Symptoms—When end users attempt to access the Forefront UAG portal, they may receive the following message "The request cannot be completed. User details are missing. Contact the site administrator." There may also be an event 161 in the event viewer or in the Web Monitor with the description "ADFSv2Site: Security token does not contain the user name claim type. User name claim type: [user_name_claim_type], Session ID: [session_ID], Trunk name: [trunk_name]."
Cause—When users sign in to the Forefront UAG portal using federated authentication, the Federation Service provides a security token containing claims about the user. In this case, the security token does not contain the claim type that you defined on the Forefront UAG server as the lead user claim type.
Solution 1—To change the claim type for the lead user:
Solution 2—To change the claim types provided by the AD FS 2.0 server:
Note: If the user is a partner employee, check the partner organization's Federation Service to ensure that it is sending the correct claim type with a claim value.
Richard Mueller edited Revision 7. Comment: Removed (en-US) from title
Patris_70 edited Revision 5. Comment: added en-US title
Ed Price MSFT edited Revision 2. Comment: Updated title and tags.
I received this error after following this article (blogs.technet.com/.../configuring-adfs-trusts-for-multiple-identity-providers-with-sharepoint-2010.aspx) to configure an ADFS 'hub setup'. We had ADFS working when we went around UAG, but as soon as we put UAG in the mix we got this error. I had to edit the ADFS 'hub server' that was being used as the AUTH in UAG. The part I had to edit was related to Solution #2 above and the Relying Trust Party was my connection to UAG. I originally only had LDAP attributes as claims, so I added a Pass through or Filter an incoming claim and selected the correct lead claim and on both sides and presto - it started working! I def think others will find this useful if they use UAG as it was not easy figuring this out.