Label | Definition | Type | Required |
User Email | User Email of the SecureFlag license to remove | Text | Yes |
Label | Definition | Type |
Status Code | Status code for SecureFlag to debug issues if any are reported | Number |
Property | Recognized Attribute Name |
First Name | FirstName, firstName, givenName, user.givenname, http://schemas.xmlsoap.org/ws/2005/05/identity/claims/givenname |
Last Name | LastName, lastName, sn, surname, user.surname, http://schemas.xmlsoap.org/ws/2005/05/identity/claims/surname |
given_name
→ sets first namefamily_name
→ sets last namename
→ used if the above are missing. Split on the first space:"name": "Jane Doe"
→ First = Jane, Last = Doe.Attribute | Type | Example |
sf_org | integer | 42 |
Attribute | Type | Example |
sf_role | integer | 3 |
Integer | Role Name |
0 | Organization Admin |
3 | Team Manager |
4 | Stats |
5 | Creator |
6 | ThreatCanvas Reviewer |
7 | User |
sf_role
also controls eligibility for sf_managed_teams
(only valid for Team Manager and Organization Admin roles).Attribute | Type | Example |
sf_team | string (team name) | Blue Team |
Attribute | Type | Example |
sf_managed_teams | comma-separated list of strings | Blue Team, Red Team |
Attribute | Type | Example |
sf_manager | comma-separated list of strings |
Attribute | Type | Example |
sf_tags | comma-separated list of strings | Security, EMEA, Contractor |
Attribute | Type | Example |
sf_projects | map | {"Project Alpha" : "RW", "Project Beta" : "RO"} |
RO
= Read-onlyRW
= Read/Write<saml2:Assertion xmlns:saml2="urn:oasis:names:tc:SAML:2.0:assertion"> <saml2:Issuer>https://idp.example.com/12345</saml2:Issuer> <saml2:Subject> <saml2:NameID Format="urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress"> </saml2:NameID> </saml2:Subject> <!-- First name --> <saml2:Attribute Name="http://schemas.xmlsoap.org/ws/2005/05/identity/claims/givenname"> <saml2:AttributeValue>Jane</saml2:AttributeValue> </saml2:Attribute> <!-- Last name --> <saml2:Attribute Name="http://schemas.xmlsoap.org/ws/2005/05/identity/claims/surname"> <saml2:AttributeValue>Doe</saml2:AttributeValue> </saml2:Attribute> <!-- Optional org selector --> <saml2:Attribute Name="sf_org"> <saml2:AttributeValue>42</saml2:AttributeValue> </saml2:Attribute> <!-- Role --> <saml2:Attribute Name="sf_role"> <saml2:AttributeValue>3</saml2:AttributeValue> </saml2:Attribute> <!-- Team Membership --> <saml2:Attribute Name="sf_team"> <saml2:AttributeValue>Blue Team</saml2:AttributeValue> </saml2:Attribute> <!-- Managed Teams --> <saml2:Attribute Name="sf_managed_teams"> <saml2:AttributeValue>Blue Team,Red Team</saml2:AttributeValue> </saml2:Attribute> <!-- Manager --> <saml2:Attribute Name="sf_manager"> <saml2:AttributeValue>lead.manager@example.com</saml2:AttributeValue> </saml2:Attribute> <!-- Tags --> <saml2:Attribute Name="sf_tags"> <saml2:AttributeValue>Security,EMEA,Contractor</saml2:AttributeValue> </saml2:Attribute> <!-- ThreatCanvas Projects --> <saml2:Attribute Name="sf_projects"> <saml2:AttributeValue>{ "Project Alpha": "RW", "Project Beta": "RO" }</saml2:AttributeValue> </saml2:Attribute></saml2:Assertion>