Hi Yvan,
All works like a charm.
Great addition to solution!
However i'd like to ask one more question - currently i'm unable to extract email address associated with AD security group (or Exchange distribution list).
In fact, when looking through PowerShell, i see
Is there another way for mapping group email?
Thanks,
Sergey
All works like a charm.
Great addition to solution!
However i'd like to ask one more question - currently i'm unable to extract email address associated with AD security group (or Exchange distribution list).
In fact, when looking through PowerShell, i see
Get-ADGroup "Project EPM-RIM" -Properties *
LastKnownParent :
mail : ProjectEPM-RIM@XXX.com
mailNickname : ProjectEPM-RIM
The same i see when looking for a user: Get-ADUser "Sergey_Solovyev" -Properties *
GivenName : Sergey
mail : Sergey_Solovyev@XXX.com
Name : Sergey Solovyev
ObjectClass : user
SamAccountName : Sergey_Solovyev
Surname : Solovyev
UserPrincipalName : Sergey_Solovyev@XXX.com
But when checking at SharePoint server, email is present for user, but not for group:$spti = Get-SPTrustedIdentityTokenIssuer
$claim9 = New-SPClaimsPrincipal -ClaimValue "Sergey_Solovyev@xxxx.com" -ClaimType http://schemas.xmlsoap.org/ws/2005/05/identity/claims/upn -TrustedIdentityTokenIssuer $spti
$user9 = $web.EnsureUser($claim9.ToEncodedString())
$user9 | Format-List -Property *
UserLogin : i:0e.t|staging adfs|sergey_solovyev@XXX.com
DisplayName : Sergey Solovyev
Name : Sergey Solovyev
Email : Sergey_Solovyev@XXX.com
$spti = Get-SPTrustedIdentityTokenIssuer
$claim10 = New-SPClaimsPrincipal -ClaimValue "Project EPM-GOPS" -ClaimType http://schemas.microsoft.com/ws/2008/06/identity/claims/role -TrustedIdentityTokenIssuer $spti
$user10 = $web.EnsureUser($claim10.ToEncodedString())
$user10 | Format-List -Property *
UserLogin : c:0-.t|staging adfs|project epm-gops
DisplayName : (Role) Project EPM-GOPS
Name : (Role) Project EPM-GOPS
Email :
Any suggestions on what i'm doing wrong?Is there another way for mapping group email?
Thanks,
Sergey