Credential Mapping which tell the Identity Broker how to connect to a given resource for remote system.
In other words, a Credential Mapping allow the Identity Broker to log in to a remote system on behalf of a subject that has already been authenticated.