ADFS Claim Rules Not Returning Any Details The Next CEO of Stack OverflowADFS v.2.0 transitive trust in a federation scenarioIssue multiple claims in a single ruleConfiguring ADFS to pass SID as claimHow to get Subject from client certificate issued as a claim in ADFS?List of well known Claim TypeADFS 2.0 E-mail address claim transformationHow do I configure ADFS to be an Issue Provider and return an e-mail claim?Limit One Domain in a two-way Trust for ADFS 2.0How can I remove or delete an outgoing claim in AD FS?ADFS 2016 Not Returning XML Unless Localhost
WOW air has ceased operation, can I get my tickets refunded?
Is a distribution that is normal, but highly skewed considered Gaussian?
Is it professional to write unrelated content in an almost-empty email?
Is it okay to majorly distort historical facts while writing a fiction story?
How to check if all elements of 1 list are in the *same quantity* and in any order, in the list2?
The exact meaning of 'Mom made me a sandwich'
Writing differences on a blackboard
Is the D&D universe the same as the Forgotten Realms universe?
Why the difference in type-inference over the as-pattern in two similar function definitions?
"misplaced omit" error when >centering columns
Should I tutor a student who I know has cheated on their homework?
What did we know about the Kessel run before the prequels?
Why, when going from special to general relativity, do we just replace partial derivatives with covariant derivatives?
Does increasing your ability score affect your main stat?
Make solar eclipses exceedingly rare, but still have new moons
Where does this common spurious transmission come from? Is there a quality difference?
Why doesn't UK go for the same deal Japan has with EU to resolve Brexit?
What happened in Rome, when the western empire "fell"?
Can we say or write : "No, it'sn't"?
Can MTA send mail via a relay without being told so?
How to prove a simple equation?
Why didn't Khan get resurrected in the Genesis Explosion?
Won the lottery - how do I keep the money?
Can you be charged for obstruction for refusing to answer questions?
ADFS Claim Rules Not Returning Any Details
The Next CEO of Stack OverflowADFS v.2.0 transitive trust in a federation scenarioIssue multiple claims in a single ruleConfiguring ADFS to pass SID as claimHow to get Subject from client certificate issued as a claim in ADFS?List of well known Claim TypeADFS 2.0 E-mail address claim transformationHow do I configure ADFS to be an Issue Provider and return an e-mail claim?Limit One Domain in a two-way Trust for ADFS 2.0How can I remove or delete an outgoing claim in AD FS?ADFS 2016 Not Returning XML Unless Localhost
I have ADFS 3.0 set up and any user in the domain can login to my site (authentication was done previously with LDAP). I set up some claim rules so that I can get the user's name, email address, and the groups the member is in. When I was using LDAP I was able to get all of this information. I am using a SAML Chrome Panel to view the SAML Responses. None of the information that I set up in the claim rules are showing up in the response. Here is an example response(some of the data has been changed for security):
<samlp:Response Consent="urn:oasis:names:tc:SAML:2.0:consent:unspecified"
Destination="https://ssotest.trknow.local:8443/sammy/saml/SSO"
ID="_alphanumeric" IssueInstant="2019-03-29T13:52:09.586Z" Version="2.0"
xmlns:samlp="urn:oasis:names:tc:SAML:2.0:protocol">
<Issuer xmlns="urn:oasis:names:tc:SAML:2.0:assertion">http://federation.trknow.com/adfs/services/trust</Issuer>
<samlp:Status><samlp:StatusCode Value="urn:oasis:names:tc:SAML:2.0:status:Success"/></samlp:Status>
<EncryptedAssertion xmlns="urn:oasis:names:tc:SAML:2.0:assertion">
