Skip to content

Commit 8810fa6

Browse files
authored
Merge pull request #169395 from chriti/patch-2
Clarifying UPN for B2B aliases.
2 parents d4259a8 + e21fcf4 commit 8810fa6

File tree

1 file changed

+5
-1
lines changed

1 file changed

+5
-1
lines changed

articles/active-directory/app-provisioning/how-provisioning-works.md

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -77,7 +77,11 @@ You can use scoping filters to define attribute-based rules that determine which
7777
It's possible to use the Azure AD user provisioning service to provision B2B (or guest) users in Azure AD to SaaS applications.
7878
However, for B2B users to sign in to the SaaS application using Azure AD, the SaaS application must have its SAML-based single sign-on capability configured in a specific way. For more information on how to configure SaaS applications to support sign-ins from B2B users, see [Configure SaaS apps for B2B collaboration](../external-identities/configure-saas-apps.md).
7979

80-
Note that the userPrincipalName for a guest user is often stored as "alias#EXT#@domain.com". when the userPrincipalName is included in your attribute mappings as a source attribute, the #EXT# is stripped from the userPrincipalName. If you require the #EXT# to be present, replace userPrincipalName with originalUserPrincipalName as the source attribute.
80+
> [!NOTE]
81+
The userPrincipalName for a guest user is often displayed as "alias#EXT#@domain.com". When the userPrincipalName is included in your attribute mappings as a source attribute, the #EXT# is stripped from the userPrincipalName. If you require the #EXT# to be present, replace userPrincipalName with originalUserPrincipalName as the source attribute.
82+
83+
userPrincipalName = [email protected]
84+
originalUserPrincipalName = alias#EXT#@domain.com
8185

8286
## Provisioning cycles: Initial and incremental
8387

0 commit comments

Comments
 (0)