<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic The very first SAML SSO page in Unified Communications Infrastructure</title>
    <link>https://community.cisco.com/t5/unified-communications-infrastructure/sso-with-cucm-10-5-and-adfs-3-0/m-p/2574781#M33650</link>
    <description>&lt;P&gt;The very first SAML SSO page shows them with the FQDN, which seems like that would be right. &amp;nbsp;I was kind of thinking the same thing as you, but changing that settings has so many more ramifications that I won't be trying it unless TAC is on the line. &amp;nbsp;&lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
    <pubDate>Wed, 07 Jan 2015 15:35:36 GMT</pubDate>
    <dc:creator>mbaker33</dc:creator>
    <dc:date>2015-01-07T15:35:36Z</dc:date>
    <item>
      <title>SSO with CUCM 10.5 and ADFS 3.0</title>
      <link>https://community.cisco.com/t5/unified-communications-infrastructure/sso-with-cucm-10-5-and-adfs-3-0/m-p/2574761#M33630</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We recently updated our CUCM/CUPS/CUC system to 10.5 in order to take advantage of the SSO capabilities that are now built in. &amp;nbsp;All of the documentation points to ADFS 2.0, and we have an ADFS 3.0 implementation. &amp;nbsp;I am trying to figure out if this is an issue with the Claims Rule code, or if CUCM simply doesn't support ADFS 3.0. &amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We have gone through the following links:&lt;/P&gt;&lt;P&gt;&lt;A href="http://www.cisco.com/c/en/us/td/docs/voice_ip_comm/connection/10x/administration/guide/10xcucsagx/10xcucsag112.html#32035" target="_blank"&gt;http://www.cisco.com/c/en/us/td/docs/voice_ip_comm/connection/10x/administration/guide/10xcucsagx/10xcucsag112.html#32035&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://supportforums.cisco.com/video/12155556/cucm-10x-samlsso-adfs20" target="_blank"&gt;https://supportforums.cisco.com/video/12155556/cucm-10x-samlsso-adfs20&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;But we are having trouble configuring the Custom Claims Rule, we get the attached error.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The rule we are applying is as follows, but with actual server names:&lt;/P&gt;&lt;P&gt;"c:[Type == "&lt;A href="http://schemas.microsoft.com/ws/2008/06/identity/claims/windowsaccountname" target="_blank"&gt;http://schemas.microsoft.com/ws/2008/06/identity/claims/windowsaccountname&lt;/A&gt;"]&lt;BR /&gt;&amp;nbsp;=&amp;gt; issue(Type = "&lt;A href="http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameidentifier" target="_blank"&gt;http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameidentifier&lt;/A&gt;", Issuer = c.Issuer, Originallssuer = c.Originallssuer, Value = c.Value, ValueType = c.ValueType, Properties["&lt;A href="http://schemas.xmlsoap.org/ws/2005/05/identity/claimproperties/format" target="_blank"&gt;http://schemas.xmlsoap.org/ws/2005/05/identity/claimproperties/format&lt;/A&gt;"] = "urn:oasis:names:tc:SAML:3.0:nameid-format: transient", Properties["&lt;A href="http://schemas.xmlsoap.org/ws/2005/05/identity/claimproperties/namequalifier" target="_blank"&gt;http://schemas.xmlsoap.org/ws/2005/05/identity/claimproperties/namequalifier&lt;/A&gt;"] = "&lt;A href="http://adfsserver.domain.com/adfs/com/adfs/service/trust" target="_blank"&gt;http://adfsserver.domain.com/adfs/com/adfs/service/trust&lt;/A&gt;", Properties["&lt;A href="http://schemas.xmlsoap.org/ws/2005/05/identity/claimproperties/spnamequalifier" target="_blank"&gt;http://schemas.xmlsoap.org/ws/2005/05/identity/claimproperties/spnamequalifier&lt;/A&gt;"] = "phoneservername.domain.com");"&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 19 Mar 2019 15:47:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/unified-communications-infrastructure/sso-with-cucm-10-5-and-adfs-3-0/m-p/2574761#M33630</guid>
      <dc:creator>mbaker33</dc:creator>
      <dc:date>2019-03-19T15:47:17Z</dc:date>
