Skip to content
  • Get started
  • Guides

Common errors and codes

Depending on the complexity of your authentication setup, you or your users may occasionally encounter errors.

Here are some common error codes and troubleshooting steps.

Sorry we don’t see way to authenticate you

Link to this section

This error message typically appears when there’s an issue with your authentication configuration or token handling. A few common causes include:

  • Expired or invalid tokens
  • Misconfigured authentication settings
  • Session management issues
  • Incorrect callback URLs

State not found

Link to this section

The State not found error typically occurs when there’s a mismatch between your environment variables and the domain you’re using during authentication. There may be a trailing space or incorrect syntax.

JWKS endpoint returning 403

Link to this section

A 403 Forbidden response from the JWKS endpoint (/.well-known/jwks) means the request was rejected before the public keys could be returned. Common causes include:

  • Wrong domain or subdomain - Ensure you are fetching the JWKS endpoint from your correct Kinde domain (e.g. https://your-business.kinde.com/.well-known/jwks). A typo or incorrect region subdomain will result in a 403.
  • Unexpected credentials in the request - The JWKS endpoint is public and does not require authentication. Sending unexpected or invalid credentials (e.g. an expired client secret or an Authorization header) can cause the request to be rejected. Remove any authorization headers from JWKS fetch requests.
  • CORS misconfiguration - Browser-based applications that fetch JWKS directly may hit CORS restrictions. Perform the JWKS fetch server-side where possible, or verify that your origin is permitted in your Kinde application settings.
  • IP allowlist or firewall rules - If your environment or network applies IP restrictions, check that outbound requests to your Kinde domain are not being blocked before they reach the endpoint.

Verification code not received (email)

Link to this section

Verification codes are sent almost immediately when triggered. If a code is not received, it might be because:

  • Junk/spam folders​ - Email providers and devices may treat OTPs from unknown providers like Kinde as spam. Check your own spam folder, or ask your IT team if emails from Kinde are quarantined by firewalls or other IT defence systems.
  • Gmail delays​ - Google Workspace addresses can experience ~4-minute-delays due to pre-delivery scanning
  • Microsoft Defender filters​ - Aggressive anti-spam filters sometimes quarantine verification emails for Outlook/Hotmail users

If none of the above help troubleshoot the issue, contact Kinde support.

Verification code not received (mobile device)

Link to this section

Verification codes are sent almost immediately when triggered. If a code is not received, it might be because:

  • Network connectivity problems or poor signal strength
  • Carrier-level spam filtering blocking OTP messages
  • SMS delivery delays during peak usage times
  • Full storage preventing new messages from being received
  • Phone numbers in certain countries do sometimes experience issues. Contact us if you think this might be the case.

We recommend using Twilio, a third-party SMS provider instead of Kinde’s default service. This makes troubleshooting issues and accessing logs much easier.

Email verification error code 123f11e6453744da8069f1a6d65247ba

Link to this section

Description

  • This code can appear in the verification link inside a Kinde email verification email

Troubleshooting

  • Verification links are time-limited. If the link has expired, request a new verification email and use it promptly
  • Make sure the link is opened in the same browser and session in which the verification was requested
  • If the error persists after requesting a fresh link, contact Kinde support with the full error code and the email address being verified

Error code 578

Link to this section

Description

  • Error coming back to Kinde while validating SAML response

Troubleshooting

  • Check that the Assertion Consumer Service (ACS) URL is correct on the identity provider

Error code 780

Link to this section

Description

  • The OAuth 2.0 response failed
  • The token is valid, but the redirect is null

Error code 928

Link to this section

Description

  • Error getting or reading the connected app configuration

Error code 1004

Link to this section

Description

  • Error getting custom SAML config while initializing SAML redirect

Error code 1656

Link to this section

Description

  • Error with authorization response
  • The request is missing a required parameter, includes an invalid parameter value, includes a parameter more than once, or is otherwise malformed

Troubleshooting

  • Missing nonce on implicit flow
  • Redirect URI might not be with an https
  • Only a localhost suffix can be used with http
  • Error with workflow

