<?xml version="1.0" encoding="UTF-8" ?>
<?xml-stylesheet type="text/xsl" href="https://community.appian.com/cfs-file/__key/system/syndication/rss.xsl" media="screen"?><rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/"><channel><title>KB-2043 SAML users are redirected to a Start Page instead of their destination upon first login</title><link>https://community.appian.com/support/w/kb/1626/kb-2043-saml-users-are-redirected-to-a-start-page-instead-of-their-destination-upon-first-login</link><description /><dc:language>en-US</dc:language><generator>Telligent Community 12</generator><item><title>KB-2043 SAML users are redirected to a Start Page instead of their destination upon first login</title><link>https://community.appian.com/support/w/kb/1626/kb-2043-saml-users-are-redirected-to-a-start-page-instead-of-their-destination-upon-first-login</link><pubDate>Thu, 19 Dec 2019 14:12:54 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:b37bbfb4-3db6-4af5-8170-77dcb03556c6</guid><dc:creator>Rebecca Jonas</dc:creator><comments>https://community.appian.com/support/w/kb/1626/kb-2043-saml-users-are-redirected-to-a-start-page-instead-of-their-destination-upon-first-login#comments</comments><description>Current Revision posted to Appian Knowledge Base by Rebecca Jonas on 12/19/2019 2:12:54 PM&lt;br /&gt;
&lt;h2&gt;Symptoms&lt;/h2&gt;
&lt;p&gt;After navigating to Appian via a link to a specific page (e.g. task, news post, etc.) or through Embedded Interfaces and authenticating via SAML, the user is redirected to either the default or group-based User Start Page. When using Embedded Interfaces, the interface will not load and the following error will be seen in the browser console:&lt;/p&gt;
&lt;pre&gt;Refused to display &amp;#39;https://appian.example.com/suite/sites/my-start-site&amp;#39;&amp;nbsp;in a frame because it set &amp;#39;X-Frame-Options&amp;#39; to &amp;#39;sameorigin&amp;#39;&lt;/pre&gt;
&lt;p&gt;After refreshing the page containing the Embedded Interface or re-opening the link, everything&amp;nbsp;works as expected until the user&amp;#39;s session expires or the user logs out.&lt;/p&gt;
&lt;h2&gt;Cause&lt;/h2&gt;
&lt;p&gt;The SAML response received from the Identity Provider has a missing or invalid&amp;nbsp;&lt;code&gt;InResponseTo&lt;/code&gt; attribute. Rather than using RelayStates, Appian uses the ID of the original SAML request as a caching key and once the SAML authentication flow is complete, uses the &lt;code&gt;InResponseTo&lt;/code&gt; attribute contained in the SAML response to route the user to their target destination. If the attribute is not present or does not match the original SAML request&amp;#39;s ID, the user will be redirected to their start page instead of the intended destination.&lt;/p&gt;
&lt;h3&gt;Incorrect Response Example&lt;/h3&gt;
&lt;pre&gt;&lt;span&gt;&amp;lt;samlp2:Response &lt;br /&gt;Destination=&amp;quot;https://appian.example.com/suite/saml/AssertionConsumer&amp;quot; &lt;br /&gt;ID=&amp;quot;ResponseId_xxx&amp;quot; &lt;br /&gt;IssueInstant=&amp;quot;2019-11-08T20:07:31.462Z&amp;quot; &lt;br /&gt;Version=&amp;quot;2.0&amp;quot; &lt;br /&gt;xmlns:saml2=&amp;quot;urn:oasis:names:tc:SAML:2.0:assertion&amp;quot; &lt;br /&gt;xmlns:samlp2=&amp;quot;urn:oasis:names:tc:SAML:2.0:protocol&amp;quot;&amp;gt;&lt;br /&gt;...&lt;/span&gt;&lt;/pre&gt;
&lt;h3&gt;Correct Response&amp;nbsp;Example&lt;/h3&gt;
&lt;pre&gt;&lt;span&gt;&amp;lt;samlp2:Response &lt;br /&gt;&lt;/span&gt;&lt;span&gt;Destination=&amp;quot;https://appian.example.com/suite/saml/AssertionConsumer&amp;quot; &lt;br /&gt;ID=&amp;quot;ResponseId_xxx&amp;quot; &lt;br /&gt;InResponseTo=&amp;quot;_64d59940-e2a7-4378-a1cf-5f4eb133ca90&amp;quot; &lt;br /&gt;IssueInstant=&amp;quot;2019-11-08T20:07:31.462Z&amp;quot; &lt;br /&gt;Version=&amp;quot;2.0&amp;quot;&lt;br /&gt;xmlns:saml2=&amp;quot;urn:oasis:names:tc:SAML:2.0:assertion&amp;quot;&lt;br /&gt;xmlns:samlp2=&amp;quot;urn:oasis:names:tc:SAML:2.0:protocol&amp;quot;&amp;gt;&lt;br /&gt;...&lt;/span&gt;&lt;/pre&gt;