<xenc:EncryptedData Type="http://www.w3.org/2001/04/xmlenc#Element"
xmlns:xenc="http://www.w3.org/2001/04/xmlenc#"><xenc:EncryptionMethod Algorithm="http://www.w3.org/2001/04/xmlenc#aes256-cbc"/>
<KeyInfo xmlns="http://www.w3.org/2000/09/xmldsig#">
<e:EncryptedKey xmlns:e="http://www.w3.org/2001/04/xmlenc#">
<e:EncryptionMethod Algorithm="http://www.w3.org/2001/04/xmlenc#rsa-oaep-mgf1p"><DigestMethod Algorithm="http://www.w3.org/2000/09/xmldsig#sha1"/></e:EncryptionMethod>
<KeyInfo>
<ds:X509Data xmlns:ds="http://www.w3.org/2000/09/xmldsig#">
<ds:X509IssuerSerial>
<ds:X509IssuerName>CN=trknow-VERIFY-CA, DC=trknow, DC=local</ds:X509IssuerName>
<ds:X509SerialNumber>serial_number</ds:X509SerialNumber>
</ds:X509IssuerSerial>
</ds:X509Data>
</KeyInfo>
<e:CipherData>
<e:CipherValue>ciphervalidi/A==</e:CipherValue>
</e:CipherData>
</e:EncryptedKey>
</KeyInfo>
<xenc:CipherData>
<xenc:CipherValue>*truncated*sva2kFMnlfrnfF4Zxd2XRCg6UW4cjrEqpjlR1oaqZrc3EwTAaaHh9Ta7U7T27Q8iPNBq9VRjjW5RcE8mrRCCGThXpeAcEkF5cw9BZ+JCz2QVEpb4Ul6iJVybe1lwA9uaEBimebH+c1hBM9vo3SOAQ=</xenc:CipherValue>
</xenc:CipherData>
</xenc:EncryptedData>
</EncryptedAssertion>
</samlp:Response>
You can see no details provided. Now here are my claim rules:
First a snapshot and then the rule language underneath:
Click for Picture of Claims: overview
1) Email2Email
c:[Type == "http://schemas.microsoft.com/ws/2008/06/identity/claims/windowsaccountname", Issuer == "AD AUTHORITY"]
=> issue(store = "Active Directory", types = ("http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddress"), query = ";mail;0", param = c.Value);
2) Email2NameID
c:[Type == "http://schemas.microsoft.com/ws/2008/06/identity/claims/windowsaccountname", Issuer == "AD AUTHORITY"]
=> issue(store = "Active Directory", types = ("http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameidentifier"), query = ";mail;0", param = c.Value);
3) Full Name
c:[Type == "http://schemas.microsoft.com/ws/2008/06/identity/claims/windowsaccountname", Issuer == "AD AUTHORITY"]
=> issue(store = "Active Directory", types = ("http://schemas.xmlsoap.org/ws/2005/05/identity/claims/surname", "http://schemas.xmlsoap.org/ws/2005/05/identity/claims/givenname"), query = ";sn,givenName;0", param = c.Value);
4) memberOfGroup
c:[Type == "http://schemas.microsoft.com/ws/2008/06/identity/claims/windowsaccountname", Issuer == "AD AUTHORITY"]
=> issue(store = "Active Directory", types = ("http://schemas.xmlsoap.org/claims/Group"), query = ";memberOf;0", param = c.Value);
5) Group SID
c:[Type == "http://schemas.microsoft.com/ws/2008/06/identity/claims/groupsid"]
=> issue(claim = c);
Here is my LDAP search and filter criteria. Trying to mirror this with ADFS claim rules:
managerDn = 'CN=Site LDAP Service Account,CN=Managed Service Accounts,DC=trk,DC=trknow,DC=com'
managerPassword = 'password'
server = 'ldap://tstrodc01.trk.trknow.com:389'
groupSearchBase = 'ou=Stations,dc=trk,dc=trknow,dc=com'
search.base = 'dc=trk,dc=trknow,dc=com'
search.filter= '(sAMAccountName=0)'
ldap adfs saml
New contributor
add a comment |
I have ADFS 3.0 set up and any user in the domain can login to my site (authentication was done previously with LDAP). I set up some claim rules so that I can get the user's name, email address, and the groups the member is in. When I was using LDAP I was able to get all of this information. I am using a SAML Chrome Panel to view the SAML Responses. None of the information that I set up in the claim rules are showing up in the response. Here is an example response(some of the data has been changed for security):
<samlp:Response Consent="urn:oasis:names:tc:SAML:2.0:consent:unspecified"
Destination="https://ssotest.trknow.local:8443/sammy/saml/SSO"
ID="_alphanumeric" IssueInstant="2019-03-29T13:52:09.586Z" Version="2.0"
