Skip to content
This repository has been archived by the owner on Jul 21, 2020. It is now read-only.

Signout without wtrealm with IdentityServer as claims provider in ADFS 2016 #17

Open
RemcoBlok opened this issue Nov 21, 2019 · 3 comments
Labels

Comments

@RemcoBlok
Copy link

Hi,

Missing support for PostLogoutRedirectUri was discussed here #9. The suggested solution to pass an id_token_hint from the WsfederationController with the wtrealm does not work when using IdentityServer as a claims provider in ADFS 2016. ADFS 2016 does not pass the wtrealm parameter to the claims provider on signout. I went back to my IdentityServer 3 claims provider in ADFS 2016 and this one handles the signout ok without the wtrealm parameter. Why does IdentityServer 4 require this? Is there another way to generate the id_token_hint? Perhaps with the suggested WsFederationSignoutRequestValidator? Will it be able to generate the id_token_hint without the wtrealm parameter?

@leastprivilege
Copy link
Member

This repo is just a sample implementation - we don't actively maintain it.

If you want commercial support implementing the feature, let us know. Or use the commercial WS-Fed plugin which includes support: https://www.identityserver.com/products/ws-federation

@RemcoBlok
Copy link
Author

RemcoBlok commented Nov 24, 2019

I understand this repo is a sample and not actively maintained. I am trying to help out Alexej Kowalew here 616b2f#1 with getting the sample working with wfresh and signout support. My question above 'Why does IdentityServer 4 require this?' is something you could perhaps help us answer, or should I post that question in the github repo for IdentityServer4?

@leastprivilege
Copy link
Member

I can't remember tbh. OpenID Connect requires this (for good reason) - and I guess since WS-Fed is just "using" the core engine - it is required there as well...

Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
Projects
None yet
Development

No branches or pull requests

2 participants