&lt;h2&gt;&lt;span&gt;Action&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span&gt;Edit your Identity Provider&amp;#39;s settings or code to include the &lt;code&gt;InResponseTo&lt;/code&gt; attribute in the SAML response. The &lt;a href="https://docs.oasis-open.org/security/saml/v2.0/saml-core-2.0-os.pdf"&gt;SAML 2.0 specification&lt;/a&gt; requires that the IdP must send the ID of the incoming SAML request as the&amp;nbsp;&lt;code&gt;InResponseTo&lt;/code&gt;&amp;nbsp;attribute&amp;nbsp;when an ID is present in the original request:&lt;/span&gt;&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;&lt;span&gt;InResponseTo [Optional]&lt;br /&gt;&lt;/span&gt;&lt;span&gt;A reference to the identifier of the request to which the response corresponds, if any. If the response is not generated in response to a request, or if the ID attribute value of a request cannot be determined (for example, the request is malformed), then this attribute MUST NOT be present. Otherwise, it MUST be present and its value MUST match the value of the corresponding request&amp;#39;s ID attribute.&lt;/span&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;h2&gt;&lt;span&gt;Affected Versions&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span&gt;This article applies to Appian 7.11 and later.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;Last Reviewed: December 2019&lt;/span&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: embedded interfaces, administration, SAML, integration, authentication&lt;/div&gt;
</description></item><item><title>KB-XXXX SAML users are redirected to a Start Page instead of their destination upon first login</title><link>https://community.appian.com/support/w/kb/1626/kb-2043-saml-users-are-redirected-to-a-start-page-instead-of-their-destination-upon-first-login/revision/6</link><pubDate>Tue, 17 Dec 2019 21:37:52 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:b37bbfb4-3db6-4af5-8170-77dcb03556c6</guid><dc:creator>Rebecca Jonas</dc:creator><comments>https://community.appian.com/support/w/kb/1626/kb-2043-saml-users-are-redirected-to-a-start-page-instead-of-their-destination-upon-first-login#comments</comments><description>Revision 6 posted to Appian Knowledge Base by Rebecca Jonas on 12/17/2019 9:37:52 PM&lt;br /&gt;
&lt;h2&gt;Symptoms&lt;/h2&gt;
&lt;p&gt;After navigating to Appian via a link to a specific page (e.g. task, news post, etc.) or through Embedded Interfaces and authenticating via SAML, the user is redirected to either the default or group-based User Start Page. When using Embedded Interfaces, the interface will not load and the following error will be seen in the browser console:&lt;/p&gt;
&lt;pre&gt;Refused to display &amp;#39;https://appian.example.com/suite/sites/my-start-site&amp;#39;&amp;nbsp;in a frame because it set &amp;#39;X-Frame-Options&amp;#39; to &amp;#39;sameorigin&amp;#39;&lt;/pre&gt;
&lt;p&gt;After refreshing the page containing the Embedded Interface or re-opening the link, everything&amp;nbsp;works as expected until the user&amp;#39;s session expires or the user logs out.&lt;/p&gt;
&lt;h2&gt;Cause&lt;/h2&gt;
&lt;p&gt;The SAML response received from the Identity Provider has a missing or invalid&amp;nbsp;&lt;code&gt;InResponseTo&lt;/code&gt; attribute. Rather than using RelayStates, Appian uses the ID of the original SAML request as a caching key and once the SAML authentication flow is complete, uses the &lt;code&gt;InResponseTo&lt;/code&gt; attribute contained in the SAML response to route the user to their target destination. If the attribute is not present or does not match the original SAML request&amp;#39;s ID, the user will be redirected to their start page instead of the intended destination.&lt;/p&gt;
&lt;h3&gt;Incorrect Response Example&lt;/h3&gt;
&lt;pre&gt;&lt;span&gt;&amp;lt;samlp2:Response &lt;br /&gt;Destination=&amp;quot;https://appian.example.com/suite/saml/AssertionConsumer&amp;quot; &lt;br /&gt;ID=&amp;quot;ResponseId_xxx&amp;quot; &lt;br /&gt;IssueInstant=&amp;quot;2019-11-08T20:07:31.462Z&amp;quot; &lt;br /&gt;Version=&amp;quot;2.0&amp;quot; &lt;br /&gt;xmlns:saml2=&amp;quot;urn:oasis:names:tc:SAML:2.0:assertion&amp;quot; &lt;br /&gt;xmlns:samlp2=&amp;quot;urn:oasis:names:tc:SAML:2.0:protocol&amp;quot;&amp;gt;&lt;br /&gt;...&lt;/span&gt;&lt;/pre&gt;
&lt;h3&gt;Correct Response&amp;nbsp;Example&lt;/h3&gt;
&lt;pre&gt;&lt;span&gt;&amp;lt;samlp2:Response &lt;br /&gt;&lt;/span&gt;&lt;span&gt;Destination=&amp;quot;https://appian.example.com/suite/saml/AssertionConsumer&amp;quot; &lt;br /&gt;ID=&amp;quot;ResponseId_xxx&amp;quot; &lt;br /&gt;InResponseTo=&amp;quot;_64d59940-e2a7-4378-a1cf-5f4eb133ca90&amp;quot; &lt;br /&gt;IssueInstant=&amp;quot;2019-11-08T20:07:31.462Z&amp;quot; &lt;br /&gt;Version=&amp;quot;2.0&amp;quot;&lt;br /&gt;xmlns:saml2=&amp;quot;urn:oasis:names:tc:SAML:2.0:assertion&amp;quot;&lt;br /&gt;xmlns:samlp2=&amp;quot;urn:oasis:names:tc:SAML:2.0:protocol&amp;quot;&amp;gt;&lt;br /&gt;...&lt;/span&gt;&lt;/pre&gt;
