In an OpenID Connect (OIDC)-based Org2Org integration, only attributes explicitly included in the OIDC assertion from the source organization are available for use as the Identity Provider (IdP) username format. The supported attributes typically include idpuser.subjectNameId, idpuser.email, and any other attributes that are actually passed in the assertion. The attribute idpuser.login isn’t supported unless it’s explicitly included in the assertion. This article clarifies how to pass a custom attribute in an OIDC assertion to set the username in a target organization.
- Okta Identity Engine (OIE)
- Okta Classic Engine
- Org2Org integration
- OpenID Connect (OIDC) Identity Provider (IdP)
Follow the steps below to pass a custom attribute in an OIDC assertion that can be used to set the username in a target organization:
- In the source org:
- Create a custom attribute for the User (default) Okta profile. Example:
member_id. - Go to Profile Editor > Apps > select the App > Mappings.
- Select the Okta User to App tab.
- Map the attribute to a "Base" attribute.
- Create a custom attribute for the User (default) Okta profile. Example:
- Now shift to the target org (Idp org):
- Go to Profile Editor > Identity Providers > select the Identity Provider > Mappings.
- Select the IdP to Okta User tab.
- Map it to
login.
The result will look something like this:
