Folks, I have an ASP.NET MVC application that I am trying to protect using the Candidate version of ADFS v2.0 (Geneva). I configured the application as a trust of trusted parties, and I used Fedutil.exe to modify the Web.config application so that it had information about the server in Geneva and used the Geneva server as the source of its claims.
However, when I try to use the MVC application, it redirects to Geneva, after which (after warning me about self-signed certificates) it redirects me to the MVC application again. After accepting both self-signed certificate certificates, the two servers play ping-pong with each other in an endless redirect cycle, until, finally, Geneva spews the following message:
The same client browser session made "6" requests in the last "1" second. Perhaps there will be a bad configuration. Contact your administrator for more information.
There are no errors in the event logs on the MVC side or in Geneva, except for the case containing the above message. If someone could give me some information on how to try to debug, diagnose and, hopefully, fix this problem, I will be eternally grateful.
Again, the Geneva Field is a candidate for the release of ADFS v2.0, and the ASP.NET MVC site was created using the latest (late) version of the Windows Identity Foundation SDK with Web.config modified with FedUtil.exe. WIF SDK.
So, you all will enjoy this ... I tried the same application from Firefox and ... IT WORKS. I get a request for the credentials of my domain, the ADFS v2 server redirects me ONCE, and then I get to the main page of my application, including my account name and personalized greeting. So, now the real problem is this: why the hell does IE8 end up in an endless redirect loop, and Firefox NOT? After even more testing, I was able to get this script unchanged, without changing any default material from ADFS v2 (RC) or from WIF (RTW) to BOTH Safari AND Firefox. IE8 is the only browser that can detect any problem associated with this authentication scenario. I tried everything, including installation and trust in self-signed certificates, adding sites to the local intranet zone and reducing security to a minimum, and even setting the first and third-party cookies, which are always allowed.