Skip to content

Commit 20a18ae

Browse files
committed
resolve GitHub issue 84895
1 parent 6cd8bf8 commit 20a18ae

File tree

1 file changed

+0
-32
lines changed

1 file changed

+0
-32
lines changed

articles/active-directory-b2c/saml-identity-provider-technical-profile.md

Lines changed: 0 additions & 32 deletions
Original file line numberDiff line numberDiff line change
@@ -179,38 +179,6 @@ The **CryptographicKeys** element contains the following attributes:
179179
| SamlAssertionDecryption |No | The X509 certificate (RSA key set). A SAML identity provider uses the public portion of the certificate to encrypt the assertion of the SAML response. Azure AD B2C uses the private portion of the certificate to decrypt the assertion. |
180180
| MetadataSigning |No | The X509 certificate (RSA key set) to use to sign SAML metadata. Azure AD B2C uses this key to sign the metadata. |
181181

182-
## SAML entityID customization
183-
184-
If you have multiple SAML applications that depend on different entityID values, you can override the `issueruri` value in your relying party file. To do this, copy the technical profile with the "Saml2AssertionIssuer" ID from the base file and override the `issueruri` value.
185-
186-
> [!TIP]
187-
> Copy the `<ClaimsProviders>` section from the base and preserve these elements within the claims provider: `<DisplayName>Token Issuer</DisplayName>`, `<TechnicalProfile Id="Saml2AssertionIssuer">`, and `<DisplayName>Token Issuer</DisplayName>`.
188-
189-
Example:
190-
191-
```xml
192-
<ClaimsProviders>
193-
<ClaimsProvider>
194-
<DisplayName>Token Issuer</DisplayName>
195-
<TechnicalProfiles>
196-
<TechnicalProfile Id="Saml2AssertionIssuer">
197-
<DisplayName>Token Issuer</DisplayName>
198-
<Metadata>
199-
<Item Key="IssuerUri">customURI</Item>
200-
</Metadata>
201-
</TechnicalProfile>
202-
</TechnicalProfiles>
203-
</ClaimsProvider>
204-
</ClaimsProviders>
205-
<RelyingParty>
206-
<DefaultUserJourney ReferenceId="SignUpInSAML" />
207-
<TechnicalProfile Id="PolicyProfile">
208-
<DisplayName>PolicyProfile</DisplayName>
209-
<Protocol Name="SAML2" />
210-
<Metadata>
211-
212-
```
213-
214182
## Next steps
215183

216184
See the following articles for examples of working with SAML identity providers in Azure AD B2C:

0 commit comments

Comments
 (0)