Feedback

  • Contents
 

Troubleshooting

        On this page Hide

This section contains procedures and information for troubleshooting and correcting problems with your Customer Interaction Center Single Sign-On environment.

Single Sign-On troubleshooting tools

For troubleshooting Single Sign-On issues, Genesys recommends Fiddler by Telerik. Fiddler is a web debugging proxy that supports all major operating systems and many frameworks, such as Java, Ruby, and Microsoft .NET.

You can download Fiddler from the following website: http://www.telerik.com/fiddler

Install and configure Fiddler by following the instructions on the following website: http://docs.telerik.com/fiddler/configure-fiddler/tasks/configurefiddler

Caution!

You should allow the interception and decryption of HTTPS traffic on test workstations only. Genesys is not responsible if you allow these activities on a production workstation and information is exposed.

Use the Fiddler online documentation to ensure that you configure Fiddler as required for your specific CIC Single Sign-On environment, including SAML profiles and bindings.

You can then use Fiddler to capture and view web traffic for troubleshooting where the Single Sign-On configuration is failing.

Examine log files

If a CIC client application based on the .NET Framework has trouble authenticating in your CIC Single Sign-On environment, check the application logs on the Windows host computer for IceLib traces.Specifically, you want to examine entries containing class names that start with SAML2.

For the CIC server, you can view the ic_sts logs.

If you are using Microsoft Active Directory Federated Services (AD FS), you can examine the Windows Event Log for identity provider items.

Any IC Web Services errors are displayed to users in the web browser during authentication.

Updating the CIC server causes certificate validation issues

If you upgraded your CIC server from one of the following versions, the upgrade to the current version creates an incompatibility with your previous HTTPS certificates:

  • CIC 4.0 SU5

  • CIC 4.0 SU6

  • CIC 2015 R1

To correct this issue, do the following steps:

  1. Open IC System Manager for the affected CIC server.

  2. In the Subsystem column of the IC System Manager window, locate the IC Secure Token Server entry.

  3. Right-click the IC Secure Token Server entry and select Stop Subsystem from the shortcut menu.

  1. When IC Server Manager prompts you to confirm that you want to stop the IC Secure Token Server service, click Yes.

  2. Wait for the IC Secure Token Server subsystem to stop, which is then indicated with a downward-pointing, red arrow.

  3. On the CIC server, open a Command Prompt window as an Administrator.

  4. In the Command Prompt window, navigate to the drive where the CIC server software was installed by entering and executing the following command:

    D:

    D: is the default drive on which the CIC server software is installed. If you installed the CIC server software to a different drive, replace D with the appropriate letter.

  5. Navigate to the Default subdirectory by entering and executing the following command:

    cd \I3\IC\Certificates\ICSecureTokenServer\Default

  6. Rename the existing Secure Token Server HTTPS certificate by entering and executing the following command:

    ren ICSecureTokenServer*.* ICSecureTokenServer*.*.backup

  7. Navigate to the HTTPS subdirectory by entering and executing the following command:

    cd ..\HTTPS

  8. Copy the previous private key of the CIC server to the ICSecureTokenServer subdirectory by entering and executing the following command:

    copy CICServerName_PrivateKey.bin ..\ICSecureTokenServer\Default\ICSecureTokenServerPrivateKey.bin

    CICServerName is a variable representing the name of this CIC server.

  9. Copy the previous HTTPS certificate of the CIC server to the ICSecureTokenServer subdirectory by entering and executing the following command:

    copy CICServerName_Certificate.cer ..\ICSecureTokenServer\Default\ICServerTokenServerCertificate.cer

    CICServerName is a variable representing the name of this CIC server.

  10. Close the Command Prompt window by entering and executing the exit command.

  11. In the IC System Manager window, restart the IC Secure Token Server entry by right-clicking the entry and selecting Start from the resulting shortcut menu.

  12. When IC Server Manager prompts you to confirm that you want to restart the IC Secure Token Server service, select the Yes button.

  13. Wait for the IC System Manager window to show a green, upward-pointing arrow for the IC Secure Token Server service to indicate that it has successfully restarted.

  14. Close IC System Manager.

  15. Open Interaction Administrator for the CIC server.

  16. In the left pane of the Interaction Administrator window, expand the System Configuration > System Sign-On container and then select the Secure Token Server item.

