Getting after redirecting to Assertion Service

Hi,
I am testing the SAML for .Net to see if it will for our solution but getting below error after login and redirect.

[SAMLProtocolException: An SP-initiated SAML response from https://samltest.id/saml/idp was received unexpectedly.]
ComponentSpace.SAML2.InternalSAMLServiceProvider.CheckInResponseTo(String inResponseTo) +324
ComponentSpace.SAML2.InternalSAMLServiceProvider.ProcessSAMLResponse(XmlElement samlResponseElement, Boolean& isInResponseTo, String& authnContext, String& userName, SAMLAttribute[]& attributes) +160
ComponentSpace.SAML2.InternalSAMLServiceProvider.ReceiveSSO(HttpRequest httpRequest, Boolean& isInResponseTo, String& partnerIdP, String& authnContext, String& userName, SAMLAttribute[]& attributes, String& relayState) +137
ComponentSpace.SAML2.SAMLServiceProvider.ReceiveSSO(HttpRequest httpRequest, Boolean& isInResponseTo, String& partnerIdP, String& authnContext, String& userName, IDictionary& attributes, String& relayState) +66
ExampleServiceProvider.SAML.AssertionConsumerService.Page_Load(Object sender, EventArgs e) in C:\SAML for .NET\Examples\SSO\WebForms\ExampleServiceProvider\SAML\AssertionConsumerService.aspx.cs:23

Here is the log

8696/6: 5/13/2020 12:32:50 PM: ComponentSpace.SAML2, Version=4.2.0.0, Culture=neutral, PublicKeyToken=16647a1283418145, .NET v4.0 build, Evaluation.
8696/6: 5/13/2020 12:32:50 PM: CLR: 4.0.30319.42000, OS: Microsoft Windows NT 10.0.17763.0,
8696/6: 5/13/2020 12:32:50 PM: Initializing the SAML environment.
8696/6: 5/13/2020 12:32:50 PM: Loading the SAML configuration file C:\SAML for .NET\Examples\SSO\WebForms\ExampleServiceProvider\saml.config.
8696/6: 5/13/2020 12:32:50 PM: SAML configuration:
<?xml version="1.0"?>

<ServiceProvider
Name=“<a href=“http://localhost:51901/””>http://localhost:51901/
Description=“Example Service Provider”
AssertionConsumerServiceUrl=”~/SAML/AssertionConsumerService.aspx">





<PartnerIdentityProvider Name=“<a href=“https://samltest.id/saml/idp””>https://samltest.id/saml/idp"
Description=“Shibboleth”
SignLogoutRequest=“true”
SignLogoutResponse=“true”
SingleSignOnServiceUrl=“<a href=“https://samltest.id/idp/profile/SAML2/Redirect/SSO””>https://samltest.id/idp/profile/SAML2/Redirect/SSO"
SingleLogoutServiceUrl=“”>https://samltest.id/idp/profile/SAML2/Redirect/SLO">








8696/6: 5/13/2020 12:32:50 PM: The SAML configuration file has been successfully loaded.
8696/6: 5/13/2020 12:32:50 PM: SAML configuration changes in the directory C:\SAML for .NET\Examples\SSO\WebForms\ExampleServiceProvider are being monitored.
8696/6: 5/13/2020 12:32:50 PM: The SAML environment has been successfully initialized.
8696/6: 5/13/2020 12:32:50 PM: The SAML_SessionId session cookie with value ce989aec-7efb-4e12-b9e2-ac1655b9424b has been set.
8696/6: 5/13/2020 12:32:50 PM: HTTP cookie: SAML_SessionId=ce989aec-7efb-4e12-b9e2-ac1655b9424b; Path=/; SameSite=None; Secure; HttpOnly
8696/6: 5/13/2020 12:32:50 PM: Initiating SSO to the partner identity provider https://samltest.id/saml/idp.
8696/6: 5/13/2020 12:32:50 PM: Service provider session (ce989aec-7efb-4e12-b9e2-ac1655b9424b) state:
8696/6: 5/13/2020 12:32:50 PM: Sending request over HTTP Redirect, baseURL=https://samltest.id/idp/profile/SAML2/Redirect/SSO, samlMessage=<samlp:AuthnRequest ID=“_8c1e1466-574b-4ff6-b8f7-f7a5d7745324” Version=“2.0” IssueInstant=“2020-05-13T19:32:50.192Z” Destination=“<a href=“https://samltest.id/idp/profile/SAML2/Redirect/SSO””>https://samltest.id/idp/profile/SAML2/Redirect/SSO" ForceAuthn=“false” IsPassive=“false” ProtocolBinding=“urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST” AssertionConsumerServiceURL=“<a href=“http://localhost:51901/SAML/AssertionConsumerService.aspx””>http://localhost:51901/SAML/AssertionConsumerService.aspx" xmlns:samlp=“urn:oasis:names:tc:SAML:2.0:protocol”><saml:Issuer xmlns:saml=“urn:oasis:names:tc:SAML:2.0:assertion”>http://localhost:51901/</saml:Issuer><samlp:NameIDPolicy Format=“urn:oasis:names:tc:SAML:1.1:nameid-format:unspecified” AllowCreate=“true” /></samlp:AuthnRequest>, relayState=/
8696/6: 5/13/2020 12:32:50 PM: Creating HTTP redirect query string.
8696/6: 5/13/2020 12:32:50 PM: Encoding SAML message: <samlp:AuthnRequest ID=“_8c1e1466-574b-4ff6-b8f7-f7a5d7745324” Version=“2.0” IssueInstant=“2020-05-13T19:32:50.192Z” Destination=“<a href=“https://samltest.id/idp/profile/SAML2/Redirect/SSO””>https://samltest.id/idp/profile/SAML2/Redirect/SSO" ForceAuthn=“false” IsPassive=“false” ProtocolBinding=“urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST” AssertionConsumerServiceURL=“<a href=“http://localhost:51901/SAML/AssertionConsumerService.aspx””>http://localhost:51901/SAML/AssertionConsumerService.aspx" xmlns:samlp=“urn:oasis:names:tc:SAML:2.0:protocol”><saml:Issuer xmlns:saml=“urn:oasis:names:tc:SAML:2.0:assertion”>http://localhost:51901/</saml:Issuer><samlp:NameIDPolicy Format=“urn:oasis:names:tc:SAML:1.1:nameid-format:unspecified” AllowCreate=“true” /></samlp:AuthnRequest>
8696/6: 5/13/2020 12:32:50 PM: Encoded SAML message: fZJBT+MwEIX/SuR74jhNGmq1lQrVaiuxS9R0OXBBrjOhlhw763FY+Pc4KSD2UK7jefO+eeMlik73fDP4k9nD3wHQR7vtijxeSQYsn8/josyPcd628/h41ZZxW4qiKcu8mGU5ie7BobJmRbIkJdEOcYCdQS+MD6U0S+O0iNnswBZ8lvEiTdgieyDRNrgoI/ykPHnfI6d0BPHhIVENVU1Pe2dbpYHWm1+3Gd1DoxxIT+v6jkQ/rJMwMa9IKzTC6F0JRPUMn5XKWW+l1dfKNMo8rcjgDLcCFXIjOkDuJR+H88DOj+cm5D8Phyqu7uoDiTaI4EbIG2tw6MDV4J6VhD/72zN2oNZWCn2y6HnBFimbaOklYSKwfyHRS6cN8in476H69w3Iejl28ylf90X/vVx8YJD1Bdol/TL3bNLz32HQbltZreTrmHQn/GUflrCpopq4nVr5YLAHqVoFTYhQa/vvxoHw4S7eDeEsdH12/f/Trd8A
8696/6: 5/13/2020 12:32:50 PM: Query string: SAMLRequest=fZJBT%2BMwEIX%2FSuR74jhNGmq1lQrVaiuxS9R0OXBBrjOhlhw763FY%2BPc4KSD2UK7jefO%2BeeMlik73fDP4k9nD3wHQR7vtijxeSQYsn8%2FjosyPcd628%2Fh41ZZxW4qiKcu8mGU5ie7BobJmRbIkJdEOcYCdQS%2BMD6U0S%2BO0iNnswBZ8lvEiTdgieyDRNrgoI%2FykPHnfI6d0BPHhIVENVU1Pe2dbpYHWm1%2B3Gd1DoxxIT%2Bv6jkQ%2FrJMwMa9IKzTC6F0JRPUMn5XKWW%2Bl1dfKNMo8rcjgDLcCFXIjOkDuJR%2BH88DOj%2Bcm5D8Phyqu7uoDiTaI4EbIG2tw6MDV4J6VhD%2F72zN2oNZWCn2y6HnBFimbaOklYSKwfyHRS6cN8in476H69w3Iejl28ylf90X%2FvVx8YJD1Bdol%2FTL3bNLz32HQbltZreTrmHQn%2FGUflrCpopq4nVr5YLAHqVoFTYhQa%2FvvxoHw4S7eDeEsdH12%2Ff%2FTrd8A&RelayState=%2F
8696/6: 5/13/2020 12:32:50 PM: Redirect URL: https://samltest.id/idp/profile/SAML2/Redirect/SSO?SAMLRequest=fZJBT%2BMwEIX%2FSuR74jhNGmq1lQrVaiuxS9R0OXBBrjOhlhw763FY%2BPc4KSD2UK7jefO%2BeeMlik73fDP4k9nD3wHQR7vtijxeSQYsn8%2FjosyPcd628%2Fh41ZZxW4qiKcu8mGU5ie7BobJmRbIkJdEOcYCdQS%2BMD6U0S%2BO0iNnswBZ8lvEiTdgieyDRNrgoI%2FykPHnfI6d0BPHhIVENVU1Pe2dbpYHWm1%2B3Gd1DoxxIT%2Bv6jkQ%2FrJMwMa9IKzTC6F0JRPUMn5XKWW%2Bl1dfKNMo8rcjgDLcCFXIjOkDuJR%2BH88DOj%2Bcm5D8Phyqu7uoDiTaI4EbIG2tw6MDV4J6VhD%2F72zN2oNZWCn2y6HnBFimbaOklYSKwfyHRS6cN8in476H69w3Iejl28ylf90X%2FvVx8YJD1Bdol%2FTL3bNLz32HQbltZreTrmHQn%2FGUflrCpopq4nVr5YLAHqVoFTYhQa%2FvvxoHw4S7eDeEsdH12%2Ff%2FTrd8A&RelayState=%2F
8696/6: 5/13/2020 12:32:50 PM: Redirecting to: https://samltest.id/idp/profile/SAML2/Redirect/SSO?SAMLRequest=fZJBT%2BMwEIX%2FSuR74jhNGmq1lQrVaiuxS9R0OXBBrjOhlhw763FY%2BPc4KSD2UK7jefO%2BeeMlik73fDP4k9nD3wHQR7vtijxeSQYsn8%2FjosyPcd628%2Fh41ZZxW4qiKcu8mGU5ie7BobJmRbIkJdEOcYCdQS%2BMD6U0S%2BO0iNnswBZ8lvEiTdgieyDRNrgoI%2FykPHnfI6d0BPHhIVENVU1Pe2dbpYHWm1%2B3Gd1DoxxIT%2Bv6jkQ%2FrJMwMa9IKzTC6F0JRPUMn5XKWW%2Bl1dfKNMo8rcjgDLcCFXIjOkDuJR%2BH88DOj%2Bcm5D8Phyqu7uoDiTaI4EbIG2tw6MDV4J6VhD%2F72zN2oNZWCn2y6HnBFimbaOklYSKwfyHRS6cN8in476H69w3Iejl28ylf90X%2FvVx8YJD1Bdol%2FTL3bNLz32HQbltZreTrmHQn%2FGUflrCpopq4nVr5YLAHqVoFTYhQa%2FvvxoHw4S7eDeEsdH12%2Ff%2FTrd8A&RelayState=%2F
8696/6: 5/13/2020 12:32:50 PM: Request sent over HTTP Redirect.
8696/6: 5/13/2020 12:32:50 PM: SAML message sent: partner=https://samltest.id/saml/idp, message=<samlp:AuthnRequest ID=“_8c1e1466-574b-4ff6-b8f7-f7a5d7745324” Version=“2.0” IssueInstant=“2020-05-13T19:32:50.192Z” Destination=“<a href=“https://samltest.id/idp/profile/SAML2/Redirect/SSO””>https://samltest.id/idp/profile/SAML2/Redirect/SSO" ForceAuthn=“false” IsPassive=“false” ProtocolBinding=“urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST” AssertionConsumerServiceURL=“<a href=“http://localhost:51901/SAML/AssertionConsumerService.aspx””>http://localhost:51901/SAML/AssertionConsumerService.aspx" xmlns:samlp=“urn:oasis:names:tc:SAML:2.0:protocol”><saml:Issuer xmlns:saml=“urn:oasis:names:tc:SAML:2.0:assertion”>http://localhost:51901/</saml:Issuer><samlp:NameIDPolicy Format=“urn:oasis:names:tc:SAML:1.1:nameid-format:unspecified” AllowCreate=“true” /></samlp:AuthnRequest>, relay state=/, destination URL=https://samltest.id/idp/profile/SAML2/Redirect/SSO
8696/6: 5/13/2020 12:32:50 PM: Service provider session (ce989aec-7efb-4e12-b9e2-ac1655b9424b) state:
Pending response state:
Action: ReceiveSamlResponse
Partner name: https://samltest.id/saml/idp
Relay state:
In response to: _8c1e1466-574b-4ff6-b8f7-f7a5d7745324

