MSIS7054: The SAML logout did not complete properly.

Hi Team,

I have implemented SAML using Componentspace with high level API
the login works fine, the logout is giving 3 error at ADFS’s end:

First error is →
Encountered error during federation passive request.
Additional Data
Protocol Name:
Saml
Relying Party:
Exception details:
Microsoft.IdentityServer.RequestFailedException: MSIS7054: The SAML logout did not complete properly.
at Microsoft.IdentityServer.Web.Protocols.Saml.SamlProtocolHandler.BuildSamlLogoutResponse(SamlContext samlContext, Boolean partialLogout, Boolean& logoutComplete)
at Microsoft.IdentityServer.Web.Protocols.Saml.SamlProtocolHandler.ProcessSignOut(SamlContext samlContext, String redirectUri, List iFrameUris, Boolean partialLogout)
at Microsoft.IdentityServer.Web.Protocols.Saml.SamlProtocolHandler.Signout(ProtocolContext context, String redirectUri, List iFrameSignoutUris)
at Microsoft.IdentityServer.Web.PassiveProtocolListener.ProcessProtocolSignoutRequest(ProtocolContext protocolContext, PassiveProtocolHandler protocolHandler)
at Microsoft.IdentityServer.Web.PassiveProtocolListener.ProcessProtocolRequest(ProtocolContext protocolContext, PassiveProtocolHandler protocolHandler)
at Microsoft.IdentityServer.Web.PassiveProtocolListener.OnGetContext(WrappedHttpListenerContext context)

Second error is →
The verification of the SAML message signature failed.
Message issuer: https://adfstest.arms.aero
Exception details:
MSIS7074: SAML authentication request for the WebSSO profile must specify an issuer with no NameQualifier, SPNameQualifier or SPProvidedId properties.
This request failed.
User Action
Verify that the message issuer configuration in the AD FS configuration database is up to date.
Configure the signing certificate for the specified issuer.
Verify that the issuer’s certificate is up to date.
Verify the issuer and server message signing requirements.

Third error is →
Encountered error during federation passive sign-out.
Additional Data
Exception details:
Microsoft.IdentityServer.RequestFailedException: MSIS7054: The SAML logout did not complete properly.
at Microsoft.IdentityServer.Web.Protocols.Saml.SamlProtocolHandler.BuildSamlLogoutResponse(SamlContext samlContext, Boolean partialLogout, Boolean& logoutComplete)
at Microsoft.IdentityServer.Web.Protocols.Saml.SamlProtocolHandler.ProcessSignOut(SamlContext samlContext, String redirectUri, List iFrameUris, Boolean partialLogout)

Log file not showing any issue. Here is my log file details

aspx.page: Begin PreInit
aspx.page: End PreInit
aspx.page: Begin Init
aspx.page: End Init
aspx.page: Begin InitComplete
aspx.page: End InitComplete
aspx.page: Begin PreLoad
aspx.page: End PreLoad
aspx.page: Begin Load
aspx.page: End Load
aspx.page: Begin LoadComplete
aspx.page: End LoadComplete
aspx.page: Begin PreRender
aspx.page: End PreRender
aspx.page: Begin PreRenderComplete
aspx.page: End PreRenderComplete
aspx.page: Begin SaveState
aspx.page: End SaveState
aspx.page: Begin SaveStateComplete
aspx.page: End SaveStateComplete
aspx.page: Begin Render
aspx.page: End Render
aspx.page: Begin PreInit
aspx.page: End PreInit
aspx.page: Begin Init
aspx.page: End Init
aspx.page: Begin InitComplete
aspx.page: End InitComplete
aspx.page: Begin LoadState
aspx.page: End LoadState
aspx.page: Begin ProcessPostData
aspx.page: End ProcessPostData
aspx.page: Begin PreLoad
aspx.page: End PreLoad
aspx.page: Begin Load
aspx.page: End Load
aspx.page: Begin ProcessPostData Second Try
aspx.page: End ProcessPostData Second Try
aspx.page: Begin Raise ChangedEvents
aspx.page: End Raise ChangedEvents
aspx.page: Begin Raise PostBackEvent
4028/42: 2/14/2019 2:38:07 PM: ComponentSpace.SAML2, Version=3.1.0.0, Culture=neutral, PublicKeyToken=null, .NET v4.0 build, Evaluation.
4028/42: 2/14/2019 2:38:07 PM: CLR: 4.0.30319.42000, OS: Microsoft Windows NT 6.3.9600.0, Account: IIS APPPOOL\adfstest.aerms.aero, Culture: English (United States)
4028/42: 2/14/2019 2:38:07 PM: Initializing the SAML environment.
4028/42: 2/14/2019 2:38:07 PM: Loading the SAML configuration file C:\WEBPROJECT\samlSP\saml.config.
4028/42: 2/14/2019 2:38:07 PM: SAML configuration:
<?xml version="1.0"?>

<ServiceProvider Name=“<a href=“https://adfstest.arms.aero””>https://adfstest.arms.aero"
Description=“Example Service Provider”
AssertionConsumerServiceUrl=“~/SAML/AssertionConsumerService.aspx”
LocalCertificateFile=“Certificates\adfsSP.pfx”
LocalCertificatePassword=“********” />



<PartnerIdentityProvider Name=“<a href=“http://adfstest.arms.aero/adfs/services/trust””>http://adfstest.arms.aero/adfs/services/trust"
Description=“ADFS”
SignAuthnRequest=“false”
SignLogoutRequest=“false”
SignLogoutResponse=“false”
WantAssertionEncrypted=“false”
WantLogoutResponseSigned=“false”
SingleSignOnServiceUrl=“<a href=“https://adfstest.arms.aero/adfs/ls/””>https://adfstest.arms.aero/adfs/ls/
SingleLogoutServiceUrl =”<a href=“https://adfstest.arms.aero/adfs/ls/”“>https://adfstest.arms.aero/adfs/ls/
PartnerCertificateFile=“Certificates\adfsIDP.cer”/>






