Skip to content

Commit d563b95

Browse files
authored
Merge pull request #219518 from csmulligan/csm-exid-claims-mapping
[EXID] Content freshness update for claims-mapping (ADO-2074845)
2 parents 046f555 + 49a5bb8 commit d563b95

File tree

3 files changed

+5
-5
lines changed

3 files changed

+5
-5
lines changed

articles/active-directory/external-identities/claims-mapping.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -6,29 +6,29 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: B2B
88
ms.topic: conceptual
9-
ms.date: 04/06/2018
9+
ms.date: 11/24/2022
1010

1111
ms.author: mimart
1212
author: msmimart
1313
manager: celestedg
1414

1515

16-
ms.collection: M365-identity-device-management
16+
ms.collection: engagement-fy23, M365-identity-device-management
1717
---
1818

1919
# B2B collaboration user claims mapping in Azure Active Directory
2020

21-
Azure Active Directory (Azure AD) supports customizing the claims that are issued in the SAML token for B2B collaboration users. When a user authenticates to the application, Azure AD issues a SAML token to the app that contains information (or claims) about the user that uniquely identifies them. By default, this includes the user's user name, email address, first name, and last name.
21+
Azure Active Directory (Azure AD) supports customizing the claims that are issued in the SAML token for [B2B collaboration](what-is-b2b.md) users. When a user authenticates to the application, Azure AD issues a SAML token to the app that contains information (or claims) about the user that uniquely identifies them. By default, this claim includes the user's user name, email address, first name, and last name.
2222

2323
In the [Azure portal](https://portal.azure.com), you can view or edit the claims that are sent in the SAML token to the application. To access the settings, select **Azure Active Directory** > **Enterprise applications** > the application that's configured for single sign-on > **Single sign-on**. See the SAML token settings in the **User Attributes** section.
2424

25-
![Shows the SAML token attributes in the UI](media/claims-mapping/view-claims-in-saml-token.png)
25+
:::image type="content" source="media/claims-mapping/view-claims-in-saml-token-attributes.png" alt-text="Screenshot of the SAML token attributes in the UI.":::
2626

2727
There are two possible reasons why you might need to edit the claims that are issued in the SAML token:
2828

2929
1. The application requires a different set of claim URIs or claim values.
3030

31-
2. The application requires the NameIdentifier claim to be something other than the user principal name (UPN) that's stored in Azure AD.
31+
2. The application requires the NameIdentifier claim to be something other than the user principal name [(UPN)](../hybrid/plan-connect-userprincipalname.md#what-is-userprincipalname) that's stored in Azure AD.
3232

3333
For information about how to add and edit claims, see [Customizing claims issued in the SAML token for enterprise applications in Azure Active Directory](../develop/active-directory-saml-claims-customization.md).
3434

46 KB
Loading
46 KB
Loading

0 commit comments

Comments
 (0)