xmlns:samlp="urn:oasis:names:tc:SAML:2.0:protocol">
<Issuer xmlns="urn:oasis:names:tc:SAML:2.0:assertion">http://federation.trknow.com/adfs/services/trust</Issuer>
<samlp:Status><samlp:StatusCode Value="urn:oasis:names:tc:SAML:2.0:status:Success"/></samlp:Status>
<EncryptedAssertion xmlns="urn:oasis:names:tc:SAML:2.0:assertion">
<xenc:EncryptedData Type="http://www.w3.org/2001/04/xmlenc#Element"
xmlns:xenc="http://www.w3.org/2001/04/xmlenc#"><xenc:EncryptionMethod Algorithm="http://www.w3.org/2001/04/xmlenc#aes256-cbc"/>
<KeyInfo xmlns="http://www.w3.org/2000/09/xmldsig#">
<e:EncryptedKey xmlns:e="http://www.w3.org/2001/04/xmlenc#">
<e:EncryptionMethod Algorithm="http://www.w3.org/2001/04/xmlenc#rsa-oaep-mgf1p"><DigestMethod Algorithm="http://www.w3.org/2000/09/xmldsig#sha1"/></e:EncryptionMethod>
<KeyInfo>
<ds:X509Data xmlns:ds="http://www.w3.org/2000/09/xmldsig#">
<ds:X509IssuerSerial>
<ds:X509IssuerName>CN=trknow-VERIFY-CA, DC=trknow, DC=local</ds:X509IssuerName>
<ds:X509SerialNumber>serial_number</ds:X509SerialNumber>
</ds:X509IssuerSerial>
</ds:X509Data>
</KeyInfo>
<e:CipherData>
<e:CipherValue>ciphervalidi/A==</e:CipherValue>
</e:CipherData>
</e:EncryptedKey>
</KeyInfo>
<xenc:CipherData>
<xenc:CipherValue>*truncated*sva2kFMnlfrnfF4Zxd2XRCg6UW4cjrEqpjlR1oaqZrc3EwTAaaHh9Ta7U7T27Q8iPNBq9VRjjW5RcE8mrRCCGThXpeAcEkF5cw9BZ+JCz2QVEpb4Ul6iJVybe1lwA9uaEBimebH+c1hBM9vo3SOAQ=</xenc:CipherValue>
</xenc:CipherData>
</xenc:EncryptedData>
</EncryptedAssertion>
</samlp:Response>
You can see no details provided. Now here are my claim rules:
First a snapshot and then the rule language underneath:
Click for Picture of Claims: overview
1) Email2Email
c:[Type == "http://schemas.microsoft.com/ws/2008/06/identity/claims/windowsaccountname", Issuer == "AD AUTHORITY"]
=> issue(store = "Active Directory", types = ("http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddress"), query = ";mail;0", param = c.Value);
2) Email2NameID
c:[Type == "http://schemas.microsoft.com/ws/2008/06/identity/claims/windowsaccountname", Issuer == "AD AUTHORITY"]
=> issue(store = "Active Directory", types = ("http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameidentifier"), query = ";mail;0", param = c.Value);
3) Full Name
c:[Type == "http://schemas.microsoft.com/ws/2008/06/identity/claims/windowsaccountname", Issuer == "AD AUTHORITY"]
=> issue(store = "Active Directory", types = ("http://schemas.xmlsoap.org/ws/2005/05/identity/claims/surname", "http://schemas.xmlsoap.org/ws/2005/05/identity/claims/givenname"), query = ";sn,givenName;0", param = c.Value);
4) memberOfGroup
c:[Type == "http://schemas.microsoft.com/ws/2008/06/identity/claims/windowsaccountname", Issuer == "AD AUTHORITY"]
=> issue(store = "Active Directory", types = ("http://schemas.xmlsoap.org/claims/Group"), query = ";memberOf;0", param = c.Value);
5) Group SID
c:[Type == "http://schemas.microsoft.com/ws/2008/06/identity/claims/groupsid"]
=> issue(claim = c);
Here is my LDAP search and filter criteria. Trying to mirror this with ADFS claim rules:
managerDn = 'CN=Site LDAP Service Account,CN=Managed Service Accounts,DC=trk,DC=trknow,DC=com'
managerPassword = 'password'
server = 'ldap://tstrodc01.trk.trknow.com:389'
groupSearchBase = 'ou=Stations,dc=trk,dc=trknow,dc=com'
search.base = 'dc=trk,dc=trknow,dc=com'
search.filter= '(sAMAccountName=0)'
ldap adfs saml
New contributor
add a comment |
I have ADFS 3.0 set up and any user in the domain can login to my site (authentication was done previously with LDAP). I set up some claim rules so that I can get the user's name, email address, and the groups the member is in. When I was using LDAP I was able to get all of this information. I am using a SAML Chrome Panel to view the SAML Responses. None of the information that I set up in the claim rules are showing up in the response. Here is an example response(some of the data has been changed for security):
