Troubleshooting SSO
Troubleshooting SSO connectivity to Currents
Please follow the steps below to help collect information when you have issues with using SSO connection:
Open the latest Chrome browser
Navigate to https://app.currents.dev/login
Open Chrome Developer Tools (View > Developer > Developer Tools)
Switch to Network Tab (1) and make sure that Network Recording is active (the recording button is red) (2)

Enter your email into the Email field, then click "Continue" - you will be forwarded to your organization's Identity Service Provider login screen
Enter your credentials, you will be forwarded to currents.dev domain
Upon seeing an error message, please capture the screenshot
Save the recorded network requests log (HAR) by clicking the "Export HAR..." button in Chrome Developer Tools

Share the screenshot and the generated HAR file with our Support team
Invalid ProviderName/Username Combination
This error occurs when Currents cannot match the SAML response to a valid user account:
Common Causes
NameID uses an opaque identifier instead of email
Some IdPs (notably Azure AD / Entra ID) default to sending an opaque persistent identifier (e.g., Object ID) as the
NameIDvalue. Currents requires theNameIDto be the user's email address, not an opaque ID.NameID and identifier claim mismatch
The
identifierSAML attribute must contain the exact same value asNameID. IfNameIDis set to one value (e.g., an opaque ID) whileidentifiercontains the email, authentication will fail.Case-sensitive email values
If
NameIDoridentifiercontains uppercase characters (e.g.,[email protected]), it may not match existing Currents accounts which use lowercase emails.
Resolution
Ensure your IdP is configured to:
Set
NameIDto the user's email address (not an opaque identifier)Apply a lowercase transformation to
NameIDSet the
identifierclaim to the same lowercase email value
For Azure AD / Entra ID:
See Azure AD / Entra ID for detailed configuration steps, including how to apply the ToLowercase() transformation to claims.
For other IdPs:
Use Microsoft Enterprise Apps transformation for Entra ID
Consult your IdP's documentation for claim transformation options
Encrypted Assertion Errors
If your IdP is configured to encrypt SAML assertions, you may encounter errors during authentication. Currents supports encrypted assertions, but the encryption must be properly configured.
Symptoms
Authentication fails silently after IdP login
Error messages referencing encryption or decryption failures
SAML response appears valid in IdP logs but Currents rejects it
Resolution
Verify your IdP is using a supported encryption algorithm
Ensure the encryption certificate matches what Currents expects
Contact Currents support with your metadata XML to verify encryption configuration
If you continue to experience issues, you can temporarily disable assertion encryption in your IdP to isolate the problem.
Last updated
Was this helpful?