internal/AdfsSamples/Templafy.json
{
"AllowedAuthenticationClassReferences": [ ], "EncryptionCertificateRevocationCheck": 5, "PublishedThroughProxy": false, "SigningCertificateRevocationCheck": 5, "WSFedEndpoint": null, "AdditionalWSFedEndpoint": [ ], "ClaimsProviderName": [ ], "ClaimsAccepted": [ ], "EncryptClaims": true, "Enabled": true, "EncryptionCertificate": null, "Identifier": [ "https://app.templafy.com/AuthServices" ], "NotBeforeSkew": 0, "EnableJWT": false, "AlwaysRequireAuthentication": false, "Notes": null, "OrganizationInfo": "", "ObjectIdentifier": "ef202863-c732-ed11-a812-000d3a9bbe83", "ProxyEndpointMappings": { }, "ProxyTrustedEndpoints": [ ], "ProtocolProfile": "WsFed-SAML", "RequestSigningCertificate": [ ], "EncryptedNameIdRequired": false, "SignedSamlRequestsRequired": false, "SamlEndpoints": [ { "Binding": "POST", "BindingUri": "urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST", "Index": 0, "IsDefault": false, "Location": "https://app.templafy.com/AuthServices/Acs", "Protocol": "SAMLAssertionConsumer", "ResponseLocation": null } ], "SamlResponseSignature": "AssertionOnly", "SignatureAlgorithm": "http://www.w3.org/2001/04/xmldsig-more#rsa-sha256", "TokenLifetime": 0, "AllowedClientTypes": 6, "IssueOAuthRefreshTokensTo": 2, "RefreshTokenProtectionEnabled": true, "RequestMFAFromClaimsProviders": false, "ScopeGroupId": null, "Name": "Templafy", "AutoUpdateEnabled": false, "MonitoringEnabled": false, "MetadataUrl": null, "ConflictWithPublishedPolicy": false, "IssuanceAuthorizationRules": "", "IssuanceTransformRules": "@RuleName = \"UPN\"\r\nc:[Type == \"http://schemas.xmlsoap.org/ws/2005/05/identity/claims/upn\"]\r\n =\u003e issue(claim = c);\r\n\r\n@RuleName = \"GivenName\"\r\nc:[Type == \"http://schemas.xmlsoap.org/ws/2005/05/identity/claims/givenname\"]\r\n =\u003e issue(claim = c);\r\n\r\n@RuleName = \"Surname\"\r\nc:[Type == \"http://schemas.xmlsoap.org/ws/2005/05/identity/claims/surname\"]\r\n =\u003e issue(claim = c);\r\n\r\n@RuleTemplate = \"PassThroughClaims\"\r\n@RuleName = \"Email\"\r\nc:[Type == \"http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddress\"]\r\n =\u003e issue(claim = c);\r\n\r\n@RuleName = \"Email as Name ID\"\r\nc:[Type == \"http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddress\"]\r\n =\u003e issue(Type = \"http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameidentifier\", Issuer = c.Issuer, OriginalIssuer = c.OriginalIssuer, Value = c.Value, ValueType = c.ValueType, Properties[\"http://schemas.xmlsoap.org/ws/2005/05/identity/claimproperties/format\"] = \"urn:oasis:names:tc:SAML:1.1:nameid-format:unspecified\");\r\n\r\n@RuleName = \"Country Code\"\r\nc1:[Type == \"http://schemas.customer.com/ws/2011/05/identity/claims/domain\"]\r\n \u0026\u0026 c2:[Type == \"http://schemas.microsoft.com/ws/2008/06/identity/claims/windowsaccountname\"]\r\n =\u003e issue(store = \"Active Directory\", types = (\"http://schemas.xmlsoap.org/ws/2005/05/identity/claims/country\"), query = \";c;{0}\", param = c1.Value + \".customer.com\\\" + c2.Value);\r\n\r\n@RuleName = \"Send LDAP Groups\"\r\nc1:[Type == \"http://schemas.customer.com/ws/2011/05/identity/claims/domain\"]\r\n \u0026\u0026 c2:[Type == \"http://schemas.microsoft.com/ws/2008/06/identity/claims/windowsaccountname\"]\r\n =\u003e issue(store = \"Active Directory\", types = (\"http://schemas.microsoft.com/ws/2008/06/identity/claims/role\"), query = \";tokenGroups(domainQualifiedName);{0}\", param = c1.Value + \".customer.com\\\" + c2.Value);\r\n\r\n@RuleName = \"Custom Address LDAP Claim\"\r\nc1:[Type == \"http://schemas.customer.com/ws/2011/05/identity/claims/domain\"]\r\n \u0026\u0026 c2:[Type == \"http://schemas.microsoft.com/ws/2008/06/identity/claims/windowsaccountname\"]\r\n =\u003e issue(store = \"Active Directory\", types = (\"http://schemas.xmlsoap.org/ws/2005/05/identity/claims/streetaddress\"), query = \";streetAddress;{0}\", param = c1.Value + \".customer.com\\\" + c2.Value);\r\n\r\n@RuleName = \"Custom State LDAP Claim\"\r\nc1:[Type == \"http://schemas.customer.com/ws/2011/05/identity/claims/domain\"]\r\n \u0026\u0026 c2:[Type == \"http://schemas.microsoft.com/ws/2008/06/identity/claims/windowsaccountname\"]\r\n =\u003e issue(store = \"Active Directory\", types = (\"http://schemas.xmlsoap.org/ws/2005/05/identity/claims/stateorprovince\"), query = \";st;{0}\", param = c1.Value + \"\\\" + c2.Value);\r\n\r\n@RuleName = \"Custom PostalCode LDAP Claim\"\r\nc1:[Type == \"http://schemas.customer.com/ws/2011/05/identity/claims/domain\"]\r\n \u0026\u0026 c2:[Type == \"http://schemas.microsoft.com/ws/2008/06/identity/claims/windowsaccountname\"]\r\n =\u003e issue(store = \"Active Directory\", types = (\"http://schemas.xmlsoap.org/ws/2005/05/identity/claims/postalcode\"), query = \";postalCode;{0}\", param = c1.Value + \".customer.com\\\" + c2.Value);\r\n\r\n@RuleName = \"Custom MobilePhone LDAP Claim\"\r\nc1:[Type == \"http://schemas.customer.com/ws/2011/05/identity/claims/domain\"]\r\n \u0026\u0026 c2:[Type == \"http://schemas.microsoft.com/ws/2008/06/identity/claims/windowsaccountname\"]\r\n =\u003e issue(store = \"Active Directory\", types = (\"http://schemas.xmlsoap.org/ws/2005/05/identity/claims/mobilePhone\"), query = \";mobile;{0}\", param = c1.Value + \"\\\" + c2.Value);\r\n\r\n@RuleName = \"Custom City LDAP Claim\"\r\nc1:[Type == \"http://schemas.customer.com/ws/2011/05/identity/claims/domain\"]\r\n \u0026\u0026 c2:[Type == \"http://schemas.microsoft.com/ws/2008/06/identity/claims/windowsaccountname\"]\r\n =\u003e issue(store = \"Active Directory\", types = (\"http://schemas.templafy.com/2016/06/identity/claims/city\"), query = \";l;{0}\", param = c1.Value + \".customer.com\\\" + c2.Value);\r\n\r\n@RuleName = \"Custom Department LDAP Claim\"\r\nc1:[Type == \"http://schemas.customer.com/ws/2011/05/identity/claims/domain\"]\r\n \u0026\u0026 c2:[Type == \"http://schemas.microsoft.com/ws/2008/06/identity/claims/windowsaccountname\"]\r\n =\u003e issue(store = \"Active Directory\", types = (\"http://schemas.templafy.com/2016/06/identity/claims/department\"), query = \";department;{0}\", param = c1.Value + \".customer.com\\\" + c2.Value);\r\n\r\n@RuleName = \"Custom JobTitle LDAP Claim\"\r\nc1:[Type == \"http://schemas.customer.com/ws/2011/05/identity/claims/domain\"]\r\n \u0026\u0026 c2:[Type == \"http://schemas.microsoft.com/ws/2008/06/identity/claims/windowsaccountname\"]\r\n =\u003e issue(store = \"Active Directory\", types = (\"http://schemas.templafy.com/2016/06/identity/claims/jobtitle\"), query = \";title;{0}\", param = c1.Value + \".customer.com\\\" + c2.Value);\r\n\r\n@RuleName = \"Custom TelephoneNumber LDAP Claim\"\r\nc1:[Type == \"http://schemas.customer.com/ws/2011/05/identity/claims/domain\"]\r\n \u0026\u0026 c2:[Type == \"http://schemas.microsoft.com/ws/2008/06/identity/claims/windowsaccountname\"]\r\n =\u003e issue(store = \"Active Directory\", types = (\"http://schemas.templafy.com/2016/06/identity/claims/phone\"), query = \";telephoneNumber;{0}\", param = c1.Value + \"\\\" + c2.Value);\r\n\r\n@RuleName = \"Custom Fax LDAP Claim\"\r\nc1:[Type == \"http://schemas.customer.com/ws/2011/05/identity/claims/domain\"]\r\n \u0026\u0026 c2:[Type == \"http://schemas.microsoft.com/ws/2008/06/identity/claims/windowsaccountname\"]\r\n =\u003e issue(store = \"Active Directory\", types = (\"http://schemas.templafy.com/2016/06/identity/claims/facsimilenumber\"), query = \";facsimileTelephoneNumber;{0}\", param = c1.Value + \"\\\" + c2.Value);\r\n\r\n", "DelegationAuthorizationRules": "", "LastPublishedPolicyCheckSuccessful": null, "LastUpdateTime": "\/Date(-2208988800000)\/", "LastMonitoredTime": "\/Date(-2208988800000)\/", "ImpersonationAuthorizationRules": "", "AdditionalAuthenticationRules": "", "AccessControlPolicyName": "Permit everyone", "AccessControlPolicyParameters": null, "ResultantPolicy": { "IsParameterized": false, "Serialized": "\u003cPolicyMetadata xmlns:i=\"http://www.w3.org/2001/XMLSchema-instance\" xmlns=\"http://schemas.datacontract.org/2012/04/ADFS\"\u003e\r\n \u003cRequireFreshAuthentication\u003efalse\u003c/RequireFreshAuthentication\u003e\r\n \u003cIssuanceAuthorizationRules\u003e\r\n \u003cRule\u003e\r\n \u003cConditions\u003e\r\n \u003cCondition i:type=\"AlwaysCondition\"\u003e\r\n \u003cOperator\u003eIsPresent\u003c/Operator\u003e\r\n \u003cValues /\u003e\r\n \u003c/Condition\u003e\r\n \u003c/Conditions\u003e\r\n \u003c/Rule\u003e\r\n \u003c/IssuanceAuthorizationRules\u003e\r\n\u003c/PolicyMetadata\u003e", "Summary": "RequireFreshAuthentication:False\nIssuanceAuthorizationRules:\n{\r\n Permit everyone\r\n}", "ExtensionData": { } } } |