Platform Selector

Below are several cases where you may need help troubleshooting. The action steps are listed below each heading.

1. New User Asked to Update Profile ( Input Fields are Blank )

When a new user SSOs into the EVERFI platform and they are led to a screen where they are asked to input values such as their name or email, which appear blank, then there is an issue with the attribute mapping in the Identity Provider setup.  All attributes must be mapped even if your organization is using the exact same attribute names. Please check your Identity Provider setup and try again.

2. New User Asked to Enter Basic Details ( Input Fields are Already Filled In )

When a new user SSOs into the EVERFI platform and they are led to a screen where they are asked to input values such as their name or email, which are prefilled in, please take a screenshot (including the URL showing in the browser nav bar) and send it, along with the steps you took that led to this error screen, to the EVERFI team for review.

3. SSO Leads to Error Message

If during SSO you are led to a screen that looks like this, please take a screenshot (including the URL showing in the browser nav bar) and send it, along with the steps you took that led to this error screen, to the EVERFI team for review.

4. Deactivated User SSO Error

If a user whose account has been deactivated by an EVERFI admin attempts to login via SSO they will receive an error message.  If the user has been deactivated in error, contact the EVERFI team.

5. Identity Provider Metadata URL – Updates in IdP SAML Metadata

When you configure your IdP in EVERFI’S platform, if you choose Option 1 to provide a metadata URL for your IdP’s SAML metadata, be aware that EVERFI uses the URL to retrieve the various properties from your SAML metadata at that point in time, and then saves them as static values. EVERFI does not periodically connect to the metadata URL to refresh any settings that might change. Therefore, if you subsequently update any properties in your IdP’s SAML metadata, such as a new x.509 certificate, EVERFI does not automatically discover these changes in order to refresh these properties. You will need to manually update your configuration in EVERFI’s platform by editing the IdP configuration and re-entering the metadata URL and saving it.

6. The Assertion of the Response is not signed and the SP requires it

When attempting SSO, you get an error: “The Assertion of the Response is not signed and the SP requires it”

Explanation: Foundry requires the identity provider’s SAML Response’s Assertion to be signed. It is not enough for just the Response to be signed; the Assertion must also be signed.

Resolution: In your identity provider, in the EVERFI service provider configuration, ensure that the IDP signs the SAML Assertion.

We were not able to log you in

If, after a user authenticates to their identity provider, you see this message:

We were not able to log you in

Sorry, we were not able to connect to your account with <<Organization>>. Please provide the following information to your organization’s technical contact so we can help resolve this issue and get you logged in: Name ID: <<XXXXXXXX>>. Response ID: <<XXXXXXXXXXXXXXXX>>

The part << Organization >> will contain the actual name of the Organization, and Name ID and Response ID will contain the actual values.

This error happens with the SAML Subject NameID has a value that cannot be found in any Users in your organization with that SSO ID or email address (as a backup search). This can only happen when your Foundry IDP setup has the “allow registration via SAML” checkbox unchecked, which means Foundry will not create new users during SSO, otherwise Foundry would have simply created a new User after not finding an existing user.

Troubleshooting steps:

  1. From the learner webpage where the error occurred, copy to your clipboard the value of the ID  in the message. This value is the SAML NameID provided to Foundry by your identity provider. The NameID is the unique identifying value of this user that is assigned by your identity provider.
  2. In the Foundry customer admin portal, search for a user with this NameID by pasting the value from your clipboard into the user search box.
  3. If a user is found, verify the user’s SSO ID is the same exact value of the NameID. The case must match. Verify there are no leading or trailing spaces. If the user’s SSO ID value is not an exact match of the NameID, then update the user’s SSO ID to have that NameID to solve the problem.
  4. If you cannot find the user with this NameID, then search for the learner by name, email address, or other search criteria.
  5. If you can find the user, check the user’s SSO ID. Make sure the user’s SSO ID is the same as the NameID to solve this problem.
  6. If you cannot find the learner at all in Foundry, then this explains the error. The learner must have a user in Foundry where the user’s SSO ID is the same as the SAML NameID.

