I have integrate Shibboleth IDP v2.4.5 and Access Manager v4.3.1 as Service Provider using below cool-solutions URL. Both are installed on Red Hat Enterprise Linux Server release 7.2.
https://www.netiq.com/communities/co...hs-idp-server/
Shibboleth IDP is "shibidp01.test.local", Access Manager IDP is "sso.test.local" and Target Application is "emr.test.local" which is protected by Access Manager.
I started from the below URL
https://sso.test.local/nidp/saml2/sp...emr.test.local
It was redirect me to the Shibboleth IDP login page, I entered the credentials of "user6" and hit Login button, then it was redirect to the target application "https://emr.test.local".
When I click on logout button (https://emr.test.local/AGLogout) from that target application it logout me from Access Manager and Shibboleth IDP and redirect me to the below URL
https://sso.test.local/nidp/saml2/spslo_return
I don't know why this page URL is automatically reload every 4 to 5 seconds. I want that when I click on Logout from target application first it logout me from Access Manager and Shibboleth IDP and then it will redirect me again to the login page of Shibboleth IDP from where User is started.
Please see below Access Manager IDP logs when I click on Logout from Target Application
Code:
<amLogEntry> 2018-03-28T06:20:49Z DEBUG NIDS Application: 
Method: NIDPContextListener.sessionCreated
Thread: http-nio-10.224.60.37-8443-exec-8
Created session AMAUTHID#49498a3e3522539faebf1b4282a7ac0e8c176f2675354b334def090717796b48 </amLogEntry>

<amLogEntry> 2018-03-28T06:20:49Z DEBUG NIDS Application: 
Method: NIDPProxyableServlet.myDoGetWithProxy
Thread: http-nio-10.224.60.37-8443-exec-8
****** HttpServletRequest Information:
Method: POST
Scheme: https
Context Path: /nidp
Servlet Path: /idff
Query String: null
Path Info: /soap
Server Name: sso.test.local
Server Port: 443
Content Length: 3686
Content Type: text/xml; charset="utf-8"
Auth Type: null
Request URL: https://sso.test.local/nidp/idff/soap
Host IP Address: 10.224.60.37
Remote Client IP Address: 10.224.60.38
Header: Name: soapaction, Value: urn:liberty:soap-action
Header: Name: content-type, Value: text/xml; charset="utf-8"
Header: Name: connection, Value: close
Header: Name: user-agent, Value: Java/1.8.0_121
Header: Name: host, Value: sso.test.local
Header: Name: accept, Value: text/html, image/gif, image/jpeg, *; q=.2, */*; q=.2
Header: Name: content-length, Value: 3686
Session Id: 49498a3e3522539faebf1b4282a7ac0e8c176f2675354b334def090717796b48
Session Last Accessed Time: 1522218049706
 </amLogEntry>

<amLogEntry> 2018-03-28T06:20:49Z DEBUG NIDS Application: 
Method: CacheMap.A
Thread: http-nio-10.224.60.37-8443-exec-8

Retrieval of object from cache session failed using key 49498a3e3522539faebf1b4282a7ac0e8c176f2675354b334def090717796b48.  Cache size is 5
 </amLogEntry>

<amLogEntry> 2018-03-28T06:20:49Z DEBUG NIDS Application: 
Method: CacheMap.A
Thread: http-nio-10.224.60.37-8443-exec-8

Retrieval of object from cache ancestralsession failed using key 49498a3e3522539faebf1b4282a7ac0e8c176f2675354b334def090717796b48.  Cache size is 0
 </amLogEntry>

<amLogEntry> 2018-03-28T06:20:49Z DEBUG NIDS Application: AM#600105011: AMDEVICEID#B930B2D61FC77E3A: AMAUTHID#49498a3e3522539faebf1b4282a7ac0e8c176f2675354b334def090717796b48:  IDP liberty12 handler to process request received for /nidp/idff </amLogEntry>

<amLogEntry> 2018-03-28T06:20:49Z DEBUG NIDS Application: 
Method: CacheMap.A
Thread: http-nio-10.224.60.37-8443-exec-8

Retrieval of object from cache session failed using key 49498a3e3522539faebf1b4282a7ac0e8c176f2675354b334def090717796b48.  Cache size is 5
 </amLogEntry>

<amLogEntry> 2018-03-28T06:20:49Z DEBUG NIDS Application: 
Method: CacheMap.A
Thread: http-nio-10.224.60.37-8443-exec-8

Retrieval of object from cache ancestralsession failed using key 49498a3e3522539faebf1b4282a7ac0e8c176f2675354b334def090717796b48.  Cache size is 0
 </amLogEntry>

<amLogEntry> 2018-03-28T06:20:49Z VERBOSE NIDS Application: Session has consumed authentications: false </amLogEntry>

<amLogEntry> 2018-03-28T06:20:49Z VERBOSE NIDS IDFF: Handling IDFF request, session authenticated: false </amLogEntry>

<amLogEntry> 2018-03-28T06:20:49Z VERBOSE NIDS Application: Session has consumed authentications: false </amLogEntry>

<amLogEntry> 2018-03-28T06:20:49Z DEBUG NIDS Application: 
Method: SavedInputStream.<init>
Thread: http-nio-10.224.60.37-8443-exec-8
Created new SavedInputStream using InputStream: org.apache.catalina.connector.CoyoteInputStream </amLogEntry>

<amLogEntry> 2018-03-28T06:20:49Z DEBUG NIDS Application: 
Method: NIDPLocalConfigUtil.isOptionConfigured
Thread: http-nio-10.224.60.37-8443-exec-8
Property read from local file --------> Property:XML_PARSE_ALLOW_DTD Value: false </amLogEntry>

<amLogEntry> 2018-03-28T06:20:49Z DEBUG NIDS Application: 
Method: BaseHandler.getSOAPDocument
Thread: http-nio-10.224.60.37-8443-exec-8
SOAP EndpointRequest
   <SOAP-ENV:Envelope xmlns:SOAP-ENV="http://schemas.xmlsoap.org/soap/envelope/">
      <SOAP-ENV:Body>
         <lib:LogoutRequest IssueInstant="2018-03-28T06:21:00Z" MajorVersion="1" MinorVersion="2" RequestID="idUwxSmgfTLAmtF4PE1M-A3aHGtew" xmlns:lib="urn:liberty:iff:2003-08" xmlns:saml="urn:oasis:names:tc:SAML:1.0:assertion" xmlns:samlp="urn:oasis:names:tc:SAML:1.0:protocol">
            <ds:Signature xmlns:ds="http://www.w3.org/2000/09/xmldsig#">
               <ds:SignedInfo>
                  <ds:CanonicalizationMethod Algorithm="http://www.w3.org/2001/10/xml-exc-c14n#"/>
                  <ds:SignatureMethod Algorithm="http://www.w3.org/2000/09/xmldsig#rsa-sha1"/>
                  <ds:Reference URI="#idUwxSmgfTLAmtF4PE1M-A3aHGtew">
                     <ds:Transforms>
                        <ds:Transform Algorithm="http://www.w3.org/2000/09/xmldsig#enveloped-signature"/>
                        <ds:Transform Algorithm="http://www.w3.org/2001/10/xml-exc-c14n#"/>
                     </ds:Transforms>
                     <ds:DigestMethod Algorithm="http://www.w3.org/2000/09/xmldsig#sha1"/>
                     <ds:DigestValue>
                      ln0qMGOeE3VsGeIbVHzZ+gIB8Dg=
                     </ds:DigestValue>
                  </ds:Reference>
               </ds:SignedInfo>
               <ds:SignatureValue>
                
FhWct6ojjUcEHB0QBfbfVaE+LkxgTIED1elmalEsqnTVvAPCw/hlV5iAXLX6oSV4AXHtX2yIimW3
jVrVsu0Ihd7BBsIXC+doO3LkLe+JgT5qjTcTxV4LbDDBj3xrpJwzxaLILHsGnW9ceTnU7QFkakhq
8krlx9eoqRkbRdhCdEhF/cqk+1wd35wcaWtDp8xlfl+GcIs9/yxh1SbZWGzhAkp2AibttoBberYz
YU/0G/e0inRL1hlCXs2K36a8pmh8QoLLlR/lo2sc8VqpYhEab30m7hyQAcloOIPjZpIaIM4zS82I
ysCP3/9huA56Rku0ffbzjEena0tq9ae69srmZw==

               </ds:SignatureValue>
               <ds:KeyInfo>
                  <ds:X509Data>
                     <ds:X509Certificate>
                      
MIIFLDCCBBSgAwIBAgIkAhwR/6b9o9AdTCI26yp8tNnAVVsmHU0Y5E9t/08XAgIWCx8iMA0GCSqG
SIb3DQEBBQUAMDgxGjAYBgNVBAsTEU9yZ2FuaXphdGlvbmFsIENBMRowGAYDVQQKFBF0b3J0ZXN0
YWRtMDFfdHJlZTAeFw0xNTA0MTIxNTEzMjdaFw0yNTA0MTIxNTEzMjdaMEAxFTATBgNVBAMTDHRl
c3Qtc2lnbmluZzEWMBQGA1UECxMNYWNjZXNzTWFuYWdlcjEPMA0GA1UEChMGbm92ZWxsMIIBIjAN
BgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAxnPStImegDgC341iSUIyu7oaxv0Q5Svpja2DlZGN
fbsKhIdlcPJBzJbsnb9283rCA0YIk/d6aSq9wRD2hoz9kT0fepXU6WpqMsM7Sj9Mv65FJ766wHLE
0WXdq0sFY0pDrdK6r+3DHvzCbhLGBR9UMf9RN9zlMKxQvp7RH2ehjE7jUPe6SExgtTuiPgL/YqMt
ZKlHh/i/B1z3zVIaz5/Gpq/lejgAboFknM3wkAIWmKBmIaZIvD9rgA2Ryo+6d/+S0uvyHG4djP9R
N7upyWN3G0uMvk7xvjyFyQy3zUiWnsyNWYwXe3DMWuA9rSMGb/VLeWOMV3nHYw+vLvJVGPvYGwID
AQABo4ICFDCCAhAwHQYDVR0OBBYEFHODhc9wV7+MKlUQ8ZEKT/OUcZ0TMB8GA1UdIwQYMBaAFEXY
QRe5XAJdamFQBOgej2XF9ljQMIIBzAYLYIZIAYb4NwEJBAEEggG7MIIBtwQCAQABAf8THU5vdmVs
bCBTZWN1cml0eSBBdHRyaWJ1dGUodG0pFkNodHRwOi8vZGV2ZWxvcGVyLm5vdmVsbC5jb20vcmVw
b3NpdG9yeS9hdHRyaWJ1dGVzL2NlcnRhdHRyc192MTAuaHRtMIIBSKAaAQEAMAgwBgIBAQIBRjAI
MAYCAQECAQoCAWmhGgEBADAIMAYCAQECAQAwCDAGAgEBAgEAAgEAogYCARcBAf+jggEEoFgCAQIC
AgD/AgEAAw0AgAAAAAAAAAAAAAAAAwkAgAAAAAAAAAAwGDAQAgEAAgh//////////wEBAAIEBvDf
SDAYMBACAQACCH//////////AQEAAgQG8N9IoVgCAQICAgD/AgEAAw0AQAAAAAAAAAAAAAAAAwkA
QAAAAAAAAAAwGDAQAgEAAgh//////////wEBAAIEEf+m/TAYMBACAQACCH//////////AQEAAgQR
/6b9ok4wTAIBAgIBAAICAP8DDQCAAAAAAAAAAAAAAAADCQCAAAAAAAAAADASMBACAQACCH//////
////AQEAMBIwEAIBAAIIf/////////8BAQAwDQYJKoZIhvcNAQEFBQADggEBAFagMwVHiDCEU8AD
ZD/PSpoAkgrOY0Ef0uHjdrwXf7l+EBW5lCPZDdsxxb8iUmVDohijk3RKNRJwoLY6C2Gqe1uknCm1
5WzeINEumd4eu+LhV+AWVKmrezde2meU+eIKbpkaSVw8JGk6CUyQd167HMes/+b+CswjBIMq+z6d
yEvGkANjIouq4rs7Ji8ec3mUOoCgoIx140Z9HckNPL8SAlFR0IeNPs2VvUDqEDUpH+HabCuRaSF9
mwlmS7CDn9P6JTWp0G60qZYow/UxXpajdrQ3it8Wli6p0yjDL1SjMehoJSGXlSVxHCBeljPjJN9K
Hm0IFEJAKMIrt6yLSg3orR4=

                     </ds:X509Certificate>
                  </ds:X509Data>
               </ds:KeyInfo>
            </ds:Signature>
            <lib:ProviderID>
             https://esp.test.local:443/nesp/idff/metadata
            </lib:ProviderID>
            <saml:NameIdentifier Format="urn:liberty:iff:nameid:one-time" NameQualifier="https://esp.test.local:443/nesp/idff/metadata">
             nrdioR5uMYT9J1ICfCxdAnguXAF/LVYIT8y09A==
            </saml:NameIdentifier>
            <lib:SessionIndex>
             7E56FC09376AE88E977F376619BFC9FC
            </lib:SessionIndex>
         </lib:LogoutRequest>
      </SOAP-ENV:Body>
   </SOAP-ENV:Envelope>
 </amLogEntry>