<samlp:Response Consent="urn:oasis:names:tc:SAML:2.0:consent:unspecified"
Destination="https://ssotest.trknow.local:8443/sammy/saml/SSO"
ID="_alphanumeric" IssueInstant="2019-03-29T13:52:09.586Z" Version="2.0"
xmlns:samlp="urn:oasis:names:tc:SAML:2.0:protocol">
<Issuer xmlns="urn:oasis:names:tc:SAML:2.0:assertion">http://federation.trknow.com/adfs/services/trust</Issuer>
<samlp:Status><samlp:StatusCode Value="urn:oasis:names:tc:SAML:2.0:status:Success"/></samlp:Status>
<EncryptedAssertion xmlns="urn:oasis:names:tc:SAML:2.0:assertion">
<xenc:EncryptedData Type="http://www.w3.org/2001/04/xmlenc#Element"
xmlns:xenc="http://www.w3.org/2001/04/xmlenc#"><xenc:EncryptionMethod Algorithm="http://www.w3.org/2001/04/xmlenc#aes256-cbc"/>
<KeyInfo xmlns="http://www.w3.org/2000/09/xmldsig#">
<e:EncryptedKey xmlns:e="http://www.w3.org/2001/04/xmlenc#">
<e:EncryptionMethod Algorithm="http://www.w3.org/2001/04/xmlenc#rsa-oaep-mgf1p"><DigestMethod Algorithm="http://www.w3.org/2000/09/xmldsig#sha1"/></e:EncryptionMethod>
<KeyInfo>
<ds:X509Data xmlns:ds="http://www.w3.org/2000/09/xmldsig#">
<ds:X509IssuerSerial>
<ds:X509IssuerName>CN=trknow-VERIFY-CA, DC=trknow, DC=local</ds:X509IssuerName>
<ds:X509SerialNumber>serial_number</ds:X509SerialNumber>
</ds:X509IssuerSerial>
</ds:X509Data>
</KeyInfo>
<e:CipherData>
<e:CipherValue>ciphervalidi/A==</e:CipherValue>
</e:CipherData>
</e:EncryptedKey>
</KeyInfo>
<xenc:CipherData>
<xenc:CipherValue>*truncated*sva2kFMnlfrnfF4Zxd2XRCg6UW4cjrEqpjlR1oaqZrc3EwTAaaHh9Ta7U7T27Q8iPNBq9VRjjW5RcE8mrRCCGThXpeAcEkF5cw9BZ+JCz2QVEpb4Ul6iJVybe1lwA9uaEBimebH+c1hBM9vo3SOAQ=</xenc:CipherValue>
</xenc:CipherData>
</xenc:EncryptedData>
</EncryptedAssertion>
</samlp:Response>
You can see no details provided. Now here are my claim rules:
First a snapshot and then the rule language underneath:
Click for Picture of Claims: overview
1) Email2Email
c:[Type == "http://schemas.microsoft.com/ws/2008/06/identity/claims/windowsaccountname", Issuer == "AD AUTHORITY"]
=> issue(store = "Active Directory", types = ("http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddress"), query = ";mail;0", param = c.Value);
2) Email2NameID
c:[Type == "http://schemas.microsoft.com/ws/2008/06/identity/claims/windowsaccountname", Issuer == "AD AUTHORITY"]
=> issue(store = "Active Directory", types = ("http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameidentifier"), query = ";mail;0", param = c.Value);
3) Full Name
c:[Type == "http://schemas.microsoft.com/ws/2008/06/identity/claims/windowsaccountname", Issuer == "AD AUTHORITY"]
=> issue(store = "Active Directory", types = ("http://schemas.xmlsoap.org/ws/2005/05/identity/claims/surname", "http://schemas.xmlsoap.org/ws/2005/05/identity/claims/givenname"), query = ";sn,givenName;0", param = c.Value);
4) memberOfGroup
c:[Type == "http://schemas.microsoft.com/ws/2008/06/identity/claims/windowsaccountname", Issuer == "AD AUTHORITY"]
=> issue(store = "Active Directory", types = ("http://schemas.xmlsoap.org/claims/Group"), query = ";memberOf;0", param = c.Value);
5) Group SID
c:[Type == "http://schemas.microsoft.com/ws/2008/06/identity/claims/groupsid"]
=> issue(claim = c);
Here is my LDAP search and filter criteria. Trying to mirror this with ADFS claim rules:
managerDn = 'CN=Site LDAP Service Account,CN=Managed Service Accounts,DC=trk,DC=trknow,DC=com'
managerPassword = 'password'
server = 'ldap://tstrodc01.trk.trknow.com:389'
groupSearchBase = 'ou=Stations,dc=trk,dc=trknow,dc=com'
search.base = 'dc=trk,dc=trknow,dc=com'
search.filter= '(sAMAccountName=0)'
ldap adfs saml
New contributor