More details:

  • The error message includes the NameID that was in the SAML Response’s Assertion. Is there a user in Foundry whose SSO ID should have this NameID? Or is there a mismatch in NameID to Foundry SSO ID, for example the NameID is ID but the SSO ID is a username or email address.
  • Are the SSO ID values populated in the Users in Foundry?
  • Is the User actually in Foundry?
  • Is the value being passed in the NameID coming from the correct field in the identity management system? For example, does the SAML NameID contain a numeric employee ID but the SSO ID fields in Foundry have email addresses?
  • Is there a case sensitivity mismatch between the SAML NameID value and the Foundry SSO ID? The case must match exactly. For example, a NameID of will NOT match to a Foundry User SSO ID of
  • The Error Message also contains a Response ID that is a long string of letters and numbers like this: _2321732d25be376733c0f2e1d9149fc. This is the unique ID of the SAML Response, not to be confused with the user’s NameID. If your system logs its outgoing SAML Responses, you can search for it with this Response ID to gain more information. You can also provide the Response ID to EVERFI for us to search for your SAML Response to diagnose the SSO event in more detail.

SAML ID provider in the request is not configured in the system

If during SSO you get this error:

SAML ID provider in the request is not configured in the system

This error occurs when the Issuer in your IDP’s SAML Response is not the same as the Entity ID that is in the IDP setup in Foundry. When Foundry receives a SAML Response, Foundry takes the Issuer in the Response and tries to locate a IDP setup whose Entity ID is equal to that Issuer. A common reason this might happen is if you have multiple Entity IDs, or your Entity ID is has a mismatch between “http” and “https”, for example.

SAML Response StatusMessage of Signature required

If you are running PingFederate and get this in a SAML Response:

   <samlp:StatusCode Value="urn:oasis:names:tc:SAML:2.0:status:Requester" />
   <samlp:StatusMessage>Signature required</samlp:StatusMessage>

When creating a service provider for Foundry in PingFederate, set “Require digitally signed AuthN requests” to false to resolve this error.

The status code of the Response was not Success, was Responder

If your IDP is Microsoft AD FS and you get this error, then in AD FS, make sure that you have uploaded the EVERFI certificate to the Signature tab in the EVERFI relying party trust. See separate Microsoft AD FS SAML Single Sign-On Integration to EVERFI Foundry documentation for more.

You can also see evidence of this error by looking at the SAML response message the IDP sends to the Foundry SP, if you see this in the response XML:

   <samlp:StatusCode Value="urn:oasis:names:tc:SAML:2.0:status:Responder" />

The SAML assertion could not be decrypted

If during SSO you may see this message when the user attempts to log in:

The SAML assertion could not be decrypted. Verify that certificates are valid.

This message occurs when a X.509 certificate is invalid, or if the there is a certificate mismatch between the identity provider and Foundry. Note that this error is likely to happen only if the partner IDP encrypts their SAML assertions (which is generally recommended).

In SAML, there are two public X.509 certificates: one for the Identity Provider organization and one for the Service Provider organization; in a SAML implementation, each organization’s system “knows” the other’s X.509 certificate. In the identity management system of the partner, in the configuration for the EVERFI service provider, that configuration will normally store the EVERFI public X.509 certificate. In Foundry, in the IDP configuration, the IDP’s certificate (or at least the fingerprint of the certificate) is stored, as well as a pointer to which specific EVERFI public X.509 certificate the identity provider is using; this model allows for EVERFI to rotate its own X.509 certificates between an older certificate and a newer one with a later expiration date.

If the certificates between the IDP and the SP are out of sync, then when SAML assertions are sent and received and then decrypted, an error will occur because of the certificate mismatch between the two systems. When this occurs, you will see the “The SAML assertion could not be decrypted” error message. This could happen if the X.509 certificates for the partner is out of sync, or if the X.509 certificates for EVERFI are out of sync; either situation could cause this error to happen.

When this problem can occur

Generally, this problem will not occur in a stable environment. This will occur only if someone changes the EVERFI X.509 certificate in the IDP without also updating the Foundry IDP configuration to designate the IdP is using the same EVERFI X.509 certificate, or if someone updates the Foundry IDP configuration with the wrong X.509 certificate of the partner organization.

Or, the error could happen if the X.509 certificate is not formatted properly.

How to Solve This Error

Ensure the X.509 certificates are in sync across both systems.
Ensure the X.509 certificate entered in the Foundry IDP setup for the identity provider is formatted correctly.

