https://{yourTenantName}.auth0.com/samlp/metadata?connection={connectionName}
EU: https://{yourTenantName}.eu.auth0.com/samlp/metadata?connection={connectionName}
AU: https://{yourTenantName}.au.auth0.com/samlp/metadata?connection={connectionName}
JP: https://{yourTenantName}.jp.auth0.com/samlp/metadata?connection=CONNECTION_NAME
: https://{yourTenantName}/samlp/metadata?connection={connectionName}
Once you’ve finished creating the relying party trust, continue to the next section.
urn:auth0:{yourTenant}:{yourConnectionName}
) and a brief description under Notes. Be sure to replace {yourConnectionName}
with a unique name you will also use to create a connection in Auth0 in a later step. If you are unsure of the connection name at this time, you can always edit the connection name later. Click Next.urn:auth0:{yourTenant}:{yourConnectionName}
(or whatever value you used as the display name when you started using the wizard). Click Next.LDAP Attribute | Outgoing Claim |
---|---|
E-Mail-Addresses | E-Mail Address |
Display-Name | Name |
User-Principal-Name | Name ID |
Given-Name | Given Name |
Surname | Surname |
Name ID
outgoing claim should always be present to ensure correct session handling. We strongly recommend adding all of the claims listed above, especially E-Mail Address
, since they are the ones most commonly used. You can add additional claim mappings if necessary.
6. Click Finish.
7. In the Edit Claim Issuance Policy window, click Apply. You can now exit out of this window.
https://your.adfs.server/adfs/ls
.
Parameter | Example Value |
---|---|
Post-back URL | https://<YOUR CUSTOM DOMAIN>/login/callback?connection=YOUR_CONNECTION_NAME if a custom domain is configured |
https://{yourDomain}/login/callback?connection=YOUR_CONNECTION_NAME if not using custom domains | |
Entity ID | urn:auth0::YOUR_CONNECTION_NAME |