Skip to content

Commit ce580dc

Browse files
authored
Updating instructions to make them easier to follow and implement
There were several pieces of this article that did not work well for someone following instructions, such as brackets (<>) around values that broke expressions, and also there was no guidance given for the options when creating new inbound and outbound synchronization rules when syncing altternativeSecurityId. This should make the article easier for someone to go through and implement the changes.
1 parent 8bb93f3 commit ce580dc

File tree

1 file changed

+32
-2
lines changed

1 file changed

+32
-2
lines changed

articles/active-directory/authentication/concept-certificate-based-authentication-certificateuserids.md

Lines changed: 32 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -91,13 +91,21 @@ To update certificate user IDs for federated users, configure Azure AD Connect t
9191

9292
### Synchronize X509:\<PN>PrincipalNameValue
9393

94-
To synchronize X509:\<PN>PrincipalNameValue, create an outbound synchronization rule, and choose **Expression** in the flow type. Choose the target attribute as \<certificateUserIds>, and in the source field, add the expression <"X509:\<PN>"&[userPrincipalName]>. If your source attribute isn't userPrincipalName, you can change the expression accordingly.
94+
To synchronize X509:\<PN>PrincipalNameValue, create an outbound synchronization rule, and choose **Expression** in the flow type. Choose the target attribute as **certificateUserIds**, and in the source field, add the following expression. If your source attribute isn't userPrincipalName, you can change the expression accordingly.
95+
96+
```
97+
"X509:\<PN>"&[userPrincipalName]
98+
```
9599

96100
:::image type="content" border="true" source="./media/concept-certificate-based-authentication-certificateuserids/pnexpression.png" alt-text="Screenshot of how to sync x509.":::
97101

98102
### Synchronize X509:\<RFC822>RFC822Name
99103

100-
To synchronize X509:\<RFC822>RFC822Name, create an outbound synchronization rule, choose **Expression** in the flow type. Choose the target attribute as \<certificateUserIds>, and in the source field, add the expression <"X509:\<RFC822>"&[userPrincipalName]>. If your source attribute isn't userPrincipalName, you can change the expression accordingly.
104+
To synchronize X509:\<RFC822>RFC822Name, create an outbound synchronization rule, choose **Expression** in the flow type. Choose the target attribute as **certificateUserIds**, and in the source field, add the following expression. If your source attribute isn't userPrincipalName, you can change the expression accordingly.
105+
106+
```
107+
"X509:\<RFC822>"&[userPrincipalName]
108+
```
101109

102110
:::image type="content" border="true" source="./media/concept-certificate-based-authentication-certificateuserids/rfc822expression.png" alt-text="Screenshot of how to sync RFC822Name.":::
103111

@@ -122,11 +130,33 @@ AlternativeSecurityId isn't part of the default attributes. An administrator nee
122130

123131
1. Create an inbound synchronization rule to transform from altSecurityIdentities to alternateSecurityId attribute.
124132

133+
In the inbound rule, use the following options.
134+
135+
|Option | Value |
136+
|-------|-------|
137+
|Name | Descriptive name of the rule, such as: In from AD - altSecurityIdentities |
138+
|Connected System | Your on-premises AD domain |
139+
|Connected System Object Type | user |
140+
|Metaverse Object Type | person |
141+
|Precedence | Choose a random high number not currently used |
142+
143+
Then proceed to the Transformations tab and do a direct mapping of the target attribute of **alternativeSecurityId** to **altSecurityIdentities** as shown below.
144+
125145
:::image type="content" border="true" source="./media/concept-certificate-based-authentication-certificateuserids/alt-security-identity-inbound.png" alt-text="Screenshot of how to transform from altSecurityIdentities to alternateSecurityId attribute":::
126146

127147
1. Create an outbound synchronization rule to transform from alternateSecurityId attribute to certificateUserIds
128148
alt-security-identity-add.
129149

150+
|Option | Value |
151+
|-------|-------|
152+
|Name | Descriptive name of the rule, such as: Out to AAD - certificateUserIds |
153+
|Connected System | Your Azure AD doamin |
154+
|Connected System Object Type | user |
155+
|Metaverse Object Type | person |
156+
|Precedence | Choose a random high number not currently used |
157+
158+
Then proceed to the Transformations tab and change your FlowType option to *Expression*, the target attribute to **certificateUserIds** and then input the below expression in to the Source field.
159+
130160
:::image type="content" border="true" source="./media/concept-certificate-based-authentication-certificateuserids/alt-security-identity-outbound.png" alt-text="Screenshot of outbound synchronization rule to transform from alternateSecurityId attribute to certificateUserIds":::
131161

132162
To map the pattern supported by certificateUserIds, administrators must use expressions to set the correct value.

0 commit comments

Comments
 (0)