Skip to page contentSkip to chat
ServiceNow support
    • Community
      Ask questions, give advice, and connect with fellow ServiceNow professionals.
      Developer
      Build, test, and deploy applications
      Documentation
      Find detailed information about ServiceNow products, apps, features, and releases.
      Impact
      Accelerate ROI and amplify your expertise.
      Learning
      Build skills with instructor-led and online training.
      Partner
      Grow your business with promotions, news, and marketing tools
      ServiceNow
      Learn about ServiceNow products & solutions.
      Store
      Download certified apps and integrations that complement ServiceNow.
      Support
      Manage your instances, access self-help, and get technical support.
SAML2Error: SAML failed to login, Status code is urn:oasis:names:tc:SAML:2.0:status:Requester - Support and Troubleshooting
  • >
  • Knowledge Base
  • >
  • Support and Troubleshooting (Knowledge Base)
  • >
  • SAML2Error: SAML failed to login, Status code is urn:oasis:names:tc:SAML:2.0:status:Requester
KB0819297

SAML2Error: SAML failed to login, Status code is urn:oasis:names:tc:SAML:2.0:status:Requester


15330 Views Last updated : Jul 24, 2025 public Copy Permalink English (Original)
  • English (Original)
  • Japanese
KB Summary by Now Assist

Issue

When SSO is enabled, some SAML request will fail with SAML2Error: SAML failed to login, Status code is urn:oasis:names:tc:SAML:2.0:status:Requester 

When checking the SAML response coming from the IDP you may notice this :urn:oasis:names:tc:SAML:2.0:status:InvalidNameIDPolicy" /></samlp:StatusCode></samlp:Status></samlp:Response>

 

Release

All versions

Resolution

The explanation and resolution in KB0657094 holds true.

Additional to this, from a ServiceNow perspective,  you can tackle this by changing the NameID policy in your IDP record.

Most of the times it would be

urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress.

Replacing it with

urn:oasis:names:tc:SAML:1.1:nameid-format:unspecified

should give relief.

Also, unchecking "Create an AuthnContextClass" in the same IDP configuration does help.

 

You would still need to consult with your IDP admin and decide if the methods above are the ones that satisfy your business requirements.

A refresh of Claim Rules would be then desirable.

 


The world works with ServiceNow.

Sign in for more! There's more content available only to authenticated users Sign in for more!
Did this KB article help you?
Did this KB article help you?

How would you rate your Now Support digital experience?

*

Very unsatisfied

Unsatisfied

Neutral

Satisfied

Very satisfied

Very unsatisfied

Unsatisfied

Neutral

Satisfied

Very satisfied

What can we improve? Please select all that apply.

What are we doing well? Please select all that apply.

Tell us more

*

Do you expect a response from this feedback?

  • Terms and conditions
  • Privacy statement
  • GDPR
  • Cookie policy
  • © 2025 ServiceNow. All rights reserved.