keycloak-scim/topics/clients/protocol-mappers.adoc

18 lines
1.1 KiB
Text
Raw Normal View History

2016-04-18 15:15:25 +00:00
[[_mappers]]
= OIDC Token and SAML Assertion Mappings
Applications that receive ID Tokens, Access Tokens, or SAML assertions may need or want different user metadata and roles.
Keycloak allows you to define what exactly is transferred.
You can hardcode roles, claims and custom attributes.
You can pull user metadata into a token or assertion.
You can rename roles.
2016-05-20 00:15:52 +00:00
Basically you have a lot of control of what exactly goes back to the client.
2016-04-18 15:15:25 +00:00
Within the admin console, if you go to an application you've registered, you'll see a "Mappers" sub-menu item.
This is the place where you can control how a OIDC ID Token, Access Token, and SAML login response assertions look like.
When you click on this you'll see some default mappers that have been set up for you.
Clicking the "Add Builtin" button gives you the option to add other preconfigured mappers.
Clicking on "Create" allows you to define your own protocol mappers.
The tooltips are very helpful to learn exactly what you can do to tailor your tokens and assertions.
They should be enough to guide you through the process.