4028/42: 2/14/2019 2:38:07 PM: The SAML configuration file has been successfully loaded.
4028/42: 2/14/2019 2:38:07 PM: SAML configuration changes in the directory C:\WEBPROJECT\samlSP are being monitored.
4028/42: 2/14/2019 2:38:07 PM: The SAML environment has been successfuly initialized.
4028/42: 2/14/2019 2:38:07 PM: The SAML_SessionId cookie with value 153066c7-3c33-487c-9223-99a910a0ee55 has been set.
4028/42: 2/14/2019 2:38:07 PM: Initiating SSO to the partner identity provider http://adfstest.arms.aero/adfs/services/trust.
4028/42: 2/14/2019 2:38:07 PM: Service provider session (153066c7-3c33-487c-9223-99a910a0ee55) state:
4028/42: 2/14/2019 2:38:07 PM: Sending request over HTTP Redirect, baseURL=https://adfstest.arms.aero/adfs/ls/, samlMessage=<samlp:AuthnRequest ID=“_3dfe82a8-858a-45a7-9296-4eef0f04aedc” Version=“2.0” IssueInstant=“2019-02-14T14:38:07.322Z” Destination=“<a href=“https://adfstest.arms.aero/adfs/ls/””>https://adfstest.arms.aero/adfs/ls/“ ForceAuthn=“false” IsPassive=“false” ProtocolBinding=“urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST” AssertionConsumerServiceURL=”<a href=“https://adfstest.arms.aero/SAML/AssertionConsumerService.aspx”“>https://adfstest.arms.aero/SAML/AssertionConsumerService.aspx” xmlns:samlp=“urn:oasis:names:tc:SAML:2.0:protocol”><saml:Issuer xmlns:saml=“urn:oasis:names:tc:SAML:2.0:assertion”>https://adfstest.arms.aero</saml:Issuer><samlp:NameIDPolicy Format=“urn:oasis:names:tc:SAML:1.1:nameid-format:unspecified” AllowCreate=“true” /></samlp:AuthnRequest>, relayState=/
4028/42: 2/14/2019 2:38:07 PM: Creating HTTP redirect query string.
4028/42: 2/14/2019 2:38:07 PM: Encoding SAML message: <samlp:AuthnRequest ID=“_3dfe82a8-858a-45a7-9296-4eef0f04aedc” Version=“2.0” IssueInstant=“2019-02-14T14:38:07.322Z” Destination=“<a href=“https://adfstest.arms.aero/adfs/ls/””>https://adfstest.arms.aero/adfs/ls/“ ForceAuthn=“false” IsPassive=“false” ProtocolBinding=“urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST” AssertionConsumerServiceURL=”<a href=“https://adfstest.arms.aero/SAML/AssertionConsumerService.aspx”“>https://adfstest.arms.aero/SAML/AssertionConsumerService.aspx” xmlns:samlp=“urn:oasis:names:tc:SAML:2.0:protocol”><saml:Issuer xmlns:saml=“urn:oasis:names:tc:SAML:2.0:assertion”>https://adfstest.arms.aero</saml:Issuer><samlp:NameIDPolicy Format=“urn:oasis:names:tc:SAML:1.1:nameid-format:unspecified” AllowCreate=“true” /></samlp:AuthnRequest>
4028/42: 2/14/2019 2:38:07 PM: Encoded SAML message: fZJfT4MwFMW/Cuk7f8ccawbJ3GIkmUo29MEXc4WLawIt9pap315gaubD9np6zz2/nnZB0NQtX3ZmL7f43iEZK13H7GVSVhgFENnRNAI7nMLMngfzKztErLzKCwHLgllPqEkoGbPA8ZiVEnWYSjIgTS95/tz2AtsPcz/kk4h7M2cSBM/MWvcpQoIZnXtjWuKuC2VFpj9wQDfkAGo1Sm5NLrNulC5whIxZBTXhEJYBkTjgn5JpZVSh6mshSyHfYtZpyRWQIC6hQeKm4Lvl3Yb3sPz1OET8Ns8zO3vY5cxaEqEeqFZKUteg3qE+iAIft5uLnMNS95zZAWo/mfXZ1JL42PZlsPbnFixZDNN8LFWf+C/b4ReDJeeJF+7J6mNOy+/7Xek6U7UovobCGzDno3zHHxVR2tU4yjtJLRaiElj2Tda1+lhpBNM/j9Fd/zpuckz9/9mSbw==
4028/42: 2/14/2019 2:38:07 PM: Query string: SAMLRequest=fZJfT4MwFMW%2FCuk7f8ccawbJ3GIkmUo29MEXc4WLawIt9pap315gaubD9np6zz2%2FnnZB0NQtX3ZmL7f43iEZK13H7GVSVhgFENnRNAI7nMLMngfzKztErLzKCwHLgllPqEkoGbPA8ZiVEnWYSjIgTS95%2Ftz2AtsPcz%2Fkk4h7M2cSBM%2FMWvcpQoIZnXtjWuKuC2VFpj9wQDfkAGo1Sm5NLrNulC5whIxZBTXhEJYBkTjgn5JpZVSh6mshSyHfYtZpyRWQIC6hQeKm4Lvl3Yb3sPz1OET8Ns8zO3vY5cxaEqEeqFZKUteg3qE%2BiAIft5uLnMNS95zZAWo%2FmfXZ1JL42PZlsPbnFixZDNN8LFWf%2BC%2Fb4ReDJeeJF%2B7J6mNOy%2B%2F7Xek6U7UovobCGzDno3zHHxVR2tU4yjtJLRaiElj2Tda1%2BlhpBNM%2Fj9Fd%2Fzpuckz9%2F9mSbw%3D%3D&RelayState=%2F
4028/42: 2/14/2019 2:38:07 PM: Redirect URL: https://adfstest.arms.aero/adfs/ls/?SAMLRequest=fZJfT4MwFMW%2FCuk7f8ccawbJ3GIkmUo29MEXc4WLawIt9pap315gaubD9np6zz2%2FnnZB0NQtX3ZmL7f43iEZK13H7GVSVhgFENnRNAI7nMLMngfzKztErLzKCwHLgllPqEkoGbPA8ZiVEnWYSjIgTS95%2Ftz2AtsPcz%2Fkk4h7M2cSBM%2FMWvcpQoIZnXtjWuKuC2VFpj9wQDfkAGo1Sm5NLrNulC5whIxZBTXhEJYBkTjgn5JpZVSh6mshSyHfYtZpyRWQIC6hQeKm4Lvl3Yb3sPz1OET8Ns8zO3vY5cxaEqEeqFZKUteg3qE%2BiAIft5uLnMNS95zZAWo%2FmfXZ1JL42PZlsPbnFixZDNN8LFWf%2BC%2Fb4ReDJeeJF%2B7J6mNOy%2B%2F7Xek6U7UovobCGzDno3zHHxVR2tU4yjtJLRaiElj2Tda1%2BlhpBNM%2Fj9Fd%2Fzpuckz9%2F9mSbw%3D%3D&RelayState=%2F
4028/42: 2/14/2019 2:38:07 PM: Redirecting to: https://adfstest.arms.aero/adfs/ls/?SAMLRequest=fZJfT4MwFMW%2FCuk7f8ccawbJ3GIkmUo29MEXc4WLawIt9pap315gaubD9np6zz2%2FnnZB0NQtX3ZmL7f43iEZK13H7GVSVhgFENnRNAI7nMLMngfzKztErLzKCwHLgllPqEkoGbPA8ZiVEnWYSjIgTS95%2Ftz2AtsPcz%2Fkk4h7M2cSBM%2FMWvcpQoIZnXtjWuKuC2VFpj9wQDfkAGo1Sm5NLrNulC5whIxZBTXhEJYBkTjgn5JpZVSh6mshSyHfYtZpyRWQIC6hQeKm4Lvl3Yb3sPz1OET8Ns8zO3vY5cxaEqEeqFZKUteg3qE%2BiAIft5uLnMNS95zZAWo%2FmfXZ1JL42PZlsPbnFixZDNN8LFWf%2BC%2Fb4ReDJeeJF%2B7J6mNOy%2B%2F7Xek6U7UovobCGzDno3zHHxVR2tU4yjtJLRaiElj2Tda1%2BlhpBNM%2Fj9Fd%2Fzpuckz9%2F9mSbw%3D%3D&RelayState=%2F
4028/42: 2/14/2019 2:38:07 PM: Request sent over HTTP Redirect.
4028/42: 2/14/2019 2:38:07 PM: SAML message sent: partner=http://adfstest.arms.aero/adfs/services/trust, message=<samlp:AuthnRequest ID=“_3dfe82a8-858a-45a7-9296-4eef0f04aedc” Version=“2.0” IssueInstant=“2019-02-14T14:38:07.322Z” Destination=“<a href=“https://adfstest.arms.aero/adfs/ls/””>https://adfstest.arms.aero/adfs/ls/“ ForceAuthn=“false” IsPassive=“false” ProtocolBinding=“urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST” AssertionConsumerServiceURL=”<a href=“https://adfstest.arms.aero/SAML/AssertionConsumerService.aspx”“>https://adfstest.arms.aero/SAML/AssertionConsumerService.aspx” xmlns:samlp=“urn:oasis:names:tc:SAML:2.0:protocol”><saml:Issuer xmlns:saml=“urn:oasis:names:tc:SAML:2.0:assertion”>https://adfstest.arms.aero</saml:Issuer><samlp:NameIDPolicy Format=“urn:oasis:names:tc:SAML:1.1:nameid-format:unspecified” AllowCreate=“true” /></samlp:AuthnRequest>, relay state=/, destination URL=https://adfstest.arms.aero/adfs/ls/
4028/42: 2/14/2019 2:38:07 PM: Service provider session (153066c7-3c33-487c-9223-99a910a0ee55) state:
Pending response state:
Action: ReceiveSamlResponse
Partner name: http://adfstest.arms.aero/adfs/services/trust
Relay state:
In response to: _3dfe82a8-858a-45a7-9296-4eef0f04aedc