8696/6: 5/13/2020 12:32:50 PM: Initiation of SSO to the partner identity provider https://samltest.id/saml/idp has completed successfully.
8696/6: 5/13/2020 12:33:57 PM: The SAML_SessionId session cookie with value d6921cfa-8ad0-448c-9967-2a2e39960345 has been set.
8696/6: 5/13/2020 12:33:57 PM: HTTP cookie: SAML_SessionId=d6921cfa-8ad0-448c-9967-2a2e39960345; Path=/; SameSite=None; Secure; HttpOnly
8696/6: 5/13/2020 12:33:57 PM: Receiving an SSO response from a partner identity provider.
8696/6: 5/13/2020 12:33:57 PM: Service provider session (d6921cfa-8ad0-448c-9967-2a2e39960345) state:
8696/6: 5/13/2020 12:33:57 PM: Receiving response over HTTP POST.
8696/6: 5/13/2020 12:33:57 PM: HTTP request:
POST /SAML/AssertionConsumerService.aspx HTTP/1.1
Cache-Control: no-cache
Connection: keep-alive
Pragma: no-cache
Content-Length: 8520
Content-Type: application/x-www-form-urlencoded
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,/;q=0.8,application/signed-exchange;v=b3;q=0.9
Accept-Encoding: gzip, deflate, br
Accept-Language: en-US,en;q=0.9
Host: localhost:51901
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/81.0.4044.138 Safari/537.36
Upgrade-Insecure-Requests: 1
Origin: null
Sec-Fetch-Site: cross-site
Sec-Fetch-Mode: navigate
Sec-Fetch-Dest: document

