One other note...
On the WAP server the Auth, Dev and Org URLs have DisableTranslateUrlInResponseHeaders set to True.
Here are all the options as set for the above URLs:
ADFSRelyingPartyID :
ADFSRelyingPartyName :
BackendServerAuthenticationMode : NoAuthentication
BackendServerAuthenticationSPN :
BackendServerCertificateValidation : None
BackendServerUrl : blankorg2015.demo.domain.com
ClientCertificateAuthenticationBindingMode : None
ClientCertificatePreauthenticationThumbprint :
DisableHttpOnlyCookieProtection : False
DisableTranslateUrlInRequestHeaders : False
DisableTranslateUrlInResponseHeaders : True
ExternalCertificateThumbprint : EB0549E06ACBA2D3BE589AC0A7FBDD0FB2C8529A
ExternalPreauthentication : PassThrough
ExternalUrl : blankorg2015.demo.domain.com
ID : ae0b9d0c-e1db-d5eb-61ec-12517d5f2c26
InactiveTransactionsTimeoutSec : 300
Name : blankOrg2015.demo.domain.com
UseOAuthAuthentication : False
PSComputerName :
On the URL for sts.demo.domain, DisableTranslateUrlInResponseHeaders is set to False
Also, On the ASDF Server there is an error:
---------------------------------------------------
Encountered error during federation passive request.
Additional Data
Protocol Name:
wsfed
Relying Party:
https://auth.demo.domain.com/
Exception details:
Microsoft.IdentityServer.Web.InvalidRequestException: MSIS7042: The same client browser session has made '6' requests in the last '1' seconds. Contact your administrator for details.
at Microsoft.IdentityServer.Web.Protocols.PassiveProtocolHandler.UpdateLoopDetectionCookie(WrappedHttpListenerContext context)
at Microsoft.IdentityServer.Web.Protocols.WSFederation.WSFederationProtocolHandler.SendSignInResponse(WSFederationContext context, MSISSignInResponse response)
at Microsoft.IdentityServer.Web.PassiveProtocolListener.ProcessProtocolRequest(ProtocolContext protocolContext, PassiveProtocolHandler protocolHandler)
at Microsoft.IdentityServer.Web.PassiveProtocolListener.OnGetContext(WrappedHttpListenerContext context)