4028/42: 2/14/2019 2:38:07 PM: Initiation of SSO to the partner identity provider http://adfstest.arms.aero/adfs/services/trust has completed successfully.
aspx.page: End Raise PostBackEvent
aspx.page: Begin LoadComplete
aspx.page: End LoadComplete
aspx.page: Begin PreRender
aspx.page: End PreRender
aspx.page: Begin PreRenderComplete
aspx.page: End PreRenderComplete
aspx.page: Begin SaveState
aspx.page: End SaveState
aspx.page: Begin SaveStateComplete
aspx.page: End SaveStateComplete
aspx.page: Begin Render
aspx.page: End Render
aspx.page: Begin PreInit
aspx.page: End PreInit
aspx.page: Begin Init
aspx.page: End Init
aspx.page: Begin InitComplete
aspx.page: End InitComplete
aspx.page: Begin PreLoad
aspx.page: End PreLoad
aspx.page: Begin Load
4028/34: 2/14/2019 2:38:08 PM: Receiving an SSO response from a partner identity provider.
4028/34: 2/14/2019 2:38:08 PM: Service provider session (153066c7-3c33-487c-9223-99a910a0ee55) state:
Pending response state:
Action: ReceiveSamlResponse
Partner name: http://adfstest.arms.aero/adfs/services/trust
Relay state:
In response to: _3dfe82a8-858a-45a7-9296-4eef0f04aedc

4028/34: 2/14/2019 2:38:08 PM: Receiving response over HTTP POST.
4028/34: 2/14/2019 2:38:08 PM: HTTP request:
POST /SAML/AssertionConsumerService.aspx HTTP/1.1
Cache-Control: max-age=0
Connection: keep-alive
Content-Length: 5302
Content-Type: application/x-www-form-urlencoded
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,/;q=0.8
Accept-Encoding: gzip, deflate, br
Accept-Language: en-GB,en-US;q=0.9,en;q=0.8
Cookie: SAML_SessionId=153066c7-3c33-487c-9223-99a910a0ee55
Host: adfstest.arms.aero
Referer: https://adfstest.arms.aero/adfs/ls/?SAMLRequest=fZJfT4MwFMW%2FCuk7f8ccawbJ3GIkmUo29MEXc4WLawIt9pap315gaubD9np6zz2%2FnnZB0NQtX3ZmL7f43iEZK13H7GVSVhgFENnRNAI7nMLMngfzKztErLzKCwHLgllPqEkoGbPA8ZiVEnWYSjIgTS95%2Ftz2AtsPcz%2Fkk4h7M2cSBM%2FMWvcpQoIZnXtjWuKuC2VFpj9wQDfkAGo1Sm5NLrNulC5whIxZBTXhEJYBkTjgn5JpZVSh6mshSyHfYtZpyRWQIC6hQeKm4Lvl3Yb3sPz1OET8Ns8zO3vY5cxaEqEeqFZKUteg3qE%2BiAIft5uLnMNS95zZAWo%2FmfXZ1JL42PZlsPbnFixZDNN8LFWf%2BC%2Fb4ReDJeeJF%2B7J6mNOy%2B%2F7Xek6U7UovobCGzDno3zHHxVR2tU4yjtJLRaiElj2Tda1%2BlhpBNM%2Fj9Fd%2Fzpuckz9%2F9mSbw%3D%3D&RelayState=%2F
User-Agent: Mozilla/5.0 (Windows NT 6.3; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/72.0.3626.109 Safari/537.36
Origin: https://adfstest.arms.aero
Upgrade-Insecure-Requests: 1