RelayState=%2F&SAMLResponse=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%2BPGRzOlNpZ25hdHVyZSB4bWxuczpkcz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC8wOS94bWxkc2lnIyI%2BPGRzOlNpZ25lZEluZm8%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%2BPGRzOkRpZ2VzdE1ldGhvZCBBbGdvcml0aG09Imh0dHA6Ly93d3cudzMub3JnLzIwMDEvMDQveG1sZW5jI3NoYTI1NiIvPjxkczpEaWdlc3RWYWx1ZT5Yb3BXWHpMVWJJekJLcUFOUFdjMnFQd25EQitHSElZY3hDN2hyUERpeWxJPTwvZHM6RGlnZXN0VmFsdWU%2BPC9kczpSZWZlcmVuY2U%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%2BPGRzOktleUluZm8%2BPGRzOlg1MDlEYXRhPjxkczpYNTA5Q2VydGlmaWNhdGU%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%2BPC9kczpLZXlJbmZvPjwvZHM6U2lnbmF0dXJlPjxzYW1sMnA6U3RhdHVzPjxzYW1sMnA6U3RhdHVzQ29kZSBWYWx1ZT0idXJuOm9hc2lzOm5hbWVzOnRjOlNBTUw6Mi4wOnN0YXR1czpTdWNjZXNzIi8%2BPC9zYW1sMnA6U3RhdHVzPjxzYW1sMjpBc3NlcnRpb24gSUQ9Il9kMTFkMzZkNTMzYjU4YjAyZGJjOWNiYzE5MDZjZDY1NiIgSXNzdWVJbnN0YW50PSIyMDIwLTA1LTEzVDE5OjMzOjA0LjUzMVoiIFZlcnNpb249IjIuMCIgeG1sbnM6c2FtbDI9InVybjpvYXNpczpuYW1lczp0YzpTQU1MOjIuMDphc3NlcnRpb24iPjxzYW1sMjpJc3N1ZXI%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%2BPHNhbWwyOkNvbmRpdGlvbnMgTm90QmVmb3JlPSIyMDIwLTA1LTEzVDE5OjMzOjA0LjUzMVoiIE5vdE9uT3JBZnRlcj0iMjAyMC0wNS0xM1QxOTozODowNC41MzFaIj48c2FtbDI6QXVkaWVuY2VSZXN0cmljdGlvbj48c2FtbDI6QXVkaWVuY2U%2BaHR0cDovL2xvY2FsaG9zdDo1MTkwMS88L3NhbWwyOkF1ZGllbmNlPjwvc2FtbDI6QXVkaWVuY2VSZXN0cmljdGlvbj48L3NhbWwyOkNvbmRpdGlvbnM%2BPHNhbWwyOkF1dGhuU3RhdGVtZW50IEF1dGhuSW5zdGFudD0iMjAyMC0wNS0xM1QxOTozMzowNC41MjRaIiBTZXNzaW9uSW5kZXg9Il83NGZiODE3Yjk4ODg2ZDM5NjUyOGNlMWIzZDZjZWUwYyI%2BPHNhbWwyOlN1YmplY3RMb2NhbGl0eSBBZGRyZXNzPSIxNzIuMzEuMTIuMjA4Ii8%2BPHNhbWwyOkF1dGhuQ29udGV4dD48c2FtbDI6QXV0aG5Db250ZXh0Q2xhc3NSZWY%2BdXJuOm9hc2lzOm5hbWVzOnRjOlNBTUw6Mi4wOmFjOmNsYXNzZXM6UGFzc3dvcmRQcm90ZWN0ZWRUcmFuc3BvcnQ8L3NhbWwyOkF1dGhuQ29udGV4dENsYXNzUmVmPjwvc2FtbDI6QXV0aG5Db250ZXh0Pjwvc2FtbDI6QXV0aG5TdGF0ZW1lbnQ%2BPHNhbWwyOkF0dHJpYnV0ZVN0YXRlbWVudD48c2FtbDI6QXR0cmlidXRlIEZyaWVuZGx5TmFtZT0idWlkIiBOYW1lPSJ1cm46b2lkOjAuOS4yMzQyLjE5MjAwMzAwLjEwMC4xLjEiIE5hbWVGb3JtYXQ9InVybjpvYXNpczpuYW1lczp0YzpTQU1MOjIuMDphdHRybmFtZS1mb3JtYXQ6dXJpIj48c2FtbDI6QXR0cmlidXRlVmFsdWU%2Bcmljazwvc2FtbDI6QXR0cmlidXRlVmFsdWU%2BPC9zYW1sMjpBdHRyaWJ1dGU%2BPHNhbWwyOkF0dHJpYnV0ZSBOYW1lPSJ1cm46b2FzaXM6bmFtZXM6dGM6U0FNTDphdHRyaWJ1dGU6c3ViamVjdC1pZCIgTmFtZUZvcm1hdD0idXJuOm9hc2lzOm5hbWVzOnRjOlNBTUw6Mi4wOmF0dHJuYW1lLWZvcm1hdDp1cmkiPjxzYW1sMjpBdHRyaWJ1dGVWYWx1ZSB4bWxuczp4c2k9Imh0dHA6Ly93d3cudzMub3JnLzIwMDEvWE1MU2NoZW1hLWluc3RhbmNlIiB4c2k6dHlwZT0ieHNkOnN0cmluZyI%2BcnNhbmNoZXpAc2FtbHRlc3QuaWQ8L3NhbWwyOkF0dHJpYnV0ZVZhbHVlPjwvc2FtbDI6QXR0cmlidXRlPjxzYW1sMjpBdHRyaWJ1dGUgRnJpZW5kbHlOYW1lPSJyb2xlIiBOYW1lPSJodHRwczovL3NhbWx0ZXN0LmlkL2F0dHJpYnV0ZXMvcm9sZSIgTmFtZUZvcm1hdD0idXJuOm9hc2lzOm5hbWVzOnRjOlNBTUw6Mi4wOmF0dHJuYW1lLWZvcm1hdDp1cmkiPjxzYW1sMjpBdHRyaWJ1dGVWYWx1ZSB4bWxuczp4c2k9Imh0dHA6Ly93d3cudzMub3JnLzIwMDEvWE1MU2NoZW1hLWluc3RhbmNlIiB4c2k6dHlwZT0ieHNkOnN0cmluZyI%2BbWFuYWdlckBzYW1sdGVzdC5pZDwvc2FtbDI6QXR0cmlidXRlVmFsdWU%2BPC9zYW1sMjpBdHRyaWJ1dGU%2BPHNhbWwyOkF0dHJpYnV0ZSBGcmllbmRseU5hbWU9InRlbGVwaG9uZU51bWJlciIgTmFtZT0idXJuOm9pZDoyLjUuNC4yMCIgTmFtZUZvcm1hdD0idXJuOm9hc2lzOm5hbWVzOnRjOlNBTUw6Mi4wOmF0dHJuYW1lLWZvcm1hdDp1cmkiPjxzYW1sMjpBdHRyaWJ1dGVWYWx1ZT4rMS01NTUtNTU1LTU1MTU8L3NhbWwyOkF0dHJpYnV0ZVZhbHVlPjwvc2FtbDI6QXR0cmlidXRlPjxzYW1sMjpBdHRyaWJ1dGUgRnJpZW5kbHlOYW1lPSJtYWlsIiBOYW1lPSJ1cm46b2lkOjAuOS4yMzQyLjE5MjAwMzAwLjEwMC4xLjMiIE5hbWVGb3JtYXQ9InVybjpvYXNpczpuYW1lczp0YzpTQU1MOjIuMDphdHRybmFtZS1mb3JtYXQ6dXJpIj48c2FtbDI6QXR0cmlidXRlVmFsdWU%2BcnNhbmNoZXpAc2FtbHRlc3QuaWQ8L3NhbWwyOkF0dHJpYnV0ZVZhbHVlPjwvc2FtbDI6QXR0cmlidXRlPjxzYW1sMjpBdHRyaWJ1dGUgRnJpZW5kbHlOYW1lPSJzbiIgTmFtZT0idXJuOm9pZDoyLjUuNC40IiBOYW1lRm9ybWF0PSJ1cm46b2FzaXM6bmFtZXM6dGM6U0FNTDoyLjA6YXR0cm5hbWUtZm9ybWF0OnVyaSI%2BPHNhbWwyOkF0dHJpYnV0ZVZhbHVlPlNhbmNoZXo8L3NhbWwyOkF0dHJpYnV0ZVZhbHVlPjwvc2FtbDI6QXR0cmlidXRlPjxzYW1sMjpBdHRyaWJ1dGUgRnJpZW5kbHlOYW1lPSJkaXNwbGF5TmFtZSIgTmFtZT0idXJuOm9pZDoyLjE2Ljg0MC4xLjExMzczMC4zLjEuMjQxIiBOYW1lRm9ybWF0PSJ1cm46b2FzaXM6bmFtZXM6dGM6U0FNTDoyLjA6YXR0cm5hbWUtZm9ybWF0OnVyaSI%2BPHNhbWwyOkF0dHJpYnV0ZVZhbHVlPlJpY2sgU2FuY2hlejwvc2FtbDI6QXR0cmlidXRlVmFsdWU%2BPC9zYW1sMjpBdHRyaWJ1dGU%2BPHNhbWwyOkF0dHJpYnV0ZSBGcmllbmRseU5hbWU9ImdpdmVuTmFtZSIgTmFtZT0idXJuOm9pZDoyLjUuNC40MiIgTmFtZUZvcm1hdD0idXJuOm9hc2lzOm5hbWVzOnRjOlNBTUw6Mi4wOmF0dHJuYW1lLWZvcm1hdDp1cmkiPjxzYW1sMjpBdHRyaWJ1dGVWYWx1ZT5SaWNrPC9zYW1sMjpBdHRyaWJ1dGVWYWx1ZT48L3NhbWwyOkF0dHJpYnV0ZT48L3NhbWwyOkF0dHJpYnV0ZVN0YXRlbWVudD48L3NhbWwyOkFzc2VydGlvbj48L3NhbWwycDpSZXNwb25zZT4%3D
8696/6: 5/13/2020 12:33:57 PM: Form variable SAMLResponse=<?xml version="1.0" encoding="UTF-8"?>
<saml2p:Response Destination="http://localhost:51901/SAML/AssertionConsumerService.aspx" ID="_654db9bbb92d606a14bccfe9129826a6" InResponseTo="_8c1e1466-574b-4ff6-b8f7-f7a5d7745324" IssueInstant="2020-05-13T19:33:04.531Z" Version="2.0" xmlns:saml2p="urn:oasis:names:tc:SAML:2.0:protocol" xmlns:xsd="http://www.w3.org/2001/XMLSchema"><saml2:Issuer xmlns:saml2="urn:oasis:names:tc:SAML:2.0:assertion">https://samltest.id/saml/idp</saml2:Issuer><ds:Signature xmlns:ds="http://www.w3.org/2000/09/xmldsig#"><ds:SignedInfo><ds:CanonicalizationMethod Algorithm="http://www.w3.org/2001/10/xml-exc-c14n#"/><ds:SignatureMethod Algorithm="http://www.w3.org/2001/04/xmldsig-more#rsa-sha256"/><ds:Reference URI="#_654db9bbb92d606a14bccfe9129826a6"><ds:Transforms><ds:Transform Algorithm="http://www.w3.org/2000/09/xmldsig#enveloped-signature"/><ds:Transform Algorithm="http://www.w3.org/2001/10/xml-exc-c14n#"><ec:InclusiveNamespaces PrefixList="xsd" xmlns:ec="http://www.w3.org/2001/10/xml-exc-c14n#"/></ds:Transform></ds:Transforms><ds:DigestMethod Algorithm="http://www.w3.org/2001/04/xmlenc#sha256"/><ds:DigestValue>XopWXzLUbIzBKqANPWc2qPwnDB+GHIYcxC7hrPDiylI=</ds:DigestValue></ds:Reference></ds:SignedInfo><ds:SignatureValue>L0dNeanbeHfItthWgnv1zRR4VbFHHvnR0MOqkdvFDQnPvdXvadd5h01cnaCDFhQ8TtnqVzNIesO63OV8TzYeN7JUWKdktvv0/IBjag9V2Z5a6WkUiFytOzEg4tCBrn6sKUWCgmOqPMiViph6e3hPARgSqETR9FgAHrsKigyJfbN3/+GvZRezNUZnNjU9lEXxVKAvGP3oAIoZGdi/Tz8+iaXy/mMa6sD130dAV31rneDAbDxmQU62EplQLhGIxZ5SMFSyOKyytTIq5DgjYbcNxXMelqSN/Da23evlAH/IsafR/vbFrLghOJo7KYsyyScyu4xrIkty2wUqlwBkklyYrQ==</ds:SignatureValue><ds:KeyInfo><ds:X509Data><ds:X509Certificate>MIIDEjCCAfqgAwIBAgIVAMECQ1tjghafm5OxWDh9hwZfxthWMA0GCSqGSIb3DQEBCwUAMBYxFDAS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==</ds:X509Certificate></ds:X509Data></ds:KeyInfo></ds:Signature><saml2p:Status><saml2p:StatusCode Value="urn:oasis:names:tc:SAML:2.0:status:Success"/></saml2p:Status><saml2:Assertion ID="_d11d36d533b58b02dbc9cbc1906cd656" IssueInstant="2020-05-13T19:33:04.531Z" Version="2.0" xmlns:saml2="urn:oasis:names:tc:SAML:2.0:assertion"><saml2:Issuer>https://samltest.id/saml/idp</saml2:Issuer><saml2:Subject><saml2:NameID Format="urn:oasis:names:tc:SAML:2.0:nameid-format:transient" NameQualifier="https://samltest.id/saml/idp" SPNameQualifier="http://localhost:51901/" xmlns:saml2="urn:oasis:names:tc:SAML:2.0:assertion">AAdzZWNyZXQxBXlXJ6zJC21AyuSDg2VLlxjRPf44zJSPmRikrY1wvqe0p+0CnHQTgypqZv4cBOv16q/Gw34EQK3Jk5ykMsaSOeGYAUjXRRE9cP6uMZCZA7j20zuhJo0rcFWQ</saml2:NameID><saml2:SubjectConfirmation Method="urn:oasis:names:tc:SAML:2.0:cm:bearer"><saml2:SubjectConfirmationData Address="172.31.12.208" InResponseTo="_8c1e1466-574b-4ff6-b8f7-f7a5d7745324" NotOnOrAfter="2020-05-13T19:38:04.540Z" Recipient="http://localhost:51901/SAML/AssertionConsumerService.aspx"/></saml2:SubjectConfirmation></saml2:Subject><saml2:Conditions NotBefore="2020-05-13T19:33:04.531Z" NotOnOrAfter="2020-05-13T19:38:04.531Z"><saml2:AudienceRestriction><saml2:Audience>http://localhost:51901/</saml2:Audience></saml2:AudienceRestriction></saml2:Conditions><saml2:AuthnStatement AuthnInstant="2020-05-13T19:33:04.524Z" SessionIndex="_74fb817b98886d396528ce1b3d6cee0c"><saml2:SubjectLocality Address="172.31.12.208"/><saml2:AuthnContext><saml2:AuthnContextClassRef>urn:oasis:names:tc:SAML:2.0:ac:classes:PasswordProtectedTransport</saml2:AuthnContextClassRef></saml2:AuthnContext></saml2:AuthnStatement><saml2:AttributeStatement><saml2:Attribute