Test connection of newly configuring IDP shows the Error: SAML2ValidationError: Unable to locate SAML 2.0 certificate if x509_certificate is not setDescription<!-- div.margin{ padding: 10px 40px 40px 30px; } table.tocTable{ border: 1px solid; border-color:#E0E0E0; background-color: rgb(245, 245, 245); padding-top: .6em; padding-bottom: .6em; padding-left: .9em; padding-right: .6em; } table.noteTable{ border:1px solid; border-color:#E0E0E0; background-color: rgb(245, 245, 245); width: 100%; border-spacing:2; } table.internaltable { white-space:nowrap; text-align:left; border-width: 1px; border-collapse: collapse; font-size:14px; width: 85%; } table.internaltable th { border-width: 1px; padding: 5px; border-style: solid; border-color: rgb(245, 245, 245); background-color: rgb(245, 245, 245); } table.internaltable td { border-width: 1px; padding: 5px; border-style: solid; border-color: #E0E0E0; color: #000000; } .title { color: #D1232B; font-weight:normal; font-size:28px; } h1{ color: #D1232B; font-weight:normal; font-size:21px; margin-bottom:-5px } h2{ color: #646464; font-weight:bold; font-size:18px; } h3{ color: #000000; font-weight:BOLD; font-size:16px; text-decoration:underline; } h4{ color: #646464; font-weight:BOLD; font-size:15px; text-decoration:; } h5{ color: #000000; font-weight:BOLD; font-size:13px; text-decoration:; } h6{ color: #000000; font-weight:BOLD; font-size:14px; text-decoration:; } ul{ list-style: disc outside none; margin-left: 0; } li { padding-left: 1em; } --> Symptoms 1. Setting up a new ADFS IDP with x-509 signing certificate is mapped, showing the error: 01/16/19 15:37:26 (544) SAML assertion is not encrypted.01/16/19 15:37:26 (546) SAML2ValidationError: Unable to locate SAML 2.0 certificate.01/16/19 15:37:26 (547) Could not validate SAMLResponse You need to enable debug logging for the multiple provider SSO integration to validate the problem.Then perform a "Test connection" on the IdP record.Check for the SAML response from the System LOG and verify IDP is mapped with the required certificate. 2. In the IDP form, the certificate is properly setup Cause Even the certificate has added in the related list of IDP records, it has not attached to the IDP record properly in the XML view of the record Resolution To avoid the problem please: Login as administrator.Open the IdP recordRight click on the top bar and select "export XML" on the IdP recordIf the XML output has the value like this:<x509_certificate/> You may need to add the Certificate display name and sys_id and upload the XML back<x509_certificate display_value="name_of_the_certificate_defined">sys_id_of the_certificate</x509_certificate>eg:- <x509_certificate display_value="Microsoft signing certificate">1e762253db3def00a67ed790cf96192f</x509_certificate>Do the test again. Note: You need to enable debug logging for the multiple provider SSO integration to validate the problem.