&lt;h2&gt;&lt;span&gt;Action&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span&gt;Edit your Identity Provider&amp;#39;s settings or code to include the &lt;code&gt;InResponseTo&lt;/code&gt; attribute in the SAML response. The &lt;a href="https://docs.oasis-open.org/security/saml/v2.0/saml-core-2.0-os.pdf"&gt;SAML 2.0 specification&lt;/a&gt; requires that the IdP must send the ID of the incoming SAML request as the&amp;nbsp;&lt;code&gt;InResponseTo&lt;/code&gt;&amp;nbsp;attribute&amp;nbsp;when an ID is present in the original request:&lt;/span&gt;&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;&lt;span&gt;InResponseTo [Optional]&lt;br /&gt;&lt;/span&gt;&lt;span&gt;A reference to the identifier of the request to which the response corresponds, if any. If the response is not generated in response to a request, or if the ID attribute value of a request cannot be determined (for example, the request is malformed), then this attribute MUST NOT be present. Otherwise, it MUST be present and its value MUST match the value of the corresponding request&amp;#39;s ID attribute.&lt;/span&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;h2&gt;&lt;span&gt;Affected Versions&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span&gt;This article applies to Appian 7.11 and later.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;Last Reviewed: December 2019&lt;/span&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: embedded interfaces, administration, SAML, integration, authentication&lt;/div&gt;
</description></item><item><title>KB-XXXX SAML users are redirected to a Start Page instead of their destination upon first login</title><link>https://community.appian.com/support/w/kb/1626/kb-2043-saml-users-are-redirected-to-a-start-page-instead-of-their-destination-upon-first-login/revision/5</link><pubDate>Tue, 17 Dec 2019 21:31:06 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:b37bbfb4-3db6-4af5-8170-77dcb03556c6</guid><dc:creator>Jussi Lundstedt</dc:creator><comments>https://community.appian.com/support/w/kb/1626/kb-2043-saml-users-are-redirected-to-a-start-page-instead-of-their-destination-upon-first-login#comments</comments><description>Revision 5 posted to Appian Knowledge Base by Jussi Lundstedt on 12/17/2019 9:31:06 PM&lt;br /&gt;
&lt;h2&gt;Symptoms&lt;/h2&gt;
&lt;p&gt;After navigating to Appian via a link or through Embedded Interfaces and authenticating via SAML, the user is redirected to either the default or group-based User Start Page. When using Embedded Interfaces, the interface will not load and the following error will be seen in the browser console:&lt;/p&gt;
&lt;pre&gt;Refused to display &amp;#39;https://appian.example.com/suite/sites/my-start-site&amp;#39;&amp;nbsp;in a frame because it set &amp;#39;X-Frame-Options&amp;#39; to &amp;#39;sameorigin&amp;#39;&lt;/pre&gt;
&lt;p&gt;After refreshing the page containing the Embedded Interface or re-opening the link, everything&amp;nbsp;works as expected until the user&amp;#39;s session expires or the user logs out.&lt;/p&gt;
&lt;h2&gt;Cause&lt;/h2&gt;
&lt;p&gt;The SAML response received from the Identity Provider has a missing or invalid&amp;nbsp;&lt;code&gt;InResponseTo&lt;/code&gt; attribute. Rather than using RelayStates, Appian uses the ID of the original SAML request as a caching key and once the SAML authentication flow is complete, uses the &lt;code&gt;InResponseTo&lt;/code&gt; attribute contained in the SAML response to route the user to their target destination. If the attribute is not present or does not match the original SAML request&amp;#39;s ID, the user will be redirected to their start page instead of the intended destination.&lt;/p&gt;
&lt;h3&gt;Incorrect Response Example&lt;/h3&gt;
&lt;pre&gt;&lt;span&gt;&amp;lt;samlp2:Response &lt;br /&gt;Destination=&amp;quot;https://appian.example.com/suite/saml/AssertionConsumer&amp;quot; &lt;br /&gt;ID=&amp;quot;ResponseId_xxx&amp;quot; &lt;br /&gt;IssueInstant=&amp;quot;2019-11-08T20:07:31.462Z&amp;quot; &lt;br /&gt;Version=&amp;quot;2.0&amp;quot; &lt;br /&gt;xmlns:saml2=&amp;quot;urn:oasis:names:tc:SAML:2.0:assertion&amp;quot; &lt;br /&gt;xmlns:samlp2=&amp;quot;urn:oasis:names:tc:SAML:2.0:protocol&amp;quot;&amp;gt;&lt;br /&gt;...&lt;/span&gt;&lt;/pre&gt;
&lt;h3&gt;Correct Response&amp;nbsp;Example&lt;/h3&gt;
&lt;pre&gt;&lt;span&gt;&amp;lt;samlp2:Response &lt;br /&gt;&lt;/span&gt;&lt;span&gt;Destination=&amp;quot;https://appian.example.com/suite/saml/AssertionConsumer&amp;quot; &lt;br /&gt;ID=&amp;quot;ResponseId_xxx&amp;quot; &lt;br /&gt;InResponseTo=&amp;quot;_64d59940-e2a7-4378-a1cf-5f4eb133ca90&amp;quot; &lt;br /&gt;IssueInstant=&amp;quot;2019-11-08T20:07:31.462Z&amp;quot; &lt;br /&gt;Version=&amp;quot;2.0&amp;quot;&lt;br /&gt;xmlns:saml2=&amp;quot;urn:oasis:names:tc:SAML:2.0:assertion&amp;quot;&lt;br /&gt;xmlns:samlp2=&amp;quot;urn:oasis:names:tc:SAML:2.0:protocol&amp;quot;&amp;gt;&lt;br /&gt;...&lt;/span&gt;&lt;/pre&gt;
&lt;h2&gt;&lt;span&gt;Action&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span&gt;Edit your Identity Provider&amp;#39;s settings or code to include the &lt;code&gt;InResponseTo&lt;/code&gt; attribute in the SAML response. The &lt;a href="https://docs.oasis-open.org/security/saml/v2.0/saml-core-2.0-os.pdf"&gt;SAML 2.0 specification&lt;/a&gt; requires that the IdP must send the ID of the incoming SAML request as the&amp;nbsp;&lt;code&gt;InResponseTo&lt;/code&gt;&amp;nbsp;attribute&amp;nbsp;when an ID is present in the original request:&lt;/span&gt;&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;&lt;span&gt;InResponseTo [Optional]&lt;br /&gt;&lt;/span&gt;&lt;span&gt;A reference to the identifier of the request to which the response corresponds, if any. If the response is not generated in response to a request, or if the ID attribute value of a request cannot be determined (for example, the request is malformed), then this attribute MUST NOT be present. Otherwise, it MUST be present and its value MUST match the value of the corresponding request&amp;#39;s ID attribute.&lt;/span&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;h2&gt;&lt;span&gt;Affected Versions&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span&gt;This article applies to Appian 7.11 and later.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;Last Reviewed: December 2019&lt;/span&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: embedded interfaces, administration, SAML, integration, authentication&lt;/div&gt;
</description></item><item><title>KB-XXXX SAML users are redirected to a Start Page instead of their destination upon first login</title><link>https://community.appian.com/support/w/kb/1626/kb-2043-saml-users-are-redirected-to-a-start-page-instead-of-their-destination-upon-first-login/revision/4</link><pubDate>Tue, 17 Dec 2019 21:30:11 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:b37bbfb4-3db6-4af5-8170-77dcb03556c6</guid><dc:creator>Jussi Lundstedt</dc:creator><comments>https://community.appian.com/support/w/kb/1626/kb-2043-saml-users-are-redirected-to-a-start-page-instead-of-their-destination-upon-first-login#comments</comments><description>Revision 4 posted to Appian Knowledge Base by Jussi Lundstedt on 12/17/2019 9:30:11 PM&lt;br /&gt;
&lt;h2&gt;Symptoms&lt;/h2&gt;
&lt;p&gt;After navigating to Appian via a link or through Embedded Interfaces and authenticating via SAML, the user is redirected to either the default or group-based User Start Page. When using Embedded Interfaces, the interface will not load and the following error will be seen in the browser console:&lt;/p&gt;
&lt;pre&gt;Refused to display &amp;#39;https://appian.example.com/suite/sites/my-start-site&amp;#39;&amp;nbsp;in a frame because it set &amp;#39;X-Frame-Options&amp;#39; to &amp;#39;sameorigin&amp;#39;&lt;/pre&gt;
&lt;p&gt;After refreshing the Embedded Interface page or re-opening a link, everything&amp;nbsp;works as expected until the user&amp;#39;s session expires or the user logs out.&lt;/p&gt;
&lt;h2&gt;Cause&lt;/h2&gt;
&lt;p&gt;The SAML response received from the Identity Provider has a missing or invalid&amp;nbsp;&lt;code&gt;InResponseTo&lt;/code&gt; attribute. Rather than using RelayStates, Appian uses the ID of the original SAML request as a caching key and once the SAML authentication flow is complete, uses the &lt;code&gt;InResponseTo&lt;/code&gt; attribute contained in the SAML response to route the user to their target destination. If the attribute is not present or does not match the original SAML request&amp;#39;s ID, the user will be redirected to their start page instead of the intended destination.&lt;/p&gt;
