Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

The user attributes sent from SSO to the application can be managed through the application's Authorization authorization policy.
The process of creating and adjusting the policy is described in the article Manage authorization policies.

...

The application can use the data of the authenticating user to fetch their data from a third-party identitity identity provider. This is achieved by mapping the users in the directories.
Below is a manual for directory user mapping with practical examples for the TUPAS methods with practical examples :
Management UI Traditional Directory User Mappings - SSO
For SQL databases, some specific configurations are needed:
Use Directory User Mapping with SQL databases

...