<amLogEntry> 2018-03-28T06:20:49Z DEBUG NIDS Application: 
Method: BaseHandler.handleSOAPMessage
Thread: http-nio-10.224.60.37-8443-exec-8
Handling SOAP Message! Name: LogoutRequest </amLogEntry>

<amLogEntry> 2018-03-28T06:20:49Z DEBUG NIDS IDFF: 
Method: LibertyLogoutProfile.processSOAPRequest
Thread: http-nio-10.224.60.37-8443-exec-8
Handling SOAP logout notification </amLogEntry>

Mar 28, 2018 2:20:49 AM org.apache.xml.security.signature.Reference verify
INFO: Verification successful for URI "#idUwxSmgfTLAmtF4PE1M-A3aHGtew"
<amLogEntry> 2018-03-28T06:20:49Z DEBUG NIDS Application: 
Method: ProxyProfile.isProxyRequest
Thread: http-nio-10.224.60.37-8443-exec-8
/nidp/idff/soap is a ProxyRequest: false </amLogEntry>

<amLogEntry> 2018-03-28T06:20:49Z DEBUG NIDS Application: 
Method: LogoutProfile.processSOAPRequest
Thread: http-nio-10.224.60.37-8443-exec-8
Handling SOAP logout notification </amLogEntry>

<amLogEntry> 2018-03-28T06:20:49Z DEBUG NIDS Application: 
Method: CacheMap.A
Thread: http-nio-10.224.60.37-8443-exec-8

Retrieval of object com.novell.nidp.common.authority.ldap.LDAPPrincipal@5a5bee01 from cache principal succeeded using key dbba955d4aceebfba7aa727ae7af2440414ef04d958399d8d6ec392732ac5cf3.  Cache size is 3
 </amLogEntry>

<amLogEntry> 2018-03-28T06:20:49Z DEBUG NIDS Application: 
Method: CacheMap.A
Thread: http-nio-10.224.60.37-8443-exec-8

Retrieval of object com.novell.nidp.NIDPSubject@5c3120a5 from cache subject succeeded using key 811786ad1ae74adfdd20dd0372abaaebc6246e343aebd01da0bfc4c02bf0106c.  Cache size is 1
 </amLogEntry>

<amLogEntry> 2018-03-28T06:20:49Z DEBUG NIDS Application: 
Method: CacheMap.A
Thread: http-nio-10.224.60.37-8443-exec-8

Retrieval of object com.novell.nidp.servlets.NIDPServletSession@6d6a1e from cache session succeeded using key 5b8d1f2636355a3f754b363ffe154c8a6919030d12afe9c8e03b72a1c4fa6484.  Cache size is 5
 </amLogEntry>

<amLogEntry> 2018-03-28T06:20:49Z VERBOSE NIDS Application: Session has consumed authentications: true </amLogEntry>

<amLogEntry> 2018-03-28T06:20:49Z VERBOSE NIDS Application: Session consumed authentications is 1 and is considered authenticated: true </amLogEntry>

<amLogEntry> 2018-03-28T06:20:49Z DEBUG NIDS Application: 
Method: LogoutProfile.processSOAPRequest
Thread: http-nio-10.224.60.37-8443-exec-8
Backchannel logout sessions 1 true </amLogEntry>

<amLogEntry> 2018-03-28T06:20:49Z VERBOSE NIDS Application: Session has consumed authentications: true </amLogEntry>

<amLogEntry> 2018-03-28T06:20:49Z VERBOSE NIDS Application: Session consumed authentications is 1 and is considered authenticated: true </amLogEntry>

<amLogEntry> 2018-03-28T06:20:49Z VERBOSE NIDS IDFF: SOAP logout is possible to https://esp.test.local:443/nesp/idff/metadata </amLogEntry>

<amLogEntry> 2018-03-28T06:20:49Z DEBUG NIDS Application: 
Method: XMLSignable.preSigning
Thread: http-nio-10.224.60.37-8443-exec-8
Atempting to sign XMLSignable object: Name: LogoutResponse </amLogEntry>

<amLogEntry> 2018-03-28T06:20:49Z DEBUG NIDS Application: 
Method: XMLSignable.A
Thread: http-nio-10.224.60.37-8443-exec-8
Signing will use certificate [CN=SSO.TEST.LOCAL, OU=Applications, OU=eHealthUsers, OU=Subscribers, DC=subscribers, DC=ssh] having serial no [1479335624] </amLogEntry>

<amLogEntry> 2018-03-28T06:20:49Z DEBUG NIDS SAML2: 
Method: NIDPLocalConfigUtil.isSaml2KeyEnabled
Thread: http-nio-10.224.60.37-8443-exec-8
'SAML2_SIGN_METHODDIGEST_SHA256' doesn't map to an existing object [nidpconfig.properties]. SAML2 request -error parsing SAML2 property SAML2_SIGN_METHODDIGEST_SHA256 </amLogEntry>

<amLogEntry> 2018-03-28T06:20:49Z DEBUG NIDS Application: 
Method: XMLSignable.postSigning
Thread: http-nio-10.224.60.37-8443-exec-8
Signature completed for object! Name: LogoutResponse </amLogEntry>

<amLogEntry> 2018-03-28T06:20:49Z DEBUG NIDS Application: 
Method: NIDPLocalConfigUtil.getSaml2TPValueBoolean
Thread: http-nio-10.224.60.37-8443-exec-8
 [nidpconfig.properties] Options - ->SAML2_RESPONSE_AVOID_REMOVE_EXTRANEOUS_NAMESPACES value returned:  false </amLogEntry>

<amLogEntry> 2018-03-28T06:20:49Z DEBUG NIDS Application: 
Method: BaseHandler.sendSOAPResponse
Thread: http-nio-10.224.60.37-8443-exec-8
SOAP EndpointResponse:
   <SOAP-ENV:Envelope xmlns:SOAP-ENV="http://schemas.xmlsoap.org/soap/envelope/">
      <SOAP-ENV:Body>
         <lib:LogoutResponse InResponseTo="idUwxSmgfTLAmtF4PE1M-A3aHGtew" IssueInstant="2018-03-28T06:20:49Z" MajorVersion="1" MinorVersion="2" Recipient="https://esp.test.local:443/nesp/idff/metadata" ResponseID="id3ld1fEMuG9lxNn0G49KeEv73OXY" xmlns:lib="urn:liberty:iff:2003-08" xmlns:samlp="urn:oasis:names:tc:SAML:1.0:protocol">
            <ds:Signature xmlns:ds="http://www.w3.org/2000/09/xmldsig#">
               <ds:SignedInfo>
                  <ds:CanonicalizationMethod Algorithm="http://www.w3.org/2001/10/xml-exc-c14n#"/>
                  <ds:SignatureMethod Algorithm="http://www.w3.org/2000/09/xmldsig#rsa-sha1"/>
                  <ds:Reference URI="#id3ld1fEMuG9lxNn0G49KeEv73OXY">
                     <ds:Transforms>
                        <ds:Transform Algorithm="http://www.w3.org/2000/09/xmldsig#enveloped-signature"/>
                        <ds:Transform Algorithm="http://www.w3.org/2001/10/xml-exc-c14n#"/>
                     </ds:Transforms>
                     <ds:DigestMethod Algorithm="http://www.w3.org/2000/09/xmldsig#sha1"/>
                     <ds:DigestValue>
                      46uouKmY2KoHbvNfPP4d+iR8WeA=
                     </ds:DigestValue>
                  </ds:Reference>
               </ds:SignedInfo>
               <ds:SignatureValue>
                
vtikgeMdkoHGWm6FxBQIWSflH7wn1wS2W5uGqMLJs1CPoPHfBSRZJ59SiDvBUUUwNLGy8kSG2yum
6bjXgPGxZq+TePI5Vx/+KG4/pKPScYCKDqVuAJ+WmRFe6IwtHwW1V4NY39wbpeKMXfhobYUHfWPI
qG4Ja5xYkk0/m0SZrENyLpbs9MjO2rEsuaNLRI0Kk2ZHTSe/9OGDWV9F3qFmngTD7DXv9ASlurA3
l+o/lB/eJoWm0c/sDfDf4RbgyVgvGXbmTU6X4PAy/THeXaI7NkxGW9B2oCn+Wp+E+WxMUvh1kR6B
kmWfJvmJEETBaq+5815RKMSHChdHiQvs7UhPJw==

               </ds:SignatureValue>
               <ds:KeyInfo>
                  <ds:X509Data>
                     <ds:X509Certificate>
                      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                     </ds:X509Certificate>
                  </ds:X509Data>
               </ds:KeyInfo>
            </ds:Signature>
            <lib:ProviderID>
             https://sso.test.local/nidp/idff/metadata
            </lib:ProviderID>
            <samlp:Status>
               <samlp:StatusCode Value="samlp:Requester">
                  <samlp:StatusCode Value="lib:UnsupportedProfile"/>
               </samlp:StatusCode>
            </samlp:Status>
         </lib:LogoutResponse>
      </SOAP-ENV:Body>
   </SOAP-ENV:Envelope>
 </amLogEntry>

<amLogEntry> 2018-03-28T06:20:49Z DEBUG NIDS Application: 
Method: CacheMap.A
Thread: http-nio-10.224.60.37-8443-exec-8

Retrieval of object from cache session failed using key 49498a3e3522539faebf1b4282a7ac0e8c176f2675354b334def090717796b48.  Cache size is 5
 </amLogEntry>

<amLogEntry> 2018-03-28T06:20:49Z DEBUG NIDS Application: 
Method: CacheMap.A
Thread: http-nio-10.224.60.37-8443-exec-8

Retrieval of object from cache ancestralsession failed using key 49498a3e3522539faebf1b4282a7ac0e8c176f2675354b334def090717796b48.  Cache size is 0
 </amLogEntry>

<amLogEntry> 2018-03-28T06:20:49Z DEBUG NIDS Application: 
Method: NIDPContextListener.sessionDestroyed
Thread: http-nio-10.224.60.37-8443-exec-8
Destroyed session AMAUTHID#49498a3e3522539faebf1b4282a7ac0e8c176f2675354b334def090717796b48 </amLogEntry>

<amLogEntry> 2018-03-28T06:20:49Z DEBUG NIDS Application: 
Method: CacheMap.A
Thread: http-nio-10.224.60.37-8443-exec-8

Retrieval of object from cache session failed using key 49498a3e3522539faebf1b4282a7ac0e8c176f2675354b334def090717796b48.  Cache size is 5
 </amLogEntry>

<amLogEntry> 2018-03-28T06:20:49Z DEBUG NIDS Application: 
Method: CacheMap.A
Thread: http-nio-10.224.60.37-8443-exec-8

Retrieval of object from cache ancestralsession failed using key 49498a3e3522539faebf1b4282a7ac0e8c176f2675354b334def090717796b48.  Cache size is 0
 </amLogEntry>

<amLogEntry> 2018-03-28T06:20:51Z DEBUG NIDS Application: 
Method: NIDPProxyableServlet.myDoGetWithProxy
Thread: http-nio-10.224.60.37-8443-exec-8
****** HttpServletRequest Information:
Method: GET
Scheme: https
Context Path: /nidp
Servlet Path: /idff
Query String: RequestID=idRdYdW9dbbFkn5XJnHXrGCQaLML4&MajorVersion=1&MinorVersion=2&IssueInstant=2018-03-28T06%3A21%3A00Z&ProviderID=https%3A%2F%2Fesp.test.local%3A443%2Fnesp%2Fidff%2Fmetadata&NameIdentifier=nrdioR5uMYT9J1ICfCxdAnguXAF%2FLVYIT8y09A%3D%3D&NameQualifier=https%3A%2F%2Fesp.test.local%3A443%2Fnesp%2Fidff%2Fmetadata&NameFormat=urn%3Aliberty%3Aiff%3Anameid%3Aone-time&SessionIndex=7E56FC09376AE88E977F376619BFC9FC&SigAlg=http%3A%2F%2Fwww.w3.org%2F2000%2F09%2Fxmldsig%23rsa-sha1&Signature=QWSB06s58T9cfFe2%2BvAnl8IGmQv8ijqCmXtsRPYm5hcHiBT9ZQ5LvgbTGZ3vx7HbmoogBQ8ZCR1z3XAnsdge4XtS3HKxf7VC7iZdofyqFY4YMVp8xGuLnBI4gCysm1kbJrlmwm0Df%2B%2FebzI4R5b5MiO8VCVONxh9uPVRUKsfUzjc%2FevJ5E16ZNR2ZLZQuPWcF0ExEwcGkYs1IENhpvjLwhiAFZ0w7SJq7ze%2Fq6dxanURueLs9v4vBoE6auDJtcy8MIO6eZ31wQmsJjGhfoADrA1yZ%2BamOOhY9SW0vcSWBGAmEUEp%2FsZwYaAhVTiUQryiJkV6U653FiTEfH%2BK8PRxqw%3D%3D
Path Info: /slo
Server Name: sso.test.local
Server Port: 443
Content Length: -1
Content Type: null
Auth Type: null
Request URL: https://sso.test.local/nidp/idff/slo
Host IP Address: 10.224.60.37
Remote Client IP Address: 10.224.128.69
Cookie: (0 of 2): JSESSIONID, 5b8d1f2636355a3f754b363ffe154c8a6919030d12afe9c8e03b72a1c4fa6484
Cookie: (1 of 2): ZNPCQ003-33393700, 87f81e40
Header: Name: host, Value: sso.test.local
Header: Name: connection, Value: keep-alive
Header: Name: upgrade-insecure-requests, Value: 1
Header: Name: user-agent, Value: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/65.0.3325.181 Safari/537.36
Header: Name: accept, Value: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
Header: Name: referer, Value: https://emr.test.local/oscar/provider/providercontrol.jsp?year=2018&month=3&day=28&view=0&displaymode=day&dboperation=searchappointmentday&viewall=1
Header: Name: accept-encoding, Value: gzip, deflate, br
Header: Name: accept-language, Value: en-US,en;q=0.9
Session Id: 5b8d1f2636355a3f754b363ffe154c8a6919030d12afe9c8e03b72a1c4fa6484
Session Last Accessed Time: 1522217568214
 </amLogEntry>