&lt;h3&gt;Incorrect Response Example&lt;/h3&gt;
&lt;pre&gt;&lt;span&gt;&amp;lt;samlp2:Response &lt;br /&gt;Destination=&amp;quot;https://appian.example.com/suite/saml/AssertionConsumer&amp;quot; &lt;br /&gt;ID=&amp;quot;ResponseId_xxx&amp;quot; &lt;br /&gt;IssueInstant=&amp;quot;2019-11-08T20:07:31.462Z&amp;quot; &lt;br /&gt;Version=&amp;quot;2.0&amp;quot; &lt;br /&gt;xmlns:saml2=&amp;quot;urn:oasis:names:tc:SAML:2.0:assertion&amp;quot; &lt;br /&gt;xmlns:samlp2=&amp;quot;urn:oasis:names:tc:SAML:2.0:protocol&amp;quot;&amp;gt;&lt;br /&gt;...&lt;/span&gt;&lt;/pre&gt;
&lt;h3&gt;Correct Response&amp;nbsp;Example&lt;/h3&gt;
&lt;pre&gt;&lt;span&gt;&amp;lt;samlp2:Response &lt;br /&gt;&lt;/span&gt;&lt;span&gt;Destination=&amp;quot;https://appian.example.com/suite/saml/AssertionConsumer&amp;quot; &lt;br /&gt;ID=&amp;quot;ResponseId_xxx&amp;quot; &lt;br /&gt;InResponseTo=&amp;quot;_64d59940-e2a7-4378-a1cf-5f4eb133ca90&amp;quot; &lt;br /&gt;IssueInstant=&amp;quot;2019-11-08T20:07:31.462Z&amp;quot; &lt;br /&gt;Version=&amp;quot;2.0&amp;quot;&lt;br /&gt;xmlns:saml2=&amp;quot;urn:oasis:names:tc:SAML:2.0:assertion&amp;quot;&lt;br /&gt;xmlns:samlp2=&amp;quot;urn:oasis:names:tc:SAML:2.0:protocol&amp;quot;&amp;gt;&lt;br /&gt;...&lt;/span&gt;&lt;/pre&gt;
&lt;h2&gt;&lt;span&gt;Action&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span&gt;Edit your Identity Provider&amp;#39;s settings or code to include the &lt;code&gt;InResponseTo&lt;/code&gt; attribute in the SAML response. The &lt;a href="https://docs.oasis-open.org/security/saml/v2.0/saml-core-2.0-os.pdf"&gt;SAML 2.0 specification&lt;/a&gt; requires that the IdP must send the ID of the incoming SAML request as the&amp;nbsp;&lt;code&gt;InResponseTo&lt;/code&gt;&amp;nbsp;attribute&amp;nbsp;when an ID is present in the original request:&lt;/span&gt;&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;&lt;span&gt;InResponseTo [Optional]&lt;br /&gt;&lt;/span&gt;&lt;span&gt;A reference to the identifier of the request to which the response corresponds, if any. If the response is not generated in response to a request, or if the ID attribute value of a request cannot be determined (for example, the request is malformed), then this attribute MUST NOT be present. Otherwise, it MUST be present and its value MUST match the value of the corresponding request&amp;#39;s ID attribute.&lt;/span&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;h2&gt;&lt;span&gt;Affected Versions&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span&gt;This article applies to Appian 7.11 and later.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;Last Reviewed: December 2019&lt;/span&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: embedded interfaces, administration, SAML, integration, authentication&lt;/div&gt;
</description></item><item><title>KB-XXXX SAML users are redirected to a Start Page instead of their destination upon first login</title><link>https://community.appian.com/support/w/kb/1626/kb-2043-saml-users-are-redirected-to-a-start-page-instead-of-their-destination-upon-first-login/revision/3</link><pubDate>Mon, 16 Dec 2019 14:50:06 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:b37bbfb4-3db6-4af5-8170-77dcb03556c6</guid><dc:creator>Jussi Lundstedt</dc:creator><comments>https://community.appian.com/support/w/kb/1626/kb-2043-saml-users-are-redirected-to-a-start-page-instead-of-their-destination-upon-first-login#comments</comments><description>Revision 3 posted to Appian Knowledge Base by Jussi Lundstedt on 12/16/2019 2:50:06 PM&lt;br /&gt;
&lt;h2&gt;Symptoms&lt;/h2&gt;
&lt;p&gt;After navigating to Appian via a link or through Embedded Interfaces and authenticating via SAML, the user is redirected to either the default or group-based User Start Page. When using Embedded Interfaces, the interface will not load and the following error will be seen in the browser console:&lt;/p&gt;
&lt;pre&gt;Refused to display &amp;#39;https://appian.example.com/suite/sites/my-start-site&amp;#39;&amp;nbsp;in a frame because it set &amp;#39;X-Frame-Options&amp;#39; to &amp;#39;sameorigin&amp;#39;&lt;/pre&gt;
&lt;p&gt;After the initial authentication is performed, links and Embedded Interfaces work as expected until the user&amp;#39;s session times out or the user logs out.&lt;/p&gt;
&lt;h2&gt;Cause&lt;/h2&gt;