I have ADFS 3.0 set up and any user in the domain can login to my site (authentication was done previously with LDAP). I set up some claim rules so that I can get the user's name, email address, and the groups the member is in. When I was using LDAP I was able to get all of this information. I am using a SAML Chrome Panel to view the SAML Responses. None of the information that I set up in the claim rules are showing up in the response. Here is an example response(some of the data has been changed for security):
<samlp:Response Consent="urn:oasis:names:tc:SAML:2.0:consent:unspecified"
Destination="https://ssotest.trknow.local:8443/sammy/saml/SSO"
ID="_alphanumeric" IssueInstant="2019-03-29T13:52:09.586Z" Version="2.0"
xmlns:samlp="urn:oasis:names:tc:SAML:2.0:protocol">
<Issuer xmlns="urn:oasis:names:tc:SAML:2.0:assertion">http://federation.trknow.com/adfs/services/trust</Issuer>
<samlp:Status><samlp:StatusCode Value="urn:oasis:names:tc:SAML:2.0:status:Success"/></samlp:Status>
<EncryptedAssertion xmlns="urn:oasis:names:tc:SAML:2.0:assertion">
<xenc:EncryptedData Type="http://www.w3.org/2001/04/xmlenc#Element"
xmlns:xenc="http://www.w3.org/2001/04/xmlenc#"><xenc:EncryptionMethod Algorithm="http://www.w3.org/2001/04/xmlenc#aes256-cbc"/>
<KeyInfo xmlns="http://www.w3.org/2000/09/xmldsig#">
<e:EncryptedKey xmlns:e="http://www.w3.org/2001/04/xmlenc#">
<e:EncryptionMethod Algorithm="http://www.w3.org/2001/04/xmlenc#rsa-oaep-mgf1p"><DigestMethod Algorithm="http://www.w3.org/2000/09/xmldsig#sha1"/></e:EncryptionMethod>
<KeyInfo>
<ds:X509Data xmlns:ds="http://www.w3.org/2000/09/xmldsig#">
<ds:X509IssuerSerial>
<ds:X509IssuerName>CN=trknow-VERIFY-CA, DC=trknow, DC=local</ds:X509IssuerName>
<ds:X509SerialNumber>serial_number</ds:X509SerialNumber>
</ds:X509IssuerSerial>
</ds:X509Data>
</KeyInfo>
<e:CipherData>
<e:CipherValue>ciphervalidi/A==</e:CipherValue>
</e:CipherData>
</e:EncryptedKey>
</KeyInfo>
<xenc:CipherData>
<xenc:CipherValue>*truncated*sva2kFMnlfrnfF4Zxd2XRCg6UW4cjrEqpjlR1oaqZrc3EwTAaaHh9Ta7U7T27Q8iPNBq9VRjjW5RcE8mrRCCGThXpeAcEkF5cw9BZ+JCz2QVEpb4Ul6iJVybe1lwA9uaEBimebH+c1hBM9vo3SOAQ=</xenc:CipherValue>
</xenc:CipherData>
</xenc:EncryptedData>
</EncryptedAssertion>
</samlp:Response>
You can see no details provided. Now here are my claim rules:
First a snapshot and then the rule language underneath:
Click for Picture of Claims: overview
1) Email2Email
c:[Type == "http://schemas.microsoft.com/ws/2008/06/identity/claims/windowsaccountname", Issuer == "AD AUTHORITY"]
=> issue(store = "Active Directory", types = ("http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddress"), query = ";mail;0", param = c.Value);
2) Email2NameID
c:[Type == "http://schemas.microsoft.com/ws/2008/06/identity/claims/windowsaccountname", Issuer == "AD AUTHORITY"]
=> issue(store = "Active Directory", types = ("http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameidentifier"), query = ";mail;0", param = c.Value);
3) Full Name
c:[Type == "http://schemas.microsoft.com/ws/2008/06/identity/claims/windowsaccountname", Issuer == "AD AUTHORITY"]
=> issue(store = "Active Directory", types = ("http://schemas.xmlsoap.org/ws/2005/05/identity/claims/surname", "http://schemas.xmlsoap.org/ws/2005/05/identity/claims/givenname"), query = ";sn,givenName;0", param = c.Value);
4) memberOfGroup
c:[Type == "http://schemas.microsoft.com/ws/2008/06/identity/claims/windowsaccountname", Issuer == "AD AUTHORITY"]
=> issue(store = "Active Directory", types = ("http://schemas.xmlsoap.org/claims/Group"), query = ";memberOf;0", param = c.Value);
5) Group SID
c:[Type == "http://schemas.microsoft.com/ws/2008/06/identity/claims/groupsid"]
=> issue(claim = c);
Here is my LDAP search and filter criteria. Trying to mirror this with ADFS claim rules:
