]></title><description><![CDATA[<p dir="auto"><a class="plugin-mentions-user plugin-mentions-a" href="/forum/user/pierrebrunet" aria-label="Profile: pierrebrunet">@<bdi>pierrebrunet</bdi></a><br />
Hello Pierre,</p>
<p dir="auto">Sorry for that late response, but yes, latest version is working fine and has solved the issue.</p>
<p dir="auto">Thanks for the fix.</p>
]]></description><link>https://xcp-ng.org/forum/post/98640</link><guid isPermaLink="true">https://xcp-ng.org/forum/post/98640</guid><dc:creator><![CDATA[Mathieu]]></dc:creator><pubDate>Sun, 19 Oct 2025 08:28:56 GMT</pubDate></item><item><title><![CDATA[Reply to SAML Auth with Azure AD on Fri, 17 Oct 2025 08:25:06 GMT]]></title><description><![CDATA[<p dir="auto"><a class="plugin-mentions-user plugin-mentions-a" href="/forum/user/probain" aria-label="Profile: probain">@<bdi>probain</bdi></a> Thank you!</p>
]]></description><link>https://xcp-ng.org/forum/post/98572</link><guid isPermaLink="true">https://xcp-ng.org/forum/post/98572</guid><dc:creator><![CDATA[pierrebrunet]]></dc:creator><pubDate>Fri, 17 Oct 2025 08:25:06 GMT</pubDate></item><item><title><![CDATA[Reply to SAML Auth with Azure AD on Fri, 17 Oct 2025 11:34:37 GMT]]></title><description><![CDATA[<p dir="auto"><a class="plugin-mentions-user plugin-mentions-a" href="/forum/user/pierrebrunet" aria-label="Profile: pierrebrunet">@<bdi>pierrebrunet</bdi></a><br />
For Google Workspace:<br />
Yes it is in the "Service Provider details"-section: See screenshot for example<br />
<img src="/forum/assets/uploads/files/1760631996707-f2d58e46-b168-43a5-85b1-7a59b305f7b4-image.png" alt="f2d58e46-b168-43a5-85b1-7a59b305f7b4-image.png" class=" img-fluid img-markdown" /></p>
<p dir="auto">Edit: Removed doubled screenshot</p>
]]></description><link>https://xcp-ng.org/forum/post/98561</link><guid isPermaLink="true">https://xcp-ng.org/forum/post/98561</guid><dc:creator><![CDATA[probain]]></dc:creator><pubDate>Fri, 17 Oct 2025 11:34:37 GMT</pubDate></item><item><title><![CDATA[Reply to SAML Auth with Azure AD on Thu, 16 Oct 2025 07:36:11 GMT]]></title><description><![CDATA[<p dir="auto"><a class="plugin-mentions-user plugin-mentions-a" href="/forum/user/probain" aria-label="Profile: probain">@<bdi>probain</bdi></a> Hi,<br />
Great!! Can you confirm the checkbox is in the Service Provider Details window? It is to enhance the doc part about SAML.</p>
]]></description><link>https://xcp-ng.org/forum/post/98524</link><guid isPermaLink="true">https://xcp-ng.org/forum/post/98524</guid><dc:creator><![CDATA[pierrebrunet]]></dc:creator><pubDate>Thu, 16 Oct 2025 07:36:11 GMT</pubDate></item><item><title><![CDATA[Reply to SAML Auth with Azure AD on Wed, 15 Oct 2025 16:27:59 GMT]]></title><description><![CDATA[<p dir="auto"><a class="plugin-mentions-user plugin-mentions-a" href="/forum/user/pierrebrunet" aria-label="Profile: pierrebrunet">@<bdi>pierrebrunet</bdi></a><br />
I'm jumping in here as well. Reporting that the PR fixes it for Google Workspace as well!<br />
However, the checkbox in GW is called "Signed response".<br />
No further adjustments of the plugin itself was needed.</p>
]]></description><link>https://xcp-ng.org/forum/post/98507</link><guid isPermaLink="true">https://xcp-ng.org/forum/post/98507</guid><dc:creator><![CDATA[probain]]></dc:creator><pubDate>Wed, 15 Oct 2025 16:27:59 GMT</pubDate></item><item><title><![CDATA[Reply to SAML Auth with Azure AD on Wed, 15 Oct 2025 08:27:54 GMT]]></title><description><![CDATA[<p dir="auto"><a class="plugin-mentions-user plugin-mentions-a" href="/forum/user/mathieu" aria-label="Profile: Mathieu">@<bdi>Mathieu</bdi></a> Hi,<br />
We merged the PR linked above with new options. If you have time, can you confirm it is working for you?<br />
It will fix the audience error and let you choose if you want to sign responses and assertions.</p>
]]></description><link>https://xcp-ng.org/forum/post/98488</link><guid isPermaLink="true">https://xcp-ng.org/forum/post/98488</guid><dc:creator><![CDATA[pierrebrunet]]></dc:creator><pubDate>Wed, 15 Oct 2025 08:27:54 GMT</pubDate></item><item><title><![CDATA[Reply to SAML Auth with Azure AD on Thu, 09 Oct 2025 13:11:48 GMT]]></title><description><![CDATA[<p dir="auto"><a class="plugin-mentions-user plugin-mentions-a" href="/forum/user/mathieu" aria-label="Profile: Mathieu">@<bdi>Mathieu</bdi></a> Thanks to your help, we are deploying a patch with config update and control over document and assertion signatures<br />
<a href="https://github.com/vatesfr/xen-orchestra/pull/9093" target="_blank" rel="noopener noreferrer nofollow ugc">https://github.com/vatesfr/xen-orchestra/pull/9093</a></p>
<div class="row github-embeds-container">

<div class="col-md-6">
<div class="github-embed card">
<div class="card-body">


<div class="meta">
<img class="author-picture not-responsive" src="https://avatars.githubusercontent.com/u/5628763?v=4" title="pierrebrunet289" />
<a href="https://github.com/pierrebrunet289"><span class="username">pierrebrunet289</span></a> opened this pull request <span class="timeago" title="2025-10-09T12:57:25Z"></span> in <a href="//github.com/vatesfr/xen-orchestra">vatesfr/xen-orchestra</a>
</div>
<h3>

<span class="badge closed float-end">closed</span>

<a href="https://github.com/vatesfr/xen-orchestra/pull/9093">fix(plugin/auth-saml): add default config in SAML</a>
<span class="number">#9093</span>
</h3>


</div>
</div>
</div>

</div>]]></description><link>https://xcp-ng.org/forum/post/98313</link><guid isPermaLink="true">https://xcp-ng.org/forum/post/98313</guid><dc:creator><![CDATA[pierrebrunet]]></dc:creator><pubDate>Thu, 09 Oct 2025 13:11:48 GMT</pubDate></item><item><title><![CDATA[Reply to SAML Auth with Azure AD on Thu, 09 Oct 2025 08:57:34 GMT]]></title><description><![CDATA[<p dir="auto"><a class="plugin-mentions-user plugin-mentions-a" href="/forum/user/pierrebrunet" aria-label="Profile: pierrebrunet">@<bdi>pierrebrunet</bdi></a><br />
XO from source, commit 1ee07 from today.</p>
]]></description><link>https://xcp-ng.org/forum/post/98306</link><guid isPermaLink="true">https://xcp-ng.org/forum/post/98306</guid><dc:creator><![CDATA[Mathieu]]></dc:creator><pubDate>Thu, 09 Oct 2025 08:57:34 GMT</pubDate></item><item><title><![CDATA[Reply to SAML Auth with Azure AD on Thu, 09 Oct 2025 08:52:18 GMT]]></title><description><![CDATA[<p dir="auto"><a class="plugin-mentions-user plugin-mentions-a" href="/forum/user/mathieu" aria-label="Profile: Mathieu">@<bdi>Mathieu</bdi></a> Hi, do you use XO from source or do you have an XOA license? Just to know how to help you more confortably</p>
]]></description><link>https://xcp-ng.org/forum/post/98305</link><guid isPermaLink="true">https://xcp-ng.org/forum/post/98305</guid><dc:creator><![CDATA[pierrebrunet]]></dc:creator><pubDate>Thu, 09 Oct 2025 08:52:18 GMT</pubDate></item><item><title><![CDATA[Reply to SAML Auth with Azure AD on Thu, 09 Oct 2025 08:28:49 GMT]]></title><description><![CDATA[<p dir="auto"><a class="plugin-mentions-user plugin-mentions-a" href="/forum/user/pierrebrunet" aria-label="Profile: pierrebrunet">@<bdi>pierrebrunet</bdi></a> Just posted it above</p>
]]></description><link>https://xcp-ng.org/forum/post/98304</link><guid isPermaLink="true">https://xcp-ng.org/forum/post/98304</guid><dc:creator><![CDATA[Mathieu]]></dc:creator><pubDate>Thu, 09 Oct 2025 08:28:49 GMT</pubDate></item><item><title><![CDATA[Reply to SAML Auth with Azure AD on Thu, 09 Oct 2025 08:28:47 GMT]]></title><description><![CDATA[<p dir="auto"><a class="plugin-mentions-user plugin-mentions-a" href="/forum/user/mathieu" aria-label="Profile: Mathieu">@<bdi>Mathieu</bdi></a> Hello, can you show us your plugin configuration (without the certificate for security purpose) please?</p>
<p dir="auto">Edit: thank you!</p>
