Skip to content

Commit e21e71d

Browse files
authored
Merge pull request #31952 from mistermik/patch-4
Update application-proxy-configure-single-sign-on-with-ping-access.md
2 parents 6dd84e3 + 6e16118 commit e21e71d

File tree

1 file changed

+36
-4
lines changed

1 file changed

+36
-4
lines changed

articles/active-directory/manage-apps/application-proxy-configure-single-sign-on-with-ping-access.md

Lines changed: 36 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -154,9 +154,9 @@ To collect this information:
154154

155155
### Update GraphAPI to send custom fields (optional)
156156

157-
For a list of security tokens that Azure AD sends for authentication, see [Microsoft identity platform ID tokens](../develop/id-tokens.md). If you need a custom claim that sends other tokens, set the `acceptMappedClaims` application field to `True`. You can use Graph Explorer or the Azure AD portal's application manifest to make this change.
157+
If you need a custom claim that sends other tokens within the access_token consumed by PingAccess, set the `acceptMappedClaims` application field to `True`. You can use Graph Explorer or the Azure AD portal's application manifest to make this change.
158158

159-
This example uses Graph Explorer:
159+
**This example uses Graph Explorer:**
160160

161161
```
162162
PATCH https://graph.windows.net/myorganization/applications/<object_id_GUID_of_your_application>
@@ -166,7 +166,7 @@ PATCH https://graph.windows.net/myorganization/applications/<object_id_GUID_of_y
166166
}
167167
```
168168

169-
This example uses the [Azure Active Directory portal](https://aad.portal.azure.com/) to update the `acceptMappedClaims` field:
169+
**This example uses the [Azure Active Directory portal](https://aad.portal.azure.com/) to update the `acceptMappedClaims` field:**
170170

171171
1. Sign in to the [Azure Active Directory portal](https://aad.portal.azure.com/) as an application administrator.
172172
2. Select **Azure Active Directory** > **App registrations**. A list of applications appears.
@@ -175,7 +175,29 @@ This example uses the [Azure Active Directory portal](https://aad.portal.azure.c
175175
5. Search for the `acceptMappedClaims` field, and change the value to `True`.
176176
6. Select **Save**.
177177

178-
### Use a custom claim (optional)
178+
179+
### Use of optional claims (optional)
180+
Optional claims allows you to add standard-but-not-included-by-default claims that every user and tenant has.
181+
You can configure optional claims for your application by modifying the application manifest. For more info, see the [Understanding the Azure AD application manifest article](https://docs.microsoft.com/azure/active-directory/develop/reference-app-manifest/)
182+
183+
Example to include email address into the access_token that PingAccess will consume:
184+
```
185+
    "optionalClaims": {
186+
        "idToken": [],
187+
        "accessToken": [
188+
            {
189+
                "name": "email",
190+
                "source": null,
191+
                "essential": false,
192+
                "additionalProperties": []
193+
            }
194+
        ],
195+
        "saml2Token": []
196+
    },
197+
```
198+
199+
### Use of claims mapping policy (optional)
200+
[Claims Mapping Policy (preview)](https://docs.microsoft.com/azure/active-directory/develop/active-directory-claims-mapping#claims-mapping-policy-properties/) for attributes which do not exist in AzureAD. Claims mapping allows you to migrate old on-prem apps to the cloud by adding additional custom claims that are backed by your ADFS or user objects
179201

180202
To make your application use a custom claim and include additional fields, be sure you've also [created a custom claims mapping policy and assigned it to the application](../develop/active-directory-claims-mapping.md#claims-mapping-policy-assignment).
181203

@@ -184,6 +206,16 @@ To make your application use a custom claim and include additional fields, be su
184206
>
185207
> You can do policy definition and assignment through PowerShell, Azure AD Graph Explorer, or Microsoft Graph. If you're doing them in PowerShell, you may need to first use `New-AzureADPolicy` and then assign it to the application with `Add-AzureADServicePrincipalPolicy`. For more information, see [Claims mapping policy assignment](../develop/active-directory-claims-mapping.md#claims-mapping-policy-assignment).
186208
209+
Example:
210+
```powershell
211+
$pol = New-AzureADPolicy -Definition @('{"ClaimsMappingPolicy":{"Version":1,"IncludeBasicClaimSet":"true", "ClaimsSchema": [{"Source":"user","ID":"employeeid","JwtClaimType":"employeeid"}]}}') -DisplayName "AdditionalClaims" -Type "ClaimsMappingPolicy"
212+
213+
Add-AzureADServicePrincipalPolicy -Id "<<The object Id of the Enterprise Application you published in the previous step, which requires this claim>>" -RefObjectId $pol.Id
214+
```
215+
216+
### Enable PingAccess to use custom claims (optional but required if you expect the application to consume additional claims)
217+
When you will configure PingAccess in the following step, the Web Session you will create (Settings->Access->Web Sessions) must have **Request Profile** deselected and **Refresh User Attributes** set to **No**
218+
187219
## Download PingAccess and configure your application
188220

189221
Now that you've completed all the Azure Active Directory setup steps, you can move on to configuring PingAccess.

0 commit comments

Comments
 (0)