&lt;p&gt;The SAML response received from the Identity Provider has a missing or invalid&amp;nbsp;&lt;code&gt;InResponseTo&lt;/code&gt; attribute. Rather than using RelayStates, Appian uses the ID of the original SAML request as a caching key and once the SAML authentication flow is complete, uses the &lt;code&gt;InResponseTo&lt;/code&gt; attribute contained in the SAML response to route the user to their target destination. If the attribute is not present or does not match the original SAML request&amp;#39;s ID, the user will be redirected to their start page instead of the intended destination.&lt;/p&gt;
&lt;h3&gt;Incorrect Response Example&lt;/h3&gt;
&lt;pre&gt;&lt;span&gt;&amp;lt;samlp2:Response &lt;br /&gt;Destination=&amp;quot;https://appian.example.com/suite/saml/AssertionConsumer&amp;quot; &lt;br /&gt;ID=&amp;quot;ResponseId_xxx&amp;quot; &lt;br /&gt;IssueInstant=&amp;quot;2019-11-08T20:07:31.462Z&amp;quot; &lt;br /&gt;Version=&amp;quot;2.0&amp;quot; &lt;br /&gt;xmlns:saml2=&amp;quot;urn:oasis:names:tc:SAML:2.0:assertion&amp;quot; &lt;br /&gt;xmlns:samlp2=&amp;quot;urn:oasis:names:tc:SAML:2.0:protocol&amp;quot;&amp;gt;&lt;br /&gt;...&lt;/span&gt;&lt;/pre&gt;
&lt;h3&gt;Correct Response&amp;nbsp;Example&lt;/h3&gt;
&lt;pre&gt;&lt;span&gt;&amp;lt;samlp2:Response &lt;br /&gt;&lt;/span&gt;&lt;span&gt;Destination=&amp;quot;https://appian.example.com/suite/saml/AssertionConsumer&amp;quot; &lt;br /&gt;ID=&amp;quot;ResponseId_xxx&amp;quot; &lt;br /&gt;InResponseTo=&amp;quot;_64d59940-e2a7-4378-a1cf-5f4eb133ca90&amp;quot; &lt;br /&gt;IssueInstant=&amp;quot;2019-11-08T20:07:31.462Z&amp;quot; &lt;br /&gt;Version=&amp;quot;2.0&amp;quot;&lt;br /&gt;xmlns:saml2=&amp;quot;urn:oasis:names:tc:SAML:2.0:assertion&amp;quot;&lt;br /&gt;xmlns:samlp2=&amp;quot;urn:oasis:names:tc:SAML:2.0:protocol&amp;quot;&amp;gt;&lt;br /&gt;...&lt;/span&gt;&lt;/pre&gt;
&lt;h2&gt;&lt;span&gt;Action&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span&gt;Edit your Identity Provider&amp;#39;s settings or code to include the &lt;code&gt;InResponseTo&lt;/code&gt; attribute in the SAML response. The &lt;a href="https://docs.oasis-open.org/security/saml/v2.0/saml-core-2.0-os.pdf"&gt;SAML 2.0 specification&lt;/a&gt; requires that the IdP must send the ID of the incoming SAML request as the&amp;nbsp;&lt;code&gt;InResponseTo&lt;/code&gt;&amp;nbsp;attribute&amp;nbsp;when an ID is present in the original request:&lt;/span&gt;&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;&lt;span&gt;InResponseTo [Optional]&lt;br /&gt;&lt;/span&gt;&lt;span&gt;A reference to the identifier of the request to which the response corresponds, if any. If the response is not generated in response to a request, or if the ID attribute value of a request cannot be determined (for example, the request is malformed), then this attribute MUST NOT be present. Otherwise, it MUST be present and its value MUST match the value of the corresponding request&amp;#39;s ID attribute.&lt;/span&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;h2&gt;&lt;span&gt;Affected Versions&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span&gt;This article applies to Appian 7.11 and later.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;Last Reviewed: December 2019&lt;/span&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: embedded interfaces, administration, SAML, integration, authentication&lt;/div&gt;
</description></item><item><title>KB-XXXX SAML users are redirected to a Start Page instead of their destination upon first login</title><link>https://community.appian.com/support/w/kb/1626/kb-2043-saml-users-are-redirected-to-a-start-page-instead-of-their-destination-upon-first-login/revision/2</link><pubDate>Mon, 16 Dec 2019 14:49:11 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:b37bbfb4-3db6-4af5-8170-77dcb03556c6</guid><dc:creator>Jussi Lundstedt</dc:creator><comments>https://community.appian.com/support/w/kb/1626/kb-2043-saml-users-are-redirected-to-a-start-page-instead-of-their-destination-upon-first-login#comments</comments><description>Revision 2 posted to Appian Knowledge Base by Jussi Lundstedt on 12/16/2019 2:49:11 PM&lt;br /&gt;
&lt;h2&gt;Symptoms&lt;/h2&gt;
&lt;p&gt;After navigating to Appian via a link or through Embedded Interfaces and authenticating via SAML, the user is redirected to either the default or group-based User Start Page. When using Embedded Interfaces, the interface will not load and the following error will be seen in the browser console:&lt;/p&gt;
