Use custom claim description for sending group membership from AD FS to EAA
To allow EAA to redirect users to AD FS login portal for completing authentication, you also need to configure the LDAP attributes that are sent from AD FS to EAA using claims.
Claims rules control which Active Directory (AD) attributes are returned to the relying party endpoint once a user has been authenticated. For example, it could be the application user’s email or user’s AD group membership information. The minimum requirement for EAA is the user’s email needs to be returned as a part of the Name ID attribute.
The EAA IT administrator can create a custom claims description in AD FS, associate it with the correct LDAP attribute, and add it to the relying party trust. This allows the user’s group membership to be sent from AD FS to EAA.
- Go to .
Expand Service and on the right, click Add
Complete these fields in
Add a claim Description window,
- Display name, for example Group (EAA)
- Short name, for example groupeaa.
- Claim identifier, must be Group.
- Click OK.
- Right-click on the relying party trust, for our example, EAA-RPT and select Edit Claims Issuance Policy...
- Click Add Rule...
Select the default Send LDAP Attributes as
Claims template. This template allows the IT administrator to
use any of the LDAP attributes for claim rules.
The Add Transform Claim Rule wizard appears.
Complete these fields,
- Claim rule name. Enter a custom claim rule name.
- Attribute store. Select Active Directory.
Map an LDAP attribute to an Outgoing
Claim Type. Select Token-Groups
for LDAP attribute and Group
(EAA) from step 3.a
- Click Finish.
- Click OK to save in the Edit Claim Rules dialog box.