You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Updating instructions to make them easier to follow and implement
There were several pieces of this article that did not work well for someone following instructions, such as brackets (<>) around values that broke expressions, and also there was no guidance given for the options when creating new inbound and outbound synchronization rules when syncing altternativeSecurityId. This should make the article easier for someone to go through and implement the changes.
Copy file name to clipboardExpand all lines: articles/active-directory/authentication/concept-certificate-based-authentication-certificateuserids.md
+32-2Lines changed: 32 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -91,13 +91,21 @@ To update certificate user IDs for federated users, configure Azure AD Connect t
91
91
92
92
### Synchronize X509:\<PN>PrincipalNameValue
93
93
94
-
To synchronize X509:\<PN>PrincipalNameValue, create an outbound synchronization rule, and choose **Expression** in the flow type. Choose the target attribute as \<certificateUserIds>, and in the source field, add the expression <"X509:\<PN>"&[userPrincipalName]>. If your source attribute isn't userPrincipalName, you can change the expression accordingly.
94
+
To synchronize X509:\<PN>PrincipalNameValue, create an outbound synchronization rule, and choose **Expression** in the flow type. Choose the target attribute as **certificateUserIds**, and in the source field, add the following expression. If your source attribute isn't userPrincipalName, you can change the expression accordingly.
95
+
96
+
```
97
+
"X509:\<PN>"&[userPrincipalName]
98
+
```
95
99
96
100
:::image type="content" border="true" source="./media/concept-certificate-based-authentication-certificateuserids/pnexpression.png" alt-text="Screenshot of how to sync x509.":::
97
101
98
102
### Synchronize X509:\<RFC822>RFC822Name
99
103
100
-
To synchronize X509:\<RFC822>RFC822Name, create an outbound synchronization rule, choose **Expression** in the flow type. Choose the target attribute as \<certificateUserIds>, and in the source field, add the expression <"X509:\<RFC822>"&[userPrincipalName]>. If your source attribute isn't userPrincipalName, you can change the expression accordingly.
104
+
To synchronize X509:\<RFC822>RFC822Name, create an outbound synchronization rule, choose **Expression** in the flow type. Choose the target attribute as **certificateUserIds**, and in the source field, add the following expression. If your source attribute isn't userPrincipalName, you can change the expression accordingly.
105
+
106
+
```
107
+
"X509:\<RFC822>"&[userPrincipalName]
108
+
```
101
109
102
110
:::image type="content" border="true" source="./media/concept-certificate-based-authentication-certificateuserids/rfc822expression.png" alt-text="Screenshot of how to sync RFC822Name.":::
103
111
@@ -122,11 +130,33 @@ AlternativeSecurityId isn't part of the default attributes. An administrator nee
122
130
123
131
1. Create an inbound synchronization rule to transform from altSecurityIdentities to alternateSecurityId attribute.
124
132
133
+
In the inbound rule, use the following options.
134
+
135
+
|Option | Value |
136
+
|-------|-------|
137
+
|Name | Descriptive name of the rule, such as: In from AD - altSecurityIdentities |
138
+
|Connected System | Your on-premises AD domain |
139
+
|Connected System Object Type | user |
140
+
|Metaverse Object Type | person |
141
+
|Precedence | Choose a random high number not currently used |
142
+
143
+
Then proceed to the Transformations tab and do a direct mapping of the target attribute of **alternativeSecurityId** to **altSecurityIdentities** as shown below.
144
+
125
145
:::image type="content" border="true" source="./media/concept-certificate-based-authentication-certificateuserids/alt-security-identity-inbound.png" alt-text="Screenshot of how to transform from altSecurityIdentities to alternateSecurityId attribute":::
126
146
127
147
1. Create an outbound synchronization rule to transform from alternateSecurityId attribute to certificateUserIds
128
148
alt-security-identity-add.
129
149
150
+
|Option | Value |
151
+
|-------|-------|
152
+
|Name | Descriptive name of the rule, such as: Out to AAD - certificateUserIds |
153
+
|Connected System | Your Azure AD doamin |
154
+
|Connected System Object Type | user |
155
+
|Metaverse Object Type | person |
156
+
|Precedence | Choose a random high number not currently used |
157
+
158
+
Then proceed to the Transformations tab and change your FlowType option to *Expression*, the target attribute to **certificateUserIds** and then input the below expression in to the Source field.
159
+
130
160
:::image type="content" border="true" source="./media/concept-certificate-based-authentication-certificateuserids/alt-security-identity-outbound.png" alt-text="Screenshot of outbound synchronization rule to transform from alternateSecurityId attribute to certificateUserIds":::
131
161
132
162
To map the pattern supported by certificateUserIds, administrators must use expressions to set the correct value.
0 commit comments