SAMLResponse=PHNhbWxwOlJlc3BvbnNlIElEPSJfNDQzZTMyMDctYzEwNS00OGIwLWI3OGEtODgzOTNjZWNhNGQyIiBWZXJzaW9uPSIyLjAiIElzc3VlSW5zdGFudD0iMjAxOS0wMi0xNFQxNDozODowOC40NjNaIiBEZXN0aW5hdGlvbj0iaHR0cHM6Ly9hZGZzdGVzdC5hcm1zLmFlcm8vU0FNTC9Bc3NlcnRpb25Db25zdW1lclNlcnZpY2UuYXNweCIgQ29uc2VudD0idXJuOm9hc2lzOm5hbWVzOnRjOlNBTUw6Mi4wOmNvbnNlbnQ6dW5zcGVjaWZpZWQiIEluUmVzcG9uc2VUbz0iXzNkZmU4MmE4LTg1OGEtNDVhNy05Mjk2LTRlZWYwZjA0YWVkYyIgeG1sbnM6c2FtbHA9InVybjpvYXNpczpuYW1lczp0YzpTQU1MOjIuMDpwcm90b2NvbCI%2BPElzc3VlciB4bWxucz0idXJuOm9hc2lzOm5hbWVzOnRjOlNBTUw6Mi4wOmFzc2VydGlvbiI%2BaHR0cDovL2FkZnN0ZXN0LmFybXMuYWVyby9hZGZzL3NlcnZpY2VzL3RydXN0PC9Jc3N1ZXI%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%2BPGRzOlJlZmVyZW5jZSBVUkk9IiNfZDBmOTg2MzAtNTdmYS00ODExLThmMDItODM3YTliNWRmZGQwIj48ZHM6VHJhbnNmb3Jtcz48ZHM6VHJhbnNmb3JtIEFsZ29yaXRobT0iaHR0cDovL3d3dy53My5vcmcvMjAwMC8wOS94bWxkc2lnI2VudmVsb3BlZC1zaWduYXR1cmUiIC8%2BPGRzOlRyYW5zZm9ybSBBbGdvcml0aG09Imh0dHA6Ly93d3cudzMub3JnLzIwMDEvMTAveG1sLWV4Yy1jMTRuIyIgLz48L2RzOlRyYW5zZm9ybXM%2BPGRzOkRpZ2VzdE1ldGhvZCBBbGdvcml0aG09Imh0dHA6Ly93d3cudzMub3JnLzIwMDAvMDkveG1sZHNpZyNzaGExIiAvPjxkczpEaWdlc3RWYWx1ZT43cnpDZTJpMzkxaUZGMTVjUlVsZ0F5MThxbGM9PC9kczpEaWdlc3RWYWx1ZT48L2RzOlJlZmVyZW5jZT48L2RzOlNpZ25lZEluZm8%2BPGRzOlNpZ25hdHVyZVZhbHVlPldic3hGdjZqNUpqaG9KNUxWZ0NOTFRYL1QxUE13QWFGUkV4ZDZkVTAyVlFhTjlkRWowNlZIMWhWZklDbXhvancvenhpbFJ2aml3Z1RVTnBoa3NiTU4xTDNmNmRETnlVVUN0ZTRGdENZRjFBOGhJaFpUWEJNcjl6NUE2b1EwdkNJUVpWb2dDVk05Y1Q4RVdNNFNpNjliQm1Ib1ZXbDAxbFNQRzJxSmJkTS9ENlJUWWxuRjh1ZThHbTZHbVMwRTlrOGNsSDA1UDNKb1pUT1pVSTR6M2wxRTRxQWpheXcycTUrbGg4bzVmUEZTZGYvS0RxMmlldTB3b3VYVW5XUzdUY1A2N1BEYUlrVEpHWjZGL1dJdS9CVFFCeVZqNzM1N0FmZWNZYTI0Tm1Nc1M4ZDNQZ2xHSnkvemdMNlM2Y0tISEVTLzMyajN4cHkvNzBNUElIN2RCZGJVQT09PC9kczpTaWduYXR1cmVWYWx1ZT48S2V5SW5mbyB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC8wOS94bWxkc2lnIyI%2BPGRzOlg1MDlEYXRhPjxkczpYNTA5Q2VydGlmaWNhdGU%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%2BPC9LZXlJbmZvPjwvZHM6U2lnbmF0dXJlPjxTdWJqZWN0PjxOYW1lSUQ%2BdmFpcmF2QFNBTUxMQUIuQ09NPC9OYW1lSUQ%2BPFN1YmplY3RDb25maXJtYXRpb24gTWV0aG9kPSJ1cm46b2FzaXM6bmFtZXM6dGM6U0FNTDoyLjA6Y206YmVhcmVyIj48U3ViamVjdENvbmZpcm1hdGlvbkRhdGEgSW5SZXNwb25zZVRvPSJfM2RmZTgyYTgtODU4YS00NWE3LTkyOTYtNGVlZjBmMDRhZWRjIiBOb3RPbk9yQWZ0ZXI9IjIwMTktMDItMTRUMTQ6NDM6MDguNDYzWiIgUmVjaXBpZW50PSJodHRwczovL2FkZnN0ZXN0LmFybXMuYWVyby9TQU1ML0Fzc2VydGlvbkNvbnN1bWVyU2VydmljZS5hc3B4IiAvPjwvU3ViamVjdENvbmZpcm1hdGlvbj48L1N1YmplY3Q%2BPENvbmRpdGlvbnMgTm90QmVmb3JlPSIyMDE5LTAyLTE0VDE0OjM4OjA4LjQ2MVoiIE5vdE9uT3JBZnRlcj0iMjAxOS0wMi0xNFQxNTozODowOC40NjFaIj48QXVkaWVuY2VSZXN0cmljdGlvbj48QXVkaWVuY2U%2BaHR0cHM6Ly9hZGZzdGVzdC5hcm1zLmFlcm88L0F1ZGllbmNlPjwvQXVkaWVuY2VSZXN0cmljdGlvbj48L0NvbmRpdGlvbnM%2BPEF0dHJpYnV0ZVN0YXRlbWVudD48QXR0cmlidXRlIE5hbWU9Imh0dHA6Ly9zY2hlbWFzLnhtbHNvYXAub3JnL3dzLzIwMDUvMDUvaWRlbnRpdHkvY2xhaW1zL2dpdmVubmFtZSI%2BPEF0dHJpYnV0ZVZhbHVlPnZhaXJhdjwvQXR0cmlidXRlVmFsdWU%2BPC9BdHRyaWJ1dGU%2BPC9BdHRyaWJ1dGVTdGF0ZW1lbnQ%2BPEF1dGhuU3RhdGVtZW50IEF1dGhuSW5zdGFudD0iMjAxOS0wMi0xNFQxNDozODowOC40MTZaIiBTZXNzaW9uSW5kZXg9Il9kMGY5ODYzMC01N2ZhLTQ4MTEtOGYwMi04MzdhOWI1ZGZkZDAiPjxBdXRobkNvbnRleHQ%2BPEF1dGhuQ29udGV4dENsYXNzUmVmPnVybjpvYXNpczpuYW1lczp0YzpTQU1MOjIuMDphYzpjbGFzc2VzOlBhc3N3b3JkUHJvdGVjdGVkVHJhbnNwb3J0PC9BdXRobkNvbnRleHRDbGFzc1JlZj48L0F1dGhuQ29udGV4dD48L0F1dGhuU3RhdGVtZW50PjwvQXNzZXJ0aW9uPjwvc2FtbHA6UmVzcG9uc2U%2B&RelayState=%2F
4028/34: 2/14/2019 2:38:08 PM: Form variable SAMLResponse=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
4028/34: 2/14/2019 2:38:08 PM: The decoded base-64 string is: <samlp:Response ID=“_443e3207-c105-48b0-b78a-88393ceca4d2” Version=“2.0” IssueInstant=“2019-02-14T14:38:08.463Z” Destination=“<a href=“https://adfstest.arms.aero/SAML/AssertionConsumerService.aspx””>https://adfstest.arms.aero/SAML/AssertionConsumerService.aspx" Consent=“urn:oasis:names:tc:SAML:2.0:consent:unspecified” InResponseTo=“_3dfe82a8-858a-45a7-9296-4eef0f04aedc” xmlns:samlp=“urn:oasis:names:tc:SAML:2.0:protocol”>http://adfstest.arms.aero/adfs/services/trustsamlp:Status<samlp:StatusCode Value=“urn:oasis:names:tc:SAML:2.0:status:Success” /></samlp:Status>http://adfstest.arms.aero/adfs/services/trust<ds:Signature xmlns:ds=“ds:SignedInfods:CanonicalizationMethod"http://www.w3.org/2000/09/xmldsig#”>ds:SignedInfo<ds:CanonicalizationMethod Algorithm=“<a href=“http://www.w3.org/2001/10/xml-exc-c14n#””>http://www.w3.org/2001/10/xml-exc-c14n#“ /><ds:SignatureMethod Algorithm=”<a href=“http://www.w3.org/2000/09/xmldsig#rsa-sha1"”>http://www.w3.org/2000/09/xmldsig#rsa-sha1" /><ds:Reference URI=“#_d0f98630-57fa-4811-8f02-837a9b5dfdd0”>ds:Transforms<ds:Transform Algorithm=“<a href=“http://www.w3.org/2000/09/xmldsig#enveloped-signature””>http://www.w3.org/2000/09/xmldsig#enveloped-signature" /><ds:Transform Algorithm=“<a href=“http://www.w3.org/2001/10/xml-exc-c14n#””>http://www.w3.org/2001/10/xml-exc-c14n#“ /></ds:Transforms><ds:DigestMethod Algorithm=”<a href=“http://www.w3.org/2000/09/xmldsig#sha1"”>http://www.w3.org/2000/09/xmldsig#sha1" />ds:DigestValue7rzCe2i391iFF15cRUlgAy18qlc=</ds:DigestValue></ds:Reference></ds:SignedInfo>ds:SignatureValueWbsxFv6j5JjhoJ5LVgCNLTX/T1PMwAaFRExd6dU02VQaN9dEj06VH1hVfICmxojw/zxilRvjiwgTUNphksbMN1L3f6dDNyUUCte4FtCYF1A8hIhZTXBMr9z5A6oQ0vCIQZVogCVM9cT8EWM4Si69bBmHoVWl01lSPG2qJbdM/D6RTYlnF8ue8Gm6GmS0E9k8clH05P3JoZTOZUI4z3l1E4qAjayw2q5+lh8o5fPFSdf/KDq2ieu0wouXUnWS7TcP67PDaIkTJGZ6F/WIu/BTQByVj7357AfecYa24NmMsS8d3PglGJy/zgL6S6cKHHES/32j3xpy/70MPIH7dBdbUA==</ds:SignatureValue><KeyInfo xmlns=“ds:X509Datads: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</ds:X509Certificate></ds:X509Data></ds:Signature>”>http://www.w3.org/2000/09/xmldsig#“>ds:X509Datads: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</ds:X509Certificate></ds:X509Data></ds:Signature>vairav@SAMLLAB.COM<SubjectConfirmationData InResponseTo=”_3dfe82a8-858a-45a7-9296-4eef0f04aedc" NotOnOrAfter=“2019-02-14T14:43:08.463Z” Recipient=“<a href=“https://adfstest.arms.aero/SAML/AssertionConsumerService.aspx””>https://adfstest.arms.aero/SAML/AssertionConsumerService.aspx" />https://adfstest.arms.aero<Attribute Name=“vairav<AuthnStatement”>http://schemas.xmlsoap.org/ws/2005/05/identity/claims/givenname">vairav<AuthnStatement AuthnInstant=“2019-02-14T14:38:08.416Z” SessionIndex=“_d0f98630-57fa-4811-8f02-837a9b5dfdd0”>urn:oasis:names:tc:SAML:2.0:ac:classes:PasswordProtectedTransport</samlp:Response>
4028/34: 2/14/2019 2:38:08 PM: Received SAML message: <samlp:Response ID=“_443e3207-c105-48b0-b78a-88393ceca4d2” Version=“2.0” IssueInstant=“2019-02-14T14:38:08.463Z” Destination=“<a href=“https://adfstest.arms.aero/SAML/AssertionConsumerService.aspx””>https://adfstest.arms.aero/SAML/AssertionConsumerService.aspx" Consent=“urn:oasis:names:tc:SAML:2.0:consent:unspecified” InResponseTo=“_3dfe82a8-858a-45a7-9296-4eef0f04aedc” xmlns:samlp=“urn:oasis:names:tc:SAML:2.0:protocol”>http://adfstest.arms.aero/adfs/services/trustsamlp:Status<samlp:StatusCode Value=“urn:oasis:names:tc:SAML:2.0:status:Success” /></samlp:Status>http://adfstest.arms.aero/adfs/services/trust<ds:Signature xmlns:ds=“ds:SignedInfods:CanonicalizationMethod"http://www.w3.org/2000/09/xmldsig#”>ds:SignedInfo<ds:CanonicalizationMethod Algorithm=“<a href=“http://www.w3.org/2001/10/xml-exc-c14n#””>http://www.w3.org/2001/10/xml-exc-c14n#“ /><ds:SignatureMethod Algorithm=”<a href=“http://www.w3.org/2000/09/xmldsig#rsa-sha1"”>http://www.w3.org/2000/09/xmldsig#rsa-sha1" /><ds:Reference URI=“#_d0f98630-57fa-4811-8f02-837a9b5dfdd0”>ds:Transforms<ds:Transform Algorithm=“<a href=“http://www.w3.org/2000/09/xmldsig#enveloped-signature””>http://www.w3.org/2000/09/xmldsig#enveloped-signature" /><ds:Transform Algorithm=“<a href=“http://www.w3.org/2001/10/xml-exc-c14n#””>http://www.w3.org/2001/10/xml-exc-c14n#“ /></ds:Transforms><ds:DigestMethod Algorithm=”<a href=“http://www.w3.org/2000/09/xmldsig#sha1"”>http://www.w3.org/2000/09/xmldsig#sha1" />ds:DigestValue7rzCe2i391iFF15cRUlgAy18qlc=</ds:DigestValue></ds:Reference></ds:SignedInfo>ds:SignatureValueWbsxFv6j5JjhoJ5LVgCNLTX/T1PMwAaFRExd6dU02VQaN9dEj06VH1hVfICmxojw/zxilRvjiwgTUNphksbMN1L3f6dDNyUUCte4FtCYF1A8hIhZTXBMr9z5A6oQ0vCIQZVogCVM9cT8EWM4Si69bBmHoVWl01lSPG2qJbdM/D6RTYlnF8ue8Gm6GmS0E9k8clH05P3JoZTOZUI4z3l1E4qAjayw2q5+lh8o5fPFSdf/KDq2ieu0wouXUnWS7TcP67PDaIkTJGZ6F/WIu/BTQByVj7357AfecYa24NmMsS8d3PglGJy/zgL6S6cKHHES/32j3xpy/70MPIH7dBdbUA==</ds:SignatureValue><KeyInfo xmlns=“ds:X509Datads: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</ds:X509Certificate></ds:X509Data></ds:Signature>”>http://www.w3.org/2000/09/xmldsig#“>ds:X509Datads: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</ds:X509Certificate></ds:X509Data></ds:Signature>vairav@SAMLLAB.COM<SubjectConfirmationData InResponseTo=”_3dfe82a8-858a-45a7-9296-4eef0f04aedc" NotOnOrAfter=“2019-02-14T14:43:08.463Z” Recipient=“<a href=“https://adfstest.arms.aero/SAML/AssertionConsumerService.aspx””>https://adfstest.arms.aero/SAML/AssertionConsumerService.aspx" />https://adfstest.arms.aero<Attribute Name=“vairav<AuthnStatement”>http://schemas.xmlsoap.org/ws/2005/05/identity/claims/givenname">vairav<AuthnStatement AuthnInstant=“2019-02-14T14:38:08.416Z” SessionIndex=“_d0f98630-57fa-4811-8f02-837a9b5dfdd0”>urn:oasis:names:tc:SAML:2.0:ac:classes:PasswordProtectedTransport</samlp:Response>