  17. In the right pane, double-click the Configuration item.

    Interaction Administrator displays the Secure Token Server Configuration dialog box.

  18. Ensure that the paths specified in the Private Key Path and Certificate Path boxes reference the files you created in steps 11 and 12, respectively.

  19. Test a Single Sign-On logon attempt on the CIC client application to ensure that functionality has been restored.

SAML 2.0 message exchange example

This section provides an example of a standard SAML 2.0 <AuthnRequest> message and the <AuthnResponse> from the identity provider. The Secure Token Server subsystem of the CIC server expects identity providers to provide their authentication results in this type of response.

This example uses the HTTP POST binding. In this example, the identity provider uses the following URL address:

https://cic.example.com/adfs/ls/

  1. The user agent accesses the Secure Token Server endpoint for authentication:

    	
      GET /SAML2WebBrowserPOSTHTTPS/login? HTTP/1.1   Host: 10.8.3.198:8043   User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:25.0) Gecko/20100101 Firefox/25.0   Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8   Accept-Language: en-US,en;q=0.5   Accept-Encoding: gzip, deflate   Connection: keep-alive     
  2. The secure token server returns the SAML <AuthnRequest> message that the user agent sends to the identity provider:

    	
      HTTP/1.1 200 OK   Cache-Control: no-cache, no-store   Pragma: no-cache   Content-Type: text/html   Date: Fri, 03 Jan 2014 19:43:12 GMT   Server: I3STSCore   Content-Length: 1616   <html>   <head>   <title>SAML2WebBrowserPOSTHTTPS</title>   </head>   <body>   Authenticating with the identity provider ...   <form method="POST" action="https://cic.example.com/adfs/ls/">   <input type="hidden" name="SAMLRequest" value="PHNhbWxwOkF1dGhuUmVxdWVzdCAgICB4bWxuczpzYW1sPSJ1cm46b2FzaXM6bmFtZXM6dGM6U0FNTDoyLjA6YXNzZXJ0aW9uIiAgICB4bWxuczpzYW1scD0idXJuOm9hc2lzOm5hbWVzOnRjOlNBTUw6Mi4wOnByb3RvY29sIiAgICBJRD0iXzRkZjg1ODQ5YTU2MjMzNDU5YmE0YWNmNjcyZmZhNTNkIiAgICBWZXJzaW9uPSIyLjAiICAgIElzc3VlSW5zdGFudD0iMjAxNC0wMS0wM1QxOTo0MzoxMi4zMzcyNDlaIiAgICBEZXN0aW5hdGlvbj0iaHR0cHM6Ly9jbGF5Lm1pNi5jb20vYWRmcy9scy8iICAgIENvbnNlbnQ9InVybjpvYXNpczpuYW1lczp0YzpTQU1MOjIuMDpjb25zZW50OnVuc3BlY2lmaWVkIiAgICBGb3JjZUF1dGhuPSJmYWxzZSIgICAgSXNQYXNzaXZlPSJmYWxzZSIgICAgQXNzZXJ0aW9uQ29uc3VtZXJTZXJ2aWNlVVJMPSJodHRwczovLzEwLjguMy4xOTg6ODA0My9TQU1MMldlYkJyb3dzZXJQb3N0SFRUUFMvbG9naW4iICAgIFByb3RvY29sQmluZGluZz0idXJuOm9hc2lzOm5hbWVzOnRjOlNBTUw6Mi4wOmJpbmRpbmdzOkhUVFAtUE9TVCIgICAgUHJvdmlkZXJOYW1lPSJodHRwczovLzEwLjguMy4xOTg6ODA0MyI+PHNhbWw6SXNzdWVyPmh0dHBzOi8vMTAuOC4zLjE5ODo4MDQzPC9zYW1sOklzc3Vlcj48L3NhbWxwOkF1dGhuUmVxdWVzdD4="/>   <input type="hidden" name="RelayState" value="12f6b8be-72e9-4bb9-97a1-4392f2746ecd"/>   <noscript>   <p>JavaScript is disabled. Click Submit to continue.</p>   <input type="submit" value="Submit"/>   </noscript>   </form>   <script language="javascript">   window.setTimeout('document.forms[0].submit()', 0);   </script>   </body>   </html>     

