Quantcast
Channel: Microsoft Dynamics CRM Forum - Recent Threads
Viewing all articles
Browse latest Browse all 55831

Internal Claims-based Authentication results in "ADFS does not have P3P policy" error

$
0
0

We have been trying to setup a CRM 2015 deployment to support development of some integration tools.

We first tried the "all-in-one" howtos for a developer/demo environment. They worked but there were lots of issues with cramming domain controller, DB, IIS, etc all in one.

When it was decided that claims-based authentication would be needed we decided to go with a less all-in-one environment, though still small.

We've got four VM's running Windows Server 2012 R2:

  1. DC1 - simple domain controller
  2. DB1 - SQL Server
  3. CRM1 - Dynamics CRM server
  4. ADFS1 - AD FS

We've followed the MS doc pretty faithfully:

We have done the suggested tests every step of the way and all has been good. But when we went to test we get the "ADFS doesn't have P3P policy, please contact your site's admin for more details." error back from the request to ADFS.

When I trace the requests (in either IE or FireFox) we get the following:

ReqResp
Code
Header/Notes
https://crminternal.domain.com302
sts.domain.com/.../ls;wtrealm=https%3a%2f%2fcrminternal.domain.com%2f&wctx=rm%3d1%26id%3d8054838a-d566-4bb7-aa4d-cdebb3ad96b3%26ru%3d%252fdefault.aspx&wct=2015-11-03T02%3a34%3a52Z&302
sts.domain.com/.../wia;wtrealm=crminternal.domain.com/&wctx=rm=1&id=4fc94b9d-fb70-4665-b442-16ee697d011f&ru=%2fdefault.aspx&wct=2015-11-02T17:10:34Z&wauth=urn:federation:authentication:windows401Server: Microsoft-HTTPAPI/2.0
WWW-Authenticate: "NegotiateNTLM"
sts.domain.com/.../wia;wtrealm=crminternal.domain.com/&wctx=rm=1&id=4fc94b9d-fb70-4665-b442-16ee697d011f&ru=%2fdefault.aspx&wct=2015-11-02T17:10:34Z&wauth=urn:federation:authentication:windows401Server: Microsoft-HTTPAPI/2.0
WWW-Authenticate: NTLM TlRMTVNTUAACAAAADAAMADgAAAAFgomi9n3RJzUYhoAAAAAAAAAAAKYApgBEAAAABgOAJQAAAA9UAFAAVABEAEUAVgACAAwAVABQAFQARABFAFYAAQAWAFQAUABUAEQARQBWAEEARABGAFMAMQAEABgAVABwAHQARABlAHYALgBsAG8AYwBhAGwAAwAwAFQAcAB0AEQAZQB2AEEARABGAFMAMQAuAFQAcAB0AEQAZQB2AC4AbABvAGMAYQBsAAUAGABUAHAAdABEAGUAdgAuAGwAbwBjAGEAbAAHAAgA5gFTrJEV0QEAAAAA
sts.domain.com/.../wia;wtrealm=crminternal.domain.com/&wctx=rm=1&id=4fc94b9d-fb70-4665-b442-16ee697d011f&ru=%2fdefault.aspx&wct=2015-11-02T17:10:34Z&wauth=urn:federation:authentication:windows200Server: Microsoft-HTTPAPI/2.0
P3P: CP="ADFS doesn't have P3P policy, please contact your site's admin for more details."
crminternal.domain.com302
crminternal.domain.com/.../errorhandler.aspx;wtrealm=https%3a%2f%2fcrminternal.domain.com%2f&wctx=rm%3d1%26id%3d3f7d735e-6568-4150-ae4f-290bbcdbb286%26ru%3d%252fdefault.aspx&wct=2015-11-02T21%3a15%3a20Z&wauth=urn%3afederation%3aauthentication%3awindows&ErrorCode=&Parm0=Error Details: The private key does not support the exchange KeySpec.&RequestUri=/default.aspx&user_lcid=1033200

The area I have the most doubts about is the certificate generation:

  1. For CRM1 (the CRM Dynamics server) we used the following line to create the self-signed certificate:
    • makecert -r -pe -n "CN=*.Domain.com" -ss my -sr LocalMachine -eku "1.3.6.1.5.5.7.3.1" -len 2048 -e "01/01/2020" "\Users\administrator.DOMAIN\Documents\Certificates\Domain.com_CRM1_wildcard.cer"
  2. For ADFS1 (the AD FS server) the command is similar but when it did not work the first time, I added the "-sky exchange" option, based on a comment about CNG certificate templates:
    • makecert -r -pe -n "CN=*.Domain.com" -ss my -sr LocalMachine -eku "1.3.6.1.5.5.7.3.1" -len 2048 -sky exchange -e "01/01/2021" "\Users\administrator.DOMAIN\Documents\Certificates\Domain.com_ADFS1_wildcard.cer"

Any help or ideas is much appreciated. Also I really have done a good bit of searching on and off this forum - if I've missed an existing solution my apologies.


Viewing all articles
Browse latest Browse all 55831

Trending Articles



<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>