managerDn = 'CN=Site LDAP Service Account,CN=Managed Service Accounts,DC=trk,DC=trknow,DC=com'
managerPassword = 'password'
server = 'ldap://tstrodc01.trk.trknow.com:389'
groupSearchBase = 'ou=Stations,dc=trk,dc=trknow,dc=com'
search.base = 'dc=trk,dc=trknow,dc=com'
search.filter= '(sAMAccountName=0)'
ldap adfs saml
ldap adfs saml
New contributor
New contributor
New contributor
asked yesterday
BmoeBmoe
1
1
New contributor
New contributor
add a comment |
add a comment |
0
active
oldest
votes
Your Answer
StackExchange.ready(function()
var channelOptions =
tags: "".split(" "),
id: "2"
;
initTagRenderer("".split(" "), "".split(" "), channelOptions);
StackExchange.using("externalEditor", function()
// Have to fire editor after snippets, if snippets enabled
if (StackExchange.settings.snippets.snippetsEnabled)
StackExchange.using("snippets", function()
createEditor();
);
else
createEditor();
);
function createEditor()
StackExchange.prepareEditor(
heartbeatType: 'answer',
autoActivateHeartbeat: false,
convertImagesToLinks: true,
noModals: true,
showLowRepImageUploadWarning: true,
reputationToPostImages: 10,
bindNavPrevention: true,
postfix: "",
imageUploader:
brandingHtml: "Powered by u003ca class="icon-imgur-white" href="https://imgur.com/"u003eu003c/au003e",
contentPolicyHtml: "User contributions licensed under u003ca href="https://creativecommons.org/licenses/by-sa/3.0/"u003ecc by-sa 3.0 with attribution requiredu003c/au003e u003ca href="https://stackoverflow.com/legal/content-policy"u003e(content policy)u003c/au003e",
allowUrls: true
,
onDemand: true,
discardSelector: ".discard-answer"
,immediatelyShowMarkdownHelp:true
);
);
Bmoe is a new contributor. Be nice, and check out our Code of Conduct.
Sign up or log in
StackExchange.ready(function ()
StackExchange.helpers.onClickDraftSave('#login-link');
);
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
StackExchange.ready(
function ()
StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fserverfault.com%2fquestions%2f960636%2fadfs-claim-rules-not-returning-any-details%23new-answer', 'question_page');
);
Post as a guest
Required, but never shown
0
active
oldest
votes
0
active
oldest
votes
active
oldest
votes
active
oldest
votes
Bmoe is a new contributor. Be nice, and check out our Code of Conduct.
Bmoe is a new contributor. Be nice, and check out our Code of Conduct.
Bmoe is a new contributor. Be nice, and check out our Code of Conduct.
Bmoe is a new contributor. Be nice, and check out our Code of Conduct.
Thanks for contributing an answer to Server Fault!
- Please be sure to answer the question. Provide details and share your research!
But avoid …
- Asking for help, clarification, or responding to other answers.
- Making statements based on opinion; back them up with references or personal experience.
To learn more, see our tips on writing great answers.
Sign up or log in
StackExchange.ready(function ()
StackExchange.helpers.onClickDraftSave('#login-link');
);
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
StackExchange.ready(
function ()
StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fserverfault.com%2fquestions%2f960636%2fadfs-claim-rules-not-returning-any-details%23new-answer', 'question_page');
);
Post as a guest
Required, but never shown
Sign up or log in
StackExchange.ready(function ()
StackExchange.helpers.onClickDraftSave('#login-link');
);
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
Sign up or log in
StackExchange.ready(function ()
StackExchange.helpers.onClickDraftSave('#login-link');
);
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
Sign up or log in
StackExchange.ready(function ()
StackExchange.helpers.onClickDraftSave('#login-link');
);
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown