diff --git a/authentik/providers/saml/managed.py b/authentik/providers/saml/managed.py index d20467ec1..e191759d5 100644 --- a/authentik/providers/saml/managed.py +++ b/authentik/providers/saml/managed.py @@ -19,6 +19,7 @@ class SAMLProviderManager(ObjectManager): name="authentik default SAML Mapping: UPN", saml_name="http://schemas.xmlsoap.org/ws/2005/05/identity/claims/upn", expression="return user.attributes.get('upn', user.email)", + friendly_name="", ), EnsureExists( SAMLPropertyMapping, @@ -26,6 +27,7 @@ class SAMLProviderManager(ObjectManager): name="authentik default SAML Mapping: Name", saml_name="http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name", expression="return user.name", + friendly_name="", ), EnsureExists( SAMLPropertyMapping, @@ -33,6 +35,7 @@ class SAMLProviderManager(ObjectManager): name="authentik default SAML Mapping: Email", saml_name="http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddress", expression="return user.email", + friendly_name="", ), EnsureExists( SAMLPropertyMapping, @@ -40,6 +43,7 @@ class SAMLProviderManager(ObjectManager): name="authentik default SAML Mapping: Username", saml_name="http://schemas.goauthentik.io/2021/02/saml/username", expression="return user.username", + friendly_name="", ), EnsureExists( SAMLPropertyMapping, @@ -47,6 +51,7 @@ class SAMLProviderManager(ObjectManager): name="authentik default SAML Mapping: User ID", saml_name="http://schemas.goauthentik.io/2021/02/saml/uid", expression="return user.pk", + friendly_name="", ), EnsureExists( SAMLPropertyMapping, @@ -54,6 +59,7 @@ class SAMLProviderManager(ObjectManager): name="authentik default SAML Mapping: Groups", saml_name="http://schemas.xmlsoap.org/claims/Group", expression=GROUP_EXPRESSION, + friendly_name="", ), EnsureExists( SAMLPropertyMapping, @@ -63,5 +69,6 @@ class SAMLProviderManager(ObjectManager): "http://schemas.microsoft.com/ws/2008/06/identity/claims/windowsaccountname" ), expression="return user.username", + friendly_name="", ), ]