<amLogEntry> 2018-03-28T06:20:51Z DEBUG NIDS Application: 
Method: CacheMap.A
Thread: http-nio-10.224.60.37-8443-exec-8

Retrieval of object com.novell.nidp.servlets.NIDPServletSession@6d6a1e from cache session succeeded using key 5b8d1f2636355a3f754b363ffe154c8a6919030d12afe9c8e03b72a1c4fa6484.  Cache size is 5
 </amLogEntry>

<amLogEntry> 2018-03-28T06:20:51Z DEBUG NIDS Application: AM#600105011: AMDEVICEID#B930B2D61FC77E3A: AMAUTHID#5b8d1f2636355a3f754b363ffe154c8a6919030d12afe9c8e03b72a1c4fa6484:  IDP liberty12 handler to process request received for /nidp/idff </amLogEntry>

<amLogEntry> 2018-03-28T06:20:51Z DEBUG NIDS Application: 
Method: CacheMap.A
Thread: http-nio-10.224.60.37-8443-exec-8

Retrieval of object com.novell.nidp.servlets.NIDPServletSession@6d6a1e from cache session succeeded using key 5b8d1f2636355a3f754b363ffe154c8a6919030d12afe9c8e03b72a1c4fa6484.  Cache size is 5
 </amLogEntry>

<amLogEntry> 2018-03-28T06:20:51Z VERBOSE NIDS Application: Session has consumed authentications: true </amLogEntry>

<amLogEntry> 2018-03-28T06:20:51Z VERBOSE NIDS Application: Session consumed authentications is 1 and is considered authenticated: true </amLogEntry>

<amLogEntry> 2018-03-28T06:20:51Z VERBOSE NIDS IDFF: Handling IDFF request, session authenticated: true </amLogEntry>

<amLogEntry> 2018-03-28T06:20:51Z VERBOSE NIDS Application: Session has consumed authentications: true </amLogEntry>

<amLogEntry> 2018-03-28T06:20:51Z VERBOSE NIDS Application: Session consumed authentications is 1 and is considered authenticated: true </amLogEntry>

<amLogEntry> 2018-03-28T06:20:51Z VERBOSE NIDS IDFF: Handling IDFF LOGOUT request </amLogEntry>

<amLogEntry> 2018-03-28T06:20:51Z DEBUG NIDS Application: 
Method: ProxyProfile.isProxyRequest
Thread: http-nio-10.224.60.37-8443-exec-8
/nidp/idff/slo is a ProxyRequest: false </amLogEntry>

<amLogEntry> 2018-03-28T06:20:51Z DEBUG NIDS Application: 
Method: CacheMap.A
Thread: http-nio-10.224.60.37-8443-exec-8

Retrieval of object com.novell.nidp.NIDPSubject@5c3120a5 from cache subject succeeded using key 811786ad1ae74adfdd20dd0372abaaebc6246e343aebd01da0bfc4c02bf0106c.  Cache size is 1
 </amLogEntry>

<amLogEntry> 2018-03-28T06:20:51Z DEBUG NIDS IDFF: 
Method: LibertyProfile.traceMessage
Thread: http-nio-10.224.60.37-8443-exec-8


************************* Liberty Redirect message ********************************

Type: received
 RelayState: None
RequestID=idRdYdW9dbbFkn5XJnHXrGCQaLML4&MajorVersion=1&MinorVersion=2&IssueInstant=2018-03-28T06%3A21%3A00Z&ProviderID=https%3A%2F%2Fesp.test.local%3A443%2Fnesp%2Fidff%2Fmetadata&NameIdentifier=nrdioR5uMYT9J1ICfCxdAnguXAF%2FLVYIT8y09A%3D%3D&NameQualifier=https%3A%2F%2Fesp.test.local%3A443%2Fnesp%2Fidff%2Fmetadata&NameFormat=urn%3Aliberty%3Aiff%3Anameid%3Aone-time&SessionIndex=7E56FC09376AE88E977F376619BFC9FC&SigAlg=http%3A%2F%2Fwww.w3.org%2F2000%2F09%2Fxmldsig%23rsa-sha1&Signature=QWSB06s58T9cfFe2%2BvAnl8IGmQv8ijqCmXtsRPYm5hcHiBT9ZQ5LvgbTGZ3vx7HbmoogBQ8ZCR1z3XAnsdge4XtS3HKxf7VC7iZdofyqFY4YMVp8xGuLnBI4gCysm1kbJrlmwm0Df%2B%2FebzI4R5b5MiO8VCVONxh9uPVRUKsfUzjc%2FevJ5E16ZNR2ZLZQuPWcF0ExEwcGkYs1IENhpvjLwhiAFZ0w7SJq7ze%2Fq6dxanURueLs9v4vBoE6auDJtcy8MIO6eZ31wQmsJjGhfoADrA1yZ%2BamOOhY9SW0vcSWBGAmEUEp%2FsZwYaAhVTiUQryiJkV6U653FiTEfH%2BK8PRxqw%3D%3D
************************* End Liberty message ****************************

 </amLogEntry>

<amLogEntry> 2018-03-28T06:20:51Z VERBOSE NIDS Application: Session has consumed authentications: true </amLogEntry>

<amLogEntry> 2018-03-28T06:20:51Z VERBOSE NIDS Application: Session consumed authentications is 1 and is considered authenticated: true </amLogEntry>

<amLogEntry> 2018-03-28T06:20:51Z DEBUG NIDS Application: 
Method: ProxyProfile.isProxyRequest
Thread: http-nio-10.224.60.37-8443-exec-8
/nidp/idff/slo is a ProxyRequest: false </amLogEntry>

<amLogEntry> 2018-03-28T06:20:51Z DEBUG NIDS Application: 
Method: CacheMap.A
Thread: http-nio-10.224.60.37-8443-exec-8

Retrieval of object com.novell.nidp.NIDPSubject@5c3120a5 from cache subject succeeded using key 811786ad1ae74adfdd20dd0372abaaebc6246e343aebd01da0bfc4c02bf0106c.  Cache size is 1
 </amLogEntry>

<amLogEntry> 2018-03-28T06:20:51Z DEBUG NIDS Application: 
Method: CacheMap.A
Thread: http-nio-10.224.60.37-8443-exec-8

Retrieval of object com.novell.nidp.NIDPSubject@5c3120a5 from cache subject succeeded using key 811786ad1ae74adfdd20dd0372abaaebc6246e343aebd01da0bfc4c02bf0106c.  Cache size is 1
 </amLogEntry>

<amLogEntry> 2018-03-28T06:20:51Z DEBUG NIDS Application: 
Method: CacheMap.A
Thread: http-nio-10.224.60.37-8443-exec-8

Retrieval of object com.novell.nidp.NIDPSubject@5c3120a5 from cache subject succeeded using key 811786ad1ae74adfdd20dd0372abaaebc6246e343aebd01da0bfc4c02bf0106c.  Cache size is 1
 </amLogEntry>

<amLogEntry> 2018-03-28T06:20:51Z DEBUG NIDS Application: 
Method: LogoutProfile.getNextSession
Thread: http-nio-10.224.60.37-8443-exec-8
GetNextSession 
<null(null)>: </amLogEntry>

<amLogEntry> 2018-03-28T06:20:51Z DEBUG NIDS Application: 
Method: CacheMap.A
Thread: http-nio-10.224.60.37-8443-exec-8

Retrieval of object com.novell.nidp.common.authority.ldap.LDAPPrincipal@5a5bee01 from cache principal succeeded using key dbba955d4aceebfba7aa727ae7af2440414ef04d958399d8d6ec392732ac5cf3.  Cache size is 3
 </amLogEntry>

<amLogEntry> 2018-03-28T06:20:51Z DEBUG NIDS Application: 
Method: CacheMap.A
Thread: http-nio-10.224.60.37-8443-exec-8

Retrieval of object com.novell.nidp.NIDPSubject@5c3120a5 from cache subject succeeded using key 811786ad1ae74adfdd20dd0372abaaebc6246e343aebd01da0bfc4c02bf0106c.  Cache size is 1
 </amLogEntry>

<amLogEntry> 2018-03-28T06:20:51Z DEBUG NIDS Application: 
Method: CacheMap.A
Thread: http-nio-10.224.60.37-8443-exec-8

Retrieval of object com.novell.nidp.servlets.NIDPServletSession@6d6a1e from cache session succeeded using key 5b8d1f2636355a3f754b363ffe154c8a6919030d12afe9c8e03b72a1c4fa6484.  Cache size is 5
 </amLogEntry>

<amLogEntry> 2018-03-28T06:20:51Z VERBOSE NIDS Application: Session has consumed authentications: true </amLogEntry>

<amLogEntry> 2018-03-28T06:20:51Z VERBOSE NIDS Application: Session consumed authentications is 1 and is considered authenticated: true </amLogEntry>

<amLogEntry> 2018-03-28T06:20:51Z DEBUG NIDS Application: 
Method: LogoutProfile.getNextSession
Thread: http-nio-10.224.60.37-8443-exec-8
Sessions [Lcom.novell.nidp.NIDPSession;@7e133a6 </amLogEntry>

<amLogEntry> 2018-03-28T06:20:51Z DEBUG NIDS Application: 
Method: LogoutProfile.getNextSession
Thread: http-nio-10.224.60.37-8443-exec-8
sessions 0 com.novell.nidp.servlets.NIDPServletSession@6d6a1e null </amLogEntry>

<amLogEntry> 2018-03-28T06:20:51Z DEBUG NIDS Application: 
Method: LogoutProfile.getNextSession
Thread: http-nio-10.224.60.37-8443-exec-8
return session com.novell.nidp.servlets.NIDPServletSession@6d6a1e </amLogEntry>

<amLogEntry> 2018-03-28T06:20:51Z DEBUG NIDS Application: 
Method: LogoutProfile.logoutSessions
Thread: http-nio-10.224.60.37-8443-exec-8
Next Session to logout com.novell.nidp.servlets.NIDPServletSession@6d6a1e </amLogEntry>

<amLogEntry> 2018-03-28T06:20:51Z VERBOSE NIDS Application: Logout session 5b8d1f2636355a3f754b363ffe154c8a6919030d12afe9c8e03b72a1c4fa6484 </amLogEntry>

<amLogEntry> 2018-03-28T06:20:51Z VERBOSE NIDS Application: Session has consumed authentications: true </amLogEntry>

<amLogEntry> 2018-03-28T06:20:51Z VERBOSE NIDS Application: Session consumed authentications is 1 and is considered authenticated: true </amLogEntry>

<amLogEntry> 2018-03-28T06:20:51Z VERBOSE NIDS Application: Logging out consumed SOAP based authentications.  Total authentications: 1 </amLogEntry>

<amLogEntry> 2018-03-28T06:20:51Z VERBOSE NIDS Application: SOAP Logout failed to https://shibidp01.test.local/idp/shibboleth </amLogEntry>

<amLogEntry> 2018-03-28T06:20:51Z DEBUG NIDS Application: 
Method: CacheMap.A
Thread: http-nio-10.224.60.37-8443-exec-8

Retrieval of object com.novell.nidp.NIDPSubject@5c3120a5 from cache subject succeeded using key 811786ad1ae74adfdd20dd0372abaaebc6246e343aebd01da0bfc4c02bf0106c.  Cache size is 1
 </amLogEntry>