&lt;pre&gt;Refused to display &amp;#39;https://appian.example.com/suite/sites/my-start-site&amp;#39;&amp;nbsp;in a frame because it set &amp;#39;X-Frame-Options&amp;#39; to &amp;#39;sameorigin&amp;#39;&lt;/pre&gt;
&lt;p&gt;After the initial authentication is performed, links and Embedded Interfaces work as expected until the user&amp;#39;s session times out or the user logs out.&lt;/p&gt;
&lt;h2&gt;Cause&lt;/h2&gt;
&lt;p&gt;The SAML response received from the Identity Provider has a missing or invalid&amp;nbsp;&lt;code&gt;InResponseTo&lt;/code&gt; attribute. Rather than using RelayStates, Appian uses the ID of the original SAML request as a caching key and once the SAML authentication flow is complete, uses the &lt;code&gt;InResponseTo&lt;/code&gt; attribute contained in the SAML response to route the user to their target destination. If the attribute is not present or does not match the original SAML request&amp;#39;s ID, the user will be redirected to their start page instead of the intended destination.&lt;/p&gt;
&lt;h3&gt;Incorrect Response Example&lt;/h3&gt;
&lt;pre&gt;&lt;span&gt;&amp;lt;samlp2:Response &lt;br /&gt;Destination=&amp;quot;https://appian.example.com/suite/saml/AssertionConsumer&amp;quot; &lt;br /&gt;ID=&amp;quot;ResponseId_xxx&amp;quot; &lt;br /&gt;IssueInstant=&amp;quot;2019-11-08T20:07:31.462Z&amp;quot; &lt;br /&gt;Version=&amp;quot;2.0&amp;quot; &lt;br /&gt;xmlns:saml2=&amp;quot;urn:oasis:names:tc:SAML:2.0:assertion&amp;quot; &lt;br /&gt;xmlns:samlp2=&amp;quot;urn:oasis:names:tc:SAML:2.0:protocol&amp;quot;&amp;gt;&lt;br /&gt;...&lt;/span&gt;&lt;/pre&gt;
&lt;h3&gt;Correct Response&amp;nbsp;Example&lt;/h3&gt;
&lt;pre&gt;&lt;span&gt;&amp;lt;samlp2:Response &lt;br /&gt;&lt;/span&gt;&lt;span&gt;Destination=&amp;quot;https://appian.example.com/suite/saml/AssertionConsumer&amp;quot; &lt;br /&gt;ID=&amp;quot;ResponseId_xxx&amp;quot; &lt;br /&gt;InResponseTo=&amp;quot;_64d59940-e2a7-4378-a1cf-5f4eb133ca90&amp;quot; &lt;br /&gt;IssueInstant=&amp;quot;2019-11-08T20:07:31.462Z&amp;quot; &lt;br /&gt;Version=&amp;quot;2.0&amp;quot;&lt;br /&gt;xmlns:saml2=&amp;quot;urn:oasis:names:tc:SAML:2.0:assertion&amp;quot;&lt;br /&gt;xmlns:samlp2=&amp;quot;urn:oasis:names:tc:SAML:2.0:protocol&amp;quot;&amp;gt;&lt;br /&gt;...&lt;/span&gt;&lt;/pre&gt;
&lt;h2&gt;&lt;span&gt;Action&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span&gt;Edit your Identity Provider&amp;#39;s settings or code to include the &lt;code&gt;InResponseTo&lt;/code&gt; attribute in the SAML response. The &lt;a href="https://docs.oasis-open.org/security/saml/v2.0/saml-core-2.0-os.pdf"&gt;SAML 2.0 specification&lt;/a&gt; requires that the IdP must send the ID of the incoming SAML request in the&amp;nbsp;&lt;code&gt;InResponseTo&lt;/code&gt; parameter when an ID is present in the request:&lt;/span&gt;&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;&lt;span&gt;InResponseTo [Optional]&lt;br /&gt;&lt;/span&gt;&lt;span&gt;A reference to the identifier of the request to which the response corresponds, if any. If the response is not generated in response to a request, or if the ID attribute value of a request cannot be determined (for example, the request is malformed), then this attribute MUST NOT be present. Otherwise, it MUST be present and its value MUST match the value of the corresponding request&amp;#39;s ID attribute.&lt;/span&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;h2&gt;&lt;span&gt;Affected Versions&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span&gt;This article applies to Appian 7.11 and later.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;Last Reviewed: December 2019&lt;/span&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: embedded interfaces, administration, SAML, integration, authentication&lt;/div&gt;
</description></item><item><title>KB-XXXX SAML users are redirected to a Start Page instead of their destination upon first login</title><link>https://community.appian.com/support/w/kb/1626/kb-2043-saml-users-are-redirected-to-a-start-page-instead-of-their-destination-upon-first-login/revision/1</link><pubDate>Mon, 16 Dec 2019 14:46:40 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:b37bbfb4-3db6-4af5-8170-77dcb03556c6</guid><dc:creator>Jussi Lundstedt</dc:creator><comments>https://community.appian.com/support/w/kb/1626/kb-2043-saml-users-are-redirected-to-a-start-page-instead-of-their-destination-upon-first-login#comments</comments><description>Revision 1 posted to Appian Knowledge Base by Jussi Lundstedt on 12/16/2019 2:46:40 PM&lt;br /&gt;
