Cortex XDR | Azure AD Single Sign On Unauthorized. Unauthorized - 4010507

cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 

Cortex XDR | Azure AD Single Sign On Unauthorized. Unauthorized - 4010507

L0 Member

Hello all,

 

I am trying to setup SSO on my XDR tenant but I am getting the following message when login in
Unauthorized. Unauthorized - 4010507

In the console "Management Audit Logs" i see the below logs:

Custom Idp Saml User Invalid Error | invalid user: email address missing or misconfigured, please verify SAML attributes mapping

I followed this video https://www.youtube.com/watch?v=nwF3hY3wgc0

I verified the completed setup, all seems to be ok, but i can´t log in the tenant with SSO.

 

Please help me on this, thanks in advance.

1 REPLY 1

L3 Networker

Hello @G.Escobar ,

 

Greetings for the day.

 

The error code Unauthorized - 4010507 indicates that the Cortex XDR platform received invalid or incomplete user data within the SAML assertion provided by your Identity Provider (IdP).

 

Specifically, the message “invalid user: email address missing or misconfigured” means that the required email attribute expected by Cortex XDR was either not present in the SAML assertion or did not exactly match the attribute name mapping defined in the XDR console.

 

To resolve this issue, follow these troubleshooting steps:

1. Identify the Exact Attribute Name Using a SAML Tracer:

Because SAML attributes are case-sensitive and must match exactly, you must verify the raw data being sent by your IdP.

  1. Install a browser extension such as SAML Tracer.

  2. Open the tracer and reproduce the failed login attempt in an incognito window.

  3. In the tracer, locate the AttributeStatement section within the SAML response.

  4. Find the attribute that contains the user's email address and note the exact Name value (for example, a URL or a simple string like emailaddress).

2. Update Attribute Mapping in Cortex XDR:

Once you have the exact attribute name from the SAML tracer, ensure it is configured correctly in the tenant:

  1. Navigate to Settings → Configurations → Access Management → Single Sign-On.

  2. Locate the IdP Attributes Mapping section.

  3. Ensure the Email field contains the exact string identified in Step 1.

Common Azure AD Mapping:

Internal Note:
In some instances, engineering has identified the correct mapping as:

3. Verify the User Profile in Your IdP

The error can also occur if the user attempting to log in does not have an email address populated in their IdP profile.

  • Check the user's account in Azure AD (or your specific IdP) to ensure the email field is not empty.

  • Verify that the attribute you are mapping is actually the one containing the data (for example, mapping user.mail vs user.userprincipalname).

Summary of Common Azure AD Attribute Mappings

If you are using Azure AD, ensure these standard mappings are used (all case-sensitive):

If you feel this has answered your query, please let us know by clicking like and on "mark this as a Solution".

 

Happy New year!!

 

Thanks & Regards,
S. Subashkar Sekar

  • 780 Views
  • 1 replies
  • 0 Likes
Like what you see?

Show your appreciation!

Click Like if a post is helpful to you or if you just want to show your support.

Click Accept as Solution to acknowledge that the answer to your question has been provided.

The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!

These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!

The LIVEcommunity thanks you for your participation!