Technical background

This error occurs when either of the following exceptions occur in Foundry when attempting to decrypt an encrypted SAML assertion:

SSO Error: Current time is earlier than NotBefore condition

This error can happen with identity providers where there is a slight time offset between systems.

If you experience this with ADFS, you can add a “clock drift.” To remedy this, in your AD FS Windows Server, in a command shell (not a DOS command line) run this command where “TrustName” is the actual name of the relying party trust for EVERFI, without double quotes:

PS C:\> Set-ADFSRelyingPartyTrust -NotBeforeSkew "5" -targetname TrustName

For example, you might have named the Relying Party Trust “EVERFI”, so the command would be:

PS C:\> Set-ADFSRelyingPartyTrust -NotBeforeSkew "5" -targetname EVERFI

See NotBefore causing troubles when server times slightly out of sync for background. The command above is for ADFS2. If running ADFS1 there is a different command.

Foundry’s system time is synched with AWS.

Foundry applies 2 seconds clock drift or leeway, so be sure that if your identity provider is adding NotBefore or NotOnOrAfter conditions to the SAML Response that they are not so limited as to trigger this error.

Invalid Signature on SAML Response

If a user attempts to SSO and gets this error:

Invalid Signature on SAML Response
Fingerprint mismatch

First, verify that in the Foundry IDP config, that the IDP certificate and IDP certificate algorithm are correct. If the identity provider is sending in the SAML Response a different certificate than the one entered in Foundry, this mismatch would cause this error. One way to check this is to inspect the SAML Response the identity provider sends with SAML Tracer. Look in the response for the certificate between the <X509Certificate> tags, and make sure the certificate text is the same as that in the Foundry identity provider config. If you mixed up certificates in the course of your setup, or make a series of changes, it’s possible that you can have the wrong certificate in the Foundry IDP config.

For background, this is the flow in single sign-on:

  1. Your identity provider sends a SAML Response. This is triggered by IDP-initiated SSO, or from a SAML AuthnRequest from Foundry during SP-initiated SSO.
  2. The SAML Response contains a X509Certificate and a signature.
  3. Foundry calculates the fingerprint from the certificate in the SAML Response and compares it to the IDP certificate fingerprint in the Foundry IDP config. They must be identical. The IDP certificate fingerprint in the Foundry IDP config was calculated from the IDP certificate you entered, or if you did not enter a certificate, then from the IDP certificate fingerprint you entered.
  4. Next, using the certificate fingerprint generated from the certificate in the SAML Response, Foundry verifies the signature in the SAML Response to ensure it is valid.

If you believe the IDP certificate and IDP certificate algorithm in Foundry are correct and you continue to see this error, then contact EVERFI. We will need to investigate further. Is is possible that when your identity provider metadata was keyed into the Foundry IDP setup, that the fingerprint digest for your certificate was calculated incorrectly.

Maximum Querystring Length Error

Some systems impose a default maximum length on request querystrings. Often these are Microsoft settings and the limit is 2,048 characters. When Foundry sends a SAML Authorization Request (AuthnRequest) to your identity provider, the SAML AuthnRequest is encoded and put into a querystring parameter. The total length of that parameter is often 3,000 – 4,000 or more characters. The AuthnRequest can get large because Foundry digitally signs the AuthnRequest so that an identity provider can validate the request is actually coming from Foundry. Signing the request means the Foundry X509 certificate is included in the response, as well as additional XML tags and data associated with signing.

To resolve this, you will need to increase the maximum querystring length in your system.

If your system is running, these links may be helpful:

The length of the query string for this request exceeds the configured maxQueryStringLength value | Stack Overflow

Cannot Edit SSO ID of my Own User

Q. As an admin user in the customer portal, I can edit other users’ SSO ID values but I cannot edit my own. Why not and how can I get this value changed?
A. Because of security reasons, an admin user cannot edit their own SSO ID. You will need to ask a different admin to update your SSO ID.