FriendlyName="uid" Name="urn:oid:0.9.2342.19200300.100.1.1" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:uri"><saml2:AttributeValue>rick</saml2:AttributeValue></saml2:Attribute><saml2:Attribute Name="urn:oasis:names:tc:SAML:attribute:subject-id" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:uri"><saml2:AttributeValue xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="xsd:string">rsanchez@samltest.id</saml2:AttributeValue></saml2:Attribute><saml2:Attribute FriendlyName="role" Name="https://samltest.id/attributes/role" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:uri"><saml2:AttributeValue xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="xsd:string">manager@samltest.id</saml2:AttributeValue></saml2:Attribute><saml2:Attribute FriendlyName="telephoneNumber" Name="urn:oid:2.5.4.20" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:uri"><saml2:AttributeValue>+1-555-555-5515</saml2:AttributeValue></saml2:Attribute><saml2:Attribute FriendlyName="mail" Name="urn:oid:0.9.2342.19200300.100.1.3" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:uri"><saml2:AttributeValue>rsanchez@samltest.id</saml2:AttributeValue></saml2:Attribute><saml2:Attribute FriendlyName="sn" Name="urn:oid:2.5.4.4" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:uri"><saml2:AttributeValue>Sanchez</saml2:AttributeValue></saml2:Attribute><saml2:Attribute FriendlyName="displayName" Name="urn:oid:2.16.840.1.113730.3.1.241" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:uri"><saml2:AttributeValue>Rick Sanchez</saml2:AttributeValue></saml2:Attribute><saml2:Attribute FriendlyName="givenName" Name="urn:oid:2.5.4.42" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:uri"><saml2:AttributeValue>Rick</saml2:AttributeValue></saml2:Attribute></saml2:AttributeStatement></saml2:Assertion></saml2p:Response>
8696/6: 5/13/2020 12:33:57 PM: The decoded base-64 string is: <?xml version="1.0" encoding="UTF-8"?>
<saml2p:Response Destination=“<a href=“http://localhost:51901/SAML/AssertionConsumerService.aspx””>http://localhost:51901/SAML/AssertionConsumerService.aspx" ID=“_654db9bbb92d606a14bccfe9129826a6” InResponseTo=“_8c1e1466-574b-4ff6-b8f7-f7a5d7745324” IssueInstant=“2020-05-13T19:33:04.531Z” Version=“2.0” xmlns:saml2p=“urn:oasis:names:tc:SAML:2.0:protocol” xmlns:xsd=“saml2:Issuer"http://www.w3.org/2001/XMLSchema”><saml2:Issuer xmlns:saml2=“urn:oasis:names:tc:SAML:2.0:assertion”>https://samltest.id/saml/idp</saml2:Issuer><ds:Signature xmlns:ds=“ds:SignedInfods:CanonicalizationMethod"http://www.w3.org/2000/09/xmldsig#”>ds:SignedInfo<ds:CanonicalizationMethod Algorithm=“ds:SignatureMethod"http://www.w3.org/2001/10/xml-exc-c14n#”/><ds:SignatureMethod Algorithm=“ds:Reference"http://www.w3.org/2001/04/xmldsig-more#rsa-sha256”/><ds:Reference URI=“#_654db9bbb92d606a14bccfe9129826a6”>ds:Transforms<ds:Transform Algorithm=“ds:Transform"http://www.w3.org/2000/09/xmldsig#enveloped-signature”/><ds:Transform Algorithm=“ec:InclusiveNamespaces"http://www.w3.org/2001/10/xml-exc-c14n#”><ec:InclusiveNamespaces PrefixList=“xsd” xmlns:ec=“</ds:Transform></ds:Transforms>ds:DigestMethod"http://www.w3.org/2001/10/xml-exc-c14n#”/></ds:Transform></ds:Transforms><ds:DigestMethod Algorithm=“ds:DigestValueXopWXzLUbIzBKqANPWc2qPwnDB+GHIYcxC7hrPDiylI=</ds:DigestValue></ds:Reference></ds:SignedInfo>ds:SignatureValueL0dNeanbeHfItthWgnv1zRR4VbFHHvnR0MOqkdvFDQnPvdXvadd5h01cnaCDFhQ8TtnqVzNIesO63OV8TzYeN7JUWKdktvv0/IBjag9V2Z5a6WkUiFytOzEg4tCBrn6sKUWCgmOqPMiViph6e3hPARgSqETR9FgAHrsKigyJfbN3/+GvZRezNUZnNjU9lEXxVKAvGP3oAIoZGdi/Tz8+iaXy/mMa6sD130dAV31rneDAbDxmQU62EplQLhGIxZ5SMFSyOKyytTIq5DgjYbcNxXMelqSN/Da23evlAH/IsafR/vbFrLghOJo7KYsyyScyu4xrIkty2wUqlwBkklyYrQ==</ds:SignatureValue>ds:KeyInfods:X509Datads:X509CertificateMIIDEjCCAfqgAwIBAgIVAMECQ1tjghafm5OxWDh9hwZfxthWMA0GCSqGSIb3DQEBCwUAMBYxFDAS”>http://www.w3.org/2001/04/xmlenc#sha256"/>ds:DigestValueXopWXzLUbIzBKqANPWc2qPwnDB+GHIYcxC7hrPDiylI=</ds:DigestValue></ds:Reference></ds:SignedInfo>ds:SignatureValueL0dNeanbeHfItthWgnv1zRR4VbFHHvnR0MOqkdvFDQnPvdXvadd5h01cnaCDFhQ8TtnqVzNIesO63OV8TzYeN7JUWKdktvv0/IBjag9V2Z5a6WkUiFytOzEg4tCBrn6sKUWCgmOqPMiViph6e3hPARgSqETR9FgAHrsKigyJfbN3/+GvZRezNUZnNjU9lEXxVKAvGP3oAIoZGdi/Tz8+iaXy/mMa6sD130dAV31rneDAbDxmQU62EplQLhGIxZ5SMFSyOKyytTIq5DgjYbcNxXMelqSN/Da23evlAH/IsafR/vbFrLghOJo7KYsyyScyu4xrIkty2wUqlwBkklyYrQ==</ds:SignatureValue>ds:KeyInfods:X509Datads:X509CertificateMIIDEjCCAfqgAwIBAgIVAMECQ1tjghafm5OxWDh9hwZfxthWMA0GCSqGSIb3DQEBCwUAMBYxFDAS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==</ds:X509Certificate></ds:X509Data></ds:KeyInfo></ds:Signature>saml2p:Status<saml2p:StatusCode Value=“urn:oasis:names:tc:SAML:2.0:status:Success”/></saml2p:Status><saml2:Assertion ID=“_d11d36d533b58b02dbc9cbc1906cd656” IssueInstant=“2020-05-13T19:33:04.531Z” Version=“2.0” xmlns:saml2=“urn:oasis:names:tc:SAML:2.0:assertion”>saml2:Issuerhttps://samltest.id/saml/idp</saml2:Issuer>saml2:Subject<saml2:NameID Format=“urn:oasis:names:tc:SAML:2.0:nameid-format:transient” NameQualifier=“<a href=“https://samltest.id/saml/idp””>https://samltest.id/saml/idp" SPNameQualifier=“<a href=“http://localhost:51901/””>http://localhost:51901/“ xmlns:saml2=“urn:oasis:names:tc:SAML:2.0:assertion”>AAdzZWNyZXQxBXlXJ6zJC21AyuSDg2VLlxjRPf44zJSPmRikrY1wvqe0p+0CnHQTgypqZv4cBOv16q/Gw34EQK3Jk5ykMsaSOeGYAUjXRRE9cP6uMZCZA7j20zuhJo0rcFWQ</saml2:NameID><saml2:SubjectConfirmation Method=“urn:oasis:names:tc:SAML:2.0:cm:bearer”><saml2:SubjectConfirmationData Address=“172.31.12.208” InResponseTo=”_8c1e1466-574b-4ff6-b8f7-f7a5d7745324" NotOnOrAfter=“2020-05-13T19:38:04.540Z” Recipient=“</saml2:SubjectConfirmation></saml2:Subject>saml2:Conditions"http://localhost:51901/SAML/AssertionConsumerService.aspx”/></saml2:SubjectConfirmation></saml2:Subject><saml2:Conditions NotBefore=“2020-05-13T19:33:04.531Z” NotOnOrAfter=“2020-05-13T19:38:04.531Z”>saml2:AudienceRestrictionsaml2:Audiencehttp://localhost:51901/</saml2:Audience></saml2:AudienceRestriction></saml2:Conditions><saml2:AuthnStatement AuthnInstant=“2020-05-13T19:33:04.524Z” SessionIndex=“_74fb817b98886d396528ce1b3d6cee0c”><saml2:SubjectLocality Address=“172.31.12.208”/>saml2:AuthnContextsaml2:AuthnContextClassRefurn:oasis:names:tc:SAML:2.0:ac:classes:PasswordProtectedTransport</saml2:AuthnContextClassRef></saml2:AuthnContext></saml2:AuthnStatement>saml2:AttributeStatement<saml2:Attribute FriendlyName=“uid” Name=“urn:oid:0.9.2342.19200300.100.1.1” NameFormat=“urn:oasis:names:tc:SAML:2.0:attrname-format:uri”>saml2:AttributeValuerick</saml2:AttributeValue></saml2:Attribute><saml2:Attribute Name=“urn:oasis:names:tc:SAML:attribute:subject-id” NameFormat=“urn:oasis:names:tc:SAML:2.0:attrname-format:uri”><saml2:AttributeValue xmlns:xsi=“<a href=“http://www.w3.org/2001/XMLSchema-instance””>http://www.w3.org/2001/XMLSchema-instance" xsi:type=“xsd:string”>rsanchez@samltest.id</saml2:AttributeValue></saml2:Attribute><saml2:Attribute FriendlyName=“role” Name=“<a href=“https://samltest.id/attributes/role””>https://samltest.id/attributes/role" NameFormat=“urn:oasis:names:tc:SAML:2.0:attrname-format:uri”><saml2:AttributeValue xmlns:xsi=“<a href=“http://www.w3.org/2001/XMLSchema-instance””>http://www.w3.org/2001/XMLSchema-instance" xsi:type=“xsd:string”>manager@samltest.id</saml2:AttributeValue></saml2:Attribute><saml2:Attribute FriendlyName=“telephoneNumber” Name=“urn:oid:2.5.4.20” NameFormat=“urn:oasis:names:tc:SAML:2.0:attrname-format:uri”>saml2:AttributeValue+1-555-555-5515</saml2:AttributeValue></saml2:Attribute><saml2:Attribute FriendlyName=“mail” Name=“urn:oid:0.9.2342.19200300.100.1.3” NameFormat=“urn:oasis:names:tc:SAML:2.0:attrname-format:uri”>saml2:AttributeValuersanchez@samltest.id</saml2:AttributeValue></saml2:Attribute><saml2:Attribute FriendlyName=“sn” Name=“urn:oid:2.5.4.4” NameFormat=“urn:oasis:names:tc:SAML:2.0:attrname-format:uri”>saml2:AttributeValueSanchez</saml2:AttributeValue></saml2:Attribute><saml2:Attribute FriendlyName=“displayName” Name=“urn:oid:2.16.840.1.113730.3.1.241” NameFormat=“urn:oasis:names:tc:SAML:2.0:attrname-format:uri”>saml2:AttributeValueRick Sanchez</saml2:AttributeValue></saml2:Attribute><saml2:Attribute FriendlyName=“givenName” Name=“urn:oid:2.5.4.42” NameFormat=“urn:oasis:names:tc:SAML:2.0:attrname-format:uri”>saml2:AttributeValueRick</saml2:AttributeValue></saml2:Attribute></saml2:AttributeStatement></saml2:Assertion></saml2p:Response>