4028/34: 2/14/2019 2:38:08 PM: Form variable RelayState=/
4028/34: 2/14/2019 2:38:08 PM: Received response over HTTP POST, samlMessage=<samlp:Response ID=“_443e3207-c105-48b0-b78a-88393ceca4d2” Version=“2.0” IssueInstant=“2019-02-14T14:38:08.463Z” Destination=“<a href=“https://adfstest.arms.aero/SAML/AssertionConsumerService.aspx””>https://adfstest.arms.aero/SAML/AssertionConsumerService.aspx" Consent=“urn:oasis:names:tc:SAML:2.0:consent:unspecified” InResponseTo=“_3dfe82a8-858a-45a7-9296-4eef0f04aedc” xmlns:samlp=“urn:oasis:names:tc:SAML:2.0:protocol”>http://adfstest.arms.aero/adfs/services/trustsamlp:Status<samlp:StatusCode Value=“urn:oasis:names:tc:SAML:2.0:status:Success” /></samlp:Status>http://adfstest.arms.aero/adfs/services/trust<ds:Signature xmlns:ds=“ds:SignedInfods:CanonicalizationMethod"http://www.w3.org/2000/09/xmldsig#”>ds:SignedInfo<ds:CanonicalizationMethod Algorithm=“<a href=“http://www.w3.org/2001/10/xml-exc-c14n#””>http://www.w3.org/2001/10/xml-exc-c14n#“ /><ds:SignatureMethod Algorithm=”<a href=“http://www.w3.org/2000/09/xmldsig#rsa-sha1"”>http://www.w3.org/2000/09/xmldsig#rsa-sha1" /><ds:Reference URI=“#_d0f98630-57fa-4811-8f02-837a9b5dfdd0”>ds:Transforms<ds:Transform Algorithm=“<a href=“http://www.w3.org/2000/09/xmldsig#enveloped-signature””>http://www.w3.org/2000/09/xmldsig#enveloped-signature" /><ds:Transform Algorithm=“<a href=“http://www.w3.org/2001/10/xml-exc-c14n#””>http://www.w3.org/2001/10/xml-exc-c14n#“ /></ds:Transforms><ds:DigestMethod Algorithm=”<a href=“http://www.w3.org/2000/09/xmldsig#sha1"”>http://www.w3.org/2000/09/xmldsig#sha1" />ds:DigestValue7rzCe2i391iFF15cRUlgAy18qlc=</ds:DigestValue></ds:Reference></ds:SignedInfo>ds:SignatureValueWbsxFv6j5JjhoJ5LVgCNLTX/T1PMwAaFRExd6dU02VQaN9dEj06VH1hVfICmxojw/zxilRvjiwgTUNphksbMN1L3f6dDNyUUCte4FtCYF1A8hIhZTXBMr9z5A6oQ0vCIQZVogCVM9cT8EWM4Si69bBmHoVWl01lSPG2qJbdM/D6RTYlnF8ue8Gm6GmS0E9k8clH05P3JoZTOZUI4z3l1E4qAjayw2q5+lh8o5fPFSdf/KDq2ieu0wouXUnWS7TcP67PDaIkTJGZ6F/WIu/BTQByVj7357AfecYa24NmMsS8d3PglGJy/zgL6S6cKHHES/32j3xpy/70MPIH7dBdbUA==</ds:SignatureValue><KeyInfo xmlns=“ds:X509Datads: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</ds:X509Certificate></ds:X509Data></ds:Signature>”>http://www.w3.org/2000/09/xmldsig#“>ds:X509Datads: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</ds:X509Certificate></ds:X509Data></ds:Signature>vairav@SAMLLAB.COM<SubjectConfirmationData InResponseTo=”_3dfe82a8-858a-45a7-9296-4eef0f04aedc" NotOnOrAfter=“2019-02-14T14:43:08.463Z” Recipient=“<a href=“https://adfstest.arms.aero/SAML/AssertionConsumerService.aspx””>https://adfstest.arms.aero/SAML/AssertionConsumerService.aspx" />https://adfstest.arms.aero<Attribute Name=“vairav<AuthnStatement”>http://schemas.xmlsoap.org/ws/2005/05/identity/claims/givenname">vairav<AuthnStatement AuthnInstant=“2019-02-14T14:38:08.416Z” SessionIndex=“_d0f98630-57fa-4811-8f02-837a9b5dfdd0”>urn:oasis:names:tc:SAML:2.0:ac:classes:PasswordProtectedTransport</samlp:Response>, relayState=/
4028/34: 2/14/2019 2:38:08 PM: SAML message received: partner=http://adfstest.arms.aero/adfs/services/trust, message=<samlp:Response ID=“_443e3207-c105-48b0-b78a-88393ceca4d2” Version=“2.0” IssueInstant=“2019-02-14T14:38:08.463Z” Destination=“<a href=“https://adfstest.arms.aero/SAML/AssertionConsumerService.aspx””>https://adfstest.arms.aero/SAML/AssertionConsumerService.aspx" Consent=“urn:oasis:names:tc:SAML:2.0:consent:unspecified” InResponseTo=“_3dfe82a8-858a-45a7-9296-4eef0f04aedc” xmlns:samlp=“urn:oasis:names:tc:SAML:2.0:protocol”>http://adfstest.arms.aero/adfs/services/trustsamlp:Status<samlp:StatusCode Value=“urn:oasis:names:tc:SAML:2.0:status:Success” /></samlp:Status>http://adfstest.arms.aero/adfs/services/trust<ds:Signature xmlns:ds=“ds:SignedInfods:CanonicalizationMethod"http://www.w3.org/2000/09/xmldsig#”>ds:SignedInfo<ds:CanonicalizationMethod Algorithm=“<a href=“http://www.w3.org/2001/10/xml-exc-c14n#””>http://www.w3.org/2001/10/xml-exc-c14n#“ /><ds:SignatureMethod Algorithm=”<a href=“http://www.w3.org/2000/09/xmldsig#rsa-sha1"”>http://www.w3.org/2000/09/xmldsig#rsa-sha1" /><ds:Reference URI=“#_d0f98630-57fa-4811-8f02-837a9b5dfdd0”>ds:Transforms<ds:Transform Algorithm=“<a href=“http://www.w3.org/2000/09/xmldsig#enveloped-signature””>http://www.w3.org/2000/09/xmldsig#enveloped-signature" /><ds:Transform Algorithm=“<a href=“http://www.w3.org/2001/10/xml-exc-c14n#””>http://www.w3.org/2001/10/xml-exc-c14n#“ /></ds:Transforms><ds:DigestMethod Algorithm=”<a href=“http://www.w3.org/2000/09/xmldsig#sha1"”>http://www.w3.org/2000/09/xmldsig#sha1" />ds:DigestValue7rzCe2i391iFF15cRUlgAy18qlc=</ds:DigestValue></ds:Reference></ds:SignedInfo>ds:SignatureValueWbsxFv6j5JjhoJ5LVgCNLTX/T1PMwAaFRExd6dU02VQaN9dEj06VH1hVfICmxojw/zxilRvjiwgTUNphksbMN1L3f6dDNyUUCte4FtCYF1A8hIhZTXBMr9z5A6oQ0vCIQZVogCVM9cT8EWM4Si69bBmHoVWl01lSPG2qJbdM/D6RTYlnF8ue8Gm6GmS0E9k8clH05P3JoZTOZUI4z3l1E4qAjayw2q5+lh8o5fPFSdf/KDq2ieu0wouXUnWS7TcP67PDaIkTJGZ6F/WIu/BTQByVj7357AfecYa24NmMsS8d3PglGJy/zgL6S6cKHHES/32j3xpy/70MPIH7dBdbUA==</ds:SignatureValue><KeyInfo xmlns=“ds:X509Datads:X509CertificateMIIC4DCCAcigAwIBAgIQL7CrwDZSg6ZI0E/gKPpzJjANBgkqhkiG9w0BAQsFADAsMSowKAYDVQQDEyFBREZTIFNpZ25pbmcgLSBhZGZzdGVzdC5hcm1zLmFlcm8wHhcNMTgxMjA4MDY1NzQyWhcNMTkxMjA4MDY1NzQyWjAsMSowKAYDVQQDEyFBREZTIFNpZ25pbmcgLSBhZGZzdGVzdC5hcm1zLmFlcm8wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQCvpF9ag1qQDH/tbFNm8In1Ee8JjvhWFbYtxQUtmegbuR0qA8ko1ZXhQvXa3Ly4B8bW3BmyXJIQ45yKUa78uJR8r6XSNIS/9VMJ1VP3KvIVB7lMtUCjIpvH/AgBA5UAnCUcdL83sWZU1evcKIcagrWdagl3E1KKazBjvHgmbkc2aJnppLXptSnzN6eV8DAdUDODOOJl1q1OvmLM9d//oC3prb9W5Y2I65o5+S0E594U3eevhfUrDU/pgnIlAHhpJePOFv90MsW0c2ezeBormpUDb7WadLaxilRsP+CjWclvbGPgsvoatAWAODDmEaKuE0fSKp8H1mbHfwI1xvNuEWXpAgMBAAEwDQYJKoZIhvcNAQELBQADggEBACyi61AjqnaoMwlJhQqxcciWnxv5HQIPCrtnZdTmrz4lsWiyRjeEZVZXWuZnXjTI+6a+4Zu3jNh9LDRADKO4iE0un1hchYo0MURvejWQASDxk4dPc/egsmb4GwsACZNIYQG/iq4Ucwmy36FNNGiBjinL1bDHRaPa53l2OQ5AHz/P6cDrSGyRjGqpSSgHgfOoG6QA8W2ANmEpcSxnJ7KKNVjUpF4tjtgwixRlGPYOq0orL6bosXvp1Ivcr/Dg9u6tk8BOQYqpSjwwi1RTrgOv8hueTiW9Fc771/7JLy9J5JA6QYB3TqmRA6NCoWP35Bm75II9Mtg33ZCxJXGo3s15XMM=</ds:X509Certificate></ds:X509Data></ds:Signature>”>http://www.w3.org/2000/09/xmldsig#“>ds:X509Datads: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</ds:X509Certificate></ds:X509Data></ds:Signature>vairav@SAMLLAB.COM<SubjectConfirmationData InResponseTo=”_3dfe82a8-858a-45a7-9296-4eef0f04aedc" NotOnOrAfter=“2019-02-14T14:43:08.463Z” Recipient=“<a href=“https://adfstest.arms.aero/SAML/AssertionConsumerService.aspx””>https://adfstest.arms.aero/SAML/AssertionConsumerService.aspx" />https://adfstest.arms.aero<Attribute Name=“vairav<AuthnStatement”>http://schemas.xmlsoap.org/ws/2005/05/identity/claims/givenname">vairav<AuthnStatement AuthnInstant=“2019-02-14T14:38:08.416Z” SessionIndex=“_d0f98630-57fa-4811-8f02-837a9b5dfdd0”>urn:oasis:names:tc:SAML:2.0:ac:classes:PasswordProtectedTransport</samlp:Response>, relay state=/
4028/34: 2/14/2019 2:38:08 PM: Verifying the SAML assertion signature.
4028/34: 2/14/2019 2:38:08 PM: Retrieving the signature certificates for the partner identity provider http://adfstest.arms.aero/adfs/services/trust.
4028/34: 2/14/2019 2:38:08 PM: Loading the X.509 certificate from the file C:\WEBPROJECT\samlSP\Certificates\adfsIDP.cer.
4028/34: 2/14/2019 2:38:08 PM: The X.509 certificate with subject name CN=ADFS Signing - adfstest.arms.aero and serial number 2FB0ABC0365283A648D04FE028FA7326 has been loaded.
4028/34: 2/14/2019 2:38:08 PM: The X.509 certificate with subject name CN=ADFS Signing - adfstest.arms.aero and serial number 2FB0ABC0365283A648D04FE028FA7326 has been cached.
4028/34: 2/14/2019 2:38:08 PM: The X.509 certificate with subject name CN=ADFS Signing - adfstest.arms.aero and serial number 2FB0ABC0365283A648D04FE028FA7326 is being used to verify the XML signature.
4028/34: 2/14/2019 2:38:08 PM: Verifying the XML signature.
4028/34: 2/14/2019 2:38:08 PM: XML signature verification was successful.
4028/34: 2/14/2019 2:38:08 PM: The SAML assertion signature verified.
4028/34: 2/14/2019 2:38:08 PM: The SAML authn context won’t be checked as an authn context hasn’t been specified.
4028/34: 2/14/2019 2:38:08 PM: Service provider session (153066c7-3c33-487c-9223-99a910a0ee55) state:
SSO session state:
Partner name: http://adfstest.arms.aero/adfs/services/trust
Name ID: <saml:NameID xmlns:saml=“urn:oasis:names:tc:SAML:2.0:assertion”>vairav@SAMLLAB.COM</saml:NameID>
Session index: _d0f98630-57fa-4811-8f02-837a9b5dfdd0

