Trending Issue: Group claim validation fails in SPSE when editing a Secure Store Target Application after September 2025 CU

To enhance security the encryption algorithm used by the secure store service to save credentials has been update to a more secure version.
As a side effect credentials stored with the old algorithm can no longer be decrypted.

Symptoms

When trying to edit an existing target application or when trying to add/update credentials the following error will occur:

In the ULS will find a similar errors:

09/25/2025 16:04:49.20  w3wp.exe (0x3F68)    0x2604  Secure Store Service    Secure Store    efk7    High    GetApplicationClaims failed with the following exception: System.ServiceModel.FaultException`1[Microsoft.Office.SecureStoreService.Server.SecureStoreServiceFault]: Group claim validation failed. (Fault Detail is equal to Microsoft.Office.SecureStoreService.Server.SecureStoreServiceFault).       db35c9a1-92b5-100f-8b1a-befa4df36f07

09/25/2025 16:04:49.29  w3wp.exe (0x3F68)    0x0784  Secure Store Service    Secure Store    d4gq    Unexpected    Decrypt Failed:System.Security.Cryptography.CryptographicException: Padding is invalid and cannot be removed.     at System.Security.Cryptography.CapiSymmetricAlgorithm.DepadBlock(Byte[] block, Int32 offset, Int32 count)     at System.Security.Cryptography.CapiSymmetricAlgorithm.TransformFinalBlock(Byte[] inputBuffer, Int32 inputOffset, Int32 inputCount)     at System.Security.Cryptography.CryptoStream.FlushFinalBlock()     at System.Security.Cryptography.CryptoStream.Dispose(Boolean disposing)     at System.IO.Stream.Close()     at Microsoft.Office.SecureStoreService.Server.DotNetSecureStoreCryptoProvider.DecryptInternal(Byte[] crypt, Byte[] secureKey, Byte[]& decryptedData)  2894c8a1-b089-a032-1955-28aec15a115b

09/25/2025 16:04:49.29  w3wp.exe (0x3F68)    0x0784  SharePoint Foundation   Runtime    tkau    Unexpected      Microsoft.Office.SecureStoreService.Server.SecureStoreServiceException: Group claim validation failed.    at Microsoft.Office.SecureStoreService.Server.SecureStoreServiceApplicationProxy.Execute[T](String operationName, Boolean validateCanary, ExecuteDelegate`1 operation)     at Microsoft.Office.SecureStoreService.Server.SecureStoreServiceApplicationProxy.GetApplicationClaims(Guid rawPartitionId, String applicationId)     at Microsoft.Office.SecureStoreService.Server.SecureStoreServiceApplicationProxy.GetApplicationClaims(String applicationId)     at Microsoft.Office.SharePoint.ClientExtensions.SecureStoreAdministration.ManageTargetApplicationInstance.OnLoad(EventArgs e)     at System.Web.UI.Control.LoadRecursive()     at System.Web.UI.Page.ProcessRequestMain(Boolean includeStagesBeforeAsyncPoint, Boolean includeStagesAfterAsyncPoint)  db35c9a1-92b5-100f-8b1a-befa4df36f07

Solution

My colleague Stuart Presley from the US has analyzed this issue and sent it to engineering to investigate a possible code change for a less disruptive solution for this issue.

To mitigate the issue in the current build, it is necessary to delete and recreate the affected Target Application in the Secure Store Service Application, using the same settings as originally configured.

16 Comments


  1. That worked for us – we just re-entered the credentials for each affected Secure Store Target Application, and it started working. Thank you so much.

    Reply

    1. Hi Ian,
      thanks a lot for the confirmation!
      🙂
      Cheers,
      Stefan

      Reply

  2. Hi Stefan,
    After my DEV SP SE farm was updated to September 2025 CU I was not able to access
    _admin/sssvc/ManageSSSvcApplication.aspx?
    until i bound the server (machine) certificate to ‘SharePoint Web Services’ web app HTTPS protocol, port 32844.
    It sems like besides the encryption algorithm, Microsoft has changed something else in Secure Store Service behavior.
    I have 3 other SP SE farms that are on August 2025 CU patch level and
    _admin/sssvc/ManageSSSvcApplication.aspx?
    is accessible on each of them without any specific certificate bindings.
    Is it just some odds that are specific to my farm, or there has really been some more changes to secure store service than just encryption algorithm?

    Reply

    1. Hi Yuriy,
      do you mean that before you were able to access it without HTTPS (pure HTTP) and now it is required to access it with HTTPS?
      Cheers,
      Stefan

      Reply

  3. What if we don’t have the target app credentials? Is there anyway to retrieve?

    Reply

    1. Hi Iam,
      unfortunately not. The information is encrypted and cannot be retrieved without the proper key.
      Cheers,
      Stefan

      Reply

  4. Hello, I am also facing issues about the Secure store service and it shows group claim validation failed. I am not able to edit any existing target application in SSS. This issue started after implementation of SEP 2025 CU on SP SE env. I cant set credentials for the existing target application. What could be the process if we need to recreate the same target application, do we need to update in BCS also.

    Reply

    1. Hi Goraksh,
      if you recreate them with identical settings as before, then there is no additional step required.
      Cheers,
      Stefan

      Reply

  5. Hi Stefan,

    Thank you for your help as always. Do you expect this issue to be resolved in the October 2025 patches?

    Thanks so much!

    Pat

    Reply

    1. Hi Pat,
      no, this will not be addressed in October 2025 CU.
      Cheers,
      Stefan

      Reply

      1. Thank you for the additional information Stefan. Do you expect a less disruptive solution for this issue soon? We do not have access to some older credentials and therefore cannot recreate them and are unsure of how to proceed.

        Reply

        1. Hi Pat,
          the discussion on this is still ongoing.
          If this is an issue for you and the workaround is not acceptable I would recommend to open a support ticket.
          The more tickets we have, the higher the chance for such a solution.
          Cheers,
          Stefan

          Reply

  6. This issue just impacted me this weekend when changing passwords, which we do on a routine basis. Recreating the Target Application took care of it.

    Reply

  7. Hi Stefan, has this problem been fixed in the current CU? Best regards, Reto

    Reply

    1. Hi Reto,
      no a fix is not available.
      The workaround is to recreate the Target Applications.
      Cheers,
      Stefan

      Reply

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.