this question is about the mapping of ADFS user information attributes / ACTIVE DIRECTORY attributes <-> OIDC (OpenID Connect) standard claims. (also referring to: Connect Your App to ADFS)
How do the mapping rules have to look like if you want to end up with having all OpenID Connect standard claims](Final: OpenID Connect Core 1.0 incorporating errata set 1) contained within the id_token?
In the example from Auth0’s ADFS docs “only” these few mappings get mentioned:
types = ("http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddress",
"http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name",
"http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameidentifier",
"http://schemas.xmlsoap.org/ws/2005/05/identity/claims/givenname",
"http://schemas.xmlsoap.org/ws/2005/05/identity/claims/surname"), query = ";mail,displayName,userPrincipalName,givenName,sn;{0}", param = c.Value);
We tried that and in the resulting id_token …
"name": "...",
"given_name": "...",
"family_name": "...",
"nickname": "...",
"picture": "...",
… amongst some other claims (some standard JWT token claims, some seemingly Auth0 specific) the above subset of the OpenID Connect standard claims was present.
I wondered why these were present in the id_token - and also in the Auth0 user’s raw JSON representation as I found out - although none of these are in the above mapping.
How does Auth0 (internally most probably?) map claim types (I guess it’s all of those, is it?) to OpenID Connect standard claims?
How does a complete mapping have to look like in order to get all OpenID Connect standard claims?