Using a local ADFS with Exchange 15 Update 1

As it seems the explanations from my older post (see here: Using a local ADFS with Exchange) is okay for Exchange 15, but is not okay for Exchange 15 with CU1 proxying to a backend E14 SP3 Server (especially in the barrier-free version).

The problem, which we encountered happens, because our custom WSFederationAuthenticationModule still opens the request and the proxy does not like that at all.
So there need to be some adjustments to make it work again.

1) Use another realm in System.IdentityModel
2) Use another WSFederationAuthenticationModule
3) Switch off the rewriting of to (redirecting is fine, but rewriting is baaaaaaaad).

1. Use another Realm
The base problem is opening the request to examine if there is any ADFS-related data present. To bypass this we need a way to identify request, which are not authenticated or are targeted to the WSFederation endpoint. Luckyly we can just change the realm to an non-present folder in Exchange.

    <cookieHandler requireSsl="false" />
    <wsFederation passiveRedirectEnabled="true"
                  realm="" <!-- This here changed: /adfs/ is a non-existent path -->
                  requireHttps="true" />

Make sure you use this realm as WSFederation-Endpoint in your ADFS configuration.

To complete it we have to reconfigure the audience uris:

  <add value="" /> <!-- probably you can remove this one, but it does not hurt to have it -->
  <add value="" />
  <add value="" />

2. WSFederationAuthenticationModule
The older custom WSFederationAuthenticaionModule will open the request, so it is not suitable. This here will fix the problem for (and that has to be assumed here) the realm being a non-existent address

namespace ZDV.IdentityModel.Services
    class ExchangeFederationAuthenticationModule : System.IdentityModel.Services.WSFederationAuthenticationModule
        protected override void OnAuthenticateRequest(object sender, EventArgs args)
            var skip = Thread.CurrentPrincipal != null;

                var passiveEndpoint = System.IdentityModel.Services.FederatedAuthentication

                var passiveEndpointUri = new Uri(passiveEndpoint);
                skip = skip && Uri.Compare(passiveEndpointUri, HttpContext.Current.Request.Url,
                                           UriComponents.Path, UriFormat.UriEscaped,
                                           StringComparison.OrdinalIgnoreCase) != 0;
            catch (Exception)
                skip = false;

            if (skip) return;

            base.OnAuthenticateRequest(sender, args);

Adjust the names in the web.config and

<location inheritInChildApplications="false">
      <serverRuntime uploadReadAheadSize="0" />
        <add name="SessionAuthenticationModule" type="System.IdentityModel.Services.SessionAuthenticationModule, System.IdentityModel.Services, Version=, Culture=neutral, PublicKeyToken=b77a5c561934e089" preCondition="" />
        <add name="WSFederationAuthenticationModule" type="ZDV.IdentityModel.Services.ExchangeFederationAuthenticationModule, ZDV.IdentityModel.Services, Version=, Culture=neutral, PublicKeyToken=e09b5e339c6d1313" preCondition="" />
        <!-- Exchange other Module definitions -->
      <!-- Lots of other config -->
  <assemblyBinding xmlns="urn:schemas-microsoft-com:asm.v1">
      <assemblyIdentity name="ZDV.IdentityModel.Services" publicKeyToken="e09b5e339c6d1313" culture="neutral" />
      <codeBase version="" href="file:///C:\Program Files\Microsoft\Exchange Server\V15\FrontEnd\HttpProxy\bin\ZDV.IdentityModel.Services.dll" />
    <!-- Lots of dependentAssemblies here -->

3. Remove Rewriting
The update adds an rewriting mechanism to the wwwroot, which should be removed and replaced by some redirections:

                <clear />
                <rule name="Trailing Slash OWA ECP" stopProcessing="true">
                    <match url="(.*[^/])$" />
                    <conditions logicalGrouping="MatchAny" trackAllCaptures="false">
                        <add input="{URL}" pattern="^/owa$" />
                        <add input="{URL}" pattern="^/ecp$" />
                    <action type="Redirect" url="{R:1}/" />
                <rule name="Redirect Logon Requests" stopProcessing="true">
                    <match url="^owa/auth/logon\.aspx$" />
                    <conditions logicalGrouping="MatchAll" trackAllCaptures="false" />
                    <action type="Redirect" url="" />
                </rule> -->
                <rule name="Redirect Logout Requests" stopProcessing="true">
                    <match url="^owa/logoff\.owa$" />
                    <conditions logicalGrouping="MatchAll" trackAllCaptures="false" />
                    <action type="Redirect" url="" />
                <rule name="Redirect Logout Requests (alt)" stopProcessing="true">
                    <match url="^owa/auth/logoff\.aspx$" />
                    <conditions logicalGrouping="MatchAll" trackAllCaptures="false" />
                    <action type="Redirect" url="" />
                <rule name="Redirect mail.students" stopProcessing="true">
                    <match url="(.*)" />
                    <conditions logicalGrouping="MatchAll" trackAllCaptures="false">
                        <add input="{HTTP_HOST}" pattern="" />
                    <action type="Redirect" url="{R:1}" />
<!-- We do not need this here!
  <location inheritInChildApplications="false">
        <add name="OwaUrlModule" type="Microsoft.Exchange.HttpProxy.OwaUrlModule,Microsoft.Exchange.OwaUrlModule,Version=,Culture=neutral,PublicKeyToken=31bf3856ad364e35" preCondition="" />
      <machineKey validationKey="AutoGenerate,IsolateApps" />
      <compilation defaultLanguage="c#" debug="false">
          <add assembly="Microsoft.Exchange.OwaUrlModule, Version=, Culture=neutral, PublicKeyToken=31bf3856ad364e35" />