internal/AdfsSamples/Templafy.json

{
    "AllowedAuthenticationClassReferences": [
 
                                             ],
    "EncryptionCertificateRevocationCheck": 5,
    "PublishedThroughProxy": false,
    "SigningCertificateRevocationCheck": 5,
    "WSFedEndpoint": null,
    "AdditionalWSFedEndpoint": [
 
                                ],
    "ClaimsProviderName": [
 
                           ],
    "ClaimsAccepted": [
 
                       ],
    "EncryptClaims": true,
    "Enabled": true,
    "EncryptionCertificate": null,
    "Identifier": [
                       "https://app.templafy.com/AuthServices"
                   ],
    "NotBeforeSkew": 0,
    "EnableJWT": false,
    "AlwaysRequireAuthentication": false,
    "Notes": null,
    "OrganizationInfo": "",
    "ObjectIdentifier": "ef202863-c732-ed11-a812-000d3a9bbe83",
    "ProxyEndpointMappings": {
 
                              },
    "ProxyTrustedEndpoints": [
 
                              ],
    "ProtocolProfile": "WsFed-SAML",
    "RequestSigningCertificate": [
 
                                  ],
    "EncryptedNameIdRequired": false,
    "SignedSamlRequestsRequired": false,
    "SamlEndpoints": [
                          {
                              "Binding": "POST",
                              "BindingUri": "urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST",
                              "Index": 0,
                              "IsDefault": false,
                              "Location": "https://app.templafy.com/AuthServices/Acs",
                              "Protocol": "SAMLAssertionConsumer",
                              "ResponseLocation": null
                          }
                      ],
    "SamlResponseSignature": "AssertionOnly",
    "SignatureAlgorithm": "http://www.w3.org/2001/04/xmldsig-more#rsa-sha256",
    "TokenLifetime": 0,
    "AllowedClientTypes": 6,
    "IssueOAuthRefreshTokensTo": 2,
    "RefreshTokenProtectionEnabled": true,
    "RequestMFAFromClaimsProviders": false,
    "ScopeGroupId": null,
    "Name": "Templafy",
    "AutoUpdateEnabled": false,
    "MonitoringEnabled": false,
    "MetadataUrl": null,
    "ConflictWithPublishedPolicy": false,
    "IssuanceAuthorizationRules": "",
    "IssuanceTransformRules": "@RuleName = \"UPN\"\r\nc:[Type == \"http://schemas.xmlsoap.org/ws/2005/05/identity/claims/upn\"]\r\n =\u003e issue(claim = c);\r\n\r\n@RuleName = \"GivenName\"\r\nc:[Type == \"http://schemas.xmlsoap.org/ws/2005/05/identity/claims/givenname\"]\r\n =\u003e issue(claim = c);\r\n\r\n@RuleName = \"Surname\"\r\nc:[Type == \"http://schemas.xmlsoap.org/ws/2005/05/identity/claims/surname\"]\r\n =\u003e issue(claim = c);\r\n\r\n@RuleTemplate = \"PassThroughClaims\"\r\n@RuleName = \"Email\"\r\nc:[Type == \"http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddress\"]\r\n =\u003e issue(claim = c);\r\n\r\n@RuleName = \"Email as Name ID\"\r\nc:[Type == \"http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddress\"]\r\n =\u003e issue(Type = \"http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameidentifier\", Issuer = c.Issuer, OriginalIssuer = c.OriginalIssuer, Value = c.Value, ValueType = c.ValueType, Properties[\"http://schemas.xmlsoap.org/ws/2005/05/identity/claimproperties/format\"] = \"urn:oasis:names:tc:SAML:1.1:nameid-format:unspecified\");\r\n\r\n@RuleName = \"Country Code\"\r\nc1:[Type == \"http://schemas.customer.com/ws/2011/05/identity/claims/domain\"]\r\n \u0026\u0026 c2:[Type == \"http://schemas.microsoft.com/ws/2008/06/identity/claims/windowsaccountname\"]\r\n =\u003e issue(store = \"Active Directory\", types = (\"http://schemas.xmlsoap.org/ws/2005/05/identity/claims/country\"), query = \";c;{0}\", param = c1.Value + \".customer.com\\\" + c2.Value);\r\n\r\n@RuleName = \"Send LDAP Groups\"\r\nc1:[Type == \"http://schemas.customer.com/ws/2011/05/identity/claims/domain\"]\r\n \u0026\u0026 c2:[Type == \"http://schemas.microsoft.com/ws/2008/06/identity/claims/windowsaccountname\"]\r\n =\u003e issue(store = \"Active Directory\", types = (\"http://schemas.microsoft.com/ws/2008/06/identity/claims/role\"), query = \";tokenGroups(domainQualifiedName);{0}\", param = c1.Value + \".customer.com\\\" + c2.Value);\r\n\r\n@RuleName = \"Custom Address LDAP Claim\"\r\nc1:[Type == \"http://schemas.customer.com/ws/2011/05/identity/claims/domain\"]\r\n \u0026\u0026 c2:[Type == \"http://schemas.microsoft.com/ws/2008/06/identity/claims/windowsaccountname\"]\r\n =\u003e issue(store = \"Active Directory\", types = (\"http://schemas.xmlsoap.org/ws/2005/05/identity/claims/streetaddress\"), query = \";streetAddress;{0}\", param = c1.Value + \".customer.com\\\" + c2.Value);\r\n\r\n@RuleName = \"Custom State LDAP Claim\"\r\nc1:[Type == \"http://schemas.customer.com/ws/2011/05/identity/claims/domain\"]\r\n \u0026\u0026 c2:[Type == \"http://schemas.microsoft.com/ws/2008/06/identity/claims/windowsaccountname\"]\r\n =\u003e issue(store = \"Active Directory\", types = (\"http://schemas.xmlsoap.org/ws/2005/05/identity/claims/stateorprovince\"), query = \";st;{0}\", param = c1.Value + \"\\\" + c2.Value);\r\n\r\n@RuleName = \"Custom PostalCode LDAP Claim\"\r\nc1:[Type == \"http://schemas.customer.com/ws/2011/05/identity/claims/domain\"]\r\n \u0026\u0026 c2:[Type == \"http://schemas.microsoft.com/ws/2008/06/identity/claims/windowsaccountname\"]\r\n =\u003e issue(store = \"Active Directory\", types = (\"http://schemas.xmlsoap.org/ws/2005/05/identity/claims/postalcode\"), query = \";postalCode;{0}\", param = c1.Value + \".customer.com\\\" + c2.Value);\r\n\r\n@RuleName = \"Custom MobilePhone LDAP Claim\"\r\nc1:[Type == \"http://schemas.customer.com/ws/2011/05/identity/claims/domain\"]\r\n \u0026\u0026 c2:[Type == \"http://schemas.microsoft.com/ws/2008/06/identity/claims/windowsaccountname\"]\r\n =\u003e issue(store = \"Active Directory\", types = (\"http://schemas.xmlsoap.org/ws/2005/05/identity/claims/mobilePhone\"), query = \";mobile;{0}\", param = c1.Value + \"\\\" + c2.Value);\r\n\r\n@RuleName = \"Custom City LDAP Claim\"\r\nc1:[Type == \"http://schemas.customer.com/ws/2011/05/identity/claims/domain\"]\r\n \u0026\u0026 c2:[Type == \"http://schemas.microsoft.com/ws/2008/06/identity/claims/windowsaccountname\"]\r\n =\u003e issue(store = \"Active Directory\", types = (\"http://schemas.templafy.com/2016/06/identity/claims/city\"), query = \";l;{0}\", param = c1.Value + \".customer.com\\\" + c2.Value);\r\n\r\n@RuleName = \"Custom Department LDAP Claim\"\r\nc1:[Type == \"http://schemas.customer.com/ws/2011/05/identity/claims/domain\"]\r\n \u0026\u0026 c2:[Type == \"http://schemas.microsoft.com/ws/2008/06/identity/claims/windowsaccountname\"]\r\n =\u003e issue(store = \"Active Directory\", types = (\"http://schemas.templafy.com/2016/06/identity/claims/department\"), query = \";department;{0}\", param = c1.Value + \".customer.com\\\" + c2.Value);\r\n\r\n@RuleName = \"Custom JobTitle LDAP Claim\"\r\nc1:[Type == \"http://schemas.customer.com/ws/2011/05/identity/claims/domain\"]\r\n \u0026\u0026 c2:[Type == \"http://schemas.microsoft.com/ws/2008/06/identity/claims/windowsaccountname\"]\r\n =\u003e issue(store = \"Active Directory\", types = (\"http://schemas.templafy.com/2016/06/identity/claims/jobtitle\"), query = \";title;{0}\", param = c1.Value + \".customer.com\\\" + c2.Value);\r\n\r\n@RuleName = \"Custom TelephoneNumber LDAP Claim\"\r\nc1:[Type == \"http://schemas.customer.com/ws/2011/05/identity/claims/domain\"]\r\n \u0026\u0026 c2:[Type == \"http://schemas.microsoft.com/ws/2008/06/identity/claims/windowsaccountname\"]\r\n =\u003e issue(store = \"Active Directory\", types = (\"http://schemas.templafy.com/2016/06/identity/claims/phone\"), query = \";telephoneNumber;{0}\", param = c1.Value + \"\\\" + c2.Value);\r\n\r\n@RuleName = \"Custom Fax LDAP Claim\"\r\nc1:[Type == \"http://schemas.customer.com/ws/2011/05/identity/claims/domain\"]\r\n \u0026\u0026 c2:[Type == \"http://schemas.microsoft.com/ws/2008/06/identity/claims/windowsaccountname\"]\r\n =\u003e issue(store = \"Active Directory\", types = (\"http://schemas.templafy.com/2016/06/identity/claims/facsimilenumber\"), query = \";facsimileTelephoneNumber;{0}\", param = c1.Value + \"\\\" + c2.Value);\r\n\r\n",
    "DelegationAuthorizationRules": "",
    "LastPublishedPolicyCheckSuccessful": null,
    "LastUpdateTime": "\/Date(-2208988800000)\/",
    "LastMonitoredTime": "\/Date(-2208988800000)\/",
    "ImpersonationAuthorizationRules": "",
    "AdditionalAuthenticationRules": "",
    "AccessControlPolicyName": "Permit everyone",
    "AccessControlPolicyParameters": null,
    "ResultantPolicy": {
                            "IsParameterized": false,
                            "Serialized": "\u003cPolicyMetadata xmlns:i=\"http://www.w3.org/2001/XMLSchema-instance\" xmlns=\"http://schemas.datacontract.org/2012/04/ADFS\"\u003e\r\n \u003cRequireFreshAuthentication\u003efalse\u003c/RequireFreshAuthentication\u003e\r\n \u003cIssuanceAuthorizationRules\u003e\r\n \u003cRule\u003e\r\n \u003cConditions\u003e\r\n \u003cCondition i:type=\"AlwaysCondition\"\u003e\r\n \u003cOperator\u003eIsPresent\u003c/Operator\u003e\r\n \u003cValues /\u003e\r\n \u003c/Condition\u003e\r\n \u003c/Conditions\u003e\r\n \u003c/Rule\u003e\r\n \u003c/IssuanceAuthorizationRules\u003e\r\n\u003c/PolicyMetadata\u003e",
                            "Summary": "RequireFreshAuthentication:False\nIssuanceAuthorizationRules:\n{\r\n Permit everyone\r\n}",
                            "ExtensionData": {
 
                                              }
                        }
}