Examples/Resources/AdfsRelyingPartyTrust/2-AdfsRelyingPartyTrust_LdapClaims_IssuanceTransformRules_Config.ps1
<#PSScriptInfo
.VERSION 1.0.0 .GUID 06035ace-52fa-4d92-b7f0-8a4780f60fbf .AUTHOR Microsoft Corporation .COMPANYNAME Microsoft Corporation .COPYRIGHT (c) Microsoft Corporation. All rights reserved. .TAGS DSCConfiguration .LICENSEURI https://github.com/X-Guardian/AdfsDsc/blob/master/LICENSE .PROJECTURI https://github.com/X-Guardian/AdfsDsc .ICONURI .EXTERNALMODULEDEPENDENCIES .REQUIREDSCRIPTS .EXTERNALSCRIPTDEPENDENCIES .RELEASENOTES First version. .PRIVATEDATA 2016-Datacenter,2016-Datacenter-Server-Core #> #Requires -module AdfsDsc <# .DESCRIPTION This configuration will ... #> Configuration AdfsRelyingPartyTrust_LdapClaims_IssuanceTransformRules_Config { Import-DscResource -Module AdfsDsc Node localhost { AdfsRelyingPartyTrust WebApp1 { Name = 'WebApp1' Enabled = $true Notes = 'This is a trust for https://webapp1.fabrikam.com' WSFedEndpoint = 'https://webapp1.fabrikam.com' Identifier = 'https://webapp1.fabrikam.com' IssuanceAuthorizationRules = $node.IssuanceAuthorizationRules IssuanceTransformRules = @( MSFT_AdfsIssuanceTransformRule { TemplateName = 'LdapClaims' Name = 'WebApp1 Ldap Claims' AttributeStore = 'Active Directory' LdapMapping = @( MSFT_AdfsLdapMapping { LdapAttribute = 'objectSID' OutgoingClaimType = 'http://schemas.microsoft.com/ws/2008/06/identity/claims/primarysid' } MSFT_AdfsLdapMapping { LdapAttribute = 'userPrincipalName' OutgoingClaimType = 'http://schemas.xmlsoap.org/ws/2005/05/identity/claims/upn' } ) } ) } } } $ConfigurationData = @{ AllNodes = @( @{ NodeName = 'localhost' IssuanceAuthorizationRules = @' @RuleTemplate = "AllowAllAuthzRule" => issue(Type = "http://schemas.microsoft.com/authorization/claims/permit", Value = "true"); '@ } ) } |