]]></description><link>https://xcp-ng.org/forum/post/98303</link><guid isPermaLink="true">https://xcp-ng.org/forum/post/98303</guid><dc:creator><![CDATA[pierrebrunet]]></dc:creator><pubDate>Thu, 09 Oct 2025 08:28:47 GMT</pubDate></item><item><title><![CDATA[Reply to SAML Auth with Azure AD on Thu, 09 Oct 2025 09:26:17 GMT]]></title><description><![CDATA[<p dir="auto"><a class="plugin-mentions-user plugin-mentions-a" href="/forum/user/pierrebrunet" aria-label="Profile: pierrebrunet">@<bdi>pierrebrunet</bdi></a></p>
<p dir="auto">Hello,</p>
<p dir="auto">I've updated the cert with signed assertion and response</p>
<p dir="auto"><img src="/forum/assets/uploads/files/1759998055611-a2bbfd50-40ff-4db8-9947-32d0a7902bc7-image.png" alt="a2bbfd50-40ff-4db8-9947-32d0a7902bc7-image.png" class=" img-fluid img-markdown" /></p>
<p dir="auto">I also tried with a brand new certificate.</p>
<p dir="auto">Unfortunately, login is still failing.</p>
<p dir="auto">From xo-server:</p>
<pre><code>Oct 09 08:11:17 xo-ce xo-server[272092]: Error: SAML assertion audience mismatch. Expected: 1671ff50-10e1-4a02-a0c5-4ed298898281 Received: https://XO_DNS_RECORD/
Oct 09 08:11:17 xo-ce xo-server[272092]:     at /opt/xo/xo-builds/xen-orchestra-202510090759/node_modules/@node-saml/node-saml/src/saml.ts:1264:18
Oct 09 08:11:17 xo-ce xo-server[272092]:     at Array.map (&lt;anonymous&gt;)
Oct 09 08:11:17 xo-ce xo-server[272092]:     at SAML.checkAudienceValidityError (/opt/xo/xo-builds/xen-orchestra-202510090759/node_modules/@node-saml/node-saml/src/saml.ts:1259:8)
Oct 09 08:11:17 xo-ce xo-server[272092]:     at SAML.processValidlySignedAssertionAsync (/opt/xo/xo-builds/xen-orchestra-202510090759/node_modules/@node-saml/node-saml/src/saml.ts:1151:32)
Oct 09 08:11:17 xo-ce xo-server[272092]:     at SAML.validatePostResponseAsync (/opt/xo/xo-builds/xen-orchestra-202510090759/node_modules/@node-saml/node-saml/src/saml.ts:808:16)
</code></pre>
<p dir="auto">And here is the plug-in configuration:<br />
<img src="/forum/assets/uploads/files/1759998489751-c2970287-4c00-4c36-817b-89195e2ce116-image.png" alt="c2970287-4c00-4c36-817b-89195e2ce116-image.png" class=" img-fluid img-markdown" /></p>
<p dir="auto">I'm not expert at all in SAML, sorry not being able to debug deeper.</p>
]]></description><link>https://xcp-ng.org/forum/post/98302</link><guid isPermaLink="true">https://xcp-ng.org/forum/post/98302</guid><dc:creator><![CDATA[Mathieu]]></dc:creator><pubDate>Thu, 09 Oct 2025 09:26:17 GMT</pubDate></item><item><title><![CDATA[Reply to SAML Auth with Azure AD on Wed, 08 Oct 2025 14:58:33 GMT]]></title><description><![CDATA[<p dir="auto"><a class="plugin-mentions-user plugin-mentions-a" href="/forum/user/mathieu" aria-label="Profile: Mathieu">@<bdi>Mathieu</bdi></a> Hi, you need to be sure to have signed assertion <strong>and</strong> signed response because only one won't be enough.</p>
<p dir="auto">We have updated the doc when you saw the impact. Sorry for the inconvenience:<br />
<a href="https://github.com/vatesfr/xen-orchestra/pull/9084/files#diff-6319d6b750c3bdbca61a9d9a1577a8aa4fa3a8a37764b91aef4672f69403baa4R221" target="_blank" rel="noopener noreferrer nofollow ugc">https://github.com/vatesfr/xen-orchestra/pull/9084/files#diff-6319d6b750c3bdbca61a9d9a1577a8aa4fa3a8a37764b91aef4672f69403baa4R221</a></p>
<div class="row github-embeds-container">