<amLogEntry> 2018-03-28T06:20:51Z DEBUG NIDS Application: 
Method: NIDPPrincipal.getIdentity
Thread: http-nio-10.224.60.37-8443-exec-8
Get the identity for: Identity Id: https://shibidp01.test.local/idp/shibboleth, provided: false, federated: false, Principal: cn=user6,ou=users,o=data </amLogEntry>

<amLogEntry> 2018-03-28T06:20:51Z DEBUG NIDS Application: 
Method: NIDPPrincipal.getIdentity
Thread: http-nio-10.224.60.37-8443-exec-8
Returning Identity: https://shibidp01.test.local/idp/shibboleth
 </amLogEntry>

<amLogEntry> 2018-03-28T06:20:51Z DEBUG NIDS SAML2: 
Method: SAML2Utils.getOptionValue
Thread: http-nio-10.224.60.37-8443-exec-8
SAML2_CHANGE_ISSUER is not configured as service provider's ui option </amLogEntry>

<amLogEntry> 2018-03-28T06:20:51Z DEBUG NIDS SAML2: 
Method: SAML2Utils.isOptionConfigured
Thread: http-nio-10.224.60.37-8443-exec-8
SAML2_AVOID_SPNAMEQUALIFIER is not configured as service provider's ui option </amLogEntry>

<amLogEntry> 2018-03-28T06:20:51Z DEBUG NIDS Application: 
Method: NIDPLocalConfigUtil.getSaml2TPValueBoolean
Thread: http-nio-10.224.60.37-8443-exec-8
 [nidpconfig.properties] Options - https://shibidp01.test.local/idp/shibboleth->SAML2_AVOID_SPNAMEQUALIFIER value returned:  false </amLogEntry>

<amLogEntry> 2018-03-28T06:20:51Z DEBUG NIDS Application: 
Method: NIDPLocalConfigUtil.isOptionConfigured
Thread: http-nio-10.224.60.37-8443-exec-8
Property read from local file --------> Property:SAML2_ISSUER_NAMEQUALIFIER Value: false </amLogEntry>

<amLogEntry> 2018-03-28T06:20:51Z DEBUG NIDS Application: 
Method: NIDPLocalConfigUtil.isOptionConfigured
Thread: http-nio-10.224.60.37-8443-exec-8
Property read from local file --------> Property:SAML2_ISSUER_FORMAT Value: false </amLogEntry>

<amLogEntry> 2018-03-28T06:20:51Z DEBUG NIDS Application: 
Method: NIDPLocalConfigUtil.getSaml2TPValueBoolean
Thread: http-nio-10.224.60.37-8443-exec-8
 [nidpconfig.properties] Options - https://sso.test.local/nidp/saml2/metadata->SAML2_AVOID_SPNAMEQUALIFIER_TO value returned:  false </amLogEntry>

<amLogEntry> 2018-03-28T06:20:51Z DEBUG NIDS Application: 
Method: SAML2Utils.isAvoidSPNameQaulifierTo
Thread: http-nio-10.224.60.37-8443-exec-8
Property read from file for Trusted Provider https://sso.test.local/nidp/saml2/metadata --------> Property:SAML2_AVOID_SPNAMEQUALIFIER_TO Value: false </amLogEntry>

<amLogEntry> 2018-03-28T06:20:51Z DEBUG NIDS SAML2: 
Method: SAML2Utils.isOptionConfigured
Thread: http-nio-10.224.60.37-8443-exec-8
SAML2_SIGN_METHODDIGEST_SHA256 is not configured as service provider's ui option </amLogEntry>

<amLogEntry> 2018-03-28T06:20:51Z DEBUG NIDS Application: 
Method: NIDPLocalConfigUtil.getSaml2TPValueBoolean
Thread: http-nio-10.224.60.37-8443-exec-8
 [nidpconfig.properties] Options - https://shibidp01.test.local/idp/shibboleth->SAML2_SIGN_METHODDIGEST_SHA256 value returned:  false </amLogEntry>

<amLogEntry> 2018-03-28T06:20:51Z DEBUG NIDS Application: 
Method: XMLSignable.preSigning
Thread: http-nio-10.224.60.37-8443-exec-8
Atempting to sign XMLSignable object: Name: LogoutRequest </amLogEntry>

<amLogEntry> 2018-03-28T06:20:51Z DEBUG NIDS Application: 
Method: XMLSignable.A
Thread: http-nio-10.224.60.37-8443-exec-8
Signing will use certificate [CN=SSO.TEST.LOCAL, OU=Applications, OU=eHealthUsers, OU=Subscribers, DC=subscribers, DC=ssh] having serial no [1479335624] </amLogEntry>

<amLogEntry> 2018-03-28T06:20:51Z DEBUG NIDS SAML2: 
Method: NIDPLocalConfigUtil.isSaml2KeyEnabled
Thread: http-nio-10.224.60.37-8443-exec-8
'SAML2_SIGN_METHODDIGEST_SHA256' doesn't map to an existing object [nidpconfig.properties]. SAML2 request -error parsing SAML2 property SAML2_SIGN_METHODDIGEST_SHA256 </amLogEntry>

<amLogEntry> 2018-03-28T06:20:51Z DEBUG NIDS Application: 
Method: XMLSignable.postSigning
Thread: http-nio-10.224.60.37-8443-exec-8
Signature completed for object! Name: LogoutRequest </amLogEntry>

<amLogEntry> 2018-03-28T06:20:51Z DEBUG NIDS Application: 
Method: NIDPLocalConfigUtil.getSaml2TPValueBoolean
Thread: http-nio-10.224.60.37-8443-exec-8
 [nidpconfig.properties] Options - https://shibidp01.test.local/idp/profile/SAML2/POST/SLO->SAML2_RESPONSE_AVOID_REMOVE_EXTRANEOUS_NAMESPACES value returned:  false </amLogEntry>

<amLogEntry> 2018-03-28T06:20:51Z DEBUG NIDS Application: 
Method: NIDPLocalConfigUtil.isPostDeFlate
Thread: http-nio-10.224.60.37-8443-exec-8
Property read from local file --------> Property:SAML2_POST_DEFLATE_TRUSTEDPROVIDERS Value: false Trusted Provider:https://shibidp01.test.local/idp/shibboleth </amLogEntry>

<amLogEntry> 2018-03-28T06:20:51Z DEBUG NIDS SAML2: 
Method: SAML2Profile.sendMessage
Thread: http-nio-10.224.60.37-8443-exec-8
Outbound POST message was NOT deflated for the TARGET with Provider ID: 'https://shibidp01.test.local/idp/shibboleth' </amLogEntry>

<amLogEntry> 2018-03-28T06:20:51Z DEBUG NIDS Application: 
Method: NIDPServletContext.goJSP
Thread: http-nio-10.224.60.37-8443-exec-8
Forwarding to JSP: /jsp/saml2post.jsp </amLogEntry>

<amLogEntry> 2018-03-28T06:20:51Z DEBUG NIDS SAML2: 
Method: SAML2Profile.traceMessage
Thread: http-nio-10.224.60.37-8443-exec-8


************************* SAML2 POST message ********************************

Type: sent
Sent to: https://shibidp01.test.local/idp/profile/SAML2/POST/SLO RelayState: None
<samlp:LogoutRequest xmlns:samlp="urn:oasis:names:tc:SAML:2.0:protocol" xmlns:saml="urn:oasis:names:tc:SAML:2.0:assertion" Destination="https://shibidp01.test.local/idp/profile/SAML2/POST/SLO" ID="idytuP3Pv8QLb0pPSREYfE9uWsoho" IssueInstant="2018-03-28T06:20:51Z" Version="2.0"><saml:Issuer>https://sso.test.local/nidp/saml2/metadata</saml:Issuer><ds:Signature xmlns:ds="http://www.w3.org/2000/09/xmldsig#">
<ds:SignedInfo>
<ds:CanonicalizationMethod Algorithm="http://www.w3.org/2001/10/xml-exc-c14n#"/>
<ds:SignatureMethod Algorithm="http://www.w3.org/2000/09/xmldsig#rsa-sha1"/>
<ds:Reference URI="#idytuP3Pv8QLb0pPSREYfE9uWsoho">
<ds:Transforms>
<ds:Transform Algorithm="http://www.w3.org/2000/09/xmldsig#enveloped-signature"/>
<ds:Transform Algorithm="http://www.w3.org/2001/10/xml-exc-c14n#"/>
</ds:Transforms>
<ds:DigestMethod Algorithm="http://www.w3.org/2000/09/xmldsig#sha1"/>
<ds:DigestValue>Pe0vCXrulglBdx/YaHmREPd3YeU=</ds:DigestValue>
</ds:Reference>
</ds:SignedInfo>
<ds:SignatureValue>
JaG/QvDHggHvXfK5hYtEHwHuIELaM4zv0Io4nqtGpmd4yrtY8WIsbU0j7+apMOxqZbpqIGind0zO
5OoM4brA3hjjEvM5BL2sb+qgVpvg4uB9QZ6R/zYXck/vDhNiGOF38CEO0mgSeRiBJVW0/6R2QU99
E50ooGd3n7eQMLVcl6eB1WHReGphXthMjfMvT0QgYaQ5njGOWKSLfd5yzhoIJ/qpio2aoJWwfezq
IGBMRKOnY7Bu26JoYW4sj/idGdgPZhCKH24kIZb1KAevTUa7s6AJhm2NersnmHVa0/HCa55lMx3f
BSQz+bijmwyBfUy/Yn2Eui/Zk55assHM09whgg==
</ds:SignatureValue>
<ds:KeyInfo>
<ds:X509Data>
<ds:X509Certificate>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</ds:X509Certificate>
</ds:X509Data>
</ds:KeyInfo>
</ds:Signature><saml:NameID Format="urn:oasis:names:tc:SAML:2.0:nameid-format:transient" NameQualifier="https://shibidp01.test.local/idp/shibboleth" SPNameQualifier="https://sso.test.local/nidp/saml2/metadata">_bba42bbb73634f97d7917e95b0d54de0</saml:NameID><samlp:SessionIndex>_fe4f9d6dc9adfcb3f7566e182c3284ce</samlp:SessionIndex></samlp:LogoutRequest>
************************* End SAML2 message ****************************

 </amLogEntry>

<amLogEntry> 2018-03-28T06:20:51Z DEBUG NIDS Application: 
Method: CacheMap.A
Thread: http-nio-10.224.60.37-8443-exec-8

Retrieval of object com.novell.nidp.servlets.NIDPServletSession@6d6a1e from cache session succeeded using key 5b8d1f2636355a3f754b363ffe154c8a6919030d12afe9c8e03b72a1c4fa6484.  Cache size is 5
 </amLogEntry>

<amLogEntry> 2018-03-28T06:20:52Z DEBUG NIDS Application: 
Method: NIDPServletContext.getServiceVersion
Thread: RMI TCP Connection(1926)-127.0.0.1
Product version: 4.3.1.0-53 </amLogEntry>

<amLogEntry> 2018-03-28T06:20:55Z DEBUG NIDS Application: 
Method: NIDPProxyableServlet.myDoGetWithProxy
Thread: http-nio-10.224.60.37-8443-exec-11
****** HttpServletRequest Information:
Method: POST
Scheme: https
Context Path: /nidp
Servlet Path: /saml2
Query String: null
Path Info: /spslo_return
Server Name: sso.test.local
Server Port: 443
Content Length: 3909
Content Type: application/x-www-form-urlencoded
Auth Type: null
Request URL: https://sso.test.local/nidp/saml2/spslo_return
Host IP Address: 10.224.60.37
Remote Client IP Address: 10.224.128.69
Cookie: (0 of 2): JSESSIONID, 5b8d1f2636355a3f754b363ffe154c8a6919030d12afe9c8e03b72a1c4fa6484
Cookie: (1 of 2): ZNPCQ003-33393700, 87f81e40
Header: Name: host, Value: sso.test.local
Header: Name: connection, Value: keep-alive
Header: Name: content-length, Value: 3909
Header: Name: cache-control, Value: max-age=0
Header: Name: origin, Value: https://shibidp01.test.local
Header: Name: upgrade-insecure-requests, Value: 1
Header: Name: content-type, Value: application/x-www-form-urlencoded
Header: Name: user-agent, Value: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/65.0.3325.181 Safari/537.36
Header: Name: accept, Value: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
Header: Name: referer, Value: https://shibidp01.test.local/idp/profile/SAML2/POST/SLO
Header: Name: accept-encoding, Value: gzip, deflate, br
Header: Name: accept-language, Value: en-US,en;q=0.9
Session Id: 5b8d1f2636355a3f754b363ffe154c8a6919030d12afe9c8e03b72a1c4fa6484
Session Last Accessed Time: 1522218051579
 </amLogEntry>

<amLogEntry> 2018-03-28T06:20:55Z DEBUG NIDS Application: 
Method: CacheMap.A
Thread: http-nio-10.224.60.37-8443-exec-11

Retrieval of object com.novell.nidp.servlets.NIDPServletSession@6d6a1e from cache session succeeded using key 5b8d1f2636355a3f754b363ffe154c8a6919030d12afe9c8e03b72a1c4fa6484.  Cache size is 5
 </amLogEntry>

<amLogEntry> 2018-03-28T06:20:55Z DEBUG NIDS Application: AM#600105011: AMDEVICEID#B930B2D61FC77E3A: AMAUTHID#5b8d1f2636355a3f754b363ffe154c8a6919030d12afe9c8e03b72a1c4fa6484:  SP saml2 handler to process request received for /nidp/saml2 </amLogEntry>

<amLogEntry> 2018-03-28T06:20:55Z DEBUG NIDS Application: 
Method: CacheMap.A
Thread: http-nio-10.224.60.37-8443-exec-11

Retrieval of object com.novell.nidp.servlets.NIDPServletSession@6d6a1e from cache session succeeded using key 5b8d1f2636355a3f754b363ffe154c8a6919030d12afe9c8e03b72a1c4fa6484.  Cache size is 5
 </amLogEntry>

<amLogEntry> 2018-03-28T06:20:55Z VERBOSE NIDS Application: Session has consumed authentications: true </amLogEntry>

<amLogEntry> 2018-03-28T06:20:55Z VERBOSE NIDS Application: Session consumed authentications is 0 and is considered authenticated: false </amLogEntry>

<amLogEntry> 2018-03-28T06:20:55Z DEBUG NIDS Application: 
Method: CacheMap.A
Thread: http-nio-10.224.60.37-8443-exec-11

Retrieval of object com.novell.nidp.NIDPSubject@5c3120a5 from cache subject succeeded using key 811786ad1ae74adfdd20dd0372abaaebc6246e343aebd01da0bfc4c02bf0106c.  Cache size is 1
 </amLogEntry>

<amLogEntry> 2018-03-28T06:20:55Z INFO NIDS Application: AM#500105029: AMDEVICEID#B930B2D61FC77E3A: AMAUTHID#5b8d1f2636355a3f754b363ffe154c8a6919030d12afe9c8e03b72a1c4fa6484:  Logged out session id: 5b8d1f2636355a3f754b363ffe154c8a6919030d12afe9c8e03b72a1c4fa6484 </amLogEntry>

<amLogEntry> 2018-03-28T06:20:55Z VERBOSE NIDS Application: NIDPSubject=null  </amLogEntry>

<amLogEntry> 2018-03-28T06:20:55Z DEBUG NIDS Application: 
Method: CacheMap.A
Thread: http-nio-10.224.60.37-8443-exec-11

Removal of object com.novell.nidp.common.authority.ldap.LDAPPrincipal@5a5bee01 from cache principal succeeded using key 31d5212615602a2fe1633862746872c8826b1b077eb47ac3249b4c3492496fef.  Cache size is 2
 </amLogEntry>

<amLogEntry> 2018-03-28T06:20:55Z DEBUG NIDS Application: 
Method: CacheMap.A
Thread: http-nio-10.224.60.37-8443-exec-11

Removal of object com.novell.nidp.common.authority.ldap.LDAPPrincipal@5a5bee01 from cache principal succeeded using key 19f12abba471bb961a1056ae2bd044ad7af74c890f981565da9aaf4eb19e34a2.  Cache size is 1
 </amLogEntry>

<amLogEntry> 2018-03-28T06:20:55Z DEBUG NIDS Application: 
Method: CacheMap.A
Thread: http-nio-10.224.60.37-8443-exec-11

Removal of object com.novell.nidp.common.authority.ldap.LDAPPrincipal@5a5bee01 from cache principal succeeded using key dbba955d4aceebfba7aa727ae7af2440414ef04d958399d8d6ec392732ac5cf3.  Cache size is 0
 </amLogEntry>

<amLogEntry> 2018-03-28T06:20:55Z DEBUG NIDS Application: 
Method: CacheMap.A
Thread: http-nio-10.224.60.37-8443-exec-11

Removal of object com.novell.nidp.NIDPSubject@5c3120a5 from cache subject succeeded using key 811786ad1ae74adfdd20dd0372abaaebc6246e343aebd01da0bfc4c02bf0106c.  Cache size is 0
 </amLogEntry>

<amLogEntry> 2018-03-28T06:20:55Z DEBUG NIDS Application: 
Method: CacheMap.A
Thread: http-nio-10.224.60.37-8443-exec-11

Removal of object from cache ImpersonationSession failed using key 5b8d1f2636355a3f754b363ffe154c8a6919030d12afe9c8e03b72a1c4fa6484.  Cache size is 0
 </amLogEntry>

<amLogEntry> 2018-03-28T06:20:55Z DEBUG NIDS Application: 
Method: CacheMap.A
Thread: http-nio-10.224.60.37-8443-exec-11

Removal of object from cache ImpersonationSession failed using key 5b8d1f2636355a3f754b363ffe154c8a6919030d12afe9c8e03b72a1c4fa6484.  Cache size is 0
 </amLogEntry>

<amLogEntry> 2018-03-28T06:20:55Z DEBUG NIDS Application: 
Method: NIDPContext.getRelayStateDecode
Thread: http-nio-10.224.60.37-8443-exec-11
Property read from local file --------> Property:decodeRelayStateParam Value: false </amLogEntry>

<amLogEntry> 2018-03-28T06:20:55Z VERBOSE NIDS Application: Input param url: null :: web.xml param value to decode: false </amLogEntry>

<amLogEntry> 2018-03-28T06:20:55Z DEBUG NIDS Application: 
Method: NIDPContext.getRelayStateDecode
Thread: http-nio-10.224.60.37-8443-exec-11
Property read from local file --------> Property:decodeRelayStateParam Value: false </amLogEntry>

<amLogEntry> 2018-03-28T06:20:55Z DEBUG NIDS Application: 
Method: NIDPLocalConfigUtil.isPostInFlate
Thread: http-nio-10.224.60.37-8443-exec-11
Property read from local file --------> Property:IS_SAML2_POST_INFLATE Value: false </amLogEntry>

<amLogEntry> 2018-03-28T06:20:55Z DEBUG NIDS SAML2: 
Method: SAML2Profile.handleInBoundMessage
Thread: http-nio-10.224.60.37-8443-exec-11
InBound POST message was NOT inflated. </amLogEntry>

<amLogEntry> 2018-03-28T06:20:55Z DEBUG NIDS SAML2: 
Method: SAML2Profile.traceMessage
Thread: http-nio-10.224.60.37-8443-exec-11


************************* SAML2 POST message ********************************

Type: received
 RelayState: None
<?xml version="1.0" encoding="UTF-8"?>
<saml2p:LogoutResponse Destination="https://sso.test.local/nidp/saml2/spslo_return" ID="_4e985ca323469c2c8b01c563a244bb11" InResponseTo="idytuP3Pv8QLb0pPSREYfE9uWsoho" IssueInstant="2018-03-28T06:22:04.222Z" Version="2.0" xmlns:saml2p="urn:oasis:names:tc:SAML:2.0:protocol"><saml2:Issuer Format="urn:oasis:names:tc:SAML:2.0:nameid-format:entity" xmlns:saml2="urn:oasis:names:tc:SAML:2.0:assertion">https://shibidp01.test.local/idp/shibboleth</saml2:Issuer><ds:Signature xmlns:ds="http://www.w3.org/2000/09/xmldsig#"><ds:SignedInfo><ds:CanonicalizationMethod Algorithm="http://www.w3.org/2001/10/xml-exc-c14n#"/><ds:SignatureMethod Algorithm="http://www.w3.org/2000/09/xmldsig#rsa-sha1"/><ds:Reference URI="#_4e985ca323469c2c8b01c563a244bb11"><ds:Transforms><ds:Transform Algorithm="http://www.w3.org/2000/09/xmldsig#enveloped-signature"/><ds:Transform Algorithm="http://www.w3.org/2001/10/xml-exc-c14n#"/></ds:Transforms><ds:DigestMethod Algorithm="http://www.w3.org/2000/09/xmldsig#sha1"/><ds:DigestValue>i5ECLFGjE3JqzQlIV515wt7dVEI=</ds:DigestValue></ds:Reference></ds:SignedInfo><ds:SignatureValue>Dvnf6V7e2JsdhJw3BFXnrPYtVjtxCYv5VxN+HfA1sT7CbYaP8fADfNZKxFHJt2rPcnYs2cL7HDPjs8ipm8UARd2P6o3d2RRASDuz6asCH/sOThzO5yYK1k1SVdDcsnifepbXMUqt6jPIVzrWiT6SInmTOLsH9BDWeObHauRaLBAu/BUptR0lYXk9qz8lrhZ5dhxL4BLXlo+mSLsE7HpQJRGsOS3fHRpFTn4qPcQvvXx/v32LJRumKpJgYIJ9piBW6DL7Lp9kPs5bQZnS67pbeO9bMlgtfCKlq0yF6bZxPZ7054GdgeK+b6K/P5IoI5Gf3tM/9MS1xIeHl1a2e4eyYA==</ds:SignatureValue><ds:KeyInfo><ds:X509Data><ds:X509Certificate>MIIDWDCCAkCgAwIBAgIVAJ7wlLAIEPY2yJSg4j0vbtVMF5ofMA0GCSqGSIb3DQEBBQUAMCYxJDAi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</ds:X509Certificate></ds:X509Data></ds:KeyInfo></ds:Signature><saml2p:Status><saml2p:StatusCode Value="urn:oasis:names:tc:SAML:2.0:status:Success"/></saml2p:Status></saml2p:LogoutResponse>
************************* End SAML2 message ****************************

 </amLogEntry>

<amLogEntry> 2018-03-28T06:20:55Z DEBUG NIDS Application: 
Method: NIDPLocalConfigUtil.isOptionConfigured
Thread: http-nio-10.224.60.37-8443-exec-11
Property read from local file --------> Property:XML_PARSE_ALLOW_DTD Value: false </amLogEntry>

Mar 28, 2018 2:20:55 AM org.apache.xml.security.signature.Reference verify
INFO: Verification successful for URI "#_4e985ca323469c2c8b01c563a244bb11"
<amLogEntry> 2018-03-28T06:20:55Z DEBUG NIDS SAML2: 
Method: SAML2Profile.trace
Thread: http-nio-10.224.60.37-8443-exec-11
Processing Logout Return Response </amLogEntry>

<amLogEntry> 2018-03-28T06:20:55Z DEBUG NIDS Application: 
Method: ProxyProfile.isProxyRequest
Thread: http-nio-10.224.60.37-8443-exec-11
/nidp/saml2/spslo_return is a ProxyRequest: false </amLogEntry>

<amLogEntry> 2018-03-28T06:20:55Z DEBUG NIDS Application: 
Method: LogoutProfile.processResponse
Thread: http-nio-10.224.60.37-8443-exec-11
Processing Logout Return Response com.novell.nidp.servlets.NIDPServletSession@6d6a1e </amLogEntry>

<amLogEntry> 2018-03-28T06:20:55Z VERBOSE NIDS Application: Session has consumed authentications: false </amLogEntry>

<amLogEntry> 2018-03-28T06:20:55Z DEBUG NIDS Application: 
Method: LogoutProfile.processResponse
Thread: http-nio-10.224.60.37-8443-exec-11
Session is not authenticated, must have been logged out already </amLogEntry>

<amLogEntry> 2018-03-28T06:20:55Z DEBUG NIDS Application: 
Method: NIDPServletContext.goJSP
Thread: http-nio-10.224.60.37-8443-exec-11
Forwarding to JSP: /jsp/main.jsp </amLogEntry>

<amLogEntry> 2018-03-28T06:20:55Z DEBUG NIDS Application: 
Method: CacheMap.A
Thread: http-nio-10.224.60.37-8443-exec-11

Retrieval of object com.novell.nidp.servlets.NIDPServletSession@6d6a1e from cache session succeeded using key 5b8d1f2636355a3f754b363ffe154c8a6919030d12afe9c8e03b72a1c4fa6484.  Cache size is 5
 </amLogEntry>

<amLogEntry> 2018-03-28T06:20:55Z DEBUG NIDS Application: 
Method: CacheMap.A
Thread: http-nio-10.224.60.37-8443-exec-11

Retrieval of object com.novell.nidp.servlets.NIDPServletSession@6d6a1e from cache session succeeded using key 5b8d1f2636355a3f754b363ffe154c8a6919030d12afe9c8e03b72a1c4fa6484.  Cache size is 5
 </amLogEntry>

<amLogEntry> 2018-03-28T06:20:55Z DEBUG NIDS Application: 
Method: NIDPResourceManager.A
Thread: http-nio-10.224.60.37-8443-exec-11
Locale: en_US mapped to directory en </amLogEntry>

<amLogEntry> 2018-03-28T06:20:55Z DEBUG NIDS Application: 
Method: NIDPResourceManager.A
Thread: http-nio-10.224.60.37-8443-exec-11
Locale: en_US mapped to directory en </amLogEntry>

