Get or generate a new signing certificate:
openssl req -x509 -nodes -sha256 -days 3650 -newkey rsa:2048 -keyout saml.key -out saml.crtUpdate the script and update the following settings:
| <samlp:AuthnRequest xmlns:samlp="urn:oasis:names:tc:SAML:2.0:protocol" | |
| @@AssertServiceURLAndDestination@@ | |
| AssertionConsumerServiceURL="https://demo-saml-sp.auth0.com/login/callback" | |
| ID="@@ID@@" | |
| IssueInstant="@@IssueInstant@@" | |
| ProtocolBinding="@@ProtocolBinding@@" Version="2.0"> | |
| <saml:Issuer xmlns:saml="urn:oasis:names:tc:SAML:2.0:assertion">@@Issuer@@</saml:Issuer> | |
| </samlp:AuthnRequest> |
| // This rule will get the groups for users coming from Azure AD | |
| // Auth0 already has the option to do that, but it (currently) won't work | |
| // if the user is coming from a different directory than the directory | |
| // where the app is registered (this can happen with multi-tenant apps). | |
| // It uses the access_token provided by Azure AD, so this needs | |
| // the 'Open ID Connect' protocol selected in the Azure AD connection. | |
| // | |
| // After the rule runs, you will have the 'groups' property in the user | |
| // that you can use to add custom claims to the id_token. | |
| // |