2 mins read

Adding Outgoing SAML Assertion Attributes Sent to Service Providers

Control which SAML IDP Attributes are included in the outgoing SAML Assertion sent to SAML Service Providers.


  1. SAML IDP Assertion Schema is defined.

  2. Attributes from the Assertion Schema are mapped to the authentication context.

Add Outgoing SAML Assertion Attributes

  1. Select OAuth » Tokens & Claims » Claims » SAML Assertion Attributes » + ADD CLAIM.

    Define Outgoing SAML assertion attribute

  2. Fill in the Add claim form with and select Add.

    Parameter Description
    Claim name Claim name in Cloudentity.
    Source type How the source value for the claim is retrieved. Authentication context is a set of attributes mapped from data sent by IDP acting on behalf of the user. Client means an application registered in Cloudentity. Workspace provides metadata about the workspace.
    Source path Specific attribute available in the source.
    Output source path Exact attribute name representing this claim in the token.
    SAML Name SAML attribute name issued with your Service Provider’s assertion, for example urn:oid:
    SAML Attribute Format SAML attribute format, for example urn:oasis:names:tc:SAML:2.0:attrname-format:uri.

The attribute will be included in the SAML Assertion sent to service providers

Consider the following example:

SAML Assertion Example

If we add an email attribute with source type set to AuthN Context, source path set to email, SAML name set to mail and with the SAML format set to urn:oasis:names:tc:SAML:2.0:attrname-format:unspecified, the outgoing SAML Assertion sent to the Service Provider has the following attribute included:

   <saml2:Attribute Name="mail" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:unspecified">
            xmlns:xsi="" xsi:type="xs:string">

Next Steps

If your SAML IDP enables users to sign into OAuth-based client applications, be sure to define Token Claims as well.

Updated: Nov 2, 2023