4028/34: 2/14/2019 2:38:08 PM: An SSO response from the partner identity provider http://adfstest.arms.aero/adfs/services/trust has been successfully received.
aspx.page: End Load
aspx.page: Begin LoadComplete
aspx.page: End LoadComplete
aspx.page: Begin PreRender
aspx.page: End PreRender
aspx.page: Begin PreRenderComplete
aspx.page: End PreRenderComplete
aspx.page: Begin SaveState
aspx.page: End SaveState
aspx.page: Begin SaveStateComplete
aspx.page: End SaveStateComplete
aspx.page: Begin Render
aspx.page: End Render
aspx.page: Begin PreInit
aspx.page: End PreInit
aspx.page: Begin Init
aspx.page: End Init
aspx.page: Begin InitComplete
aspx.page: End InitComplete
aspx.page: Begin PreLoad
aspx.page: End PreLoad
aspx.page: Begin Load
aspx.page: End Load
aspx.page: Begin LoadComplete
aspx.page: End LoadComplete
aspx.page: Begin PreRender
aspx.page: End PreRender
aspx.page: Begin PreRenderComplete
aspx.page: End PreRenderComplete
aspx.page: Begin SaveState
aspx.page: End SaveState
aspx.page: Begin SaveStateComplete
aspx.page: End SaveStateComplete
aspx.page: Begin Render
aspx.page: End Render
aspx.page: Begin PreInit
aspx.page: End PreInit
aspx.page: Begin Init
aspx.page: End Init
aspx.page: Begin InitComplete
aspx.page: End InitComplete
aspx.page: Begin LoadState
aspx.page: End LoadState
aspx.page: Begin ProcessPostData
aspx.page: End ProcessPostData
aspx.page: Begin PreLoad
aspx.page: End PreLoad
aspx.page: Begin Load
aspx.page: End Load
aspx.page: Begin ProcessPostData Second Try
aspx.page: End ProcessPostData Second Try
aspx.page: Begin Raise ChangedEvents
aspx.page: End Raise ChangedEvents
aspx.page: Begin Raise PostBackEvent
4028/35: 2/14/2019 2:38:09 PM: Checking if the partner identity provider http://adfstest.arms.aero/adfs/services/trust has successfully completed SSO and also supports SLO.
4028/35: 2/14/2019 2:38:09 PM: Service provider session (153066c7-3c33-487c-9223-99a910a0ee55) state:
SSO session state:
Partner name: http://adfstest.arms.aero/adfs/services/trust
Name ID: <saml:NameID xmlns:saml=“urn:oasis:names:tc:SAML:2.0:assertion”>vairav@SAMLLAB.COM</saml:NameID>
Session index: _d0f98630-57fa-4811-8f02-837a9b5dfdd0

