2016-06-01 08:49:54 +00:00
[[_mappers]]
2016-05-27 15:23:34 +00:00
=== Mapping Claims and Assertions
2016-05-26 16:09:04 +00:00
2016-05-27 15:23:34 +00:00
You can import the SAML and OpenID Connect metadata provided by the external IDP you are authenticating with into the environment
of the realm. This allows you to extract user profile metadata and other information so that you can make it available to your
applications.
2019-01-21 16:38:32 +00:00
Each new user that logs into your realm via an external identity provider will have an entry for them created in the local
{project_name} database, based on the metadata from the SAML or OIDC assertions and claims.
2016-05-27 15:23:34 +00:00
If you click on an identity provider listed in the `Identity Providers` page for your realm, you will be brought to the IDPs
2019-01-21 16:38:32 +00:00
`Settings` tab. On this page there is also a `Mappers` tab. Click on that tab to start mapping your incoming IDP metadata.
2016-05-26 16:09:04 +00:00
2017-08-28 12:50:14 +00:00
image:{project_images}/identity-provider-mappers.png[]
2016-05-26 16:09:04 +00:00
There is a `Create` button on this page.
Clicking on this create button allows you to create a broker mapper.
2016-05-27 15:23:34 +00:00
Broker mappers can import SAML attributes or OIDC ID/Access token claims into user attributes and user role mappings.
2017-08-28 12:50:14 +00:00
image:{project_images}/identity-provider-mapper.png[]
2016-05-27 15:23:34 +00:00
Select a mapper from the `Mapper Type` list. Hover over the tooltip to see a description of what the mapper does. The
tooltips also describe what configuration information you need to enter. Click `Save` and your new mapper will be added.
2016-06-05 21:22:42 +00:00
For JSON based claims, you can use dot notation for nesting and square brackets to access array fields by index.
2016-05-27 15:23:34 +00:00
For example 'contact.address[0].country'.
2016-05-26 16:09:04 +00:00
2016-06-05 21:22:42 +00:00
To investigate the structure of user profile JSON data provided by social providers you can enable the `DEBUG` level logger `org.keycloak.social.user_profile_dump`.
2016-05-27 15:23:34 +00:00
This is done in the server's app-server configuration file (domain.xml or standalone.xml).