    </item>
    <item>
      <title>Mark,Try removing external</title>
      <link>https://community.cisco.com/t5/unified-communications-infrastructure/sso-with-cucm-10-5-and-adfs-3-0/m-p/2574762#M33631</link>
      <description>&lt;P&gt;Mark,&lt;/P&gt;&lt;P&gt;Try removing external quotes. My test rule, albeit for AD FS 2.0, looks like this:&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;CODE&gt;c:[Type == "http://schemas.microsoft.com/ws/2008/06/identity/claims/windowsaccountname"] &lt;/CODE&gt;&lt;/P&gt;&lt;P&gt;&lt;CODE&gt;=&amp;gt; issue(Type = "http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameidentifier", Issuer =&lt;/CODE&gt;&lt;/P&gt;&lt;P&gt;&lt;CODE&gt;c.Issuer, OriginalIssuer = c.OriginalIssuer, Value = c.Value, ValueType = c.ValueType, &lt;/CODE&gt;&lt;/P&gt;&lt;P&gt;&lt;CODE&gt;Properties["http://schemas.xmlsoap.org/ws/2005/05/identity/claimproperties/format"] = &lt;/CODE&gt;&lt;/P&gt;&lt;P&gt;&lt;CODE&gt;"urn:oasis:names:tc:SAML:2.0:nameid-format:transient", &lt;/CODE&gt;&lt;/P&gt;&lt;P&gt;&lt;CODE&gt;Properties["http://schemas.xmlsoap.org/ws/2005/05/identity/claimproperties/namequalifier"] = &lt;/CODE&gt;&lt;/P&gt;&lt;P&gt;&lt;CODE&gt;"http://dc.example.local/adfs/com/adfs/service/trust", &lt;/CODE&gt;&lt;/P&gt;&lt;P&gt;&lt;CODE&gt;Properties["http://schemas.xmlsoap.org/ws/2005/05/identity/claimproperties/spnamequalifier"] = &lt;/CODE&gt;&lt;/P&gt;&lt;P&gt;&lt;CODE&gt;"cucm.example.local"); &lt;/CODE&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;-Mateusz&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 27 Oct 2014 19:40:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/unified-communications-infrastructure/sso-with-cucm-10-5-and-adfs-3-0/m-p/2574762#M33631</guid>
      <dc:creator>Mateusz Pagacz</dc:creator>
      <dc:date>2014-10-27T19:40:33Z</dc:date>
    </item>
    <item>
      <title>I had tried it without the</title>
      <link>https://community.cisco.com/t5/unified-communications-infrastructure/sso-with-cucm-10-5-and-adfs-3-0/m-p/2574763#M33632</link>
      <description>&lt;P&gt;I had tried it without the Quotes before, but something with your formatting is different, because it worked after updating server information!!&amp;nbsp; Thank you very much Mateusz!&lt;/P&gt;&lt;P&gt;Edit:&lt;/P&gt;&lt;P&gt;I think I spoke too soon. &amp;nbsp;When running the SSO test, I get "Error while processing SAML Response." in the results window. &amp;nbsp;I can see that the login was successful on the ADFS server, however, it doesn't seem right on the CUCM server. &amp;nbsp;&lt;/P&gt;&lt;P&gt;Mark&lt;/P&gt;</description>
      <pubDate>Mon, 27 Oct 2014 21:25:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/unified-communications-infrastructure/sso-with-cucm-10-5-and-adfs-3-0/m-p/2574763#M33632</guid>
      <dc:creator>mbaker33</dc:creator>
      <dc:date>2014-10-27T21:25:09Z</dc:date>
    </item>
    <item>
      <title>Mark,I'm not sure if you got</title>
      <link>https://community.cisco.com/t5/unified-communications-infrastructure/sso-with-cucm-10-5-and-adfs-3-0/m-p/2574764#M33633</link>
      <description>&lt;P&gt;Mark,&lt;/P&gt;&lt;P&gt;I'm not sure if you got this worked out but this can be related to a different entityID being used with ADFS 3.0. The correct entityID can be found in the downloaded FederationMetadata.xml from your server https://&lt;U&gt;adfs.domain.com/FederationMetadata/2007-06/FederationMetadata.xml&lt;/U&gt;&lt;/P&gt;&lt;P&gt;Open that XML file and copy the entityID "https://adfs.domain.com/adfs/services/trust" to the location in the custom claim rule for namequalifier.&lt;/P&gt;&lt;P&gt;Previous rules may look like "http://adfs.domain.com/adfs/com/adfs/service/trust”.