Skip to content

Commit 8f5700b

Browse files
Merge pull request #106994 from pamcdo/patch-7
Updating instructions to make them easier to follow and implement
2 parents 12dba21 + 8cbd3ec commit 8f5700b

File tree

1 file changed

+32
-2
lines changed

1 file changed

+32
-2
lines changed

articles/active-directory/authentication/concept-certificate-based-authentication-certificateuserids.md

Lines changed: 32 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -91,13 +91,21 @@ To update certificate user IDs for federated users, configure Azure AD Connect t
9191

9292
### Synchronize X509:\<PN>PrincipalNameValue
9393

94-
To synchronize X509:\<PN>PrincipalNameValue, create an outbound synchronization rule, and choose **Expression** in the flow type. Choose the target attribute as \<certificateUserIds>, and in the source field, add the expression <"X509:\<PN>"&[userPrincipalName]>. If your source attribute isn't userPrincipalName, you can change the expression accordingly.
94+
To synchronize X509:\<PN>PrincipalNameValue, create an outbound synchronization rule, and choose **Expression** in the flow type. Choose the target attribute as **certificateUserIds**, and in the source field, add the following expression. If your source attribute isn't userPrincipalName, you can change the expression accordingly.
95+
96+
```
97+
"X509:\<PN>"&[userPrincipalName]
98+
```
9599

96100
:::image type="content" border="true" source="./media/concept-certificate-based-authentication-certificateuserids/pnexpression.png" alt-text="Screenshot of how to sync x509.":::
97101

98102
### Synchronize X509:\<RFC822>RFC822Name
99103

100-
To synchronize X509:\<RFC822>RFC822Name, create an outbound synchronization rule, choose **Expression** in the flow type. Choose the target attribute as \<certificateUserIds>, and in the source field, add the expression <"X509:\<RFC822>"&[userPrincipalName]>. If your source attribute isn't userPrincipalName, you can change the expression accordingly.
104+
To synchronize X509:\<RFC822>RFC822Name, create an outbound synchronization rule, choose **Expression** in the flow type. Choose the target attribute as **certificateUserIds**, and in the source field, add the following expression. If your source attribute isn't userPrincipalName, you can change the expression accordingly.
105+
106+
```
107+
"X509:\<RFC822>"&[userPrincipalName]
108+
```
101109

102110
:::image type="content" border="true" source="./media/concept-certificate-based-authentication-certificateuserids/rfc822expression.png" alt-text="Screenshot of how to sync RFC822Name.":::
103111

@@ -122,11 +130,33 @@ AlternativeSecurityId isn't part of the default attributes. An administrator nee
122130

123131
1. Create an inbound synchronization rule to transform from altSecurityIdentities to alternateSecurityId attribute.
124132

133+
In the inbound rule, use the following options.
134+
135+
|Option | Value |
136+
|-------|-------|
137+
|Name | Descriptive name of the rule, such as: In from AD - altSecurityIdentities |
138+
|Connected System | Your on-premises AD domain |
139+
|Connected System Object Type | user |
140+
|Metaverse Object Type | person |
141+
|Precedence | Choose a random high number not currently used |
142+
143+
Then proceed to the Transformations tab and do a direct mapping of the target attribute of **alternativeSecurityId** to **altSecurityIdentities** as shown below.
144+
125145
:::image type="content" border="true" source="./media/concept-certificate-based-authentication-certificateuserids/alt-security-identity-inbound.png" alt-text="Screenshot of how to transform from altSecurityIdentities to alternateSecurityId attribute":::
126146

127147
1. Create an outbound synchronization rule to transform from alternateSecurityId attribute to certificateUserIds
128148
alt-security-identity-add.
129149

150+
|Option | Value |
151+
|-------|-------|
152+
|Name | Descriptive name of the rule, such as: Out to AAD - certificateUserIds |
153+
|Connected System | Your Azure AD doamin |
154+
|Connected System Object Type | user |
155+
|Metaverse Object Type | person |
156+
|Precedence | Choose a random high number not currently used |
157+
158+
Then proceed to the Transformations tab and change your FlowType option to *Expression*, the target attribute to **certificateUserIds** and then input the below expression in to the Source field.
159+
130160
:::image type="content" border="true" source="./media/concept-certificate-based-authentication-certificateuserids/alt-security-identity-outbound.png" alt-text="Screenshot of outbound synchronization rule to transform from alternateSecurityId attribute to certificateUserIds":::
131161

132162
To map the pattern supported by certificateUserIds, administrators must use expressions to set the correct value.

0 commit comments

Comments
 (0)