SSO ID not visible when Admin edits Users in Customer Portal

If you are trying to edit the SSO ID of a user, and the field is not visible, it could be because your organization is not enabled for SSO yet. If you can see a menu link for Settings –> Single Sign-On, then your organization is enabled for SSO; if not, then check with your account manager.
If you organization has single sign-on enabled, then you must add at least one identity provider to make the SSO ID field on users visible. If you are not ready to implement SSO just yet, then you can still add an identity provider, but leave “allow service provider initiated login” checkbox unchecked, so that your learners won’t have the option to SSO until you’re ready.

Not a valid audience for this Response

SAML error detail: “https://admin.fifoundry/{org-slug}/saml/sp is not a valid audience for this Response – Valid audiences: https://fifoundry/{org-slug}/saml/sp” where {org-slug} is the slug name for your organization.
Resolution: in your identity provider, in the configuration for the Foundry service provider when you enter an audience restriction, you must enter the Foundry EntityID which is the first part of the error detail message. Be sure to include your actual organization slug, not the placeholder in the example above.

A different user with the email <<emailaddress>> already exists

If a user is attempting to single sign-on and receives an error message saying their email address already exists, this is caused by the either of the following two cases:
Case 1: Matching NameID
  • The user logging in has a SAML Response NameID from the identity provider that is matched with an existing Foundry User. This means that Foundry was able to match the user.
  • The Foundry IDP config has an Attribute Mapping for email address.
  • The SAML Response contains an Attribute for the email address.
  • The SAML Attribute Value for the email address is different from the email address of the matched Foundry user. In this event, Foundry attempts to update the Foundry user’s email to the value provided in the SAML Attribute.
  • There is a different user in Foundry with the same email address as the mapped email address in the SAML Response provided by the identity provider. This can happen if the person has a duplicate user account in Foundry, whether the duplicate user is active or inactive, or if an organization recycles email addresses, and the previous person who had that email address before had a Foundry user.
  • When Foundry attempts to update the email address of the user who just SSO’d, an error occurs because of the duplicate email address.
  • As a result, Foundry does not save the user, and rolls back the single sign-on attempt, and gives this error message to the learner who attempted to single sign-on.

Reason this error was triggered: Where there is a mapped attribute for email, and the SAML Response has a value for that Attribute, then Foundry will attempt to update the user’s email address to that value. But Foundry was not able to do this because of the duplicate email address held by a different user.

Resolution: in the duplicate user who has the same email address as that of the SAML Attribute, change that user’s email address. Since email is a required field, you can make it a fake email address.

Case 2: No Matching NameID, Attempt to Create New User with Duplicate Email Address

The user attempting to log in has a NameID that does not match with the SSO ID of any existing Foundry users

In the identity provider configuration in Foundry, the “Allow automatic registration during SSO” checkbox is checked, so that Foundry will create a new user

When Foundry attempts to create a new user, the email address provided in a mapped Attribute is already held by a user in Foundry, causing Foundry to have an error when attempting to add the new user

Resolution: check the Foundry user who already has the email address. If that user has a SSO ID, ensure that the user attempting to log in has a matching NameID. It could be that there is a case difference between the NameID in the SAML Response and the Foundry user’s SSO ID.

User Cannot Be Saved

This error message can happen for a number of reasons. At the root of all these errors is that in the course of SSO, Foundry is either attempting to add a new user, or update an existing user, and that attempt failed. Hence the message that the user cannot be saved.

User Cannot be Saved when attempting to Add a New User

  • This error can happen if the user attempting to SSO does not already exist in Foundry. If the IDP config in Foundry has “allow registration via SAML” checked, then Foundry will add a new user with the values provided in the defaults set in the IDP config plus any mapped attributes. If the combination of values is invalid or incomplete, then the attempt to insert a new user will fail and this error message will be displayed. Common problems might be:
  • A required field like first name, last name or email address is not in a mapped Attribute
  • The email address, which must be unique, duplicates the email address of another user
  • A mapped attribute for user type, role or location is invalid

User Cannot be Saved during Update of User

Foundry might attempt to update an existing user if the user signing in already exists in Foundry, and can be identified via the SAML Response’s NameID or mapped email attribute. Foundry may attempt to update the user if there are mapped attributes. Errors for this scenario are unusual but may happen when:

  • There is a mapped attribute for email address, and the value provided in the Attribute is an email address that already belongs to another user. Since email addresses cannot be duplicated, the attempt to save the user will fail and you will get this error.
  • There is a mapped attribute for a location or role where the Attribute value is invalid

