The attribute statement field can be configured to map user values to SAML attributes. The SAMLResponse will be sent to the configured SP (Service Provider) endpoint.
The format for the configuration is
If no namespace is specified the default namespace used is:
urn:oasis:names:tc:SAML:2.0:attrname-format:unspecified
Each pair or triplet makes up an attribute configuration. The attribute values a delimited with "|". The system can be configured to have multiple attribute pairs (triplets) each one is delimited by a ",".
The AttributeValue can be either a fixed static value or a dynamic value. Dynamic values follow the current format ${user.'fieldName'}
The userName value used is the configured userName format for the Template SAML App
To access Active Directory or LDAP user attribute values values, the following Format is used. (Note: the instances ID has to be used to identify what application instance that the users attributes are mapped from)
LDAP default value for userName is the UID
Default field mapped to userName from Active Directory is the UPN (User Principal Name)
email|${user.email},firstName|${user.firstName},role|ENG
role|ENG|urn:oasis:names:tc:SAML:2.0:attrname-format:uri, email|${user.email}|urn:oasis:names:tc:SAML:2.0:attrname-format:uri
dn|12341234:${user.dn}|urn:oasis:names:tc:SAML:2.0:attrname-format:uri, samAccountName|12341234:${user.samAccountName}|urn:oasis:names:tc:SAML:2.0:attrname-format:uri
The following information is necessary for SP Endpoint Configuration.
External key:
Sign into the Okta Admin dashboard to generate this value.Public certificate: Sign into the Okta Admin dashboard to generate this value.
Redirect Login URL
Sign into the Okta Admin dashboard to generate this value.Provide the following IDP metadata to your SP provider.
[Sign into the Okta Admin dashboard to generate this value.]
Select All