Hi @SayanthBR,
Sure.
Navigate to Entra ID (formerly Azure AD)
Select Applications > Enterprise applications
Under the Search by application name or object id search for your application.
This would be the friendly name of the enterprise app you configured for SailPoint.
Select Single sign-on.
Under section 2, Attributes & Claims, select Edit.
Under Required claim, Select Unique User Identified (Name ID)
Ensure the Name identified format matches what is configured on the SailPoint tenant under the Service Provider section. In our example, we use unspecified.
By default, the Source attribute section is set to user.userprincipalname. This is where you will want to swap to user.mail etc.
Click Save.
Transforms
If needed, this is where you can create the transformations.
Select the radio Transformation.
Select the drop-down for the type of transformation.
Select the desired type.
If you need more than one, you can click Add for additional.
In my example, I have ExtractMailPrefix(), which removes the domain, leaving everything before the “@,” and then I apply ToLower(), which applies lowercase formatting.
Transform Example:
Additional Resources:
Microsoft Documentation
Customize SAML token claims - Microsoft identity platform | Microsoft Learn
SAML TRACER
@j_place makes a great suggestion. If you have not already done so, installing a SAML Tracer add-on in your web browser is a great way to examine what is being sent and received between the authentication.
SAML-tracer - Chrome Web Store
Regards,
Paul