urn:auth0:{yourTenant}
https://{yourDomain}/login/callback
or https://<YOUR CUSTOM DOMAIN>/login/callback
, if you are using a custom domain./FederationMetadata/2007-06/FederationMetadata.xml
) is enabled in ADFS, Auth0 can periodically (once a day) look for changes in the configuration, like a new signing certificate added to prepare for a rollover. Because of this, enabling the Federation Metadata endpoint is preferred to providing a standalone metadata file. If you provide a standalone metadata file, we will notify you via email when the certificates are close to their expiration date.
You can use a script to to setup the connection or set it up manually.
$webAppEndpoint
value with https://<YOUR CUSTOM DOMAIN>/login/callback
.{yourAppName}
), and click Next.ADFS 2.0 profile
), and click Next.no encryption certificate
), and click Next.https://{yourDomain}/login/callback
,or if you are using a custom domain, use https://<YOUR CUSTOM DOMAIN>/login/callback
urn:auth0:{yourTenant}
Permit all users...
, and click Next.In Windows Server 2012 | In Windows Server 2016 |
---|---|
In the Actions panel on the right side of the console, find the Relying Party Trust you just created. Beneath it, click Edit Claim Issuance Policy. | In the console tree, under ADFS, click Relying Party Trusts. On the right side of the console, find the Relying Party Trust you just created. Right-click it and click Edit Claim Issuance Policy. |
Send LDAP Attributes as Claims
.
Mapping of LDAP attributes to outgoing claim types
, and click Finish.
LDAP Attribute | Outgoing Claim Type |
---|---|
E-Mail-Addresses | E-Mail Address |
Display-Name | Name |
User-Principal-Name | Name ID |
Given-Name | Given Name |
Surname | Surname |
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/department
).department
in http://schemas.xmlsoap.org/ws/2005/05/identity/claims/department
) as the attribute name for the user profile.