ADFS Sample application
This application uses OWIN and Microsoft Katana for authentication purposes.
Log on
By accessing a page that requires authorization or clicking on Login in the top right you can login to the web application.
Login »
View My Claims
You can view claims for yourself here. If you have not logged in this should log you in as well.
View Claims »
Log off
You can logout and reset your Authentication cookie here.
Log Off »
Implementer Notes
If you are using IIS Express Ensure the following.
- The IIS Express Self Signed Certificate is available in your machine's personal AND trusted store
- That IIS Express is using the self signed certificate
- From command prompt: C:\program Files (x86)\IIS Express\IisExpressAdminCmd.exe setupssl -url:https://urlToYourSite.com:portnumber/ -UseSelfSigned
- From Visual studio set the project web property to the https://urlToYourSite.com:portnumber/
- From Visual studio set the project property to use SSL = true
Always Ensure the following
- The ADFS team must setup relying party trust for your application urls and ports.
- The ADFS Certificate in your machine's trusted certificate store
- Ensure the proper relying trusts have been added to ADFS on the server, for development you may need a localhost and custom port entry.
- Ensure ADFS has the proper Claim Rules
- Ensure web.config has the proper information.
- This was tested with both internal and external ADFS Authentication policies configured for Forms Authentication
Your current web application settings for ADFS configured in the web.config indicate:
MetadataAddress = https://wkis.qss.wko.at/FederationMetadata/2007-06/FederationMetadata.xml
Wtrealm = https://wko.at/applications/trainerportal/
Wreply = https://qss.trainerportal.at/