&lt;/P&gt;&lt;P&gt;So the updated would look like this -&lt;/P&gt;&lt;P&gt;&lt;CODE&gt;c:[Type == "http://schemas.microsoft.com/ws/2008/06/identity/claims/windowsaccountname"] &lt;/CODE&gt;&lt;/P&gt;&lt;P&gt;&lt;CODE&gt;=&amp;gt; issue(Type = "http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameidentifier", Issuer =&lt;/CODE&gt;&lt;/P&gt;&lt;P&gt;&lt;CODE&gt;c.Issuer, OriginalIssuer = c.OriginalIssuer, Value = c.Value, ValueType = c.ValueType, &lt;/CODE&gt;&lt;/P&gt;&lt;P&gt;&lt;CODE&gt;Properties["http://schemas.xmlsoap.org/ws/2005/05/identity/claimproperties/format"] = &lt;/CODE&gt;&lt;/P&gt;&lt;P&gt;&lt;CODE&gt;"urn:oasis:names:tc:SAML:2.0:nameid-format:transient", &lt;/CODE&gt;&lt;/P&gt;&lt;P&gt;&lt;CODE&gt;Properties["http://schemas.xmlsoap.org/ws/2005/05/identity/claimproperties/namequalifier"] = &lt;/CODE&gt;&lt;/P&gt;&lt;P&gt;&lt;CODE&gt;"https://adfs.domain.com/adfs/services/trust", &lt;/CODE&gt;&lt;/P&gt;&lt;P&gt;&lt;CODE&gt;Properties["http://schemas.xmlsoap.org/ws/2005/05/identity/claimproperties/spnamequalifier"] = &lt;/CODE&gt;&lt;/P&gt;&lt;P&gt;&lt;CODE&gt;"cucm.example.local"); &lt;/CODE&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 29 Dec 2014 22:27:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/unified-communications-infrastructure/sso-with-cucm-10-5-and-adfs-3-0/m-p/2574764#M33633</guid>
      <dc:creator>Joshua Warcop</dc:creator>
      <dc:date>2014-12-29T22:27:00Z</dc:date>
    </item>
    <item>
      <title>I thought you were going to</title>
      <link>https://community.cisco.com/t5/unified-communications-infrastructure/sso-with-cucm-10-5-and-adfs-3-0/m-p/2574765#M33634</link>
      <description>&lt;P&gt;I thought you were going to be the hero. &amp;nbsp;I checked and found that the line in question was indeed wrong. &amp;nbsp;I adjusted it, and it had no affect at all. &amp;nbsp;Back to the drawing board....&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Edit:&lt;/P&gt;&lt;P&gt;Also, if I test it from the ADFS test site&amp;nbsp;https://adfs.domain.com/adfs/ls/idpinitiatedsignon, I can sign into ADFS fine, but when signing into the CUCM service, I get "The re-direction url is not available in saml response." which seems like a CUCM issue, but I can't say 100%.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Mark&lt;/P&gt;</description>
      <pubDate>Mon, 05 Jan 2015 16:54:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/unified-communications-infrastructure/sso-with-cucm-10-5-and-adfs-3-0/m-p/2574765#M33634</guid>
      <dc:creator>mbaker33</dc:creator>
      <dc:date>2015-01-05T16:54:43Z</dc:date>
    </item>
    <item>
      <title>That is still correct because</title>
      <link>https://community.cisco.com/t5/unified-communications-infrastructure/sso-with-cucm-10-5-and-adfs-3-0/m-p/2574766#M33635</link>
      <description>&lt;P&gt;That is still correct because signing into ADFS first and selecting the CUCM site will fail. You have to go to the CUCM web page and click the link from there.&lt;/P&gt;&lt;P&gt;Are you doing the "Run SSO Test" from the SAML SSO configuration page?&lt;/P&gt;</description>
      <pubDate>Tue, 06 Jan 2015 20:16:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/unified-communications-infrastructure/sso-with-cucm-10-5-and-adfs-3-0/m-p/2574766#M33635</guid>
      <dc:creator>Joshua Warcop</dc:creator>
      <dc:date>2015-01-06T20:16:18Z</dc:date>
    </item>
    <item>
      <title>Yes, I am.  I assumed that</title>
      <link>https://community.cisco.com/t5/unified-communications-infrastructure/sso-with-cucm-10-5-and-adfs-3-0/m-p/2574767#M33636</link>
      <description>&lt;P&gt;Yes, I am. &amp;nbsp;I assumed that was the case, and wasn't terribly concerned. &amp;nbsp;I received a response from TAC indicating he is seeing&amp;nbsp;‘SSO metadata test time out’ in the logs. &amp;nbsp;He sent me the steps to go through the SAML Single Sign-On Configuration, which I had been doing already.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I bumped the logging to debug level, and got the following error in the log:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;