<div class="col-md-6">
<div class="github-embed card">
<div class="card-body">


<div class="meta">
<img class="author-picture not-responsive" src="https://avatars.githubusercontent.com/u/5628763?v=4" title="pierrebrunet289" />
<a href="https://github.com/pierrebrunet289"><span class="username">pierrebrunet289</span></a> opened this pull request <span class="timeago" title="2025-10-08T13:27:04Z"></span> in <a href="//github.com/vatesfr/xen-orchestra">vatesfr/xen-orchestra</a>
</div>
<h3>

<span class="badge closed float-end">closed</span>

<a href="https://github.com/vatesfr/xen-orchestra/pull/9084">chore: update doc for SAML due to breaking changes in config</a>
<span class="number">#9084</span>
</h3>


</div>
</div>
</div>

</div>]]></description><link>https://xcp-ng.org/forum/post/98280</link><guid isPermaLink="true">https://xcp-ng.org/forum/post/98280</guid><dc:creator><![CDATA[pierrebrunet]]></dc:creator><pubDate>Wed, 08 Oct 2025 14:58:33 GMT</pubDate></item><item><title><![CDATA[Reply to SAML Auth with Azure AD on Wed, 08 Oct 2025 14:48:01 GMT]]></title><description><![CDATA[<p dir="auto"><a class="plugin-mentions-user plugin-mentions-a" href="/forum/user/mathieu" aria-label="Profile: Mathieu">@<bdi>Mathieu</bdi></a> yes indeed, I worked on this with <a class="plugin-mentions-user plugin-mentions-a" href="/forum/user/pierrebrunet" aria-label="Profile: pierrebrunet">@<bdi>pierrebrunet</bdi></a> PR <a href="https://github.com/vatesfr/xen-orchestra/pull/9042" target="_blank" rel="noopener noreferrer nofollow ugc">https://github.com/vatesfr/xen-orchestra/pull/9042</a><br />
Do you have any logs in <code>xo-server</code> service?</p>
<div class="row github-embeds-container">

<div class="col-md-6">
<div class="github-embed card">
<div class="card-body">


<div class="meta">
<img class="author-picture not-responsive" src="https://avatars.githubusercontent.com/u/5628763?v=4" title="pierrebrunet289" />
<a href="https://github.com/pierrebrunet289"><span class="username">pierrebrunet289</span></a> opened this pull request <span class="timeago" title="2025-10-02T12:20:22Z"></span> in <a href="//github.com/vatesfr/xen-orchestra">vatesfr/xen-orchestra</a>
</div>
<h3>

<span class="badge closed float-end">closed</span>

<a href="https://github.com/vatesfr/xen-orchestra/pull/9042">chore: update packages</a>
<span class="number">#9042</span>
</h3>