    The Base64 encoded SAML <AuthnRequest> message for step 2, when decoded, is as follows:

    	
      <samlp:AuthnRequest xmlns:saml="urn:oasis:names:tc:SAML:2.0:assertion" xmlns:samlp="urn:oasis:names:tc:SAML:2.0:protocol" ID="_4df85849a56233459ba4acf672ffa53d" Version="2.0" IssueInstant="2014-01-03T19:43:12.337249Z" Destination=https://cic.example.com/adfs/ls/ Consent="urn:oasis:names:tc:SAML:2.0:consent:unspecified" ForceAuthn="false" IsPassive="false" AssertionConsumerServiceURL="https://10.8.3.198:8043/SAML2WebBrowserPOSTHTTPS/login" ProtocolBinding="urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST" ProviderName="https://10.8.3.198:8043">   <saml:Issuer>https://10.8.3.198:8043</saml:Issuer>   </samlp:AuthnRequest>   
  3. The user agent posts the SAML <AuthnRequest> message to the identity provider:

    	
      POST /adfs/ls/ HTTP/1.1   Host: cic.example.com   User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:25.0) Gecko/20100101 Firefox/25.0   Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8   Accept-Language: en-US,en;q=0.5   Accept-Encoding: gzip, deflate   Referer: https://10.8.3.198:8043/SAML2WebBrowserPOSTHTTPS/login?   Cookie: MSISIPSelectionPersistent=aHR0cDovL0NsYXkubWk2LmNvbS9hZGZzL3NlcnZpY2VzL3RydXN0   Connection: keep-alive   Content-Type: application/x-www-form-urlencoded   Content-Length: 936      SAMLRequest=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%2BPHNhbWw6SXNzdWVyPmh0dHBzOi8vMTAuOC4zLjE5ODo4MDQzPC9zYW1sOklzc3Vlcj48L3NhbWxwOkF1dGhuUmVxdWVzdD4%3D&RelayState=12f6b8be-72e9-4bb9-97a1-4392f2746ecd   
  4. The identity provider validates the user and responds with a SAML <AuthnResponse> message:

    	
      HTTP/1.1 200 OK   Cache-Control: no-cache   Pragma: no-cache   Content-Type: text/html; charset=utf-8   Expires: -1   Server: Microsoft-IIS/7.5   X-AspNet-Version: 2.0.50727   Set-Cookie: MSISSamlRequest=; expires=Thu, 02-Jan-2014 19:43:14 GMT; path=/adfs/ls   Set-Cookie: MSISAuthenticated=MS8zLzIwMTQgNzo0MzoxNCBQTQ==; path=/adfs/ls; secure; HttpOnly   Set-Cookie: MSISLoopDetectionCookie=MjAxNC0wMS0wMzoxOTo0MzoxNFpcMQ==; path=/adfs/ls; secure; HttpOnly   Persistent-Auth: true   X-Powered-By: ASP.NET   Date: Fri, 03 Jan 2014 19:43:14 GMT   Content-Length: 5580      <html>   <head>   <title>Working...</title>   </head>   <body>   <form method="POST" name="hiddenform" action="https://10.8.3.198:8043/SAML2WebBrowserPOSTHTTPS/login">   <input type="hidden" name="SAMLResponse" value="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" />   <input type="hidden" name="RelayState" value="12f6b8be-72e9-4bb9-97a1-4392f2746ecd" />   <noscript>   <p>   Script is disabled. Click Submit to continue.   </p>   <input type="submit" value="Submit" />   </noscript>   </form>   <script language="javascript">   window.setTimeout('document.forms[0].submit()', 0);   </script>   </body>   </html>   

    The Base64 encoded SAML <AuthnResponse> message for step 4, when decoded, is as follows:

    	
      <samlp:Response ID="_4d9e1e67-7c5c-464e-91ad-78738410db53" Version="2.0" IssueInstant="2014-01-03T19:43:14.391Z" Destination="https://10.8.3.198:8043/SAML2WebBrowserPOSTHTTPS/login" Consent="urn:oasis:names:tc:SAML:2.0:consent:unspecified" InResponseTo="_4df85849a56233459ba4acf672ffa53d" xmlns:samlp="urn:oasis:names:tc:SAML:2.0:protocol">   <Issuer xmlns="urn:oasis:names:tc:SAML:2.0:assertion">     http://cic.example.com/adfs/services/trust   </Issuer>   <samlp:Status>   <samlp:StatusCode Value="urn:oasis:names:tc:SAML:2.0:status:Success" />   </samlp:Status>   <Assertion ID="_a4e99a02-4123-45ff-b9d5-7cad3d650220" IssueInstant="2014-01-03T19:43:14.391Z" Version="2.0" xmlns="urn:oasis:names:tc:SAML:2.0:assertion">   <Issuer>     http://cic.example.com/adfs/services/trust   </Issuer>   <ds:Signature xmlns:ds="http://www.w3.org/2000/09/xmldsig#">   <ds:SignedInfo>   <ds:CanonicalizationMethod Algorithm="http://www.w3.org/2001/10/xml-exc-c14n#" />   <ds:SignatureMethod Algorithm="http://www.w3.org/2001/04/xmldsig-more#rsa-sha256" />   <ds:Reference URI="#_a4e99a02-4123-45ff-b9d5-7cad3d650220">   <ds:Transforms>   <ds:Transform Algorithm="http://www.w3.org/2000/09/xmldsig#enveloped-signature" />   <ds:Transform Algorithm="http://www.w3.org/2001/10/xml-exc-c14n#" />   </ds:Transforms>   <ds:DigestMethod Algorithm="http://www.w3.org/2001/04/xmlenc#sha256" />   <ds:DigestValue>     +34wpDamiPwpnOoP23lcvBDX6tKT/4hLzBKw7Zc56ks=   </ds:DigestValue>   </ds:Reference>   </ds:SignedInfo>   <ds:SignatureValue>     d1PPKeb6RZaKzbm9nQBVNqqT15MbR1RJ/eJTHr/5YiryWCvPmX3MfQ8lqKlVC6ovEeLDmcnRGJ7C/29SGG1UUbl0X830W7Bd4N4qfS25XICVpjt3NT3zwEY1Cb2CCZJIhueGFpqB31IoTffLqfoDkDI7utyINz4TN0JpLKJ79yEACu0ipDlRWCheaSrRjN1DJYu3a8bIPc6O1KIzU+MSYCcYSNlFVjZ+/tJ4vuzvYRTkC6kqvt3IWdg/Ulkq/5NGRMvmVDyElvW3G8JxNm0beG0Zb/SGXHWyozH6d+ROFGbIG3U6OJxJN5O5I7eguCrzEyH74dkiyO23l24rMwoThA==   </ds:SignatureValue>   <KeyInfo xmlns="http://www.w3.org/2000/09/xmldsig#">   <ds:X509Data>   <ds:X509Certificate>     