8696/6: 5/13/2020 12:33:57 PM: Received SAML message: <saml2p:Response Destination=“<a href=“http://localhost:51901/SAML/AssertionConsumerService.aspx””>http://localhost:51901/SAML/AssertionConsumerService.aspx" ID=“_654db9bbb92d606a14bccfe9129826a6” InResponseTo=“_8c1e1466-574b-4ff6-b8f7-f7a5d7745324” IssueInstant=“2020-05-13T19:33:04.531Z” Version=“2.0” xmlns:saml2p=“urn:oasis:names:tc:SAML:2.0:protocol” xmlns:xsd=“saml2:Issuer"http://www.w3.org/2001/XMLSchema”><saml2:Issuer xmlns:saml2=“urn:oasis:names:tc:SAML:2.0:assertion”>https://samltest.id/saml/idp</saml2:Issuer><ds:Signature xmlns:ds=“ds:SignedInfods:CanonicalizationMethod"http://www.w3.org/2000/09/xmldsig#”>ds:SignedInfo<ds:CanonicalizationMethod Algorithm=“<a href=“http://www.w3.org/2001/10/xml-exc-c14n#””>http://www.w3.org/2001/10/xml-exc-c14n#“ /><ds:SignatureMethod Algorithm=”<a href=“http://www.w3.org/2001/04/xmldsig-more#rsa-sha256"”>http://www.w3.org/2001/04/xmldsig-more#rsa-sha256" /><ds:Reference URI=“#_654db9bbb92d606a14bccfe9129826a6”>ds:Transforms<ds:Transform Algorithm=“<a href=“http://www.w3.org/2000/09/xmldsig#enveloped-signature””>http://www.w3.org/2000/09/xmldsig#enveloped-signature" /><ds:Transform Algorithm=“ec:InclusiveNamespaces"http://www.w3.org/2001/10/xml-exc-c14n#”><ec:InclusiveNamespaces PrefixList=“xsd” xmlns:ec=“<a href=“http://www.w3.org/2001/10/xml-exc-c14n#””>http://www.w3.org/2001/10/xml-exc-c14n#“ /></ds:Transform></ds:Transforms><ds:DigestMethod Algorithm=”<a href=“http://www.w3.org/2001/04/xmlenc#sha256"”>http://www.w3.org/2001/04/xmlenc#sha256" />ds:DigestValueXopWXzLUbIzBKqANPWc2qPwnDB+GHIYcxC7hrPDiylI=</ds:DigestValue></ds:Reference></ds:SignedInfo>ds:SignatureValueL0dNeanbeHfItthWgnv1zRR4VbFHHvnR0MOqkdvFDQnPvdXvadd5h01cnaCDFhQ8TtnqVzNIesO63OV8TzYeN7JUWKdktvv0/IBjag9V2Z5a6WkUiFytOzEg4tCBrn6sKUWCgmOqPMiViph6e3hPARgSqETR9FgAHrsKigyJfbN3/+GvZRezNUZnNjU9lEXxVKAvGP3oAIoZGdi/Tz8+iaXy/mMa6sD130dAV31rneDAbDxmQU62EplQLhGIxZ5SMFSyOKyytTIq5DgjYbcNxXMelqSN/Da23evlAH/IsafR/vbFrLghOJo7KYsyyScyu4xrIkty2wUqlwBkklyYrQ==</ds:SignatureValue>ds:KeyInfods:X509Datads:X509CertificateMIIDEjCCAfqgAwIBAgIVAMECQ1tjghafm5OxWDh9hwZfxthWMA0GCSqGSIb3DQEBCwUAMBYxFDAS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==</ds:X509Certificate></ds:X509Data></ds:KeyInfo></ds:Signature>saml2p:Status<saml2p:StatusCode Value=“urn:oasis:names:tc:SAML:2.0:status:Success” /></saml2p:Status><saml2:Assertion ID=“_d11d36d533b58b02dbc9cbc1906cd656” IssueInstant=“2020-05-13T19:33:04.531Z” Version=“2.0” xmlns:saml2=“urn:oasis:names:tc:SAML:2.0:assertion”>saml2:Issuerhttps://samltest.id/saml/idp</saml2:Issuer>saml2:Subject<saml2:NameID Format=“urn:oasis:names:tc:SAML:2.0:nameid-format:transient” NameQualifier=“<a href=“https://samltest.id/saml/idp””>https://samltest.id/saml/idp" SPNameQualifier=“<a href=“http://localhost:51901/””>http://localhost:51901/“ xmlns:saml2=“urn:oasis:names:tc:SAML:2.0:assertion”>AAdzZWNyZXQxBXlXJ6zJC21AyuSDg2VLlxjRPf44zJSPmRikrY1wvqe0p+0CnHQTgypqZv4cBOv16q/Gw34EQK3Jk5ykMsaSOeGYAUjXRRE9cP6uMZCZA7j20zuhJo0rcFWQ</saml2:NameID><saml2:SubjectConfirmation Method=“urn:oasis:names:tc:SAML:2.0:cm:bearer”><saml2:SubjectConfirmationData Address=“172.31.12.208” InResponseTo=”_8c1e1466-574b-4ff6-b8f7-f7a5d7745324" NotOnOrAfter=“2020-05-13T19:38:04.540Z” Recipient=“<a href=“http://localhost:51901/SAML/AssertionConsumerService.aspx””>http://localhost:51901/SAML/AssertionConsumerService.aspx" /></saml2:SubjectConfirmation></saml2:Subject><saml2:Conditions NotBefore=“2020-05-13T19:33:04.531Z” NotOnOrAfter=“2020-05-13T19:38:04.531Z”>saml2:AudienceRestrictionsaml2:Audiencehttp://localhost:51901/</saml2:Audience></saml2:AudienceRestriction></saml2:Conditions><saml2:AuthnStatement AuthnInstant=“2020-05-13T19:33:04.524Z” SessionIndex=“_74fb817b98886d396528ce1b3d6cee0c”><saml2:SubjectLocality Address=“172.31.12.208” />saml2:AuthnContextsaml2:AuthnContextClassRefurn:oasis:names:tc:SAML:2.0:ac:classes:PasswordProtectedTransport</saml2:AuthnContextClassRef></saml2:AuthnContext></saml2:AuthnStatement>saml2:AttributeStatement<saml2:Attribute FriendlyName=“uid” Name=“urn:oid:0.9.2342.19200300.100.1.1” NameFormat=“urn:oasis:names:tc:SAML:2.0:attrname-format:uri”>saml2:AttributeValuerick</saml2:AttributeValue></saml2:Attribute><saml2:Attribute Name=“urn:oasis:names:tc:SAML:attribute:subject-id” NameFormat=“urn:oasis:names:tc:SAML:2.0:attrname-format:uri”><saml2:AttributeValue xmlns:xsi=“<a href=“http://www.w3.org/2001/XMLSchema-instance””>http://www.w3.org/2001/XMLSchema-instance" xsi:type=“xsd:string”>rsanchez@samltest.id</saml2:AttributeValue></saml2:Attribute><saml2:Attribute FriendlyName=“role” Name=“<a href=“https://samltest.id/attributes/role””>https://samltest.id/attributes/role" NameFormat=“urn:oasis:names:tc:SAML:2.0:attrname-format:uri”><saml2:AttributeValue xmlns:xsi=“<a href=“http://www.w3.org/2001/XMLSchema-instance””>http://www.w3.org/2001/XMLSchema-instance" xsi:type=“xsd:string”>manager@samltest.id</saml2:AttributeValue></saml2:Attribute><saml2:Attribute FriendlyName=“telephoneNumber” Name=“urn:oid:2.5.4.20” NameFormat=“urn:oasis:names:tc:SAML:2.0:attrname-format:uri”>saml2:AttributeValue+1-555-555-5515</saml2:AttributeValue></saml2:Attribute><saml2:Attribute FriendlyName=“mail” Name=“urn:oid:0.9.2342.19200300.100.1.3” NameFormat=“urn:oasis:names:tc:SAML:2.0:attrname-format:uri”>saml2:AttributeValuersanchez@samltest.id</saml2:AttributeValue></saml2:Attribute><saml2:Attribute FriendlyName=“sn” Name=“urn:oid:2.5.4.4” NameFormat=“urn:oasis:names:tc:SAML:2.0:attrname-format:uri”>saml2:AttributeValueSanchez</saml2:AttributeValue></saml2:Attribute><saml2:Attribute FriendlyName=“displayName” Name=“urn:oid:2.16.840.1.113730.3.1.241” NameFormat=“urn:oasis:names:tc:SAML:2.0:attrname-format:uri”>saml2:AttributeValueRick Sanchez</saml2:AttributeValue></saml2:Attribute><saml2:Attribute FriendlyName=“givenName” Name=“urn:oid:2.5.4.42” NameFormat=“urn:oasis:names:tc:SAML:2.0:attrname-format:uri”>saml2:AttributeValueRick</saml2:AttributeValue></saml2:Attribute></saml2:AttributeStatement></saml2:Assertion></saml2p:Response>
8696/6: 5/13/2020 12:33:57 PM: Form variable RelayState=/
8696/6: 5/13/2020 12:33:57 PM: Received response over HTTP POST, samlMessage=<saml2p:Response Destination=“<a href=“http://localhost:51901/SAML/AssertionConsumerService.aspx””>http://localhost:51901/SAML/AssertionConsumerService.aspx" ID=“_654db9bbb92d606a14bccfe9129826a6” InResponseTo=“_8c1e1466-574b-4ff6-b8f7-f7a5d7745324” IssueInstant=“2020-05-13T19:33:04.531Z” Version=“2.0” xmlns:saml2p=“urn:oasis:names:tc:SAML:2.0:protocol” xmlns:xsd=“saml2:Issuer"http://www.w3.org/2001/XMLSchema”><saml2:Issuer xmlns:saml2=“urn:oasis:names:tc:SAML:2.0:assertion”>https://samltest.id/saml/idp</saml2:Issuer><ds:Signature xmlns:ds=“ds:SignedInfods:CanonicalizationMethod"http://www.w3.org/2000/09/xmldsig#”>ds:SignedInfo<ds:CanonicalizationMethod Algorithm=“<a href=“http://www.w3.org/2001/10/xml-exc-c14n#””>http://www.w3.org/2001/10/xml-exc-c14n#“ /><ds:SignatureMethod Algorithm=”<a href=“http://www.w3.org/2001/04/xmldsig-more#rsa-sha256"”>http://www.w3.org/2001/04/xmldsig-more#rsa-sha256" /><ds:Reference URI=“#_654db9bbb92d606a14bccfe9129826a6”>ds:Transforms<ds:Transform Algorithm=“<a href=“http://www.w3.org/2000/09/xmldsig#enveloped-signature””>http://www.w3.org/2000/09/xmldsig#enveloped-signature" /><ds:Transform