Skip to main content

How to Resolve SAML SSO Failures Due to Certificate Rollovers

This article explains how to quickly resolve SAML authentication errors caused by certificate rollovers or configuration changes

Updated over a week ago

Occasionally, SAML SSO integrations may fail after scheduled security maintenance—usually when the identity provider (IdP) rotates or updates their signing certificate, a standard best practice. When this happens, your users may see errors similar to:

⚠️ Invalid assertion. invalid signature: the signature value is incorrect

This indicates that your service (the Service Provider or SP) is no longer able to verify the signatures from your IdP, because it is using an outdated certificate. Resolving this typically requires refreshing the IdP’s connection settings.

How to Fix Certificate Rollover Errors in SAML SSO

. Identify the Problem

  • Confirm that users are experiencing SSO login failures and check for error messages about “invalid signatures” or “invalid assertion.”

  • Reach out to your IdP administrator or review any recent notification of certificate changes or upcoming maintenance.

Refresh or Update SAML Metadata

Most modern SAML IdPs provide a “metadata URL”—an XML document containing the current signing certificates and endpoints.

  • Locate the Metadata URL: Obtain the metadata URL from your identity provider (e.g., your ADFS admin, Microsoft Azure AD, Google Workspace, Okta, or Auth0 dashboard).

  • Refresh Metadata in Sleekplan:please contact Support in order to obtain a setup link to update the metada from you IdP :

Did this answer your question?