Loading
Salesforce now sends email only from verified domains. Read More
Identify Your Users and Manage Access
Table of Contents
Select Filters

          No results
          No results
          Here are some search tips

          Check the spelling of your keywords.
          Use more general search terms.
          Select fewer filters to broaden your search.

          Search all of Salesforce Help
          Example SAML Assertions

          Example SAML Assertions

          Salesforce supports several SAML assertion formats sent by your identity provider, with extra requirements for specific features like encrypted assertions and Just-in-Time (JIT) provisioning. To help your identity provider determine the format of SAML assertions to use with your Salesforce org, share these examples.

          Required Editions

          Available in: both Salesforce Classic and Lightning Experience

          Federated Authentication is available in: All Editions

          Delegated Authentication is available in: Professional, Enterprise, Performance, Unlimited, Developer, and Database.com Editions

          Authentication Providers are available in: Professional, Enterprise, Performance, Unlimited, and Developer Editions

          User Permissions Needed
          To view the settings: View Setup and Configuration
          To edit the settings:

          Customize Application

          AND

          Modify All Data

          SAML assertions must be signed according to the XML Signature specification using RSA and either SHA-1 or SHA-256.

          In addition to the general single sign-on (SSO) examples, use these samples for the specific feature.

          • Assertions for encrypted SAML
          • Assertions for portals
          • Assertions for Salesforce sites
          • Assertions for JIT provisioning

          General SSO Examples

          SAML User ID type is the Salesforce username, and SAML User ID location is the <NameIdentifier> element in the <Subject> element
          <saml:Subject>
              <saml:NameID Format="urn:oasis:names:tc:SAML:1.1:nameid-format:unspecified">user101@salesforce.com</saml:NameID>
              <saml:SubjectConfirmation Method="urn:oasis:names:tc:SAML:2.0:cm:bearer">
                  <saml:SubjectConfirmationData NotOnOrAfter="2008-06-26T02:44:24.173Z" Recipient="http://localhost:9000"/>
              </saml:SubjectConfirmation>
          </saml:Subject>
          SAML User ID type is the Salesforce username, and SAML User ID location is the <Attribute> element
          <saml:AttributeStatement>
              <saml:Attribute FriendlyName="fooAttrib" Name="SFDC_USERNAME" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:unspecified">
                  <saml:AttributeValue xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="xs:string">
                      user101@salesforce.com
                  </saml:AttributeValue>
              </saml:Attribute>
           </saml:AttributeStatement>
          SAML User ID type is the Salesforce User object’s FederationIdentifier field, and SAML User ID location is the <NameIdentifier> element in the <Subject> element
          <saml:Subject>
              <saml:NameID Format="urn:oasis:names:tc:SAML:1.1:nameid-format:unspecified">MyName</saml:NameID>
              <saml:SubjectConfirmation Method="urn:oasis:names:tc:SAML:2.0:cm:bearer">
                  <saml:SubjectConfirmationData NotOnOrAfter="2008-06-26T02:48:25.730Z" Recipient="http://localhost:9000/"/>
              </saml:SubjectConfirmation>
          </saml:Subject>
          Note
          Note The name identifier can be any arbitrary string, including email addresses or numeric ID strings.
          SAML User ID type is theSalesforce User object’s FederationIdentifier field, and SAML User ID location is the <Attribute> element
          <saml:AttributeStatement>
              <saml:Attribute FriendlyName="fooAttrib" Name="SFDC_ATTR" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:unspecified">
                  <saml:AttributeValue xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="xs:string">
                      user101
                  </saml:AttributeValue>
              </saml:Attribute>
          </saml:AttributeStatement>
          SAML User ID type is the Salesforce username, and SAML User ID location is the <NameIdentifier> element in the <Subject> element
          Here’s a complete SAML response:
          <samlp:Response ID="_257f9d9e9fa14962c0803903a6ccad931245264310738" 
             IssueInstant="2009-06-17T18:45:10.738Z" Version="2.0">
          <saml:Issuer Format="urn:oasis:names:tc:SAML:2.0:nameid-format:entity">
             https://www.salesforce.com
          </saml:Issuer>
          
          <samlp:Status>
             <samlp:StatusCode Value="urn:oasis:names:tc:SAML:2.0:status:Success"/>
          </samlp:Status>
          
          <saml:Assertion ID="_3c39bc0fe7b13769cab2f6f45eba801b1245264310738" 
             IssueInstant="2009-06-17T18:45:10.738Z" Version="2.0">
             <saml:Issuer Format="urn:oasis:names:tc:SAML:2.0:nameid-format:entity">
                https://www.salesforce.com
             </saml:Issuer>
          
             <saml:Signature>
                <saml:SignedInfo>
                   <saml:CanonicalizationMethod Algorithm="http://www.w3.org/2001/10/xml-exc-c14n#"/>
                   <saml:SignatureMethod Algorithm="http://www.w3.org/2000/09/xmldsig#rsa-sha1"/>
                   <saml:Reference URI="#_3c39bc0fe7b13769cab2f6f45eba801b1245264310738">
                      <saml:Transforms>
                         <saml:Transform Algorithm="http://www.w3.org/2000/09/xmldsig#enveloped-signature"/>
                         <saml:Transform Algorithm="http://www.w3.org/2001/10/xml-exc-c14n#">
                            <ec:InclusiveNamespaces PrefixList="ds saml xs"/>
                         </saml:Transform>
                      </saml:Transforms>
                      <saml:DigestMethod Algorithm="http://www.w3.org/2000/09/xmldsig#sha1"/>
                      <saml:DigestValue>vzR9Hfp8d16576tEDeq/zhpmLoo=
                      </saml:DigestValue>
                   </saml:Reference>
                </saml:SignedInfo>
                <saml:SignatureValue>
                   AzID5hhJeJlG2llUDvZswNUrlrPtR7S37QYH2W+Un1n8c6kTC
                   Xr/lihEKPcA2PZt86eBntFBVDWTRlh/W3yUgGOqQBJMFOVbhK
                   M/CbLHbBUVT5TcxIqvsNvIFdjIGNkf1W0SBqRKZOJ6tzxCcLo
                   9dXqAyAUkqDpX5+AyltwrdCPNmncUM4dtRPjI05CL1rRaGeyX
                   3kkqOL8p0vjm0fazU5tCAJLbYuYgU1LivPSahWNcpvRSlCI4e
                   Pn2oiVDyrcc4et12inPMTc2lGIWWWWJyHOPSiXRSkEAIwQVjf
                   Qm5cpli44Pv8FCrdGWpEE0yXsPBvDkM9jIzwCYGG2fKaLBag==
                </saml:SignatureValue>
                <saml:KeyInfo>
                   <saml:X509Data>
                      <saml:X509Certificate>
                         MIIEATCCAumgAwIBAgIBBTANBgkqhkiG9w0BAQ0FADCBgzELM
                         [Certificate truncated for readability...]
                      </saml:X509Certificate>
                   </saml:X509Data>
                </saml:KeyInfo>
             </saml:Signature>
          
             <saml:Subject>
                <saml:NameID Format="urn:oasis:names:tc:SAML:1.1:nameid-format:unspecified">
                   saml01@salesforce.com
                </saml:NameID>
          
                <saml:SubjectConfirmation Method="urn:oasis:names:tc:SAML:2.0:cm:bearer">
                <saml:SubjectConfirmationData NotOnOrAfter="2009-06-17T18:50:10.738Z" 
                   Recipient="https://login.salesforce.com"/>
                </saml:SubjectConfirmation>
             </saml:Subject>
          
             <saml:Conditions NotBefore="2009-06-17T18:45:10.738Z" 
                NotOnOrAfter="2009-06-17T18:50:10.738Z">
          
                <saml:AudienceRestriction>
                   <saml:Audience>https://saml.salesforce.com</saml:Audience>
                </saml:AudienceRestriction>
             </saml:Conditions>
          
             <saml:AuthnStatement AuthnInstant="2009-06-17T18:45:10.738Z">
                <saml:AuthnContext>
                   <saml:AuthnContextClassRef>urn:oasis:names:tc:SAML:2.0:ac:classes:unspecified
                   </saml:AuthnContextClassRef>
                </saml:AuthnContext>
             </saml:AuthnStatement>
          
             <saml:AttributeStatement>
          
                <saml:Attribute Name="portal_id">
                   <saml:AttributeValue xsi:type="xs:anyType">060D00000000SHZ
                   </saml:AttributeValue>
                </saml:Attribute>
          
                <saml:Attribute Name="organization_id">
                   <saml:AttributeValue xsi:type="xs:anyType">00DD0000000F7L5
                   </saml:AttributeValue>
                </saml:Attribute>
          
                <saml:Attribute Name="ssostartpage" 
                   NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:unspecified">
          
                   <saml:AttributeValue xsi:type="xs:anyType">
                      http://www.salesforce.com/security/saml/saml20-gen.jsp
                   </saml:AttributeValue>
                </saml:Attribute>
          
                <saml:Attribute Name="logouturl" 
                   NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:uri">
          
                   <saml:AttributeValue xsi:type="xs:string">
                      http://www.salesforce.com/security/del_auth/SsoLogoutPage.html
                   </saml:AttributeValue>
                </saml:Attribute>
             </saml:AttributeStatement>
          </saml:Assertion>
          </samlp:Response>

          Example Assertions for Encrypted SAML

          These examples are useful if you set up your org to decrypt encrypted SAML assertions from your identity provider.

          The expected tag for an encrypted assertion is <EncryptedAssertion>.

          If you set up encrypted assertions, your identity provider must encrypt the entire assertion. However, Salesforce only supports one layer of encryption. For example, you can’t encrypt <NameID> to <EncryptedID> and then encrypt the whole assertion.

          Here’s an example of an encrypted SAML assertion with <EncryptedKey> outside of <EncryptedData>.

          <saml:EncryptedAssertion xmlns:saml="urn:oasis:names:tc:SAML:2.0:assertion"> 
             <xenc:EncryptedData xmlns:xenc="http://www.w3.org/2001/04/xmlenc#" Id="Encrypted_DATA_ID"   Type="http://www.w3.org/2001/04/xmlenc#Element">   
                <xenc:EncryptionMethod   Algorithm="http://www.w3.org/2001/04/xmlenc#aes128-cbc"/>
                <ds:KeyInfo xmlns:ds="http://www.w3.org/2000/09/xmldsig#">
                   <ds:RetrievalMethod URI="#Encrypted_KEY_ID" Type="http://www.w3.org/2001/04/xmlenc#EncryptedKey"/>
                </ds:KeyInfo>
                <xenc:CipherData >   
                   <xenc:CipherValue>Nk4W4mx...</xenc:CipherValue>   
                </xenc:CipherData>
             </xenc:EncryptedData>   
             <xenc:EncryptedKey xmlns:xenc="http://www.w3.org/2001/04/xmlenc#" Id="Encrypted_KEY_ID">   
                <xenc:EncryptionMethod   Algorithm="http://www.w3.org/2001/04/xmlenc#rsa-1_5"/>
                <xenc:CipherData>   
                   <xenc:CipherValue>PzA5X...</xenc:CipherValue>   
                </xenc:CipherData>   
                <xenc:ReferenceList>
                   <xenc:DataReference URI="#Encrypted_DATA_ID"/>
                </xenc:ReferenceList>   
             </xenc:EncryptedKey>   
          </saml:EncryptedAssertion>

          Here’s an example of an encrypted SAML assertion with <EncryptedKey> inside <EncryptedData>.

          <xenc:EncryptedData xmlns:xenc="http://www.w3.org/2001/04/xmlenc#" Type="http://www.w3.org/2001/04/xmlenc#Element">
             <xenc:EncryptionMethod Algorithm="http://www.w3.org/2001/04/xmlenc#aes256-cbc" />
            <ds:KeyInfo xmlns:ds="http://www.w3.org/2000/09/xmldsig#">
             <xenc:EncryptedKey xmlns:xenc="http://www.w3.org/2001/04/xmlenc#">
              <xenc:EncryptionMethod Algorithm="http://www.w3.org/2001/04/xmlenc#rsa-1_5" />
              <xenc:CipherData xmlns:xenc="http://www.w3.org/2001/04/xmlenc#">
               <xenc:CipherValue>HWm..</xenc:CipherValue>
              </xenc:CipherData>
             </xenc:EncryptedKey>
             …
           </xenc:EncryptedData>
          

          Example SAML Assertion for Experience Cloud Sites

          Here’s an example SAML assertion for an Experience Cloud site.

          <?xml version="1.0" encoding="UTF-8"?>
          <saml2p:Response xmlns:saml2p="urn:oasis:names:tc:SAML:2.0:protocol" xmlns:xs="http://www.w3.org/2001/XMLSchema" Destination="https://<mydomainvalue>.my.site.com/login" ID="_6aaedcfc-110ed330" IssueInstant="2023-05-16T21:53:41.040Z" Version="2.0">
              <saml2:Issuer xmlns:saml2="urn:oasis:names:tc:SAML:2.0:assertion">IssuerValue</saml2:Issuer>
              <ds:Signature xmlns:ds="http://www.w3.org/2000/09/xmldsig#">
                  Signature omitted for brevity
              </ds:Signature>
              <saml2p:Status>
                  <saml2p:StatusCode Value="urn:oasis:names:tc:SAML:2.0:status:Success"/>
              </saml2p:Status>
              <saml2:Assertion xmlns:saml2="urn:oasis:names:tc:SAML:2.0:assertion" ID="_187bec3f-3542a4eb" IssueInstant="2023-05-16T21:53:41.040Z" Version="2.0">
                  <saml2:Issuer>IssuerValue</saml2:Issuer>
                  <saml2:Subject>
                      <saml2:NameID Format="urn:oasis:names:tc:SAML:1.1:nameid-format:unspecified">user@example.com</saml2:NameID>
                      <saml2:SubjectConfirmation Method="urn:oasis:names:tc:SAML:2.0:cm:bearer">
                          <saml2:SubjectConfirmationData NotOnOrAfter="2023-05-16T21:54:41.040Z" Recipient="https://<mydomainvalue>.my.site.com/login"/>
                      </saml2:SubjectConfirmation>
                  </saml2:Subject>
                  <saml2:Conditions NotBefore="2023-05-16T21:53:41.040Z" NotOnOrAfter="2023-05-16T21:54:41.040Z">
                      <saml2:AudienceRestriction>
                          <saml2:Audience>EntityIDValue</saml2:Audience>
                      </saml2:AudienceRestriction>
                  </saml2:Conditions>
                  <saml2:AuthnStatement AuthnInstant="2023-05-16T21:53:41.040Z">
                      <saml2:AuthnContext>
                          <saml2:AuthnContextClassRef>urn:oasis:names:tc:SAML:2.0:ac:classes:unspecified</saml2:AuthnContextClassRef>
                      </saml2:AuthnContext>
                  </saml2:AuthnStatement>
              </saml2:Assertion>
          </saml2p:Response>

          Example SAML Assertions for Portals

          Here’s a portion of a SAML assertion statement shows the portal_id and organization_id attributes.

          <saml:AttributeStatement>
             <saml:Attribute Name="portal_id">
                <saml:AttributeValue xsi:type="xs:anyType">060D00000000SHZ</saml:AttributeValue>
             </saml:Attribute>
          
             <saml:Attribute Name="organization_id">
                   <saml:AttributeValue xsi:type="xs:anyType">00DD0000000F7P5</saml:AttributeValue>
             </saml:Attribute>
          </saml:AttributeStatement>
          

          Here’s a complete SAML assertion statement for SSO for portals. The example org uses federated sign-on, which is included in an attribute, not in the subject. See the <saml:AttributeStatement> in bold text in the assertion.

          <samlp:Response ID="_f97faa927f54ab2c1fef230eee27cba21245264205456" 
                IssueInstant="2009-06-17T18:43:25.456Z" Version="2.0">
             <saml:Issuer Format="urn:oasis:names:tc:SAML:2.0:nameid-format:entity">
                https://www.salesforce.com</saml:Issuer>
          
             <samlp:Status>
                <samlp:StatusCode Value="urn:oasis:names:tc:SAML:2.0:status:Success"/>
             </samlp:Status>
          
             <saml:Assertion ID="_f690da2480a8df7fcc1cbee5dc67dbbb1245264205456"
                IssueInstant="2009-06-17T18:45:10.738Z" Version="2.0">
                <saml:Issuer Format="urn:oasis:names:tc:SAML:2.0:nameid-format:entity">
                   https://www.salesforce.com
                </saml:Issuer>
          
                <saml:Signature>
                   <saml:SignedInfo>
                      <saml:CanonicalizationMethod Algorithm="http://www.w3.org/2001/10/xml-exc-c14n#"/>
                      <saml:SignatureMethod Algorithm="http://www.w3.org/2000/09/xmldsig#rsa-sha1"/>
                      <saml:Reference URI="#_f690da2480a8df7fcc1cbee5dc67dbbb1245264205456">
                         <saml:Transforms>
                            <saml:Transform Algorithm="http://www.w3.org/2000/09/xmldsig#enveloped-signature"/>
                            <saml:Transform Algorithm="http://www.w3.org/2001/10/xml-exc-c14n#">
                               <ec:InclusiveNamespaces PrefixList="ds saml xs"/>
                            </saml:Transform>
                         </saml:Transforms>
                         <saml:DigestMethod Algorithm="http://www.w3.org/2000/09/xmldsig#sha1"/>
                         <saml:DigestValue>vzR9Hfp8d16576tEDeq/zhpmLoo=
                         </saml:DigestValue>
                      </saml:Reference>
                   </saml:SignedInfo>
                   <saml:SignatureValue>
                      AzID5hhJeJlG2llUDvZswNUrlrPtR7S37QYH2W+Un1n8c6kTC
                      Xr/lihEKPcA2PZt86eBntFBVDWTRlh/W3yUgGOqQBJMFOVbhK
                      M/CbLHbBUVT5TcxIqvsNvIFdjIGNkf1W0SBqRKZOJ6tzxCcLo
                      9dXqAyAUkqDpX5+AyltwrdCPNmncUM4dtRPjI05CL1rRaGeyX
                      3kkqOL8p0vjm0fazU5tCAJLbYuYgU1LivPSahWNcpvRSlCI4e
                      Pn2oiVDyrcc4et12inPMTc2lGIWWWWJyHOPSiXRSkEAIwQVjf
                      Qm5cpli44Pv8FCrdGWpEE0yXsPBvDkM9jIzwCYGG2fKaLBag==
                   </saml:SignatureValue>
                   <saml:KeyInfo>
                      <saml:X509Data>
                         <saml:X509Certificate>
                            MIIEATCCAumgAwIBAgIBBTANBgkqhkiG9w0BAQ0FADCBgzELM
                            Certificate truncated for readability...
                         </saml:X509Certificate>
                      </saml:X509Data>
                   </saml:KeyInfo>
                </saml:Signature>
          
                <saml:Subject>
                   <saml:NameID Format="urn:oasis:names:tc:SAML:1.1:nameid-format:unspecified">null
                   </saml:NameID>
          
                   <saml:SubjectConfirmation Method="urn:oasis:names:tc:SAML:2.0:cm:bearer">
                   <saml:SubjectConfirmationData NotOnOrAfter="2009-06-17T18:48:25.456Z" 
                      Recipient="https://login.salesforce.com/?saml=02HKiPoin4f49GRMsOdFmhTgi
                      _0nR7BBAflopdnD3gtixujECWpxr9klAw"/>
                      </saml:SubjectConfirmation>
                </saml:Subject>
          
                <saml:Conditions NotBefore="2009-06-17T18:43:25.456Z" 
                   NotOnOrAfter="2009-06-17T18:48:25.456Z">
          
                   <saml:AudienceRestriction>
                      <saml:Audience>https://saml.salesforce.com</saml:Audience>
                   </saml:AudienceRestriction>
                </saml:Conditions>
          
                <saml:AuthnStatement AuthnInstant="2009-06-17T18:43:25.456Z">
          
                   <saml:AuthnContext>
                      <saml:AuthnContextClassRef>urn:oasis:names:tc:SAML:2.0:ac:classes:unspecified
                      </saml:AuthnContextClassRef>
                   </saml:AuthnContext>
                </saml:AuthnStatement>
          
                <saml:AttributeStatement>
          
                   <saml:Attribute FriendlyName="Friendly Name" Name="federationId" 
                      NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:unspecified">
                      <saml:AttributeValue xsi:type="xs:string">saml_portal_user_federation_id
                      </saml:AttributeValue>
                      <saml:AttributeValue xsi:type="xs:string">SomeOtherValue
                      </saml:AttributeValue>
                   </saml:Attribute>
          
                   <saml:Attribute Name="portal_id">
                      <saml:AttributeValue xsi:type="xs:anyType">060D00000000SHZ
                      </saml:AttributeValue>
                   </saml:Attribute>
          
                   <saml:Attribute Name="organization_id">
                      <saml:AttributeValue xsi:type="xs:anyType">00DD0000000F7Z5
                      </saml:AttributeValue>
                   </saml:Attribute>
          
                   <saml:Attribute Name="ssostartpage" 
                      NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:unspecified">
          
                      <saml:AttributeValue xsi:type="xs:anyType">
                         http://www.salesforce.com/qa/security/saml/saml20-gen.jsp
                      </saml:AttributeValue>
                   </saml:Attribute>
          
                   <saml:Attribute Name="logouturl" 
                      NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:uri">
          
                      <saml:AttributeValue xsi:type="xs:string">
                          http://www.salesforce.com/qa/security/del_auth/SsoLogoutPage.html
                      </saml:AttributeValue>
                   </saml:Attribute>
                </saml:AttributeStatement>
             </saml:Assertion>
          </samlp:Response>

          Example SAML Assertion for Salesforce Sites

          Here’s a SAML assertion statement that shows the portal_id, organization_id, and siteurl attributes.

          <saml:AttributeStatement>
             <saml:Attribute Name="portal_id">
                <saml:AttributeValue xmlns:xs="http://www.w3.org/2001/XMLSchema" 
                   xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
                   xsi:type="xs:anyType">060900000004cDk
                </saml:AttributeValue>
             </saml:Attribute>
             <saml:Attribute Name="organization_id">
                <saml:AttributeValue xmlns:xs="http://www.w3.org/2001/XMLSchema" 
                   xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
                   xsi:type="xs:anyType">00D900000008bX0
                </saml:AttributeValue></saml:Attribute>
             <saml:Attribute Name="siteurl">
                <saml:AttributeValue xmlns:xs="http://www.w3.org/2001/XMLSchema" 
                   xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
                   xsi:type="xs:anyType">https://MyDomainName.my.site.com/mySuffix</saml:AttributeValue>
             </saml:Attribute>
          </saml:AttributeStatement>
          

          Example SAML Assertion for JIT Provisioning

          Here’s an example SAML assertion for JIT provisioning.

          <saml:AttributeStatement>
          
             <saml:Attribute Name="User.Username" 
                NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:unspecified">
                <saml:AttributeValue xsi:type="xs:anyType">testuser@123.org
                </saml:AttributeValue>
             </saml:Attribute>
          
             <saml:Attribute Name="User.Phone" 
                NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:unspecified">
                <saml:AttributeValue xsi:type="xs:anyType">415-123-1234
                </saml:AttributeValue>
             </saml:Attribute>
          
             <saml:Attribute Name="User.FirstName"
                NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:unspecified">
                <saml:AttributeValue xsi:type="xs:anyType">Testuser
                </saml:AttributeValue>
             </saml:Attribute>
          
             <saml:Attribute Name="User.LanguageLocaleKey"
                NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:unspecified">
                <saml:AttributeValue xsi:type="xs:anyType">en_US
                </saml:AttributeValue>
             </saml:Attribute>
          
             <saml:Attribute Name="User.CompanyName"
                NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:unspecified">
                <saml:AttributeValue xsi:type="xs:anyType">Salesforce.com
                </saml:AttributeValue>
             </saml:Attribute>
          
             <saml:Attribute Name="User.Alias"
                NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:unspecified">
                <saml:AttributeValue xsi:type="xs:anyType">tlee2
                </saml:AttributeValue>
             </saml:Attribute>
          
             <saml:Attribute Name="User.CommunityNickname"
                NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:unspecified">
                <saml:AttributeValue xsi:type="xs:anyType">tlee2
                </saml:AttributeValue>
             </saml:Attribute>
          
             <saml:Attribute Name="User.UserRoleId"
                NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:unspecified">
                <saml:AttributeValue xsi:type="xs:anyType">000000000000000
                </saml:AttributeValue>
             </saml:Attribute>
          
             <saml:Attribute Name="User.Title"
                NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:unspecified">
                <saml:AttributeValue xsi:type="xs:anyType">Mr.
                </saml:AttributeValue>
             </saml:Attribute>
          
             <saml:Attribute Name="User.LocaleSidKey"
                NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:unspecified">
                <saml:AttributeValue xsi:type="xs:anyType">en_CA
                </saml:AttributeValue>
             </saml:Attribute>
          
             <saml:Attribute Name="User.Email"
                NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:unspecified">
                <saml:AttributeValue xsi:type="xs:anyType">testuser@salesforce.com
                </saml:AttributeValue>
             </saml:Attribute>
          
             <saml:Attribute Name=" User.FederationIdentifier"
                NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:unspecified">
                <saml:AttributeValue xsi:type="xs:anyType">tlee2
                </saml:AttributeValue>
             </saml:Attribute>
          
             <saml:Attribute Name="User.TimeZoneSidKey"
                NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:unspecified">
                <saml:AttributeValue xsi:type="xs:anyType">America/Los_Angeles
                </saml:AttributeValue>
             </saml:Attribute>
          
             <saml:Attribute Name="User.LastName"
                NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:unspecified">
                <saml:AttributeValue xsi:type="xs:anyType">Lee
                </saml:AttributeValue>
             </saml:Attribute>
          
             <saml:Attribute Name="User.ProfileId"
                NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:unspecified">
                <saml:AttributeValue xsi:type="xs:anyType">00ex0000001pBNL
                </saml:AttributeValue>
             </saml:Attribute>
          
             <saml:Attribute Name="User.IsActive"
                NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:unspecified">
                <saml:AttributeValue xsi:type="xs:anyType">1
                </saml:AttributeValue>
             </saml:Attribute>
          
             <saml:Attribute Name="User.EmailEncodingKey"
                NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:unspecified">
                <saml:AttributeValue xsi:type="xs:anyType">UTF-8
                </saml:AttributeValue>
             </saml:Attribute>
          
          </saml:AttributeStatement>
          
           
          Loading
          Salesforce Help | Article