&lt;PRE&gt;
2015-01-06 15:20:35,715 ERROR [http-bio-443-exec-236] authentication.SAMLAuthenticator - Error while processing saml responseInvalid Status code in Response.

com.sun.identity.saml2.common.SAML2Exception: Invalid Status code in Response.

at com.sun.identity.saml2.common.SAML2Utils.verifyResponse(SAML2Utils.java:418)

at com.sun.identity.saml2.profile.SPACSUtils.processResponse(SPACSUtils.java:1051)

at com.sun.identity.saml2.profile.SPACSUtils.processResponseForFedlet(SPACSUtils.java:2108)

at com.cisco.cpi.sso.saml.sp.security.authentication.SAMLAuthenticator.processResponse(SAMLAuthenticator.java:74)

at com.cisco.cpi.sso.saml.sp.security.authentication.SAMLAuthenticator.process(SAMLAuthenticator.java:58)

at com.cisco.cpi.sso.saml.sp.security.filter.SamlFilter.doFilter(SamlFilter.java:63)

at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:243)

at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:210)

at org.apache.catalina.core.StandardWrapperValve.invoke(StandardWrapperValve.java:222)

at org.apache.catalina.core.StandardContextValve.invoke(StandardContextValve.java:123)

at org.apache.catalina.authenticator.AuthenticatorBase.invoke(AuthenticatorBase.java:472)

at org.apache.catalina.core.StandardHostValve.invoke(StandardHostValve.java:171)

at org.apache.catalina.valves.ErrorReportValve.invoke(ErrorReportValve.java:99)

at org.apache.catalina.valves.AccessLogValve.invoke(AccessLogValve.java:953)

at org.apache.catalina.authenticator.SingleSignOn.invoke(SingleSignOn.java:341)

at org.apache.catalina.core.StandardEngineValve.invoke(StandardEngineValve.java:118)

at org.apache.catalina.connector.CoyoteAdapter.service(CoyoteAdapter.java:408)

at org.apache.coyote.http11.AbstractHttp11Processor.process(AbstractHttp11Processor.java:1023)

at org.apache.coyote.AbstractProtocol$AbstractConnectionHandler.process(AbstractProtocol.java:589)

at org.apache.tomcat.util.net.JIoEndpoint$SocketProcessor.run(JIoEndpoint.java:310)

at java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1145)

at java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:615)

at java.lang.Thread.run(Thread.java:744)