Algorithm=“ec:InclusiveNamespaces"http://www.w3.org/2001/10/xml-exc-c14n#”><ec:InclusiveNamespaces PrefixList=“xsd” xmlns:ec=“<a href=“http://www.w3.org/2001/10/xml-exc-c14n#””>http://www.w3.org/2001/10/xml-exc-c14n#“ /></ds:Transform></ds:Transforms><ds:DigestMethod Algorithm=”<a href=“http://www.w3.org/2001/04/xmlenc#sha256"”>http://www.w3.org/2001/04/xmlenc#sha256" />ds:DigestValueXopWXzLUbIzBKqANPWc2qPwnDB+GHIYcxC7hrPDiylI=</ds:DigestValue></ds:Reference></ds:SignedInfo>ds:SignatureValueL0dNeanbeHfItthWgnv1zRR4VbFHHvnR0MOqkdvFDQnPvdXvadd5h01cnaCDFhQ8TtnqVzNIesO63OV8TzYeN7JUWKdktvv0/IBjag9V2Z5a6WkUiFytOzEg4tCBrn6sKUWCgmOqPMiViph6e3hPARgSqETR9FgAHrsKigyJfbN3/+GvZRezNUZnNjU9lEXxVKAvGP3oAIoZGdi/Tz8+iaXy/mMa6sD130dAV31rneDAbDxmQU62EplQLhGIxZ5SMFSyOKyytTIq5DgjYbcNxXMelqSN/Da23evlAH/IsafR/vbFrLghOJo7KYsyyScyu4xrIkty2wUqlwBkklyYrQ==</ds:SignatureValue>ds:KeyInfods:X509Datads:X509CertificateMIIDEjCCAfqgAwIBAgIVAMECQ1tjghafm5OxWDh9hwZfxthWMA0GCSqGSIb3DQEBCwUAMBYxFDAS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==</ds:X509Certificate></ds:X509Data></ds:KeyInfo></ds:Signature>saml2p:Status<saml2p:StatusCode Value=“urn:oasis:names:tc:SAML:2.0:status:Success” /></saml2p:Status><saml2:Assertion ID=“_d11d36d533b58b02dbc9cbc1906cd656” IssueInstant=“2020-05-13T19:33:04.531Z” Version=“2.0” xmlns:saml2=“urn:oasis:names:tc:SAML:2.0:assertion”>saml2:Issuerhttps://samltest.id/saml/idp</saml2:Issuer>saml2:Subject<saml2:NameID Format=“urn:oasis:names:tc:SAML:2.0:nameid-format:transient” NameQualifier=“<a href=“https://samltest.id/saml/idp””>https://samltest.id/saml/idp" SPNameQualifier=“<a href=“http://localhost:51901/””>http://localhost:51901/“ xmlns:saml2=“urn:oasis:names:tc:SAML:2.0:assertion”>AAdzZWNyZXQxBXlXJ6zJC21AyuSDg2VLlxjRPf44zJSPmRikrY1wvqe0p+0CnHQTgypqZv4cBOv16q/Gw34EQK3Jk5ykMsaSOeGYAUjXRRE9cP6uMZCZA7j20zuhJo0rcFWQ</saml2:NameID><saml2:SubjectConfirmation Method=“urn:oasis:names:tc:SAML:2.0:cm:bearer”><saml2:SubjectConfirmationData Address=“172.31.12.208” InResponseTo=”_8c1e1466-574b-4ff6-b8f7-f7a5d7745324" NotOnOrAfter=“2020-05-13T19:38:04.540Z” Recipient=“<a href=“http://localhost:51901/SAML/AssertionConsumerService.aspx””>http://localhost:51901/SAML/AssertionConsumerService.aspx" /></saml2:SubjectConfirmation></saml2:Subject><saml2:Conditions NotBefore=“2020-05-13T19:33:04.531Z” NotOnOrAfter=“2020-05-13T19:38:04.531Z”>saml2:AudienceRestrictionsaml2:Audiencehttp://localhost:51901/</saml2:Audience></saml2:AudienceRestriction></saml2:Conditions><saml2:AuthnStatement AuthnInstant=“2020-05-13T19:33:04.524Z” SessionIndex=“_74fb817b98886d396528ce1b3d6cee0c”><saml2:SubjectLocality Address=“172.31.12.208” />saml2:AuthnContextsaml2:AuthnContextClassRefurn:oasis:names:tc:SAML:2.0:ac:classes:PasswordProtectedTransport</saml2:AuthnContextClassRef></saml2:AuthnContext></saml2:AuthnStatement>saml2:AttributeStatement<saml2:Attribute FriendlyName=“uid” Name=“urn:oid:0.9.2342.19200300.100.1.1” NameFormat=“urn:oasis:names:tc:SAML:2.0:attrname-format:uri”>saml2:AttributeValuerick</saml2:AttributeValue></saml2:Attribute><saml2:Attribute Name=“urn:oasis:names:tc:SAML:attribute:subject-id” NameFormat=“urn:oasis:names:tc:SAML:2.0:attrname-format:uri”><saml2:AttributeValue xmlns:xsi=“<a href=“http://www.w3.org/2001/XMLSchema-instance””>http://www.w3.org/2001/XMLSchema-instance" xsi:type=“xsd:string”>rsanchez@samltest.id</saml2:AttributeValue></saml2:Attribute><saml2:Attribute FriendlyName=“role” Name=“<a href=“https://samltest.id/attributes/role””>https://samltest.id/attributes/role" NameFormat=“urn:oasis:names:tc:SAML:2.0:attrname-format:uri”><saml2:AttributeValue xmlns:xsi=“<a href=“http://www.w3.org/2001/XMLSchema-instance””>http://www.w3.org/2001/XMLSchema-instance" xsi:type=“xsd:string”>manager@samltest.id</saml2:AttributeValue></saml2:Attribute><saml2:Attribute FriendlyName=“telephoneNumber” Name=“urn:oid:2.5.4.20” NameFormat=“urn:oasis:names:tc:SAML:2.0:attrname-format:uri”>saml2:AttributeValue+1-555-555-5515</saml2:AttributeValue></saml2:Attribute><saml2:Attribute FriendlyName=“mail” Name=“urn:oid:0.9.2342.19200300.100.1.3” NameFormat=“urn:oasis:names:tc:SAML:2.0:attrname-format:uri”>saml2:AttributeValuersanchez@samltest.id</saml2:AttributeValue></saml2:Attribute><saml2:Attribute FriendlyName=“sn” Name=“urn:oid:2.5.4.4” NameFormat=“urn:oasis:names:tc:SAML:2.0:attrname-format:uri”>saml2:AttributeValueSanchez</saml2:AttributeValue></saml2:Attribute><saml2:Attribute FriendlyName=“displayName” Name=“urn:oid:2.16.840.1.113730.3.1.241” NameFormat=“urn:oasis:names:tc:SAML:2.0:attrname-format:uri”>saml2:AttributeValueRick Sanchez</saml2:AttributeValue></saml2:Attribute><saml2:Attribute FriendlyName=“givenName” Name=“urn:oid:2.5.4.42” NameFormat=“urn:oasis:names:tc:SAML:2.0:attrname-format:uri”>saml2:AttributeValueRick</saml2:AttributeValue></saml2:Attribute></saml2:AttributeStatement></saml2:Assertion></saml2p:Response>, relayState=/
8696/6: 5/13/2020 12:33:57 PM: SAML message received: partner=https://samltest.id/saml/idp, message=<saml2p:Response Destination=“<a href=“http://localhost:51901/SAML/AssertionConsumerService.aspx””>http://localhost:51901/SAML/AssertionConsumerService.aspx" ID=“_654db9bbb92d606a14bccfe9129826a6” InResponseTo=“_8c1e1466-574b-4ff6-b8f7-f7a5d7745324” IssueInstant=“2020-05-13T19:33:04.531Z” Version=“2.0” xmlns:saml2p=“urn:oasis:names:tc:SAML:2.0:protocol” xmlns:xsd=“saml2:Issuer"http://www.w3.org/2001/XMLSchema”><saml2:Issuer xmlns:saml2=“urn:oasis:names:tc:SAML:2.0:assertion”>https://samltest.id/saml/idp</saml2:Issuer><ds:Signature xmlns:ds=“ds:SignedInfods:CanonicalizationMethod"http://www.w3.org/2000/09/xmldsig#”>ds:SignedInfo<ds:CanonicalizationMethod Algorithm=“<a href=“http://www.w3.org/2001/10/xml-exc-c14n#””>http://www.w3.org/2001/10/xml-exc-c14n#“ /><ds:SignatureMethod Algorithm=”<a href=“http://www.w3.org/2001/04/xmldsig-more#rsa-sha256"”>http://www.w3.org/2001/04/xmldsig-more#rsa-sha256" /><ds:Reference URI=“#_654db9bbb92d606a14bccfe9129826a6”>ds:Transforms<ds:Transform Algorithm=“<a href=“http://www.w3.org/2000/09/xmldsig#enveloped-signature””>http://www.w3.org/2000/09/xmldsig#enveloped-signature" /><ds:Transform Algorithm=“ec:InclusiveNamespaces"http://www.w3.org/2001/10/xml-exc-c14n#”><ec:InclusiveNamespaces PrefixList=“xsd” xmlns:ec=“<a href=“http://www.w3.org/2001/10/xml-exc-c14n#””>http://www.w3.org/2001/10/xml-exc-c14n#“ /></ds:Transform></ds:Transforms><ds:DigestMethod Algorithm=”<a href=“http://www.w3.org/2001/04/xmlenc#sha256"”>http://www.w3.org/2001/04/xmlenc#sha256" />ds:DigestValueXopWXzLUbIzBKqANPWc2qPwnDB+GHIYcxC7hrPDiylI=</ds:DigestValue></ds:Reference></ds:SignedInfo>ds:SignatureValueL0dNeanbeHfItthWgnv1zRR4VbFHHvnR0MOqkdvFDQnPvdXvadd5h01cnaCDFhQ8TtnqVzNIesO63OV8TzYeN7JUWKdktvv0/IBjag9V2Z5a6WkUiFytOzEg4tCBrn6sKUWCgmOqPMiViph6e3hPARgSqETR9FgAHrsKigyJfbN3/+GvZRezNUZnNjU9lEXxVKAvGP3oAIoZGdi/Tz8+iaXy/mMa6sD130dAV31rneDAbDxmQU62EplQLhGIxZ5SMFSyOKyytTIq5DgjYbcNxXMelqSN/Da23evlAH/IsafR/vbFrLghOJo7KYsyyScyu4xrIkty2wUqlwBkklyYrQ==</ds:SignatureValue>ds:KeyInfods:X509Datads:X509CertificateMIIDEjCCAfqgAwIBAgIVAMECQ1tjghafm5OxWDh9hwZfxthWMA0GCSqGSIb3DQEBCwUAMBYxFDAS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==</ds:X509Certificate></ds:X509Data></ds:KeyInfo></ds:Signature>saml2p:Status<saml2p:StatusCode Value=“urn:oasis:names:tc:SAML:2.0:status:Success” /></saml2p:Status><saml2:Assertion ID=“_d11d36d533b58b02dbc9cbc1906cd656” IssueInstant=“2020-05-13T19:33:04.531Z” Version=“2.0” xmlns:saml2=“urn:oasis:names:tc:SAML:2.0:assertion”>saml2:Issuerhttps://samltest.id/saml/idp</saml2:Issuer>saml2:Subject<saml2:NameID Format=“urn:oasis:names:tc:SAML:2.0:nameid-format:transient” NameQualifier=“<a href=“https://samltest.id/saml/idp””>https://samltest.id/saml/idp" SPNameQualifier=“<a href=“http://localhost:51901/””>http://localhost:51901/“ xmlns:saml2=“urn:oasis:names:tc:SAML:2.0:assertion”>AAdzZWNyZXQxBXlXJ6zJC21AyuSDg2VLlxjRPf44zJSPmRikrY1wvqe0p+0CnHQTgypqZv4cBOv16q/Gw34EQK3Jk5ykMsaSOeGYAUjXRRE9cP6uMZCZA7j20zuhJo0rcFWQ</saml2:NameID><saml2:SubjectConfirmation