Hi @Anthony Fitzgerald · Thank you for reaching out.
The extension attributes populated via User Flow won't appear in the portal under SAML user attributes/claims for the Enterprise App. You can however, use Claims Mapping policy to pass the extension attribute as SAML claim in the token.
Keep in mind that the attributes without any value populated will not be returned in the token. So make sure the attribute is not empty.
In below example, I am using ExtID extension attribute that I created via User flow, which is always in extension_<App ID of aad-extensions-app>_attributeName
format.
New-AzureADPolicy -Definition @('{
"ClaimsMappingPolicy": {
"Version": 1,
"IncludeBasicClaimSet": "true",
"ClaimsSchema": [
{
"Source": "user",
"ExtensionID": "extension_a90abxxxxxxxxxxxxxa5f1072c3810bc_ExtID",
"SamlClaimType": "http://schemas.microsoft.com/identity/claims/ExtID",
"JwtClaimType": "ExtID"
},
{
"Source": "user",
"ID": "onpremisessamaccountname",
"SamlClaimType": "samaccountname",
"JwtClaimType": "samAccountName"
},
{
"Source": "user",
"ID": "department",
"SamlClaimType": "http://schemas.microsoft.com/identity/claims/department",
"JwtClaimType": "department"
}
]
}
}') -DisplayName "MyClaimsPolicy" -Type "ClaimsMappingPolicy"
Add-AzureADServicePrincipalPolicy -Id <Object ID of Enterprise App> -RefObjectId <object ID of the Policy created above>
-----------------------------------------------------------------------------------------------------------
Please "Accept the answer" if the information helped you. This will help us and others in the community as well.