<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Set alternate claim for the mapped sub in Azure in Integration, Extension &amp; APIs</title>
    <link>https://community.qlik.com/t5/Integration-Extension-APIs/Set-alternate-claim-for-the-mapped-sub-in-Azure/m-p/2421585#M19963</link>
    <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.qlik.com/t5/user/viewprofilepage/user-id/2908"&gt;@eyalnir_qlik&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;"internalClaims" is post processed claimed by Qlik Cloud, which in your case is "Antonb@xxxx.co.il" "claimsFromIdp" is raw claims from IdP, so it looks you've overwritten the sub correctly, there's nothing wrong with how the product behaves here.&lt;BR /&gt;&lt;BR /&gt;However if you're trying to match user names on your on-premise Qlik Sense environment, the "sub" claim should not only contain the username but also the domain.&lt;BR /&gt;Basically what you see in Qlik Client Client Managed (on-premise) in the "Users" screen you have "User Directory" and "User Id", both of those elements should be in "sub"(IdP subject) when in Qlik Cloud.&lt;BR /&gt;&lt;BR /&gt;Example:&lt;BR /&gt;User Directory: DOMAIN&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;User Id: User1&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;You're expected to have the below in Qlik Cloud to avoid duplicate licenses&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;sub: DOMAIN\\User1&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;If your user ID in Client managed is already&amp;nbsp;&lt;A href="mailto:Antonb@xxx.co.il" target="_blank"&gt;Antonb@xxx.co.il&lt;/A&gt;, then the easiest way is to add your domain name in the "Realm" field in the Identity Provider configuration in Qlik Cloud.&lt;BR /&gt;&lt;BR /&gt;Best regards,&lt;/P&gt;</description>
    <pubDate>Wed, 21 Feb 2024 08:48:57 GMT</pubDate>
    <dc:creator>Damien_V</dc:creator>
    <dc:date>2024-02-21T08:48:57Z</dc:date>
    <item>
      <title>Set alternate claim for the mapped sub in Azure</title>
      <link>https://community.qlik.com/t5/Integration-Extension-APIs/Set-alternate-claim-for-the-mapped-sub-in-Azure/m-p/2419085#M19911</link>
      <description>&lt;P&gt;Hi,&amp;nbsp;&lt;/P&gt;
&lt;P&gt;We set&amp;nbsp;OIDC authentication with azure in SaaS, as default we&amp;nbsp;authenticate as&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;"sub" it's exposing inside the claim sub "UserId", which cause&amp;nbsp;for&amp;nbsp;duplicate license use, the&amp;nbsp;customer have unified license.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;since we&amp;nbsp;authenticate with OnPREM environment&amp;nbsp;as "name" claim attribute with SAML, we aimed to have both&amp;nbsp;authenticate as "name".&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;A href="https://community.qlik.com/t5/Official-Support-Articles/How-to-match-users-between-Qlik-Sense-Client-Managed-and-Qlik/tac-p/2413459#M12469" target="_blank" rel="noopener"&gt;https://community.qlik.com/t5/Official-Support-Articles/How-to-match-users-between-Qlik-Sense-Client-Managed-and-Qlik/tac-p/2413459#M12469&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;A href="https://community.qlik.com/t5/Support-Updates/OpenID-Connect-configuration-in-Qlik-Cloud-Services-Explained/ba-p/1774547" target="_blank" rel="noopener"&gt;https://community.qlik.com/t5/Support-Updates/OpenID-Connect-configuration-in-Qlik-Cloud-Services-Ex...&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;we tried to create alternate claim an "name" for the mapped sub with no success, it seems that "sub" claim of OIDC&amp;nbsp;can't have filled with other&amp;nbsp;&lt;/SPAN&gt;claim such as "name".&lt;/P&gt;
