SAML with Azure on self hosted gitlab enterprise

Hello ,

Is anybody resolve this issu? Its look like that azure ad send wrong attributes to gitlab instance.Screenshot_from_2020-04-10_15-32-16

Here is my gitlab instace config: gitlab_rails['omniauth_block_auto_created_users'] = false gitlab_rails['omniauth_auto_sign_in_with_provider'] = 'saml' gitlab_rails['omniauth_allow_single_sign_on'] = ['saml']

gitlab_rails['omniauth_providers'] = [ { name: 'saml', groups_attribute: 'Groups', external_groups: ['Gitlab'], args: { assertion_consumer_service_url: 'https://gitlab.myinstance.com/users/auth/saml/callback', idp_cert_fingerprint: 'F82F7E3F04CE4F952C20F3B885D3A2E0B821734B', idp_sso_target_url: 'https://login.microsoftonline.com/21ad76cb-XXXX-XXXX-XXX-XXXXXXXX/saml2', //Azure AD Identifier issuer: 'https://gitlab.myinstance.com', name_identifier_format: 'urn:oasis:names:tc:SAML:2.0:nameid-format:persistent', attribute_statements: { email: ['emailaddress'] }, }, label: 'Company Login' # optional label for SAML login button, defaults to "Saml" } ]

Edited by Stoyan Stoyanov