Method=“urn:oasis:names:tc:SAML:2.0:cm:bearer”><saml2:SubjectConfirmationData Address=“172.31.12.208” InResponseTo=”_8c1e1466-574b-4ff6-b8f7-f7a5d7745324" NotOnOrAfter=“2020-05-13T19:38:04.540Z” Recipient=“<a href=“http://localhost:51901/SAML/AssertionConsumerService.aspx””>http://localhost:51901/SAML/AssertionConsumerService.aspx" /></saml2:SubjectConfirmation></saml2:Subject><saml2:Conditions NotBefore=“2020-05-13T19:33:04.531Z” NotOnOrAfter=“2020-05-13T19:38:04.531Z”>saml2:AudienceRestrictionsaml2:Audiencehttp://localhost:51901/</saml2:Audience></saml2:AudienceRestriction></saml2:Conditions><saml2:AuthnStatement AuthnInstant=“2020-05-13T19:33:04.524Z” SessionIndex=“_74fb817b98886d396528ce1b3d6cee0c”><saml2:SubjectLocality Address=“172.31.12.208” />saml2:AuthnContextsaml2:AuthnContextClassRefurn:oasis:names:tc:SAML:2.0:ac:classes:PasswordProtectedTransport</saml2:AuthnContextClassRef></saml2:AuthnContext></saml2:AuthnStatement>saml2:AttributeStatement<saml2:Attribute FriendlyName=“uid” Name=“urn:oid:0.9.2342.19200300.100.1.1” NameFormat=“urn:oasis:names:tc:SAML:2.0:attrname-format:uri”>saml2:AttributeValuerick</saml2:AttributeValue></saml2:Attribute><saml2:Attribute Name=“urn:oasis:names:tc:SAML:attribute:subject-id” NameFormat=“urn:oasis:names:tc:SAML:2.0:attrname-format:uri”><saml2:AttributeValue xmlns:xsi=“<a href=“http://www.w3.org/2001/XMLSchema-instance””>http://www.w3.org/2001/XMLSchema-instance" xsi:type=“xsd:string”>rsanchez@samltest.id</saml2:AttributeValue></saml2:Attribute><saml2:Attribute FriendlyName=“role” Name=“<a href=“https://samltest.id/attributes/role””>https://samltest.id/attributes/role" NameFormat=“urn:oasis:names:tc:SAML:2.0:attrname-format:uri”><saml2:AttributeValue xmlns:xsi=“<a href=“http://www.w3.org/2001/XMLSchema-instance””>http://www.w3.org/2001/XMLSchema-instance" xsi:type=“xsd:string”>manager@samltest.id</saml2:AttributeValue></saml2:Attribute><saml2:Attribute FriendlyName=“telephoneNumber” Name=“urn:oid:2.5.4.20” NameFormat=“urn:oasis:names:tc:SAML:2.0:attrname-format:uri”>saml2:AttributeValue+1-555-555-5515</saml2:AttributeValue></saml2:Attribute><saml2:Attribute FriendlyName=“mail” Name=“urn:oid:0.9.2342.19200300.100.1.3” NameFormat=“urn:oasis:names:tc:SAML:2.0:attrname-format:uri”>saml2:AttributeValuersanchez@samltest.id</saml2:AttributeValue></saml2:Attribute><saml2:Attribute FriendlyName=“sn” Name=“urn:oid:2.5.4.4” NameFormat=“urn:oasis:names:tc:SAML:2.0:attrname-format:uri”>saml2:AttributeValueSanchez</saml2:AttributeValue></saml2:Attribute><saml2:Attribute FriendlyName=“displayName” Name=“urn:oid:2.16.840.1.113730.3.1.241” NameFormat=“urn:oasis:names:tc:SAML:2.0:attrname-format:uri”>saml2:AttributeValueRick Sanchez</saml2:AttributeValue></saml2:Attribute><saml2:Attribute FriendlyName=“givenName” Name=“urn:oid:2.5.4.42” NameFormat=“urn:oasis:names:tc:SAML:2.0:attrname-format:uri”>saml2:AttributeValueRick</saml2:AttributeValue></saml2:Attribute></saml2:AttributeStatement></saml2:Assertion></saml2p:Response>, relay state=/
8696/6: 5/13/2020 12:33:57 PM: Verifying the SAML response signature.
8696/6: 5/13/2020 12:33:57 PM: Retrieving the signature certificates for the partner identity provider https://samltest.id/saml/idp.
8696/6: 5/13/2020 12:33:57 PM: Loading the X.509 certificate from the file C:\SAML for .NET\Examples\SSO\WebForms\ExampleServiceProvider\Certificates\shibboleth1.cer.
8696/6: 5/13/2020 12:33:57 PM: The X.509 certificate with subject name CN=samltest.id and serial number 00C102435B6382169F9B93B158387D87065FC6D856 has been loaded.
8696/6: 5/13/2020 12:33:57 PM: The X.509 certificate with subject name CN=samltest.id and serial number 00C102435B6382169F9B93B158387D87065FC6D856 has been cached.
8696/6: 5/13/2020 12:33:57 PM: Loading the X.509 certificate from the file C:\SAML for .NET\Examples\SSO\WebForms\ExampleServiceProvider\Certificates\shibboleth2.cer.
8696/6: 5/13/2020 12:33:57 PM: The X.509 certificate with subject name CN=samltest.id and serial number 00C102435B6382169F9B93B158387D87065FC6D856 has been loaded.
8696/6: 5/13/2020 12:33:57 PM: The X.509 certificate with subject name CN=samltest.id and serial number 00C102435B6382169F9B93B158387D87065FC6D856 has been cached.
8696/6: 5/13/2020 12:33:57 PM: The X.509 certificate with subject name CN=samltest.id and serial number 00C102435B6382169F9B93B158387D87065FC6D856 is being used to verify the XML signature.
8696/6: 5/13/2020 12:33:57 PM: Verifying the XML signature.
8696/6: 5/13/2020 12:33:57 PM: XML signature verification was successful.
8696/6: 5/13/2020 12:33:57 PM: The SAML response signature verified.
8696/6: 5/13/2020 12:33:57 PM: Exception: ComponentSpace.SAML2.Exceptions.SAMLProtocolException: An SP-initiated SAML response from https://samltest.id/saml/idp was received unexpectedly.
8696/6: 5/13/2020 12:33:57 PM: at ComponentSpace.SAML2.InternalSAMLServiceProvider.CheckInResponseTo(String inResponseTo)
at ComponentSpace.SAML2.InternalSAMLServiceProvider.ProcessSAMLResponse(XmlElement samlResponseElement, Boolean& isInResponseTo, String& authnContext, String& userName, SAMLAttribute[]& attributes)
at ComponentSpace.SAML2.InternalSAMLServiceProvider.ReceiveSSO(HttpRequest httpRequest, Boolean& isInResponseTo, String& partnerIdP, String& authnContext, String& userName, SAMLAttribute[]& attributes, String& relayState)
at ComponentSpace.SAML2.SAMLServiceProvider.ReceiveSSO(HttpRequest httpRequest, Boolean& isInResponseTo, String& partnerIdP, String& authnContext, String& userName, IDictionary& attributes, String& relayState)
at ExampleServiceProvider.SAML.AssertionConsumerService.Page_Load(Object sender, EventArgs e) in C:\SAML for .NET\Examples\SSO\WebForms\ExampleServiceProvider\SAML\AssertionConsumerService.aspx.cs:line 23
at System.Web.Util.CalliEventHandlerDelegateProxy.Callback(Object sender, EventArgs e)
at System.Web.UI.Control.OnLoad(EventArgs e)
at System.Web.UI.Control.LoadRecursive()
at System.Web.UI.Page.ProcessRequestMain(Boolean includeStagesBeforeAsyncPoint, Boolean includeStagesAfterAsyncPoint)
at System.Web.UI.Page.ProcessRequest(Boolean includeStagesBeforeAsyncPoint, Boolean includeStagesAfterAsyncPoint)
at System.Web.UI.Page.ProcessRequest()
at System.Web.UI.Page.ProcessRequestWithNoAssert(HttpContext context)
at System.Web.UI.Page.ProcessRequest(HttpContext context)
at ASP.saml_assertionconsumerservice_aspx.ProcessRequest(HttpContext context) in c:\Users\AppData\Local\Temp\Temporary ASP.NET Files\vs\006aca5e\c36504cf\App_Web_cyal0bg0.2.cs:line 0
at System.Web.HttpApplication.CallHandlerExecutionStep.System.Web.HttpApplication.IExecutionStep.Execute()
at System.Web.HttpApplication.ExecuteStepImpl(IExecutionStep step)
at System.Web.HttpApplication.ExecuteStep(IExecutionStep step, Boolean& completedSynchronously)
at System.Web.HttpApplication.PipelineStepManager.ResumeSteps(Exception error)
at System.Web.HttpApplication.BeginProcessRequestNotification(HttpContext context, AsyncCallback cb)
at System.Web.HttpRuntime.ProcessRequestNotificationPrivate(IIS7WorkerRequest wr, HttpContext context)
at System.Web.Hosting.PipelineRuntime.ProcessRequestNotificationHelper(IntPtr rootedObjectsPointer, IntPtr nativeRequestContext, IntPtr moduleData, Int32 flags)
at System.Web.Hosting.PipelineRuntime.ProcessRequestNotification(IntPtr rootedObjectsPointer, IntPtr nativeRequestContext, IntPtr moduleData, Int32 flags)
at System.Web.Hosting.UnsafeIISMethods.MgdIndicateCompletion(IntPtr pHandler, RequestNotificationStatus& notificationStatus)
at System.Web.Hosting.PipelineRuntime.ProcessRequestNotificationHelper(IntPtr rootedObjectsPointer, IntPtr nativeRequestContext, IntPtr moduleData, Int32 flags)
at System.Web.Hosting.PipelineRuntime.ProcessRequestNotification(IntPtr rootedObjectsPointer, IntPtr nativeRequestContext, IntPtr moduleData, Int32 flags)