Error code 1706

Link to this section

Description

  • Post-authentication workflow failed to complete and the policy is set to stop

    Example:

    postUserAuthWorkflow.ts
    export const workflowSettings = {
    bindings: {"kinde.env": {}, "kinde.fetch": {}, url: {}},
    failurePolicy: {action: "stop"},
    id: "hubspotSync",
    name: "HubSpot sync",
    trigger: "user:post_authentication"
    };

Troubleshooting

  • Review the post-authentication workflow configuration for missing data references, inactive integrations, or misconfigured conditions
  • Disable non-essential workflow steps one at a time and retry login to isolate the failing step
  • If you need to unblock users while investigating, change the policy setting from stop to warn or allow
  • If the workflow was recently modified, restore the previous version using the version history in the workflow settings

Error code 1829

Link to this section

Description

  • Error exchanging token on connected app callback

Troubleshooting

  • Check the redirect URLs for a mismatch
  • Check the client credentials

Error code 1959

Link to this section

Description

  • Error decoding SAML response
  • Response contains invalid characters for Base64 response

Error code 2201

Link to this section

Description

Troubleshooting

  • The workflow is intentionally blocking the user based on a matched condition — this is not a workflow error
  • Review the post-authentication workflow conditions to identify which rule is triggering the denial and update it if needed

Error code 3005

Link to this section

Description

  • Cannot handle SAML callback
  • The userProfile contains invalid values

Error code 3420

Link to this section

Description

  • OAuth 2.0 response failed because token is invalid and redirect ID is null

Error code 4179

Link to this section

Description

  • Handle Social OAuth 2.0 callback - error exchanging token
  • Expired secrets for social provider

Troubleshooting

  • Check the secret being used with your social provider and ensure that it hasn’t expired

Error code 4617

Link to this section

Description

  • Error reading config on OAuth 2.0 callback

Troubleshooting

  • Check that the client credentials in both Kinde and IDP are correct
  • Check that the redirect and callback URLs in both Kinde and IDP are correct

Error code 5716

Link to this section

Description

  • OAuth 2.0 response failed due to an invalid token
  • Redirection was successful

Error code 6722

Link to this section

Description

  • Error configuring SAML provider This error can appear if IdP-initiated SSO is attempted but not properly configured. Kinde supports both SP-initiated (default) and IdP-initiated SSO flows. If you need IdP-initiated SSO, ensure it’s properly configured. See IdP-initiated SAML SSO for setup instructions.

Troubleshooting

  • Check that the settings in the Kinde enterprise connection are correct
  • Check enterprise connection metadata URL, entity ID, certificate
  • If using IdP-initiated SSO, verify the IdP is configured to send assertions to the correct ACS URL

Error code 7558

Link to this section

Description

  • SAML callback tokenInfo returned invalid data

Error code 8030

Link to this section

Description

  • Error configuring SAML provider on redirect

Troubleshooting

  • Check the enterprise connection metadata URL
  • Check that the IDP has the correct ACS URL

Error code 8809

Link to this section

Description:

  • Received browser trust token is different from the one stored in the login session

Troubleshooting

  • Start the auth flow again from the sign in or log in button
  • The user is trying to start a session in a new tab, browser, or device when there’s already a partially completed session in progress
  • The user may have bookmarked the auth page when it’s partially completed, instead of bookmarking the initial sign in or log in page

Error code 9055

Link to this section

Description

  • Error getting custom SAML provider configuration
  • RelayState is invalid or doesn’t exist

Troubleshooting

  • Check the SAML callback URL
  • Check the entity ID
  • Check that the SAML IDP is returning a valid RelayState

Error code 9364

Link to this section

Description

  • Error getting authentication request while initializing SAML redirect

Troubleshooting

  • Check the enterprise connection private key, certificate, and signature method

Error code 9697

Link to this section

Description

  • Disposable email detected while authenticating a user on sign up in a workflow

Error code 9881

Link to this section

Description

  • Error storing tokens with connected app

Troubleshooting

  • Check the refresh token is valid