MIIC1DCCAbygAwIBAgIQFWiR+G4EOr1HK/aFUZsj/DANBgkqhkiG9w0BAQsFADAmMSQwIgYDVQQDExtBREZTIFNpZ25pbmcgLSBDbGF5Lm1pNi5jb20wHhcNMTMwODA4MTYzODI1WhcNMTQwODA4MTYzODI1WjAmMSQwIgYDVQQDExtBREZTIFNpZ25pbmcgLSBDbGF5Lm1pNi5jb20wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQChz6zzFaMVXfm3FO7Z+lIZeueNt17Gw+L3F4f3NNoQN/X5JvbHzuMpBHQDUcXuTPQ57c5Ord+XgBVwl2ehbgqdOXL5anHPxCpkgBzrWEHInuVS5XecbAD0Efv8kt3Hp2+JUrEF84aMq4ZxPzKmKIM9Wlz8rY5uoURpffxkCQTZ2UhisInlkaRlNyVHvm4LN1WYdmkilwEQ5wtDWPye6PW6jCK8nT4ts4UdxxoHRoHtNKpwuj0y+ne8rvvMkiQPlOIkmRUkhA1OsdYJ6Wa3IIJRpw2HWm+02iNKHrkwegz/mBc/GNlg3F9gx1W0qZYB2v3WPiQCHgEVGHtj/L6FXq4rAgMBAAEwDQYJKoZIhvcNAQELBQADggEBABueRnPRJhBrwyyuoWwRyK6JxNjFzm5fL1ctwxhmce+yBqhtrJsi+3M/ZjmXt+sGrvPBMxD3US62expzt8WCO4YmsXfk7SH73ad+YXeUkn8EWILF4B4vJ0awPtlFqbUTEZp2eE+mOZDVJJzL54sKxuxAuqIGfyWZp/T+eoG2UpA+D5XcQ8hsPDCy1W34RLbCd5L4hYMgnY6C2O5k/r9o8Kw4lrceHkXi9NgrCU7u+01t4VCyAm825aKZ+NnlFnOgDmmOQ51/IX6wulvwBWxOy6ezFoRd006JvtE1Pb+sRsmOssJGP1NmGtoOIeRX5awI2IeZdWZUJ0NXiuWbCkVl4bI=   </ds:X509Certificate>   </ds:X509Data>   </KeyInfo>   </ds:Signature>   <Subject>   <SubjectConfirmation Method="urn:oasis:names:tc:SAML:2.0:cm:bearer">   <SubjectConfirmationData InResponseTo="_4df85849a56233459ba4acf672ffa53d" NotOnOrAfter="2014-01-03T19:48:14.391Z" Recipient="https://10.8.3.198:8043/SAML2WebBrowserPOSTHTTPS/login" />   </SubjectConfirmation>   </Subject>   <Conditions NotBefore="2014-01-03T19:43:14.390Z" NotOnOrAfter="2014-01-03T20:43:14.390Z">   <AudienceRestriction>   <Audience>     https://10.8.3.198:8043   </Audience>   </AudienceRestriction>   </Conditions>   <AttributeStatement>   <Attribute Name="http://schemas.microsoft.com/ws/2008/06/identity/claims/windowsaccountname">   <AttributeValue>     MI6\Administrator   </AttributeValue>   </Attribute>   </AttributeStatement>   <AuthnStatement AuthnInstant="2014-01-03T19:43:14.358Z">   <AuthnContext>   <AuthnContextClassRef>     urn:federation:authentication:windows   </AuthnContextClassRef>   </AuthnContext>   </AuthnStatement>   </Assertion>   </samlp:Response>   
  5. The user agent posts the SAML <AuthnResponse> message to the secure token server:

    	
      POST /SAML2WebBrowserPOSTHTTPS/login HTTP/1.1   Host: 10.8.3.198:8043   User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:25.0) Gecko/20100101 Firefox/25.0   Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8   Accept-Language: en-US,en;q=0.5   Accept-Encoding: gzip, deflate   Referer: https://cic.example.com/adfs/ls/auth/integrated/   Connection: keep-alive   Content-Type: application/x-www-form-urlencoded   Content-Length: 5155      SAMLResponse=PHNhbWxwOlJlc3BvbnNlIElEPSJfNGQ5ZTFlNjctN2M1Yy00NjRlLTkxYWQtNzg3Mzg0MTBkYjUzIiBWZXJzaW9uPSIyLjAiIElzc3VlSW5zdGFudD0iMjAxNC0wMS0wM1QxOTo0MzoxNC4zOTFaIiBEZXN0aW5hdGlvbj0iaHR0cHM6Ly8xMC44LjMuMTk4OjgwNDMvU0FNTDJXZWJCcm93c2VyUG9zdEhUVFBTL2xvZ2luIiBDb25zZW50PSJ1cm46b2FzaXM6bmFtZXM6dGM6U0FNTDoyLjA6Y29uc2VudDp1bnNwZWNpZmllZCIgSW5SZXNwb25zZVRvPSJfNGRmODU4NDlhNTYyMzM0NTliYTRhY2Y2NzJmZmE1M2QiIHhtbG5zOnNhbWxwPSJ1cm46b2FzaXM6bmFtZXM6dGM6U0FNTDoyLjA6cHJvdG9jb2wiPjxJc3N1ZXIgeG1sbnM9InVybjpvYXNpczpuYW1lczp0YzpTQU1MOjIuMDphc3NlcnRpb24iPmh0dHA6Ly9DbGF5Lm1pNi5jb20vYWRmcy9zZXJ2aWNlcy90cnVzdDwvSXNzdWVyPjxzYW1scDpTdGF0dXM%2BPHNhbWxwOlN0YXR1c0NvZGUgVmFsdWU9InVybjpvYXNpczpuYW1lczp0YzpTQU1MOjIuMDpzdGF0dXM6U3VjY2VzcyIgLz48L3NhbWxwOlN0YXR1cz48QXNzZXJ0aW9uIElEPSJfYTRlOTlhMDItNDEyMy00NWZmLWI5ZDUtN2NhZDNkNjUwMjIwIiBJc3N1ZUluc3RhbnQ9IjIwMTQtMDEtMDNUMTk6NDM6MTQuMzkxWiIgVmVyc2lvbj0iMi4wIiB4bWxucz0idXJuOm9hc2lzOm5hbWVzOnRjOlNBTUw6Mi4wOmFzc2VydGlvbiI%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%2BPC9kczpSZWZlcmVuY2U%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%2BPEtleUluZm8geG1sbnM9Imh0dHA6Ly93d3cudzMub3JnLzIwMDAvMDkveG1sZHNpZyMiPjxkczpYNTA5RGF0YT48ZHM6WDUwOUNlcnRpZmljYXRlPk1JSUMxRENDQWJ5Z0F3SUJBZ0lRRldpUitHNEVPcjFISy9hRlVac2ovREFOQmdrcWhraUc5dzBCQVFzRkFEQW1NU1F3SWdZRFZRUURFeHRCUkVaVElGTnBaMjVwYm1jZ0xTQkRiR0Y1TG0xcE5pNWpiMjB3SGhjTk1UTXdPREE0TVRZek9ESTFXaGNOTVRRd09EQTRNVFl6T0RJMVdqQW1NU1F3SWdZRFZRUURFeHRCUkVaVElGTnBaMjVwYm1jZ0xTQkRiR0Y1TG0xcE5pNWpiMjB3Z2dFaU1BMEdDU3FHU0liM0RRRUJBUVVBQTRJQkR3QXdnZ0VLQW9JQkFRQ2h6Nnp6RmFNVlhmbTNGTzdaK2xJWmV1ZU50MTdHdytMM0Y0ZjNOTm9RTi9YNUp2Ykh6dU1wQkhRRFVjWHVUUFE1N2M1T3JkK1hnQlZ3bDJlaGJncWRPWEw1YW5IUHhDcGtnQnpyV0VISW51VlM1WGVjYkFEMEVmdjhrdDNIcDIrSlVyRUY4NGFNcTRaeFB6S21LSU05V2x6OHJZNXVvVVJwZmZ4a0NRVFoyVWhpc0lubGthUmxOeVZIdm00TE4xV1lkbWtpbHdFUTV3dERXUHllNlBXNmpDSzhuVDR0czRVZHh4b0hSb0h0Tktwd3VqMHkrbmU4cnZ2TWtpUVBsT0lrbVJVa2hBMU9zZFlKNldhM0lJSlJwdzJIV20rMDJpTktIcmt3ZWd6L21CYy9HTmxnM0Y5Z3gxVzBxWllCMnYzV1BpUUNIZ0VWR0h0ai9MNkZYcTRyQWdNQkFBRXdEUVlKS29aSWh2Y05BUUVMQlFBRGdnRUJBQnVlUm5QUkpoQnJ3eXl1b1d3UnlLNkp4TmpGem01ZkwxY3R3eGhtY2UreUJxaHRySnNpKzNNL1pqbVh0K3NHcnZQQk14RDNVUzYyZXhwenQ4V0NPNFltc1hmazdTSDczYWQrWVhlVWtuOEVXSUxGNEI0dkowYXdQdGxGcWJVVEVacDJlRSttT1pEVkpKekw1NHNLeHV4QXVxSUdmeVdacC9UK2VvRzJVcEErRDVYY1E4aHNQREN5MVczNFJMYkNkNUw0aFlNZ25ZNkMyTzVrL3I5bzhLdzRscmNlSGtYaTlOZ3JDVTd1KzAxdDRWQ3lBbTgyNWFLWitObmxGbk9nRG1tT1E1MS9JWDZ3dWx2d0JXeE95NmV6Rm9SZDAwNkp2dEUxUGIrc1JzbU9zc0pHUDFObUd0b09JZVJYNWF3STJJZVpkV1pVSjBOWGl1V2JDa1ZsNGJJPTwvZHM6WDUwOUNlcnRpZmljYXRlPjwvZHM6WDUwOURhdGE%2BPC9LZXlJbmZvPjwvZHM6U2lnbmF0dXJlPjxTdWJqZWN0PjxTdWJqZWN0Q29uZmlybWF0aW9uIE1ldGhvZD0idXJuOm9hc2lzOm5hbWVzOnRjOlNBTUw6Mi4wOmNtOmJlYXJlciI%2BPFN1YmplY3RDb25maXJtYXRpb25EYXRhIEluUmVzcG9uc2VUbz0iXzRkZjg1ODQ5YTU2MjMzNDU5YmE0YWNmNjcyZmZhNTNkIiBOb3RPbk9yQWZ0ZXI9IjIwMTQtMDEtMDNUMTk6NDg6MTQuMzkxWiIgUmVjaXBpZW50PSJodHRwczovLzEwLjguMy4xOTg6ODA0My9TQU1MMldlYkJyb3dzZXJQb3N0SFRUUFMvbG9naW4iIC8%2BPC9TdWJqZWN0Q29uZmlybWF0aW9uPjwvU3ViamVjdD48Q29uZGl0aW9ucyBOb3RCZWZvcmU9IjIwMTQtMDEtMDNUMTk6NDM6MTQuMzkwWiIgTm90T25PckFmdGVyPSIyMDE0LTAxLTAzVDIwOjQzOjE0LjM5MFoiPjxBdWRpZW5jZVJlc3RyaWN0aW9uPjxBdWRpZW5jZT5odHRwczovLzEwLjguMy4xOTg6ODA0MzwvQXVkaWVuY2U%2BPC9BdWRpZW5jZVJlc3RyaWN0aW9uPjwvQ29uZGl0aW9ucz48QXR0cmlidXRlU3RhdGVtZW50PjxBdHRyaWJ1dGUgTmFtZT0iaHR0cDovL3NjaGVtYXMubWljcm9zb2Z0LmNvbS93cy8yMDA4LzA2L2lkZW50aXR5L2NsYWltcy93aW5kb3dzYWNjb3VudG5hbWUiPjxBdHRyaWJ1dGVWYWx1ZT5NSTZcQWRtaW5pc3RyYXRvcjwvQXR0cmlidXRlVmFsdWU%2BPC9BdHRyaWJ1dGU%2BPC9BdHRyaWJ1dGVTdGF0ZW1lbnQ%2BPEF1dGhuU3RhdGVtZW50IEF1dGhuSW5zdGFudD0iMjAxNC0wMS0wM1QxOTo0MzoxNC4zNThaIj48QXV0aG5Db250ZXh0PjxBdXRobkNvbnRleHRDbGFzc1JlZj51cm46ZmVkZXJhdGlvbjphdXRoZW50aWNhdGlvbjp3aW5kb3dzPC9BdXRobkNvbnRleHRDbGFzc1JlZj48L0F1dGhuQ29udGV4dD48L0F1dGhuU3RhdGVtZW50PjwvQXNzZXJ0aW9uPjwvc2FtbHA6UmVzcG9uc2U%2B&RelayState=12f6b8be-72e9-4bb9-97a1-4392f2746ecd   
  6. The secure token server issues the user agent an ININ-STS-TOKEN:

    	
      HTTP/1.1 200 OK   ININ-STS-TOKEN: (3"ExpirationTime"T20140117194314.989423,"IdentityProvider""12f6b8be-72e9-4bb9-97a1-4392f2746ecd","AuthenticationType""SAML2WebBrowserPOSTHTTPS")|Js4dizHlKCwE88R60KKrCi49udulzSkNRKmxKb6P0fphF9jZz/gudeZ4gQ+4kOztj4OvYELeLJYuwSwGS+F4TZgBxJOMc3Wkq8s3cO2QwaBVxgWPt1vMVCeJ3AHwRBuUW5Y0JGvInGwvsW9pJnzY5CxyYDyBKJLe0J9z8mHNnhjoIeHd/BjMYPqVMg9x10wY/dXhXa+GM3O3bZuyGRMzNrW/Vm8J/+mv8N8+2nT9Gxq2hMZGkFhfavaM7EJfYZjInLKep26zZOGwf2tR3bnYICbcLMdrwyTj1jqiHSl0QryiipHGf+eCSEoJxxuabA130xQoFHahzz7NdzspYucpDQ==   Date: Fri, 03 Jan 2014 19:43:15 GMT   Server: I3STSCore   Content-Length: 0