&lt;P&gt;we need advise how&amp;nbsp;&lt;SPAN&gt;to do so, the article above didn't elaborate much&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;hope someone can advise&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Thanks&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Eyal&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;a href="https://community.qlik.com/t5/user/viewprofilepage/user-id/29425"&gt;@Damien_V&lt;/a&gt;&amp;nbsp;&lt;a href="https://community.qlik.com/t5/user/viewprofilepage/user-id/16958"&gt;@Albert_Candelario&lt;/a&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 15 Feb 2024 07:38:59 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Integration-Extension-APIs/Set-alternate-claim-for-the-mapped-sub-in-Azure/m-p/2419085#M19911</guid>
      <dc:creator>eyalnir_qlik</dc:creator>
      <dc:date>2024-02-15T07:38:59Z</dc:date>
    </item>
    <item>
      <title>Re: Set alternate claim for the mapped sub in Azure</title>
      <link>https://community.qlik.com/t5/Integration-Extension-APIs/Set-alternate-claim-for-the-mapped-sub-in-Azure/m-p/2419092#M19912</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://community.qlik.com/t5/user/viewprofilepage/user-id/92093"&gt;@eyal&lt;/a&gt;&amp;nbsp;&lt;BR /&gt;You should be able to use a different claim by just specifying it in the "sub" field in the Identity provider configuration in the Qlik Cloud console.&lt;/P&gt;
&lt;P&gt;When you log in with the user that has the issue, what do you see when you open&lt;/P&gt;
&lt;P&gt;&lt;A href="https://tenantname.eu.qlikcloud.com/api/v1/diagnose-claims" target="_blank"&gt;https://tenantname.eu.qlikcloud.com/api/v1/diagnose-claims&lt;/A&gt;&amp;nbsp;? Do you see the claim you've specified listed in the ClaimsFromIdP section?&lt;BR /&gt;&lt;BR /&gt;&lt;A href="https://community.qlik.com/t5/Official-Support-Articles/Qlik-Cloud-How-to-see-if-claims-for-USER-and-GROUPS-are-passing/ta-p/1938548" target="_blank"&gt;https://community.qlik.com/t5/Official-Support-Articles/Qlik-Cloud-How-to-see-if-claims-for-USER-and-GROUPS-are-passing/ta-p/1938548&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 15 Feb 2024 07:41:58 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Integration-Extension-APIs/Set-alternate-claim-for-the-mapped-sub-in-Azure/m-p/2419092#M19912</guid>
      <dc:creator>Damien_V</dc:creator>
      <dc:date>2024-02-15T07:41:58Z</dc:date>
    </item>
    <item>
      <title>Re: Set alternate claim for the mapped sub in Azure</title>
      <link>https://community.qlik.com/t5/Integration-Extension-APIs/Set-alternate-claim-for-the-mapped-sub-in-Azure/m-p/2419216#M19913</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.qlik.com/t5/user/viewprofilepage/user-id/29425"&gt;@Damien_V&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You can see below in&amp;nbsp; "internalClaims" the "sub": "Axxx@xxxx.co.il" (which seems correct) but in&amp;nbsp;"claimsFromIdp"&amp;nbsp;"sub": "GepTdu327M6MPBU206LQQbxLrv2iV8dG_olVNlFKg1k" (Difference from&amp;nbsp;internalClaims ) it cause for&amp;nbsp;&lt;SPAN&gt;duplicate license use.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;we aimed that both authenticate&amp;nbsp;sub will set as "&lt;A href="mailto:Antonb@xxx.co.il&amp;quot;" target="_blank" rel="noopener"&gt;Axx@xxx.co.il"&lt;/A&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;*************************************************************************************************************&lt;/P&gt;
&lt;P&gt;"subType": "user",&lt;BR /&gt;"internalClaims": {&lt;BR /&gt;"sub": "Axxx@xxx.co.il",&lt;BR /&gt;"tenantId": "_ZZHqcIecaxxxRb-ySwGxvk0mruRv0um",&lt;BR /&gt;"subType": "user",&lt;BR /&gt;"userId": "657eade8b11b11084ff3e157",&lt;BR /&gt;"encodedPermissions": "data&amp;amp;colon;application/vnd.qlik.permissions;base64,AQBL/////9//////+/8P/+//v/3////Piigef4gH////Af///d/h///////////////////////////////9//////////Cv////e/AD/////////ff/////2/////////v/x/////////44",&lt;BR /&gt;"level": "admin",&lt;BR /&gt;"name": "Axx Bxi",&lt;BR /&gt;"email": "Antonb@xxx.co.il",&lt;BR /&gt;"email_verified": true,&lt;BR /&gt;"userTag": "1707981153",&lt;BR /&gt;"sid": "HnBeuCvaJqTwRK0D7BUrsPlMai0xaWzGh4bdfo3zQDY=",&lt;BR /&gt;"jti": "bJDFbRyStM-EqF83VhBBQ_UGnj5ABlTl",&lt;BR /&gt;"iat": 1707985256,&lt;BR /&gt;"exp": 1707911156,&lt;BR /&gt;"aud": "qlik.api.internal",&lt;BR /&gt;"iss": "qlik.api.internal"&lt;BR /&gt;},&lt;BR /&gt;"claimSource": "id-token",&lt;BR /&gt;"claimsFromIdp": {&lt;BR /&gt;"aud": "f9726de1-bb96-111a-8bce-5def1811ca28",&lt;BR /&gt;"iss": "&lt;A href="https://login.microsoftonline.com/9c70d10e-03a6-4f14-b491-e6319ca91ae7/v2.0" target="_blank" rel="noopener"&gt;https://login.microsoftonline.com/9c70d10e-03a6-4f14-b491-e6319ca91ae7/v2.0&lt;/A&gt;",&lt;BR /&gt;"iat": 1707984112,&lt;BR /&gt;"nbf": 1707984112,&lt;BR /&gt;"exp": 1707988112,&lt;BR /&gt;"aio": "AWQAm/8VAAAALO2pHjBI5W6Nk5fU93lPyHQT0nrLSBqTQjGA8D//NiZsTjF8wj33E2IDWgfhkIy3ntCzcrnMKWyqOR+1VnX70EJAOaTiIUeuedCZCLvSx1b0oSOxIF2Z9DlI4",&lt;BR /&gt;"email": "Axx@xxx.co.il",&lt;BR /&gt;"family_name": "xxski",&lt;BR /&gt;"given_name": "Axx",&lt;BR /&gt;"name": "Axxx Bxx",&lt;BR /&gt;"nonce": "Ts6a6E3cFXrezXGcrA1yNAyD85hvCIoCA_TQPg-pGBs",&lt;BR /&gt;"oid": "0a7202d0-eb59-4c25-a5d6-de350136e20d",&lt;BR /&gt;"preferred_username": "Axx@xxx.co.il",&lt;BR /&gt;"rh": "0.AQoADtFwnKYDFE-0keYxnKka5-FtcvmWu9pBi85d7xh2yigKABQ.",&lt;BR /&gt;"sub": "GepTdu327M8MPBU245LQQbxLrv2iV8dG_olVNlFKg1k",&lt;BR /&gt;"tid": "9c70d10e-03a6-4f14-b491-e6319ca91ae7",&lt;BR /&gt;"upn": "Axx@xxx.co.il",&lt;BR /&gt;"uti": "HE5qvXexkU-Ni0YkUg-4AQ",&lt;BR /&gt;"ver": "2.0"&lt;BR /&gt;},&lt;BR /&gt;"extraClaims": {},&lt;BR /&gt;"mappedClaims": {&lt;BR /&gt;"sub": "Axx@xxx.co.il",&lt;BR /&gt;"name": "Axx Bxx",&lt;BR /&gt;"email": "Axx@xxx.co.il",&lt;BR /&gt;"email_verified": true&lt;BR /&gt;}&lt;BR /&gt;}&lt;/P&gt;</description>
      <pubDate>Wed, 18 Dec 2024 14:10:47 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Integration-Extension-APIs/Set-alternate-claim-for-the-mapped-sub-in-Azure/m-p/2419216#M19913</guid>
      <dc:creator>eyalnir_qlik</dc:creator>
      <dc:date>2024-12-18T14:10:47Z</dc:date>
    </item>
    <item>
      <title>Re: Set alternate claim for the mapped sub in Azure</title>
      <link>https://community.qlik.com/t5/Integration-Extension-APIs/Set-alternate-claim-for-the-mapped-sub-in-Azure/m-p/2421585#M19963</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.qlik.com/t5/user/viewprofilepage/user-id/2908"&gt;@eyalnir_qlik&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;"internalClaims" is post processed claimed by Qlik Cloud, which in your case is "Antonb@xxxx.co.il" "claimsFromIdp" is raw claims from IdP, so it looks you've overwritten the sub correctly, there's nothing wrong with how the product behaves here.&lt;BR /&gt;&lt;BR /&gt;However if you're trying to match user names on your on-premise Qlik Sense environment, the "sub" claim should not only contain the username but also the domain.&lt;BR /&gt;Basically what you see in Qlik Client Client Managed (on-premise) in the "Users" screen you have "User Directory" and "User Id", both of those elements should be in "sub"(IdP subject) when in Qlik Cloud.&lt;BR /&gt;&lt;BR /&gt;Example:&lt;BR /&gt;User Directory: DOMAIN&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;User Id: User1&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;You're expected to have the below in Qlik Cloud to avoid duplicate licenses&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;sub: DOMAIN\\User1&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;If your user ID in Client managed is already&amp;nbsp;&lt;A href="mailto:Antonb@xxx.co.il" target="_blank"&gt;Antonb@xxx.co.il&lt;/A&gt;, then the easiest way is to add your domain name in the "Realm" field in the Identity Provider configuration in Qlik Cloud.&lt;BR /&gt;&lt;BR /&gt;Best regards,&lt;/P&gt;</description>
      <pubDate>Wed, 21 Feb 2024 08:48:57 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Integration-Extension-APIs/Set-alternate-claim-for-the-mapped-sub-in-Azure/m-p/2421585#M19963</guid>
      <dc:creator>Damien_V</dc:creator>
      <dc:date>2024-02-21T08:48:57Z</dc:date>
    </item>
  </channel>
</rss>