4028/35: 2/14/2019 2:38:09 PM: SLO to the partner identity provider http://adfstest.arms.aero/adfs/services/trust can occur.
4028/35: 2/14/2019 2:38:09 PM: Initiating SLO to the partner identity provider http://adfstest.arms.aero/adfs/services/trust.
4028/35: 2/14/2019 2:38:09 PM: Service provider session (153066c7-3c33-487c-9223-99a910a0ee55) state:
SSO session state:
Partner name: http://adfstest.arms.aero/adfs/services/trust
Name ID: <saml:NameID xmlns:saml=“urn:oasis:names:tc:SAML:2.0:assertion”>vairav@SAMLLAB.COM</saml:NameID>
Session index: _d0f98630-57fa-4811-8f02-837a9b5dfdd0

4028/35: 2/14/2019 2:38:09 PM: Sending request over HTTP Redirect, baseURL=https://adfstest.arms.aero/adfs/ls/, samlMessage=<samlp:LogoutRequest ID=“_5c216729-7e69-4684-9de7-25dd9cceffb4” Version=“2.0” IssueInstant=“2019-02-14T14:38:09.45Z” Destination=“<a href=“https://adfstest.arms.aero/adfs/ls/””>https://adfstest.arms.aero/adfs/ls/“ NotOnOrAfter=“2019-02-14T14:41:09.45Z” xmlns:samlp=“urn:oasis:names:tc:SAML:2.0:protocol”><saml:Issuer xmlns:saml=“urn:oasis:names:tc:SAML:2.0:assertion”>https://adfstest.arms.aero</saml:Issuer><saml:NameID xmlns:saml=“urn:oasis:names:tc:SAML:2.0:assertion”>vairav@SAMLLAB.COM</saml:NameID>samlp:SessionIndex_d0f98630-57fa-4811-8f02-837a9b5dfdd0</samlp:SessionIndex></samlp:LogoutRequest>, relayState=
4028/35: 2/14/2019 2:38:09 PM: Creating HTTP redirect query string.
4028/35: 2/14/2019 2:38:09 PM: Encoding SAML message: <samlp:LogoutRequest ID=”_5c216729-7e69-4684-9de7-25dd9cceffb4" Version=“2.0” IssueInstant=“2019-02-14T14:38:09.45Z” Destination=“<a href=“https://adfstest.arms.aero/adfs/ls/””>https://adfstest.arms.aero/adfs/ls/“ NotOnOrAfter=“2019-02-14T14:41:09.45Z” xmlns:samlp=“urn:oasis:names:tc:SAML:2.0:protocol”><saml:Issuer xmlns:saml=“urn:oasis:names:tc:SAML:2.0:assertion”>https://adfstest.arms.aero</saml:Issuer><saml:NameID xmlns:saml=“urn:oasis:names:tc:SAML:2.0:assertion”>vairav@SAMLLAB.COM</saml:NameID>samlp:SessionIndex_d0f98630-57fa-4811-8f02-837a9b5dfdd0</samlp:SessionIndex></samlp:LogoutRequest>
4028/35: 2/14/2019 2:38:09 PM: Encoded SAML message: nZLLTsMwFER/JfLeedV52GojCt1E6kMCxIJN5cY2RErs4OtU/XyStKBSCRZs53rOzLU9B942HVubN9O7R/nRS3BeuVqgfVLFUZrFFGcypZikOcFUyAzHiRC0qqRSB4K8F2mhNnqBYj9EXgnQy1KD49oNUhhRHMY4Is8RYbOchdQnySvyVkNIrbmbjO/OdcCCgAsFbhj43Lbgc2nNJAUNBMjbGrfTO7tUTtpbMIm+wae20cCmlRaot5oZDjUwzVsJzFXsablZs6Ep66xxpjINKubjaTYVt1f+v+0cQNqxPip+rz8PrtCXnO2AKlf/yTny2vLj3ThaL+/9h93mwj8jz/yOPUkY36PUQp6KvQgVzdNZiJNMcUzyKMK5Gi4un2WcHhKhhAjPmBvnl/jjXxSf
4028/35: 2/14/2019 2:38:09 PM: Query string: SAMLRequest=nZLLTsMwFER%2FJfLeedV52GojCt1E6kMCxIJN5cY2RErs4OtU%2FXyStKBSCRZs53rOzLU9B942HVubN9O7R%2FnRS3BeuVqgfVLFUZrFFGcypZikOcFUyAzHiRC0qqRSB4K8F2mhNnqBYj9EXgnQy1KD49oNUhhRHMY4Is8RYbOchdQnySvyVkNIrbmbjO%2FOdcCCgAsFbhj43Lbgc2nNJAUNBMjbGrfTO7tUTtpbMIm%2Bwae20cCmlRaot5oZDjUwzVsJzFXsablZs6Ep66xxpjINKubjaTYVt1f%2Bv%2B0cQNqxPip%2Brz8PrtCXnO2AKlf%2FyTny2vLj3ThaL%2B%2F9h93mwj8jz%2FyOPUkY36PUQp6KvQgVzdNZiJNMcUzyKMK5Gi4un2WcHhKhhAjPmBvnl%2FjjXxSf
4028/35: 2/14/2019 2:38:09 PM: Redirect URL: https://adfstest.arms.aero/adfs/ls/?SAMLRequest=nZLLTsMwFER%2FJfLeedV52GojCt1E6kMCxIJN5cY2RErs4OtU%2FXyStKBSCRZs53rOzLU9B942HVubN9O7R%2FnRS3BeuVqgfVLFUZrFFGcypZikOcFUyAzHiRC0qqRSB4K8F2mhNnqBYj9EXgnQy1KD49oNUhhRHMY4Is8RYbOchdQnySvyVkNIrbmbjO%2FOdcCCgAsFbhj43Lbgc2nNJAUNBMjbGrfTO7tUTtpbMIm%2Bwae20cCmlRaot5oZDjUwzVsJzFXsablZs6Ep66xxpjINKubjaTYVt1f%2Bv%2B0cQNqxPip%2Brz8PrtCXnO2AKlf%2FyTny2vLj3ThaL%2B%2F9h93mwj8jz%2FyOPUkY36PUQp6KvQgVzdNZiJNMcUzyKMK5Gi4un2WcHhKhhAjPmBvnl%2FjjXxSf
4028/35: 2/14/2019 2:38:09 PM: Redirecting to: https://adfstest.arms.aero/adfs/ls/?SAMLRequest=nZLLTsMwFER%2FJfLeedV52GojCt1E6kMCxIJN5cY2RErs4OtU%2FXyStKBSCRZs53rOzLU9B942HVubN9O7R%2FnRS3BeuVqgfVLFUZrFFGcypZikOcFUyAzHiRC0qqRSB4K8F2mhNnqBYj9EXgnQy1KD49oNUhhRHMY4Is8RYbOchdQnySvyVkNIrbmbjO%2FOdcCCgAsFbhj43Lbgc2nNJAUNBMjbGrfTO7tUTtpbMIm%2Bwae20cCmlRaot5oZDjUwzVsJzFXsablZs6Ep66xxpjINKubjaTYVt1f%2Bv%2B0cQNqxPip%2Brz8PrtCXnO2AKlf%2FyTny2vLj3ThaL%2B%2F9h93mwj8jz%2FyOPUkY36PUQp6KvQgVzdNZiJNMcUzyKMK5Gi4un2WcHhKhhAjPmBvnl%2FjjXxSf
4028/35: 2/14/2019 2:38:09 PM: Request sent over HTTP Redirect.
4028/35: 2/14/2019 2:38:09 PM: SAML message sent: partner=http://adfstest.arms.aero/adfs/services/trust, message=<samlp:LogoutRequest ID=”_5c216729-7e69-4684-9de7-25dd9cceffb4" Version=“2.0” IssueInstant=“2019-02-14T14:38:09.45Z” Destination=“<a href=“https://adfstest.arms.aero/adfs/ls/””>https://adfstest.arms.aero/adfs/ls/" NotOnOrAfter=“2019-02-14T14:41:09.45Z” xmlns:samlp=“urn:oasis:names:tc:SAML:2.0:protocol”><saml:Issuer xmlns:saml=“urn:oasis:names:tc:SAML:2.0:assertion”>https://adfstest.arms.aero</saml:Issuer><saml:NameID xmlns:saml=“urn:oasis:names:tc:SAML:2.0:assertion”>vairav@SAMLLAB.COM</saml:NameID>samlp:SessionIndex_d0f98630-57fa-4811-8f02-837a9b5dfdd0</samlp:SessionIndex></samlp:LogoutRequest>, relay state=, destination URL=https://adfstest.arms.aero/adfs/ls/
4028/35: 2/14/2019 2:38:09 PM: Service provider session (153066c7-3c33-487c-9223-99a910a0ee55) state:
Pending response state:
Action: ReceiveLogoutResponse
Partner name: http://adfstest.arms.aero/adfs/services/trust
Relay state:
In response to: _5c216729-7e69-4684-9de7-25dd9cceffb4