<amLogEntry> 2018-03-28T06:20:55Z DEBUG NIDS Application: 
Method: CacheMap.A
Thread: http-nio-10.224.60.37-8443-exec-11

Retrieval of object com.novell.nidp.servlets.NIDPServletSession@6d6a1e from cache session succeeded using key 5b8d1f2636355a3f754b363ffe154c8a6919030d12afe9c8e03b72a1c4fa6484.  Cache size is 5
 </amLogEntry>

<amLogEntry> 2018-03-28T06:21:02Z DEBUG NIDS Application: 
Method: CacheMap.A
Thread: http-nio-10.224.60.37-8443-exec-8

Retrieval of object com.novell.nidp.servlets.NIDPServletSession@6d6a1e from cache session succeeded using key 5b8d1f2636355a3f754b363ffe154c8a6919030d12afe9c8e03b72a1c4fa6484.  Cache size is 5
 </amLogEntry>

<amLogEntry> 2018-03-28T06:21:02Z DEBUG NIDS Application: 
Method: NIDPProxyableServlet.myDoGetWithProxy
Thread: http-nio-10.224.60.37-8443-exec-8
****** HttpServletRequest Information:
Method: GET
Scheme: https
Context Path: /nidp
Servlet Path: /jsp/logoutSuccess.jsp
Query String: uiDestination=contentDiv
Path Info: null
Server Name: sso.test.local
Server Port: 443
Content Length: -1
Content Type: null
Auth Type: null
Request URL: https://sso.test.local/nidp/jsp/logoutSuccess.jsp
Host IP Address: 10.224.60.37
Remote Client IP Address: 10.224.128.69
Cookie: (0 of 2): JSESSIONID, 5b8d1f2636355a3f754b363ffe154c8a6919030d12afe9c8e03b72a1c4fa6484
Cookie: (1 of 2): ZNPCQ003-33393700, 87f81e40
Header: Name: host, Value: sso.test.local
Header: Name: connection, Value: keep-alive
Header: Name: accept, Value: */*
Header: Name: x-requested-with, Value: XMLHttpRequest
Header: Name: user-agent, Value: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/65.0.3325.181 Safari/537.36
Header: Name: referer, Value: https://sso.test.local/nidp/saml2/spslo_return
Header: Name: accept-encoding, Value: gzip, deflate, br
Header: Name: accept-language, Value: en-US,en;q=0.9
Session Id: 5b8d1f2636355a3f754b363ffe154c8a6919030d12afe9c8e03b72a1c4fa6484
Session Last Accessed Time: 1522218058850
 </amLogEntry>

<amLogEntry> 2018-03-28T06:21:02Z DEBUG NIDS Application: 
Method: NIDPJspFilter.doFilter
Thread: http-nio-10.224.60.37-8443-exec-8
JSP request did not need to be proxied to a different server! </amLogEntry>

<amLogEntry> 2018-03-28T06:21:02Z DEBUG NIDS Application: 
Method: CacheMap.A
Thread: http-nio-10.224.60.37-8443-exec-8

Retrieval of object com.novell.nidp.servlets.NIDPServletSession@6d6a1e from cache session succeeded using key 5b8d1f2636355a3f754b363ffe154c8a6919030d12afe9c8e03b72a1c4fa6484.  Cache size is 5
 </amLogEntry>

<amLogEntry> 2018-03-28T06:21:02Z DEBUG NIDS Application: 
Method: CacheMap.A
Thread: http-nio-10.224.60.37-8443-exec-8

Retrieval of object com.novell.nidp.servlets.NIDPServletSession@6d6a1e from cache session succeeded using key 5b8d1f2636355a3f754b363ffe154c8a6919030d12afe9c8e03b72a1c4fa6484.  Cache size is 5
 </amLogEntry>

<amLogEntry> 2018-03-28T06:21:02Z DEBUG NIDS Application: 
Method: NIDPContextListener.sessionDestroyed
Thread: http-nio-10.224.60.37-8443-exec-8
The HttpSession 5b8d1f2636355a3f754b363ffe154c8a6919030d12afe9c8e03b72a1c4fa6484 has associated cache data! </amLogEntry>

<amLogEntry> 2018-03-28T06:21:02Z VERBOSE NIDS Application: Session has consumed authentications: false </amLogEntry>

<amLogEntry> 2018-03-28T06:21:02Z DEBUG NIDS Application: 
Method: CacheMap.A
Thread: http-nio-10.224.60.37-8443-exec-8

Removal of object from cache ImpersonationSession failed using key 5b8d1f2636355a3f754b363ffe154c8a6919030d12afe9c8e03b72a1c4fa6484.  Cache size is 0
 </amLogEntry>

<amLogEntry> 2018-03-28T06:21:02Z DEBUG NIDS Application: 
Method: CacheMap.A
Thread: http-nio-10.224.60.37-8443-exec-8

Removal of object com.novell.nidp.servlets.NIDPServletSession@6d6a1e from cache session succeeded using key 5b8d1f2636355a3f754b363ffe154c8a6919030d12afe9c8e03b72a1c4fa6484.  Cache size is 4
 </amLogEntry>

<amLogEntry> 2018-03-28T06:21:02Z DEBUG NIDS Application: 
Method: NIDPContextListener.sessionDestroyed
Thread: http-nio-10.224.60.37-8443-exec-8
Destroyed session AMAUTHID#5b8d1f2636355a3f754b363ffe154c8a6919030d12afe9c8e03b72a1c4fa6484 </amLogEntry>

<amLogEntry> 2018-03-28T06:21:02Z DEBUG NIDS Application: 
Method: LDAPAuthority.getObjectByDn
Thread: http-nio-10.224.60.37-8443-exec-11
dn = cn=mobileAccess,cn=SCC24snsi,ou=idpClusters,o=amSystem </amLogEntry>

<amLogEntry> 2018-03-28T06:21:02Z DEBUG NIDS Application: 
Method: LDAPAuthority.getObjectByDn
Thread: http-nio-10.224.60.37-8443-exec-11
dn1 = cn=mobileAccess,cn=SCC24snsi,ou=idpClusters,o=amSystem </amLogEntry>

<amLogEntry> 2018-03-28T06:21:02Z DEBUG NIDS Application: 
Method: JNDILogEventListener.accept
Thread: http-nio-10.224.60.37-8443-exec-11
Target object dn: cn=mobileAccess,cn=SCC24snsi,ou=idpClusters,o=amSystem
Acting as: ou=nidsUser,ou=UsersContainer,ou=Partition,ou=PartitionsContainer,ou=VCDN_Root,ou=accessManagerContainer,o=novell
Attrs: null or zero! </amLogEntry>

<amLogEntry> 2018-03-28T06:21:02Z DEBUG NIDS Application: 
Method: JNDILogEventListener.accept
Thread: http-nio-10.224.60.37-8443-exec-11
getNextConnection() attempting to get preferred replica from the IPreferredReplica interface </amLogEntry>

<amLogEntry> 2018-03-28T06:21:02Z DEBUG NIDS Application: 
Method: JNDILogEventListener.accept
Thread: http-nio-10.224.60.37-8443-exec-11
Closing LDAP connection due to connection timeout! Interval: 496506, Timeout: 10000, Connection: Id: 9e6f070a-fed0-4191-9a46-02785d1f6a07, host: ldaps://10.224.60.39 </amLogEntry>

<amLogEntry> 2018-03-28T06:21:02Z DEBUG NIDS Application: 
Method: JNDILogEventListener.accept
Thread: http-nio-10.224.60.37-8443-exec-11
Connection: 144ec704-11e4-49df-ad76-b9a6d9a170ea, Environment Parameters for InitialDirContext() method call:
Key: java.naming.factory.initial, Value: com.sun.jndi.ldap.LdapCtxFactory
Key: java.naming.provider.url, Value: ldaps://10.224.60.39:636
Key: com.sun.jndi.ldap.connect.timeout, Value: 0
Key: java.naming.security.principal, Value: ou=nidsUser,ou=UsersContainer,ou=Partition,ou=PartitionsContainer,ou=VCDN_Root,ou=accessManagerContainer,o=novell
Key: java.naming.security.authentication, Value: simple
Key: java.naming.security.credentials, Value: *****
Key: java.naming.security.protocol, Value: ssl
Key: java.naming.ldap.factory.socket, Value: com.novell.nidp.common.util.net.client.NIDP_SSLSocketFactory
 </amLogEntry>

