Event ID 613 — Claims-Aware Application Configuration

Updated: February 27, 2008

Applies To: Windows Server 2008

red

AD FS Web Agent for claims-aware applications configuration logs how the claims-aware agent processes configuration information in the web.config file.

Event Details

Product: Windows Operating System
ID: 613
Source: Microsoft-Windows-ADFS
Version: 6.0
Symbolic Name: WsNoFsUrl
Message: The AD FS Web Agent for claims-aware applications cannot find the Federation Service Uniform Resource Locator (URL) that is configured in web.config.

The Web agent cannot start until this condition is corrected.

User Action
Add the Federation Service URL to the web.config.

Resolve

Add the Federation Service URL to the web.config file of the Web application

Add the Federation Service Uniform Resource Locator (URL) to the web.config file of the Web application.

To add a Federation Service URL value to the web.config file:

  1. On the AD FS-enabled Web server that is hosting the claims-aware agent, locate the web.config file for your claims-aware application, and then open it with Notepad. This file should be located in \inetpub\wwwroot\virtualdirectory, where your claims-aware application files are stored.
  2. Search for the fs tag, and then enter a valid Federation Service URL value in the tag. For example, https://myfederationserver/adfs/fs/federationserverservice.asmx.
  3. Click File, click Save, and then close Notepad.

Verify

Verify that the web.config file is configured with correct URL values and that all configuration parameters contain valid values.

To perform this procedure, you must be a member of the local Administrators group, or you must have been delegated the appropriate authority.

To verify that the web.config file is configured with the correct Return URL value:

  1. On a resource federation server, click Start, point to Administrative Tools, and then click Active Directory Federation Services.
  2. Double-click Federation Service, double-click Trust Policy, double-click My Organization, click Applications, right-click the application in the list that represents this claims-aware application, and then click Properties.
  3. Verify that the https value that is specified in Application URL—for example, https://www.treyresearch.net/ApplicationName/— is identical to the value that is specified between the returnurl tags in the web.config file on the AD FS-enabled Web server.

Related Management Information

Claims-Aware Application Configuration

Active Directory Federation Services

Community Additions

ADD
Show: