Although a lot of platforms are heading away from on-prem configurations, but in some cases we need to pass assertion in the “old” format in the SAML response. I am looking for the “new” way of passing downlevel format of groups in the SAML assertions.
We used to be able to do this by adding the Groups claim in the Attribute settings as follows.
Alright, I figured it out; something that I had forgotten. The Regex [Domain\\].* does exactly what it is supposed to do.
the Regex is filtering for all groups with the prefixes of Domain\ and adding it to the SAML assertion. The ,* is a wildcard, and the second \ is the escape character.
The caveat is that an Okta group has to exist with the Domain\ prefix. On-prem AD will come across as the group’s friendly name without the Domain qualifier. Therefore, you will need to create an Okta group and add a Group Rule that will take an AD group and add it to the Okta group.
Examples:
Create a couple of Okta groups with the prefix Test\.