Hi, I'm Ask INFA!
What would you like to know?
ASK INFAPreview
Please to access Ask INFA.

Table of Contents

Search

  1. Preface
  2. Introducing Reference 360
  3. Getting started with Reference 360
  4. Manage system reference data
  5. Manage reference data sets
  6. Manage code lists
  7. Manage code values
  8. Manage crosswalks
  9. Import data
  10. Manage hierarchies
  11. Manage attributes
  12. Manage workflows
  13. Manage jobs
  14. Monitor Reference 360
  15. Reference 360 REST API
  16. Glossary

Reference 360

Reference 360

SAML attribute mapping properties

SAML attribute mapping properties

User login attributes such as name, email address, and user role are included in the authentication response from the identity provider to
Informatica Intelligent Cloud Services
. If the identity provider passes user and group information using SCIM 2.0, the authentication response includes additional SCIM attributes such as Display Name, Employee Number, and Organization.
Map the
Informatica Intelligent Cloud Services
user fields to corresponding SAML attributes on the
SAML Setup
page.
The attribute format differs based on your identity provider. Refer to the provider documentation for more information.
The following table describes the SAML attribute mapping properties:
Property
Description
Use friendly SAML attribute names
If selected, uses the human-readable form of the SAML attribute name which might be useful in cases in which the attribute name is complex or opaque, such as an OID or a UUID.
First Name
SAML attribute used to pass the user first name.
Last Name
SAML attribute used to pass the user last name.
Job Title
SAML attribute used to pass the user job title.
Email Addresses
SAML attribute used to pass the user email addresses. This property must be mapped.
Emails Delimiter
Delimiter to separate the email addresses if multiple email addresses are passed.
Phone Number
SAML attribute used to pass the user phone number.
Time Zone
SAML attribute used to pass the user time zone.
User Roles
SAML attribute used to pass the assigned user roles.
This field is enabled when the
Map SAML Groups and Roles
option is enabled.
Roles Delimiter
Delimiter to separate the roles if multiple roles are passed.
This field is enabled when the
Map SAML Groups and Roles
option is enabled.
User Groups
SAML attribute used to pass the assigned user groups.
This field is enabled when the
Map SAML Groups and Roles
option is enabled.
Groups Delimiter
Delimiter to separate the groups if multiple groups are passed.
This field is enabled when the
Map SAML Groups and Roles
option is enabled.
The following table describes the additional attributes. These attributes are visible when the
Enable IdP to push users/groups using SCIM 2.0
option is enabled:
Property
Description
Display Name
SCIM attribute used to pass the user displayName.
Employee Number
SCIM attribute used to pass the enterprise user employeeNumber.
Organization
SCIM attribute used to pass the enterprise user organization.
Department
SCIM attribute used to pass the enterprise user department.
Street Address
SCIM attribute used to pass the user streetAddress.
Locality
SCIM attribute used to pass the user locality.
Region
SCIM attribute used to pass the user region.
Post Code
SCIM attribute used to pass the user postalCode.
Country
SCIM attribute used to pass the user country.
Locale
SCIM attribute used to pass the user locale.
Preferred Language
SCIM attribute used to pass the user preferredLanguage.
ID
SCIM attribute used to pass the user id.
External ID
SCIM attribute used to pass the user externalId.
For Azure Active Directory, this is the objectID. For Okta, it is the id.

0 COMMENTS

We’d like to hear from you!