ADFS Sample application

This application uses OWIN and Microsoft Katana for authentication purposes.

Log on

By accessing a page that requires authorization or clicking on Login in the top right you can login to the web application.

Login »

View My Claims

You can view claims for yourself here. If you have not logged in this should log you in as well.

View Claims »

Log off

You can logout and reset your Authentication cookie here.

Log Off »

Implementer Notes

If you are using IIS Express Ensure the following.
  • The IIS Express Self Signed Certificate is available in your machine's personal AND trusted store
  • That IIS Express is using the self signed certificate
    • From command prompt: C:\program Files (x86)\IIS Express\IisExpressAdminCmd.exe setupssl -url:https://urlToYourSite.com:portnumber/ -UseSelfSigned
    • From Visual studio set the project web property to the https://urlToYourSite.com:portnumber/
    • From Visual studio set the project property to use SSL = true
Always Ensure the following
  • The ADFS team must setup relying party trust for your application urls and ports.
  • The ADFS Certificate in your machine's trusted certificate store
  • Ensure the proper relying trusts have been added to ADFS on the server, for development you may need a localhost and custom port entry.
  • Ensure ADFS has the proper Claim Rules
  • Ensure web.config has the proper information.
  • This was tested with both internal and external ADFS Authentication policies configured for Forms Authentication
Your current web application settings for ADFS configured in the web.config indicate:
MetadataAddress = https://wkis.qss.wko.at/FederationMetadata/2007-06/FederationMetadata.xml
Wtrealm = https://wko.at/applications/trainerportal/
Wreply = https://qss.trainerportal.at/