<amLogEntry> 2018-03-28T06:21:02Z DEBUG NIDS Application: 
Method: JNDILogEventListener.accept
Thread: http-nio-10.224.60.37-8443-exec-11
Added property to DirContext Environment: Property Name: java.naming.ldap.attributes.binary, Value: GUID nDSPKITrustedRootCertificate </amLogEntry>
See below Shibboleth IDP logs when I click on Logout button of target application
Code:
02:13:53.998 - DEBUG [edu.internet2.middleware.shibboleth.idp.profile.saml2.SSOProfileHandler:331] - secondarily indexing user session by name identifier
02:13:53.998 - DEBUG [edu.internet2.middleware.shibboleth.idp.profile.AbstractSAMLProfileHandler:797] - Encoding response to SAML request idmpBaK9cQ1uqkF8qgy0qbgfxmopI from relying party https://sso.test.local/nidp/saml2/metadata
02:13:53.999 - DEBUG [org.opensaml.ws.message.encoder.BaseMessageEncoder:49] - Beginning encode message to outbound transport of type: org.opensaml.ws.transport.http.HttpServletResponseAdapter
02:13:53.999 - DEBUG [org.opensaml.saml2.binding.encoding.HTTPPostEncoder:124] - Invoking Velocity template to create POST body
02:13:53.999 - DEBUG [org.opensaml.saml2.binding.encoding.HTTPPostEncoder:158] - Encoding action url of 'https://sso.test.local/nidp/saml2/spassertion_consumer' with encoded value 'https&#x3a;&#x2f;&#x2f;sso.test.local&#x2f;nidp&#x2f;saml2&#x2f;spassertion_consumer'
02:13:53.999 - DEBUG [org.opensaml.saml2.binding.encoding.HTTPPostEncoder:162] - Marshalling and Base64 encoding SAML message
02:13:53.999 - DEBUG [org.opensaml.ws.message.encoder.BaseMessageEncoder:97] - Marshalling message
02:13:54.000 - DEBUG [org.opensaml.saml2.binding.encoding.HTTPPostEncoder:185] - Setting RelayState parameter to: 'MQ==', encoded as 'MQ&#x3d;&#x3d;'
02:13:54.001 - DEBUG [org.opensaml.ws.message.encoder.BaseMessageEncoder:56] - Successfully encoded message.
02:13:54.001 - INFO [Shibboleth-Audit:1028] - 20180328T061354Z|urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST|idmpBaK9cQ1uqkF8qgy0qbgfxmopI|https://sso.test.local/nidp/saml2/metadata|urn:mace:shibboleth:2.0:profiles:saml2:sso|https://shibidp01.test.local/idp/shibboleth|urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST|_fcb3c8752831da6e3d398f7eac7310c1|klew|urn:oasis:names:tc:SAML:2.0:ac:classes:PasswordProtectedTransport|grantByDelegateMeritOnly,AssertingParty,AuthenticationLevel,uao,AuthenticationToken,mail,PrincipalFedKey,transientId,CompensatingFactor,givenName,DelegationManagementSchemeRef,IdentityProvider,rid,CredentialManagementSchemeRef,ProtectedNetwork,IdentityVerificationSchemeRef,UAOIdentityVerificationSchemeRef,sn,uaoType,|_bba42bbb73634f97d7917e95b0d54de0|_599e185b851d888f810908de3561a6c2,|
02:22:03.844 - INFO [Shibboleth-Access:73] - 20180328T062203Z|10.224.128.69|shibidp01.test.local:443|/profile/SAML2/POST/SLO|
02:22:03.845 - DEBUG [edu.internet2.middleware.shibboleth.idp.profile.IdPProfileHandlerManager:86] - shibboleth.HandlerManager: Looking up profile handler for request path: /SAML2/POST/SLO
02:22:03.845 - DEBUG [edu.internet2.middleware.shibboleth.idp.profile.IdPProfileHandlerManager:97] - shibboleth.HandlerManager: Located profile handler of the following type for the request path: edu.internet2.middleware.shibboleth.idp.profile.saml2.SLOProfileHandler
02:22:03.845 - DEBUG [edu.internet2.middleware.shibboleth.idp.profile.saml2.SLOProfileHandler:160] - Processing incoming SAML LogoutRequest
02:22:03.845 - DEBUG [edu.internet2.middleware.shibboleth.idp.profile.saml2.SLOProfileHandler:522] - Decoding message with decoder binding 'urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST'
02:22:03.845 - DEBUG [org.opensaml.ws.message.decoder.BaseMessageDecoder:76] - Beginning to decode message from inbound transport of type: org.opensaml.ws.transport.http.HttpServletRequestAdapter
02:22:04.204 - DEBUG [org.opensaml.saml2.binding.decoding.HTTPPostDecoder:88] - Decoded SAML relay state of: null
02:22:04.204 - DEBUG [org.opensaml.saml2.binding.decoding.HTTPPostDecoder:109] - Getting Base64 encoded message from request
02:22:04.204 - DEBUG [org.opensaml.ws.message.decoder.BaseMessageDecoder:183] - Parsing message stream into DOM document
02:22:04.205 - DEBUG [org.opensaml.ws.message.decoder.BaseMessageDecoder:193] - Unmarshalling message DOM
02:22:04.205 - DEBUG [org.opensaml.xml.signature.impl.SignatureUnmarshaller:56] - Starting to unmarshall Apache XML-Security-based SignatureImpl element
02:22:04.205 - DEBUG [org.opensaml.xml.signature.impl.SignatureUnmarshaller:62] - Constructing Apache XMLSignature object
02:22:04.206 - DEBUG [org.opensaml.xml.signature.impl.SignatureUnmarshaller:68] - Adding canonicalization and signing algorithms, and HMAC output length to Signature
02:22:04.206 - DEBUG [org.opensaml.xml.signature.impl.SignatureUnmarshaller:75] - Adding KeyInfo to Signature
02:22:04.206 - DEBUG [org.opensaml.ws.message.decoder.BaseMessageDecoder:205] - Message succesfully unmarshalled
02:22:04.206 - DEBUG [org.opensaml.saml2.binding.decoding.HTTPPostDecoder:94] - Decoded SAML message
02:22:04.206 - DEBUG [org.opensaml.saml2.binding.decoding.BaseSAML2MessageDecoder:112] - Extracting ID, issuer and issue instant from request
02:22:04.206 - DEBUG [org.opensaml.saml2.metadata.provider.ChainingMetadataProvider:253] - Checking child metadata provider for entity descriptor with entity ID: https://sso.test.local/nidp/saml2/metadata
02:22:04.206 - DEBUG [org.opensaml.saml2.metadata.provider.AbstractMetadataProvider:520] - Searching for entity descriptor with an entity ID of https://sso.test.local/nidp/saml2/metadata
02:22:04.206 - DEBUG [org.opensaml.saml2.metadata.provider.AbstractMetadataProvider:167] - Metadata document does not contain an EntityDescriptor with the ID https://sso.test.local/nidp/saml2/metadata
02:22:04.206 - DEBUG [org.opensaml.saml2.metadata.provider.ChainingMetadataProvider:253] - Checking child metadata provider for entity descriptor with entity ID: https://sso.test.local/nidp/saml2/metadata
02:22:04.207 - DEBUG [org.opensaml.saml2.metadata.provider.AbstractMetadataProvider:520] - Searching for entity descriptor with an entity ID of https://sso.test.local/nidp/saml2/metadata
02:22:04.207 - DEBUG [org.opensaml.saml2.metadata.provider.ChainingMetadataProvider:253] - Checking child metadata provider for entity descriptor with entity ID: https://sso.test.local/nidp/saml2/metadata
02:22:04.207 - DEBUG [org.opensaml.saml2.metadata.provider.AbstractMetadataProvider:520] - Searching for entity descriptor with an entity ID of https://sso.test.local/nidp/saml2/metadata
02:22:04.207 - DEBUG [org.opensaml.saml2.metadata.provider.AbstractMetadataProvider:167] - Metadata document does not contain an EntityDescriptor with the ID https://sso.test.local/nidp/saml2/metadata
02:22:04.207 - DEBUG [org.opensaml.saml2.metadata.provider.ChainingMetadataProvider:253] - Checking child metadata provider for entity descriptor with entity ID: https://sso.test.local/nidp/saml2/metadata
02:22:04.207 - DEBUG [org.opensaml.saml2.metadata.provider.AbstractMetadataProvider:520] - Searching for entity descriptor with an entity ID of https://sso.test.local/nidp/saml2/metadata
02:22:04.207 - DEBUG [edu.internet2.middleware.shibboleth.common.relyingparty.provider.SAMLMDRelyingPartyConfigurationManager:128] - Looking up relying party configuration for https://sso.test.local/nidp/saml2/metadata
02:22:04.207 - DEBUG [edu.internet2.middleware.shibboleth.common.relyingparty.provider.SAMLMDRelyingPartyConfigurationManager:134] - No custom relying party configuration found for https://sso.test.local/nidp/saml2/metadata, looking up configuration based on metadata groups.
02:22:04.207 - DEBUG [org.opensaml.saml2.metadata.provider.ChainingMetadataProvider:253] - Checking child metadata provider for entity descriptor with entity ID: https://sso.test.local/nidp/saml2/metadata
02:22:04.207 - DEBUG [org.opensaml.saml2.metadata.provider.AbstractMetadataProvider:520] - Searching for entity descriptor with an entity ID of https://sso.test.local/nidp/saml2/metadata
02:22:04.208 - DEBUG [org.opensaml.saml2.metadata.provider.AbstractMetadataProvider:167] - Metadata document does not contain an EntityDescriptor with the ID https://sso.test.local/nidp/saml2/metadata
02:22:04.208 - DEBUG [org.opensaml.saml2.metadata.provider.ChainingMetadataProvider:253] - Checking child metadata provider for entity descriptor with entity ID: https://sso.test.local/nidp/saml2/metadata
02:22:04.208 - DEBUG [org.opensaml.saml2.metadata.provider.AbstractMetadataProvider:520] - Searching for entity descriptor with an entity ID of https://sso.test.local/nidp/saml2/metadata
02:22:04.208 - DEBUG [edu.internet2.middleware.shibboleth.common.relyingparty.provider.SAMLMDRelyingPartyConfigurationManager:157] - No custom or group-based relying party configuration found for https://sso.test.local/nidp/saml2/metadata. Using default relying party configuration.
02:22:04.208 - DEBUG [edu.internet2.middleware.shibboleth.common.relyingparty.RelyingPartySecurityPolicyResolver:117] - Resolving security policy based on communication profile ID: urn:mace:shibboleth:2.0:profiles:saml2:logout
02:22:04.208 - DEBUG [org.opensaml.ws.message.decoder.BaseMessageDecoder:130] - Evaluating security policy of type 'edu.internet2.middleware.shibboleth.common.security.ShibbolethSecurityPolicy' for decoded message
02:22:04.208 - DEBUG [org.opensaml.util.storage.ReplayCache:92] - Attempting to acquire lock for replay cache check
02:22:04.208 - DEBUG [org.opensaml.util.storage.ReplayCache:94] - Lock acquired
02:22:04.208 - DEBUG [org.opensaml.util.storage.ReplayCache:105] - Message ID idytuP3Pv8QLb0pPSREYfE9uWsoho was not a replay
02:22:04.208 - DEBUG [org.opensaml.util.storage.ReplayCache:132] - Writing message ID https://sso.test.local/nidp/saml2/metadataidytuP3Pv8QLb0pPSREYfE9uWsoho to replay cache with expiration time 2018-03-28T02:27:04.208-04:00
02:22:04.209 - DEBUG [org.opensaml.security.SAMLSignatureProfileValidator:229] - Saw Enveloped signature transform
02:22:04.209 - DEBUG [org.opensaml.security.SAMLSignatureProfileValidator:233] - Saw Exclusive C14N signature transform
02:22:04.209 - DEBUG [org.opensaml.common.binding.security.SAMLProtocolMessageXMLSignatureSecurityPolicyRule:125] - Attempting to verify signature on signed SAML protocol message using context issuer message type: {urn:oasis:names:tc:SAML:2.0:protocol}LogoutRequest
02:22:04.209 - DEBUG [org.opensaml.security.MetadataCredentialResolver:167] - Forcing on-demand metadata provider refresh if necessary
02:22:04.209 - DEBUG [org.opensaml.security.MetadataCredentialResolver:215] - Attempting to retrieve credentials from cache using index: [https://sso.test.local/nidp/saml2/metadata,{urn:oasis:names:tc:SAML:2.0:metadata}SPSSODescriptor,urn:oasis:names:tc:SAML:2.0:protocol,SIGNING]
02:22:04.209 - DEBUG [org.opensaml.security.MetadataCredentialResolver:223] - Retrieved credentials from cache using index: [https://sso.test.local/nidp/saml2/metadata,{urn:oasis:names:tc:SAML:2.0:metadata}SPSSODescriptor,urn:oasis:names:tc:SAML:2.0:protocol,SIGNING]
02:22:04.209 - DEBUG [org.opensaml.xml.security.credential.criteria.EvaluableCredentialCriteriaRegistry:74] - Registry located evaluable criteria class org.opensaml.xml.security.credential.criteria.EvaluableEntityIDCredentialCriteria for criteria class org.opensaml.xml.security.criteria.EntityIDCriteria
02:22:04.210 - DEBUG [org.opensaml.xml.security.credential.criteria.EvaluableCredentialCriteriaRegistry:74] - Registry located evaluable criteria class org.opensaml.xml.security.credential.criteria.EvaluableKeyAlgorithmCredentialCriteria for criteria class org.opensaml.xml.security.criteria.KeyAlgorithmCriteria
02:22:04.210 - DEBUG [org.opensaml.xml.security.credential.criteria.EvaluableCredentialCriteriaRegistry:105] - Registry could not locate evaluable criteria for criteria class org.opensaml.security.MetadataCriteria
02:22:04.210 - DEBUG [org.opensaml.xml.security.credential.criteria.EvaluableCredentialCriteriaRegistry:74] - Registry located evaluable criteria class org.opensaml.xml.security.credential.criteria.EvaluableUsageCredentialCriteria for criteria class org.opensaml.xml.security.criteria.UsageCriteria
02:22:04.210 - DEBUG [org.opensaml.xml.signature.impl.BaseSignatureTrustEngine:92] - Attempting to verify signature and establish trust using KeyInfo-derived credentials
02:22:04.210 - DEBUG [org.opensaml.xml.security.keyinfo.BasicProviderKeyInfoCredentialResolver:330] - Found 0 key names: []
02:22:04.210 - DEBUG [org.opensaml.xml.security.keyinfo.BasicProviderKeyInfoCredentialResolver:255] - Processing KeyInfo child with qname: {http://www.w3.org/2000/09/xmldsig#}X509Data
02:22:04.210 - DEBUG [org.opensaml.xml.security.keyinfo.BasicProviderKeyInfoCredentialResolver:293] - Provider org.opensaml.xml.security.keyinfo.provider.DSAKeyValueProvider doesn't handle objects of type {http://www.w3.org/2000/09/xmldsig#}X509Data, skipping
02:22:04.210 - DEBUG [org.opensaml.xml.security.keyinfo.BasicProviderKeyInfoCredentialResolver:293] - Provider org.opensaml.xml.security.keyinfo.provider.RSAKeyValueProvider doesn't handle objects of type {http://www.w3.org/2000/09/xmldsig#}X509Data, skipping
