We have some additional questions, please answer them.
Q3:
In SAML federation, for example, when logging into SiteMinder (ldp), it was possible to use the SAMAccountName attribute of AD to provide the mail attribute for federation with SP in an assertion for SSO.
Assuming a federation environment with M365 using WS-Federation, is it possible to use a user attribute different from the login ID as the ID when federating with M365 and WS-Federation?
Q4:
The above explanation suggests that Kerberos authentication is used in SSO for federation with M365 via WS-Federation, so only the ID logged in to the Windows terminal can be used when logging in to M365, and other attributes (other than sAMAccountName Please let me check if there is a restriction that only IDs logged in to Windows devices can be used to log in to M365, and other attributes (other than sAMAccountName) cannot be used as login IDs for M365 in WS-Federation.
Best Regards,
MARUBUN COPORATON