&lt;/PRE&gt;</description>
      <pubDate>Tue, 06 Jan 2015 20:32:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/unified-communications-infrastructure/sso-with-cucm-10-5-and-adfs-3-0/m-p/2574767#M33636</guid>
      <dc:creator>mbaker33</dc:creator>
      <dc:date>2015-01-06T20:32:13Z</dc:date>
    </item>
    <item>
      <title>What browser are you using to</title>
      <link>https://community.cisco.com/t5/unified-communications-infrastructure/sso-with-cucm-10-5-and-adfs-3-0/m-p/2574768#M33637</link>
      <description>&lt;P&gt;What browser are you using to sign into CUCM and is your browser automatically signing you into ADFS during the redirect?&lt;/P&gt;</description>
      <pubDate>Tue, 06 Jan 2015 20:34:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/unified-communications-infrastructure/sso-with-cucm-10-5-and-adfs-3-0/m-p/2574768#M33637</guid>
      <dc:creator>Joshua Warcop</dc:creator>
      <dc:date>2015-01-06T20:34:12Z</dc:date>
    </item>
    <item>
      <title>I have tried IE, Chrome and</title>
      <link>https://community.cisco.com/t5/unified-communications-infrastructure/sso-with-cucm-10-5-and-adfs-3-0/m-p/2574769#M33638</link>
      <description>&lt;P&gt;I have tried IE, Chrome and Firefox and they all have the same behavior. &amp;nbsp;On initially attempts, I am prompted for credentials. &amp;nbsp;On each subsequent attempt, it caches the credentials unless I close out of the browser session and start a new one.&lt;/P&gt;</description>
      <pubDate>Tue, 06 Jan 2015 20:36:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/unified-communications-infrastructure/sso-with-cucm-10-5-and-adfs-3-0/m-p/2574769#M33638</guid>
      <dc:creator>mbaker33</dc:creator>
      <dc:date>2015-01-06T20:36:12Z</dc:date>
    </item>
    <item>
      <title>Are you expecting it to</title>
      <link>https://community.cisco.com/t5/unified-communications-infrastructure/sso-with-cucm-10-5-and-adfs-3-0/m-p/2574770#M33639</link>
      <description>&lt;P&gt;Are you expecting it to prompt for credentials? If your machine is on the same domain as the ADFS server you shouldn't be getting a password prompt. That somewhat defeats the purpose of SSO if you have to enter credentials. If you're in IE make sure you have adfs.domain.com or your domain in your Local Intranet sites list. Chrome shouldn't be prompting you for credentials either if you're domain joined and you can reach a domain controller.&lt;/P&gt;</description>
      <pubDate>Tue, 06 Jan 2015 20:39:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/unified-communications-infrastructure/sso-with-cucm-10-5-and-adfs-3-0/m-p/2574770#M33639</guid>
      <dc:creator>Joshua Warcop</dc:creator>
      <dc:date>2015-01-06T20:39:11Z</dc:date>
    </item>
    <item>
      <title>That is exactly what I was</title>
      <link>https://community.cisco.com/t5/unified-communications-infrastructure/sso-with-cucm-10-5-and-adfs-3-0/m-p/2574771#M33640</link>
      <description>&lt;P&gt;That is exactly what I was thinking, but wasn't 100% sure. &amp;nbsp;I am on the same domain (although, on different subnet), and should not be getting prompted.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Another thing I just noticed that seems odd... &amp;nbsp;Look at the attached image and see the&amp;nbsp;arrow pointing out what seems to be an invalid URL? &amp;nbsp;I'm grasping at straws here....&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Also, since adding the site to trusted sites, i no longer am prompted for credentials, it just fails. &amp;nbsp;I assume that's a step in the right direction.&lt;/P&gt;</description>
      <pubDate>Tue, 06 Jan 2015 20:54:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/unified-communications-infrastructure/sso-with-cucm-10-5-and-adfs-3-0/m-p/2574771#M33640</guid>
      <dc:creator>mbaker33</dc:creator>
      <dc:date>2015-01-06T20:54:38Z</dc:date>
    </item>
    <item>
      <title>Interesting. Are you</title>
      <link>https://community.cisco.com/t5/unified-communications-infrastructure/sso-with-cucm-10-5-and-adfs-3-0/m-p/2574772#M33641</link>
