User data from… | Might include… |
---|---|
Current employer or degrees achieved | |
Profile picture, birthday, or relationship status | |
Active Directory | Employee number, job title, or department |
surname
from one connection might be last_name
and family_name
from other user data sources.
To handle this complexity, Auth0 provides a normalized user profile, an Auth0-specific standard for storing user data.
profileMapper.js
file, located in the installation directory of the AD/LDAP connector, maps the attributes when a user authenticates.
If Auth0 is a… | Then… |
---|---|
SAML Service Provider | Use the SAML connection’s Mappings tab to map attributes coming from an IDP to attributes in the Auth0 user profile: Go to Dashboard > Authentication > Enterprise > SAMLP. Click on the name of the SAML connection and click Mappings. |
SAML Identity Provider | Use the Settings tab of Application AddOns to map attributes from the Auth0 user profile to attributes in the SAML Assertion sent back to the Service Provider: Go to Dashboard > Applications. Click on the name of your application, click Addons, and click SAML2 Web App. |
user_id
for the second authentication is different from the user_id
for the first authentication.
Auth0 provides a mechanism to link the two accounts. When Auth0 links the two accounts, it stores two elements in the identities
array portion of the user profile, one for each connection.
Auth0 does not merge user profile attributes from multiple providers. Auth0 sources core user profile attributes from the first provider used.
To learn more, read User Account Linking.
user_metadata
to store custom attributes such as the user’s favorite color or hobby.
user_metadata
and app_metadata
portions of any user’s profile.update:users
, and then click TRY.
The Auth0 Authentication API is specifically for authentication flows. To learn more, read Authentication API Explorer. Typically, most of these endpoints are used by the various Auth0 SDKs, not your own code.