</div>
</div>
</div>

</div>]]></description><link>https://xcp-ng.org/forum/post/98277</link><guid isPermaLink="true">https://xcp-ng.org/forum/post/98277</guid><dc:creator><![CDATA[nathanael-h]]></dc:creator><pubDate>Wed, 08 Oct 2025 14:48:01 GMT</pubDate></item><item><title><![CDATA[Reply to SAML Auth with Azure AD on Wed, 08 Oct 2025 14:48:17 GMT]]></title><description><![CDATA[<p dir="auto">Hi,</p>
<p dir="auto">Yes it was. You need to be sure that your SAML provider used the signed SAML assertion.</p>
<p dir="auto">Examples in Keycloak then Azure respectively:</p>
<p dir="auto"><img src="/forum/assets/uploads/files/1759934891448-saml2.png" alt="saml2.png" class=" img-fluid img-markdown" /></p>
<p dir="auto"><img src="/forum/assets/uploads/files/1759934894307-saml1.png" alt="saml1.png" class=" img-fluid img-markdown" /></p>
]]></description><link>https://xcp-ng.org/forum/post/98276</link><guid isPermaLink="true">https://xcp-ng.org/forum/post/98276</guid><dc:creator><![CDATA[olivierlambert]]></dc:creator><pubDate>Wed, 08 Oct 2025 14:48:17 GMT</pubDate></item><item><title><![CDATA[Reply to SAML Auth with Azure AD on Wed, 08 Oct 2025 14:04:56 GMT]]></title><description><![CDATA[<p dir="auto">Hello,</p>
<p dir="auto">Has the saml-auth plugin updated recently ?</p>
<p dir="auto">Using XOCE, commit c0065, it was working fine. Updating today to latest release, SAML authentication (Microsoft Entra ID), is not working anymore, I land on a page with a<br />
<em>'Internal server error'</em> message.</p>
<p dir="auto">Thanks,</p>
]]></description><link>https://xcp-ng.org/forum/post/98273</link><guid isPermaLink="true">https://xcp-ng.org/forum/post/98273</guid><dc:creator><![CDATA[Mathieu]]></dc:creator><pubDate>Wed, 08 Oct 2025 14:04:56 GMT</pubDate></item><item><title><![CDATA[Reply to SAML Auth with Azure AD on Wed, 08 Jan 2025 08:43:45 GMT]]></title><description><![CDATA[<p dir="auto">Sure, happy to have a PR on our doc!</p>
]]></description><link>https://xcp-ng.org/forum/post/87841</link><guid isPermaLink="true">https://xcp-ng.org/forum/post/87841</guid><dc:creator><![CDATA[olivierlambert]]></dc:creator><pubDate>Wed, 08 Jan 2025 08:43:45 GMT</pubDate></item><item><title><![CDATA[Reply to SAML Auth with Azure AD on Wed, 08 Jan 2025 08:22:18 GMT]]></title><description><![CDATA[<p dir="auto"><a class="plugin-mentions-user plugin-mentions-a" href="/forum/user/dant123" aria-label="Profile: dant123">@<bdi>dant123</bdi></a><br />
Old topic but thanks a lot for your first post, it was quite helpful for me to setup authentification with Microsoft Entra.</p>
<p dir="auto">I just didn't get immediately that you also need to specify the callback URL in the XO plugin settings, not only in the enterprise application in the Microsoft portal.</p>
<p dir="auto">My XO is behind a reverse proxy with a Let's Encrypt certificate, but it is also working with a self-signed certificate and a local DNS record.</p>
<p dir="auto"><a class="plugin-mentions-user plugin-mentions-a" href="/forum/user/olivierlambert" aria-label="Profile: olivierlambert">@<bdi>olivierlambert</bdi></a> Might be worth an addendum in the official documentation with specific screenshots for Microsoft Entra?</p>
]]></description><link>https://xcp-ng.org/forum/post/87839</link><guid isPermaLink="true">https://xcp-ng.org/forum/post/87839</guid><dc:creator><![CDATA[Mathieu]]></dc:creator><pubDate>Wed, 08 Jan 2025 08:22:18 GMT</pubDate></item></channel></rss>