      <description>&lt;P&gt;Interesting. Are you accessing your CUCM server via FQDN in your browser? Something like &lt;A href="https://cucm1.domain.com" target="_blank"&gt;https://cucm1.domain.com&lt;/A&gt; and is your certificate valid?&lt;/P&gt;</description>
      <pubDate>Tue, 06 Jan 2015 20:55:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/unified-communications-infrastructure/sso-with-cucm-10-5-and-adfs-3-0/m-p/2574772#M33641</guid>
      <dc:creator>Joshua Warcop</dc:creator>
      <dc:date>2015-01-06T20:55:39Z</dc:date>
    </item>
    <item>
      <title>We use an internal CA for the</title>
      <link>https://community.cisco.com/t5/unified-communications-infrastructure/sso-with-cucm-10-5-and-adfs-3-0/m-p/2574773#M33642</link>
      <description>&lt;P&gt;We use an internal CA for the certificates, and it does not prompt for authenticity. &amp;nbsp;I've also added the FQDN of the CUCM to the intranet sites list. &amp;nbsp;No change thus far.&lt;/P&gt;</description>
      <pubDate>Tue, 06 Jan 2015 21:05:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/unified-communications-infrastructure/sso-with-cucm-10-5-and-adfs-3-0/m-p/2574773#M33642</guid>
      <dc:creator>mbaker33</dc:creator>
      <dc:date>2015-01-06T21:05:06Z</dc:date>
    </item>
    <item>
      <title>Have you also checked the</title>
      <link>https://community.cisco.com/t5/unified-communications-infrastructure/sso-with-cucm-10-5-and-adfs-3-0/m-p/2574774#M33643</link>
      <description>&lt;P&gt;Have you also checked the "spnamequalifer" in your custom claim rule? You can find the value needed here from your downloaded "SPMetadata.zip" file that you download from CUCM. Open the XML file for your node and make sure the entityID matches between that XML file and your custom claim.&lt;/P&gt;</description>
      <pubDate>Tue, 06 Jan 2015 21:20:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/unified-communications-infrastructure/sso-with-cucm-10-5-and-adfs-3-0/m-p/2574774#M33643</guid>
      <dc:creator>Joshua Warcop</dc:creator>
      <dc:date>2015-01-06T21:20:16Z</dc:date>
    </item>
    <item>
      <title>I had checked the ADFS XML,</title>
      <link>https://community.cisco.com/t5/unified-communications-infrastructure/sso-with-cucm-10-5-and-adfs-3-0/m-p/2574775#M33644</link>
      <description>&lt;P&gt;I had checked the ADFS XML, but for some reason not the one coming from CUCM. &amp;nbsp;Verified they were the same just now (they were) tried again for kicks, no dice.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'm not sure if it matters, but the actual servername is not ADFS, I created the ADFS name specifically for ADFS to use per best practice. &amp;nbsp;I'm wondering if that has something to do with it. &amp;nbsp;I just can't figure out where that would be. &amp;nbsp;But, then again, SAML works when using the TEST URL.&lt;/P&gt;</description>
      <pubDate>Tue, 06 Jan 2015 21:27:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/unified-communications-infrastructure/sso-with-cucm-10-5-and-adfs-3-0/m-p/2574775#M33644</guid>
      <dc:creator>mbaker33</dc:creator>
      <dc:date>2015-01-06T21:27:32Z</dc:date>
    </item>
    <item>
      <title>Hi,i have exactly same issue.</title>
      <link>https://community.cisco.com/t5/unified-communications-infrastructure/sso-with-cucm-10-5-and-adfs-3-0/m-p/2574776#M33645</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;i have exactly same issue. I cant enable the&amp;nbsp;SAML Single Sign-On as i came not across the "Run SSO Test" .&lt;/P&gt;&lt;P&gt;First time i test i got a prompt for login&amp;nbsp;and than after some time i have also "&lt;SPAN style="font-size: 14px;"&gt;Error while processing SAML Response." and the SSO Test timed out in the background.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 14px;"&gt;@Mark&lt;BR /&gt;Could you make it run ?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 14px;"&gt;Any idea someone?&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 07 Jan 2015 14:04:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/unified-communications-infrastructure/sso-with-cucm-10-5-and-adfs-3-0/m-p/2574776#M33645</guid>