&lt;h2&gt;Symptoms&lt;/h2&gt;
&lt;p&gt;After navigating to Appian via a link or through Embedded Interfaces and authenticating via SAML, the user is redirected to either the default or group-based User Start Page. When using Embedded Interfaces, the interface will not load and the following error will be seen in the browser console:&lt;/p&gt;
&lt;pre&gt;Refused to display &amp;#39;https://appian.example.com/suite/sites/my-start-site&amp;#39;&amp;nbsp;in a frame because it set &amp;#39;X-Frame-Options&amp;#39; to &amp;#39;sameorigin&amp;#39;&lt;/pre&gt;
&lt;p&gt;After the initial authentication is performed, links and Embedded Interfaces work as expected until the user&amp;#39;s session times out or the user logs out.&lt;/p&gt;
&lt;h2&gt;Cause&lt;/h2&gt;
&lt;p&gt;The SAML response received from the Identity Provider does not contain the &lt;code&gt;InResponseTo&lt;/code&gt; attribute. Rather than using RelayStates, Appian uses the ID of the original SAML request as a caching key and once the SAML authentication flow is complete, uses the &lt;code&gt;InResponseTo&lt;/code&gt; attribute contained in the SAML response to route the user to their target destination. If the attribute is not present or does not match the original SAML request&amp;#39;s ID, the user will be redirected to their start page instead of the intended destination.&lt;/p&gt;
&lt;h3&gt;Incorrect Response Example&lt;/h3&gt;
&lt;pre&gt;&lt;span&gt;&amp;lt;samlp2:Response &lt;br /&gt;Destination=&amp;quot;https://appian.example.com/suite/saml/AssertionConsumer&amp;quot; &lt;br /&gt;ID=&amp;quot;ResponseId_xxx&amp;quot; &lt;br /&gt;IssueInstant=&amp;quot;2019-11-08T20:07:31.462Z&amp;quot; &lt;br /&gt;Version=&amp;quot;2.0&amp;quot; &lt;br /&gt;xmlns:saml2=&amp;quot;urn:oasis:names:tc:SAML:2.0:assertion&amp;quot; &lt;br /&gt;xmlns:samlp2=&amp;quot;urn:oasis:names:tc:SAML:2.0:protocol&amp;quot;&amp;gt;&lt;br /&gt;...&lt;/span&gt;&lt;/pre&gt;
&lt;h3&gt;Correct Response&amp;nbsp;Example&lt;/h3&gt;
&lt;pre&gt;&lt;span&gt;&amp;lt;samlp2:Response &lt;br /&gt;&lt;/span&gt;&lt;span&gt;Destination=&amp;quot;https://appian.example.com/suite/saml/AssertionConsumer&amp;quot; &lt;br /&gt;ID=&amp;quot;ResponseId_xxx&amp;quot; &lt;br /&gt;InResponseTo=&amp;quot;_64d59940-e2a7-4378-a1cf-5f4eb133ca90&amp;quot; &lt;br /&gt;IssueInstant=&amp;quot;2019-11-08T20:07:31.462Z&amp;quot; &lt;br /&gt;Version=&amp;quot;2.0&amp;quot;&lt;br /&gt;xmlns:saml2=&amp;quot;urn:oasis:names:tc:SAML:2.0:assertion&amp;quot;&lt;br /&gt;xmlns:samlp2=&amp;quot;urn:oasis:names:tc:SAML:2.0:protocol&amp;quot;&amp;gt;&lt;br /&gt;...&lt;/span&gt;&lt;/pre&gt;
&lt;h2&gt;&lt;span&gt;Action&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span&gt;Edit your Identity Provider&amp;#39;s settings or code to include the &lt;code&gt;InResponseTo&lt;/code&gt; attribute in the SAML response. The &lt;a href="https://docs.oasis-open.org/security/saml/v2.0/saml-core-2.0-os.pdf"&gt;SAML 2.0 specification&lt;/a&gt; requires that the IdP must send the ID of the incoming SAML request in the&amp;nbsp;&lt;code&gt;InResponseTo&lt;/code&gt; parameter when an ID is present in the request:&lt;/span&gt;&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;&lt;span&gt;InResponseTo [Optional]&lt;br /&gt;&lt;/span&gt;&lt;span&gt;A reference to the identifier of the request to which the response corresponds, if any. If the response is not generated in response to a request, or if the ID attribute value of a request cannot be determined (for example, the request is malformed), then this attribute MUST NOT be present. Otherwise, it MUST be present and its value MUST match the value of the corresponding request&amp;#39;s ID attribute.&lt;/span&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;h2&gt;&lt;span&gt;Affected Versions&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span&gt;This article applies to Appian 7.11 and later.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;Last Reviewed: December 2019&lt;/span&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: embedded interfaces, administration, SAML, integration, authentication&lt;/div&gt;
</description></item></channel></rss>