|
2 | 2 | services: active-directory
|
3 | 3 | platforms: dotnet
|
4 | 4 | author: kalyankrishna1
|
5 |
| -level: 400 |
| 5 | +level: 300 |
6 | 6 | client: ASP.NET Core Web App
|
7 | 7 | service: Microsoft Graph
|
8 | 8 | endpoint: Microsoft identity platform
|
@@ -61,7 +61,7 @@ git clone https://github.com/Azure-Samples/microsoft-identity-platform-aspnetcor
|
61 | 61 |
|
62 | 62 | or download and extract the repository .zip file.
|
63 | 63 |
|
64 |
| -> Given that the name of the sample is quiet long, and so are the names of the referenced NuGet packages, you might want to clone it in a folder close to the root of your hard drive, to avoid file size limitations on Windows. |
| 64 | +> Given that the name of the sample is quiet long, and so are the names of the referenced NuGet packages, you might want to clone it in a folder close to the root of your hard drive, to avoid file name length limitations on Windows. |
65 | 65 |
|
66 | 66 | Navigate to the `"5-WebApp-AuthZ"` folder
|
67 | 67 |
|
@@ -153,9 +153,7 @@ Now you have two different options available to you on how you can further confi
|
153 | 153 | 1. [Receive **all the groups** that the signed-in user is assigned to in an Azure AD tenant, included nested groups](#configure-your-application-to-receive-all-the-groups-the-signed-in-user-is-assigned-to-included-nested-groups).
|
154 | 154 | 1. [Receive the **groups** claim values from a **filtered set of groups** that your application is programmed to work with](#configure-your-application-to-receive-the-groups-claim-values-from-a-filtered-set-of-groups-a-user-may-be-assigned-to). (Not available in the [Azure AD Free edition](https://azure.microsoft.com/pricing/details/active-directory/)).
|
155 | 155 |
|
156 |
| - > To get the on-premise group's `samAccountName` or `On Premises Group Security Identifier` instead of Group id, check out the document [Configure group claims for applications with Azure Active Directory](https://docs.microsoft.com/azure/active-directory/hybrid/how-to-connect-fed-group-claims#prerequisites-for-using-group-attributes-synchronized-from-active-directory). |
157 |
| -
|
158 |
| -> To receive the `groups` claim with the object id of the security groups, please ensure that the user accounts you plan to sign-in to this app is assigned to a few security groups in this AAD tenant. |
| 156 | +> To get the on-premise group's `samAccountName` or `On Premises Group Security Identifier` instead of Group id, please refer to the document [Configure group claims for applications with Azure Active Directory](https://docs.microsoft.com/azure/active-directory/hybrid/how-to-connect-fed-group-claims#prerequisites-for-using-group-attributes-synchronized-from-active-directory). |
159 | 157 |
|
160 | 158 | ##### Configure your application to receive **all the groups** the signed-in user is assigned to, included nested groups
|
161 | 159 |
|
|
0 commit comments