We use a SAML_SessionId to maintain SAML session state in support of the SAML protocol. This cookie is marked as Secure which means that HTTPS must be employed.

The SAML response received at /SAML/AssertionConsumerService.aspx was sent over HTTP rather than HTTPS. This means the SAML_SessionId cookie wasn’t sent by the browser and we didn’t have access to the SAML session state. The SAML response indicated it was in response to a SAML authn request. However, as the SAML session state couldn’t be accessed, we treated this as a SAML protocol error.

Make sure to use HTTPS to access your /SAML/AssertionConsumerService.aspx endpoint.

[quote]
ComponentSpace - 5/13/2020
We use a SAML_SessionId to maintain SAML session state in support of the SAML protocol. This cookie is marked as Secure which means that HTTPS must be employed.

The SAML response received at /SAML/AssertionConsumerService.aspx was sent over HTTP rather than HTTPS. This means the SAML_SessionId cookie wasn't sent by the browser and we didn't have access to the SAML session state. The SAML response indicated it was in response to a SAML authn request. However, as the SAML session state couldn't be accessed, we treated this as a SAML protocol error.

Make sure to use HTTPS to access your /SAML/AssertionConsumerService.aspx endpoint.
[/quote]

Thanks, it worked after changing to https.

Thanks for the update.

[quote]
ComponentSpace - 5/13/2020
Thanks for the update.
[/quote]

Is there a setting to disable logging?

We use the standard .NET framework logging. This is configured through the <system.diagnostics> section of web.config.

You could set the switchValue to Information or simply remove the entire <system.diagnostices> section.

Even if I use https://localhost:44376/Account/AssertionConsumerService, I’m still getting the issue “SamlProtocolException an SP-initiated saml response for “…” is received “unexpectedly” site:componentspace.com”. Before issue is not there. I’m getting this issue recently.

Can you please help me how to resolve it?

We keep track of the SAML protocol state using a SAML_SessionId cookie. It’s possible this cookie is being sent by the browser.

The cookie is marked as Secure and SiteMode=None. Your assertion consumer service is using HTTPS so the Secure flag won’t be the issue. It may be an issue related to the SameSite cookie property.

https://www.componentspace.com/Forums/10511/SAML-Cookie-SameSite-Mode-None

Please enable SAML trace and send the generated log file as an email attachment to support@componentspace.com mentioning your forum post.

https://www.componentspace.com/Forums/17/Enabing-SAML-Trace

[quote]
ComponentSpace - 5/13/2020
We use a SAML_SessionId to maintain SAML session state in support of the SAML protocol. This cookie is marked as Secure which means that HTTPS must be employed.

The SAML response received at /SAML/AssertionConsumerService.aspx was sent over HTTP rather than HTTPS. This means the SAML_SessionId cookie wasn't sent by the browser and we didn't have access to the SAML session state. The SAML response indicated it was in response to a SAML authn request. However, as the SAML session state couldn't be accessed, we treated this as a SAML protocol error.

Make sure to use HTTPS to access your /SAML/AssertionConsumerService.aspx endpoint.
[/quote]

Hello,
I have the same problem and strange enough I use ssl.
Could this problem have another cause please ?

None spring to mind.

Please enable SAML trace and send the generated log file as an email attachment to support@componentspace.com mentioning your forum post.

https://www.componentspace.com/Forums/17/Enabing-SAML-Trace

i have the issue with login ‘An SP-initiated SAML response from http://www.okta.com/exk63omfn84Ir4LPV0h7 was received unexpectedly.

And I can’t find the reason why it happens.

It can’t be HTTPS as a reason (tested under HTTP and HTTPS - no difference here), because implemented RedisSsoSessionStore and RedisIdCache.

Attached log.

We use a SAML_SessionId cookie to maintain SAML session state in support of the SAML protocol.

This cookie isn’t being sent by the browser along with the HTTP Post of the SAML response. This leads to the exception you’re seeing.

Please take a look at the following article which talks about the setting in web.config.

https://www.componentspace.com/Forums/10843/Ramifications-of-setting-httpCookies-sameSite-in-webconfig

If there’s still an issue, please use Chrome’s browser developer tools (F12) to capture the network traffic.

Check the “show filtered out request cookies” flag and hover over the icon to get a reason for the browser not sending the cookie.

https://www.componentspace.com/Forums/11875/Troubleshooting-Missing-Cookies



i mentioned in prev post, that was implemented RedisSession storage. there are no SAML_SessionId cookie, As sessionId stored in Redis, not cookies.

httpCookies setting is not specified and adding it doesn’t change any.

The session information isn’t stored in the cookie. Instead, the cookie value is an index into the Redis session store. If there’s no cookie, we don’t know which session information to retrieve from the Redis session store.