4028/35: 2/14/2019 2:38:09 PM: Initiation of SLO to the partner identity provider http://adfstest.arms.aero/adfs/services/trust has completed successfully.
aspx.page: End Raise PostBackEvent
aspx.page: Begin LoadComplete
aspx.page: End LoadComplete
aspx.page: Begin PreRender
aspx.page: End PreRender
aspx.page: Begin PreRenderComplete
aspx.page: End PreRenderComplete
aspx.page: Begin SaveState
aspx.page: End SaveState
aspx.page: Begin SaveStateComplete
aspx.page: End SaveStateComplete
aspx.page: Begin Render
aspx.page: End Render


Please help me what i am doing wrong.
Thanks.


ADFS requires that SAML logout messages it receives are signed.
In your you need to set SignLogoutRequest and SignLogoutResponse to true.
The LocalCertificateFile you have configured will be used to sign the logout messages sent to ADFS.
You need to ensure that the CER file corresponding to your LocalCertificateFile PFX is configured in ADFS under the Signature tab of your relying party’s properties.
ADFS will verify your signatures using the certificate under the Signature tab.
Once you have a signature certificate configured for your relying party in ADFS, it will also expect the SAML authn request to be signed.
Therefore, your SignAuthnRequest must also be set to true.
If you run into any issues with ADFS not being able to validate your certificate, ensure the certificate chain is valid.
If your certificate is self-signed, you will have to copy it to the trusted certificates store on the ADFS server so the chain is valid.