Connection Type | “Native” Azure AD | Enterprise OIDC | SAML |
---|---|---|---|
Protocol | OAuth authorization code flow | OAuth implicit flow OR OAuth authorization code flow | SAML |
Can receive optional claims from Azure AD? | No | Yes | Yes |
Federated logout support (“Single Logout” or SLO) | Yes | No | Yes |
Receive AD Groups | Yes, friendly names | Yes, object IDs | Yes, object IDs |
Receive Extended Profile | Yes | No | No |
id_token
and directly queries the Microsoft Graph API. If configured, the query searches for groups and additional profile information. Microsoft Azure AD ignores any custom claims included in the id_token
.
Graph Attribute | Auth0 Profile Attribute | Data type | Equivalent optional claim for OIDC or SAML |
---|---|---|---|
businessPhones | phone | array | N/A |
givenName | given_name | string | given_name |
jobTitle | job_title | string | N/A |
mobilePhone | mobile | string | N/A |
preferredLanguage | preferred_language | string | xms_pl |
surname | family_name | string | family_name |
userPrincipalName | upn | string | upn |
businessPhones
jobTitle
mobilePhone
groups
attribute in the Auth0 profile. Auth0 maps these group “friendly names” and does not need to configure a custom claim because these groups map directly from the Microsoft Graph API.
group_ids
attribute in the user’s Auth0 profile.
id_token
to the Auth0 User Profile. To learn more about authentication flows, visit the Authentication and Authorization Flows documentation.
groups
in the id_token
of your request. Auth0 then maps these groups to the group_ids
attribute in the user’s Auth0 profile.