Invalid SAML Response

If during SSO, you see an error message saying:
Invalid SAML Response. Not match the saml-schema-protocol-2.0.xsd
This means the SAML Response is not formatted correctly.
To troubleshoot this, do the following:
  1. Capture the SAML Response using SAML Tracer or another tool.
  2. Go to a XML schema validator site like:
  3. Enter the SAML Response in the XML field
  4. Enter the SAML 2.0 schema XSD from (“view source” in browser to get the raw text) in the XSD field
  5. Run the validation check and examine the errors.
  6. Correct the formatting in the SAML Response based on what the errors highlight.

404 Page Not Found Error during SP-initiated SSO

Q: We are certain the SSO/ACS login pages are entered correctly, but when we attempt SP-initiated SSO, we get a 404 “page not found” error when Foundry sends the user to our IDP’s login page. But when we initiate SSO from our identity provider, SSO works. Why is this 404 happening?

A: Normally, a 404 “page not found” error happens when the web page file does not exist, such as with a broken webpage link. But a 404 error can also be caused by other random backend errors. You may need to inspect your server’s event logs to find an explanation. We have seen examples where certificate mismatches or other configuration problems cause a 404 error; the IDP detects some problem and rather then outputting the real problem, it bombs out with an ambiguous 404. This kind of error can throw you off because normally a 404 error means “page not found” but in this case it is masking a different root problem.

In some cases, the real problem is the Maximum Querystring Length Error. Foundry’s SAML AuthnRequest has a large querystring parameter value containing a certificate and digital signature and this can exceed the maximum querystring length value on some servers. If this is the case, the server returns a 404 error even though the webpage actually does exist. You may need to increase this limit to overcome this restriction and allow SP-initiated SSO to function. The reason this error might not occur during IDP-initiated SSO is because the SSO flow starts from your identity provider and there is no SAML Message sent from Foundry to your system.

SAML ID provider in the logout request is not configured in the system.

You may see this error during single logout after a user tries to log out of Foundry after having logged in with single sign-on.

This error is caused by having an incorrect URL entered in the identity provider single logout URL in the Foundry identity provider configuration.

To resolve this error, in the Foundry customer admin portal, update the identity provider configuration and ensure the Single Logout URL is the correct URL in your identity provider system.

The status code of the Response was not Success, was Requester

Error message: The status code of the Response was not Success, was Requester => AuthnFailed

Reason: this is an error message returned by an identity provider that rejected Foundry’s authentication request during service provider initiated single sign-on.

Resolution: verify that all the SAML properties in the service provider configuration in your identity provider are correct, in particular the entity ID, service URL and certificates. Also verify in Foundry that the identity provider settings are correct in particular the IDP’s entity ID, service URL and certificate. Also in Foundry, check the EVERFI SAML Certificate setting and make sure the same Foundry certificate is added to the identity provider as a signing and encryption certificate.

We are not recognizing the SAMLRequest or SAMLResponse

Error message:

We’re sorry.

We are not recognizing the SAMLRequest or SAMLResponse.

Please contact your IT department for assistance

Cause: During single logout, Foundry has received a SAML message from the identity provider at the Foundry single logout URL but the message does not have a querystring parameter for SAMLRequest (for a logout request) or  SAMLResponse (for a logout response) which means the single logout request or response from the identity provider is not a valid SAML message.

Resolution: determine why the identity provider is not sending to Foundry a SLO message with either a SAMLRequest or a SAMLResponse querystring parameter and value.

user is not assigned to a role for the application

Note: this error text originates from your identity provider and is different for every identity provider product. The text above is just one example from one product.

Message: An error message on your identity provider page (not a EVERFI Foundry) page after a user authenticates successfully to your identity provider, and the error message explains the user is not assigned to the application or similar text.

Explanation: Typically, an identity provider has a mechanism to assign user-groups and/or users to a service provider application like Foundry. If you see an error such as this, then it likely means the user is not assigned the necessary privileges in your identity provider to access the Foundry applicaiton.

Resolution: in your identity provider, verify that the user is in the correct groups(s) and also verify that you have assigned the appropriate security user groups to the Foundry applicaiton.