      <dc:creator>thorstenn</dc:creator>
      <dc:date>2015-01-07T14:04:46Z</dc:date>
    </item>
    <item>
      <title>No, mine seems to fail almost</title>
      <link>https://community.cisco.com/t5/unified-communications-infrastructure/sso-with-cucm-10-5-and-adfs-3-0/m-p/2574777#M33646</link>
      <description>&lt;P&gt;No, mine seems to fail almost immediately. &amp;nbsp;I have had a TAC case open, and it finally got escalated yesterday afternoon. &amp;nbsp;I have a WebEx scheduled for noon EST today and will relay anything we find out.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;My hunch is, it is&amp;nbsp;something to do with certificates, or some silly misconfiguration on our end in CUCM.&lt;/P&gt;</description>
      <pubDate>Wed, 07 Jan 2015 14:09:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/unified-communications-infrastructure/sso-with-cucm-10-5-and-adfs-3-0/m-p/2574777#M33646</guid>
      <dc:creator>mbaker33</dc:creator>
      <dc:date>2015-01-07T14:09:53Z</dc:date>
    </item>
    <item>
      <title>I fixed the Problem.For me it</title>
      <link>https://community.cisco.com/t5/unified-communications-infrastructure/sso-with-cucm-10-5-and-adfs-3-0/m-p/2574778#M33647</link>
      <description>&lt;P&gt;I fixed the Problem.&lt;/P&gt;&lt;P&gt;For me it was a time issue. The ADFS Server was 10 minutes in the future and the CUCM was correct. &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt; Thats because i tried this in LAB with no really time Server &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;BR /&gt;&lt;BR /&gt;In RTMT traces (SSO_log4j)&amp;nbsp;we saw this one:&lt;/P&gt;&lt;DIV&gt;&lt;EM&gt;2015-01-07 15:28:17,924 ERROR [http-bio-443-exec-180] authentication.SAMLAuthenticator - Error while processing saml responseInvalid SAML Response. SAMLResponse &lt;STRONG&gt;is outside the validity window&lt;/STRONG&gt;.&lt;BR /&gt;com.sun.identity.saml2.common.SAML2Exception: Invalid SAML Response. SAMLResponse &lt;STRONG&gt;is outside the validity window&lt;/STRONG&gt;.&lt;/EM&gt;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Check your time on CUCM and ADFS&amp;nbsp;Server, maybe ist the same.&lt;/DIV&gt;</description>
      <pubDate>Wed, 07 Jan 2015 14:59:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/unified-communications-infrastructure/sso-with-cucm-10-5-and-adfs-3-0/m-p/2574778#M33647</guid>
      <dc:creator>thorstenn</dc:creator>
      <dc:date>2015-01-07T14:59:00Z</dc:date>
    </item>
    <item>
      <title>Our servers are within a</title>
      <link>https://community.cisco.com/t5/unified-communications-infrastructure/sso-with-cucm-10-5-and-adfs-3-0/m-p/2574779#M33648</link>
      <description>&lt;P&gt;Our servers are within a second of each other, since we use NTP. &amp;nbsp;We are getting the following error in our logs. &amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;2015-01-06 16:01:37,805 ERROR [http-bio-443-exec-276] authentication.SAMLAuthenticator - Error while processing saml responseInvalid Status code in Response.&lt;/P&gt;</description>
      <pubDate>Wed, 07 Jan 2015 15:11:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/unified-communications-infrastructure/sso-with-cucm-10-5-and-adfs-3-0/m-p/2574779#M33648</guid>
      <dc:creator>mbaker33</dc:creator>
      <dc:date>2015-01-07T15:11:09Z</dc:date>
    </item>
    <item>
      <title>When you're on the SAML SSO</title>
      <link>https://community.cisco.com/t5/unified-communications-infrastructure/sso-with-cucm-10-5-and-adfs-3-0/m-p/2574780#M33649</link>
      <description>&lt;P&gt;When you're on the SAML SSO configuration page are your servers listed by IP address or FQDN? I'm curious if this has to do with your "System -&amp;gt; Server" setting. There might be a correlation between the two.&lt;/P&gt;</description>
      <pubDate>Wed, 07 Jan 2015 15:33:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/unified-communications-infrastructure/sso-with-cucm-10-5-and-adfs-3-0/m-p/2574780#M33649</guid>
      <dc:creator>Joshua Warcop</dc:creator>
      <dc:date>2015-01-07T15:33:10Z</dc:date>
    </item>
  </channel>
</rss>