02:22:04.211 - DEBUG [org.opensaml.xml.security.keyinfo.BasicProviderKeyInfoCredentialResolver:298] - Processing KeyInfo child {http://www.w3.org/2000/09/xmldsig#}X509Data with provider org.opensaml.xml.security.keyinfo.provider.InlineX509DataProvider
02:22:04.211 - DEBUG [org.opensaml.xml.security.keyinfo.provider.InlineX509DataProvider:124] - Attempting to extract credential from an X509Data
02:22:04.212 - DEBUG [org.opensaml.xml.security.keyinfo.provider.InlineX509DataProvider:197] - Found 1 X509Certificates
02:22:04.212 - DEBUG [org.opensaml.xml.security.keyinfo.provider.InlineX509DataProvider:178] - Found 0 X509CRLs
02:22:04.212 - DEBUG [org.opensaml.xml.security.keyinfo.provider.InlineX509DataProvider:216] - Single certificate was present, treating as end-entity certificate
02:22:04.212 - DEBUG [org.opensaml.xml.security.keyinfo.BasicProviderKeyInfoCredentialResolver:303] - Credentials successfully extracted from child {http://www.w3.org/2000/09/xmldsig#}X509Data by provider org.opensaml.xml.security.keyinfo.provider.InlineX509DataProvider
02:22:04.213 - DEBUG [org.opensaml.xml.security.keyinfo.BasicProviderKeyInfoCredentialResolver:163] - A total of 1 credentials were resolved
02:22:04.213 - DEBUG [org.opensaml.xml.security.credential.criteria.EvaluableCredentialCriteriaRegistry:105] - Registry could not locate evaluable criteria for criteria class org.opensaml.xml.security.keyinfo.KeyInfoCriteria
02:22:04.213 - DEBUG [org.opensaml.xml.signature.SignatureValidator:54] - Attempting to validate signature using key from supplied credential
02:22:04.213 - DEBUG [org.opensaml.xml.signature.SignatureValidator:90] - Creating XMLSignature object
02:22:04.213 - DEBUG [org.opensaml.xml.signature.SignatureValidator:64] - Validating signature with signature algorithm URI: http://www.w3.org/2000/09/xmldsig#rsa-sha1
02:22:04.213 - DEBUG [org.opensaml.xml.signature.SignatureValidator:65] - Validation credential key algorithm 'RSA', key instance class 'sun.security.rsa.RSAPublicKeyImpl'
02:22:04.214 - DEBUG [org.opensaml.xml.signature.SignatureValidator:70] - Signature validated with key from supplied credential
02:22:04.214 - DEBUG [org.opensaml.xml.signature.impl.BaseSignatureTrustEngine:148] - Signature validation using candidate credential was successful
02:22:04.214 - DEBUG [org.opensaml.xml.signature.impl.BaseSignatureTrustEngine:101] - Successfully verified signature using KeyInfo-derived credential
02:22:04.217 - DEBUG [org.opensaml.xml.signature.impl.BaseSignatureTrustEngine:102] - Attempting to establish trust of KeyInfo-derived credential
02:22:04.217 - DEBUG [org.opensaml.xml.security.trust.ExplicitKeyTrustEvaluator:91] - Successfully validated untrusted credential against trusted key
02:22:04.217 - DEBUG [org.opensaml.xml.signature.impl.BaseSignatureTrustEngine:104] - Successfully established trust of KeyInfo-derived credential
02:22:04.217 - DEBUG [org.opensaml.xml.signature.impl.ChainingSignatureTrustEngine:69] - Signature was trusted by chain member: org.opensaml.xml.signature.impl.ExplicitKeySignatureTrustEngine
02:22:04.218 - INFO [org.opensaml.common.binding.security.SAMLProtocolMessageXMLSignatureSecurityPolicyRule:129] - Validation of protocol message signature succeeded, message type: {urn:oasis:names:tc:SAML:2.0:protocol}LogoutRequest
02:22:04.218 - DEBUG [org.opensaml.common.binding.security.SAMLProtocolMessageXMLSignatureSecurityPolicyRule:131] - Authentication via protocol message signature succeeded for context issuer entity ID https://sso.test.local/nidp/saml2/metadata
02:22:04.218 - DEBUG [org.opensaml.common.binding.security.BaseSAMLSimpleSignatureSecurityPolicyRule:64] - Evaluating simple signature rule of type: org.opensaml.saml2.binding.security.SAML2HTTPRedirectDeflateSignatureRule
02:22:04.218 - DEBUG [org.opensaml.common.binding.security.BaseSAMLSimpleSignatureSecurityPolicyRule:81] - Rule can not handle this request, skipping processing
02:22:04.218 - DEBUG [org.opensaml.common.binding.security.BaseSAMLSimpleSignatureSecurityPolicyRule:64] - Evaluating simple signature rule of type: org.opensaml.saml2.binding.security.SAML2HTTPPostSimpleSignRule
02:22:04.218 - DEBUG [org.opensaml.common.binding.security.BaseSAMLSimpleSignatureSecurityPolicyRule:87] - HTTP request was not signed via simple signature mechanism, skipping
02:22:04.218 - INFO [org.opensaml.ws.transport.http.HttpServletRequestAdapter:130] - Wrapped HTTP servlet request did not contain a client certificate
02:22:04.218 - INFO [org.opensaml.ws.security.provider.ClientCertAuthRule:104] - Inbound message transport did not contain a peer credential, skipping client certificate authentication
02:22:04.218 - DEBUG [org.opensaml.ws.message.decoder.BaseMessageDecoder:85] - Successfully decoded message.
02:22:04.218 - DEBUG [org.opensaml.common.binding.decoding.BaseSAMLMessageDecoder:191] - Checking SAML message intended destination endpoint against receiver endpoint
02:22:04.218 - DEBUG [org.opensaml.common.binding.decoding.BaseSAMLMessageDecoder:210] - Intended message destination endpoint: https://shibidp01.test.local/idp/profile/SAML2/POST/SLO
02:22:04.219 - DEBUG [org.opensaml.common.binding.decoding.BaseSAMLMessageDecoder:211] - Actual message receiver endpoint: https://shibidp01.test.local/idp/profile/SAML2/POST/SLO
02:22:04.219 - DEBUG [org.opensaml.common.binding.decoding.BaseSAMLMessageDecoder:219] - SAML message intended destination endpoint matched recipient endpoint
02:22:04.219 - DEBUG [edu.internet2.middleware.shibboleth.idp.profile.saml2.SLOProfileHandler:536] - Decoded request from relying party 'https://sso.test.local/nidp/saml2/metadata'
02:22:04.219 - DEBUG [org.opensaml.saml2.metadata.provider.ChainingMetadataProvider:253] - Checking child metadata provider for entity descriptor with entity ID: https://sso.test.local/nidp/saml2/metadata
02:22:04.219 - DEBUG [org.opensaml.saml2.metadata.provider.AbstractMetadataProvider:520] - Searching for entity descriptor with an entity ID of https://sso.test.local/nidp/saml2/metadata
02:22:04.219 - DEBUG [org.opensaml.saml2.metadata.provider.AbstractMetadataProvider:167] - Metadata document does not contain an EntityDescriptor with the ID https://sso.test.local/nidp/saml2/metadata
02:22:04.219 - DEBUG [org.opensaml.saml2.metadata.provider.ChainingMetadataProvider:253] - Checking child metadata provider for entity descriptor with entity ID: https://sso.test.local/nidp/saml2/metadata
02:22:04.219 - DEBUG [org.opensaml.saml2.metadata.provider.AbstractMetadataProvider:520] - Searching for entity descriptor with an entity ID of https://sso.test.local/nidp/saml2/metadata
02:22:04.219 - DEBUG [org.opensaml.saml2.metadata.provider.ChainingMetadataProvider:253] - Checking child metadata provider for entity descriptor with entity ID: https://sso.test.local/nidp/saml2/metadata
02:22:04.219 - DEBUG [org.opensaml.saml2.metadata.provider.AbstractMetadataProvider:520] - Searching for entity descriptor with an entity ID of https://sso.test.local/nidp/saml2/metadata
02:22:04.219 - DEBUG [org.opensaml.saml2.metadata.provider.AbstractMetadataProvider:167] - Metadata document does not contain an EntityDescriptor with the ID https://sso.test.local/nidp/saml2/metadata
02:22:04.219 - DEBUG [org.opensaml.saml2.metadata.provider.ChainingMetadataProvider:253] - Checking child metadata provider for entity descriptor with entity ID: https://sso.test.local/nidp/saml2/metadata
02:22:04.220 - DEBUG [org.opensaml.saml2.metadata.provider.AbstractMetadataProvider:520] - Searching for entity descriptor with an entity ID of https://sso.test.local/nidp/saml2/metadata
02:22:04.220 - DEBUG [edu.internet2.middleware.shibboleth.common.relyingparty.provider.SAMLMDRelyingPartyConfigurationManager:128] - Looking up relying party configuration for https://sso.test.local/nidp/saml2/metadata
02:22:04.220 - DEBUG [edu.internet2.middleware.shibboleth.common.relyingparty.provider.SAMLMDRelyingPartyConfigurationManager:134] - No custom relying party configuration found for https://sso.test.local/nidp/saml2/metadata, looking up configuration based on metadata groups.
02:22:04.220 - DEBUG [org.opensaml.saml2.metadata.provider.ChainingMetadataProvider:253] - Checking child metadata provider for entity descriptor with entity ID: https://sso.test.local/nidp/saml2/metadata
02:22:04.220 - DEBUG [org.opensaml.saml2.metadata.provider.AbstractMetadataProvider:520] - Searching for entity descriptor with an entity ID of https://sso.test.local/nidp/saml2/metadata
02:22:04.220 - DEBUG [org.opensaml.saml2.metadata.provider.AbstractMetadataProvider:167] - Metadata document does not contain an EntityDescriptor with the ID https://sso.test.local/nidp/saml2/metadata
02:22:04.220 - DEBUG [org.opensaml.saml2.metadata.provider.ChainingMetadataProvider:253] - Checking child metadata provider for entity descriptor with entity ID: https://sso.test.local/nidp/saml2/metadata
02:22:04.220 - DEBUG [org.opensaml.saml2.metadata.provider.AbstractMetadataProvider:520] - Searching for entity descriptor with an entity ID of https://sso.test.local/nidp/saml2/metadata
02:22:04.220 - DEBUG [edu.internet2.middleware.shibboleth.common.relyingparty.provider.SAMLMDRelyingPartyConfigurationManager:157] - No custom or group-based relying party configuration found for https://sso.test.local/nidp/saml2/metadata. Using default relying party configuration.
02:22:04.220 - DEBUG [org.opensaml.saml2.metadata.provider.ChainingMetadataProvider:253] - Checking child metadata provider for entity descriptor with entity ID: https://shibidp01.test.local/idp/shibboleth
02:22:04.220 - DEBUG [org.opensaml.saml2.metadata.provider.AbstractMetadataProvider:520] - Searching for entity descriptor with an entity ID of https://shibidp01.test.local/idp/shibboleth
02:22:04.221 - DEBUG [org.opensaml.common.binding.BasicEndpointSelector:72] - Selected endpoint https://sso.test.local/nidp/saml2/spslo for request
02:22:04.221 - DEBUG [edu.internet2.middleware.shibboleth.idp.profile.saml2.SLOProfileHandler:279] - Querying SessionManager based on NameID '_bba42bbb73634f97d7917e95b0d54de0|urn:oasis:names:tc:SAML:2.0:nameid-format:transient|https://shibidp01.test.local/idp/shibboleth|https://sso.test.local/nidp/saml2/metadata'
02:22:04.221 - INFO [edu.internet2.middleware.shibboleth.idp.profile.saml2.SLOProfileHandler:347] - Invalidating session identified by LogoutRequest: dfaea61a16272575bc7c1394bbd76e9624e2c731453d320c704468521bec434c
02:22:04.222 - DEBUG [edu.internet2.middleware.shibboleth.idp.profile.AbstractSAMLProfileHandler:797] - Encoding response to SAML request idytuP3Pv8QLb0pPSREYfE9uWsoho from relying party https://sso.test.local/nidp/saml2/metadata
02:22:04.223 - DEBUG [org.opensaml.ws.message.encoder.BaseMessageEncoder:49] - Beginning encode message to outbound transport of type: org.opensaml.ws.transport.http.HttpServletResponseAdapter
02:22:04.223 - DEBUG [org.opensaml.common.SAMLObjectHelper:56] - Examing signed object for content references with exclusive canonicalization transform
02:22:04.223 - DEBUG [org.opensaml.common.SAMLObjectHelper:70] - Saw exclusive transform, declaring non-visible namespaces on signed object
02:22:04.223 - DEBUG [org.opensaml.xml.signature.impl.SignatureMarshaller:100] - Starting to marshall {http://www.w3.org/2000/09/xmldsig#}Signature
02:22:04.223 - DEBUG [org.opensaml.xml.signature.impl.SignatureMarshaller:103] - Creating XMLSignature object
02:22:04.223 - DEBUG [org.opensaml.xml.signature.impl.SignatureMarshaller:113] - Adding content to XMLSignature.
02:22:04.223 - DEBUG [org.opensaml.common.impl.SAMLObjectContentReference:173] - Adding list of inclusive namespaces for signature exclusive canonicalization transform
02:22:04.224 - DEBUG [org.opensaml.xml.signature.impl.SignatureMarshaller:118] - Creating Signature DOM element
02:22:04.224 - DEBUG [org.opensaml.xml.signature.Signer:76] - Computing signature over XMLSignature object
02:22:04.230 - DEBUG [org.opensaml.saml2.binding.encoding.HTTPPostEncoder:124] - Invoking Velocity template to create POST body
02:22:04.231 - DEBUG [org.opensaml.saml2.binding.encoding.HTTPPostEncoder:158] - Encoding action url of 'https://sso.test.local/nidp/saml2/spslo_return' with encoded value 'https&#x3a;&#x2f;&#x2f;sso.test.local&#x2f;nidp&#x2f;saml2&#x2f;spslo_return'
02:22:04.231 - DEBUG [org.opensaml.saml2.binding.encoding.HTTPPostEncoder:162] - Marshalling and Base64 encoding SAML message
02:22:04.233 - DEBUG [org.opensaml.ws.message.encoder.BaseMessageEncoder:56] - Successfully encoded message.
02:22:04.256 - INFO [Shibboleth-Audit:1028] - 20180328T062204Z|urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST|idytuP3Pv8QLb0pPSREYfE9uWsoho|https://sso.test.local/nidp/saml2/metadata|urn:mace:shibboleth:2.0:profiles:saml2:logout|https://shibidp01.test.local/idp/shibboleth|urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST|_4e985ca323469c2c8b01c563a244bb11|klew|urn:oasis:names:tc:SAML:2.0:ac:classes:PasswordProtectedTransport||_bba42bbb73634f97d7917e95b0d54de0||