Skip to content

Commit 1c26e6b

Browse files
author
Kalyan Krishna
committed
final edits and fixes
1 parent 5715fb7 commit 1c26e6b

File tree

4 files changed

+10
-14
lines changed

4 files changed

+10
-14
lines changed

5-WebApp-AuthZ/5-2-Groups/AppCreationScripts/sample.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"Sample": {
33
"Title": "Add authorization using groups & group claims to an ASP.NET Core Web app that signs-in users with the Microsoft identity platform",
4-
"Level": 400,
4+
"Level": 300,
55
"Client": "ASP.NET Core Web App",
66
"Service": "Microsoft Graph",
77
"RepositoryUrl": "microsoft-identity-platform-aspnetcore-webapp-tutorial",

5-WebApp-AuthZ/5-2-Groups/README-incremental-instructions.md

Lines changed: 3 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
services: active-directory
33
platforms: dotnet
44
author: kalyankrishna1
5-
level: 400
5+
level: 300
66
client: ASP.NET Core Web App
77
service: Microsoft Graph
88
endpoint: Microsoft identity platform
@@ -69,9 +69,7 @@ Now you have two different options available to you on how you can further confi
6969
1. [Receive **all the groups** that the signed-in user is assigned to in an Azure AD tenant, included nested groups](#configure-your-application-to-receive-all-the-groups-the-signed-in-user-is-assigned-to-included-nested-groups).
7070
1. [Receive the **groups** claim values from a **filtered set of groups** that your application is programmed to work with](#configure-your-application-to-receive-the-groups-claim-values-from-a-filtered-set-of-groups-a-user-may-be-assigned-to). (Not available in the [Azure AD Free edition](https://azure.microsoft.com/pricing/details/active-directory/)).
7171

72-
> To get the on-premise group's `samAccountName` or `On Premises Group Security Identifier` instead of Group id, check out the document [Configure group claims for applications with Azure Active Directory](https://docs.microsoft.com/azure/active-directory/hybrid/how-to-connect-fed-group-claims#prerequisites-for-using-group-attributes-synchronized-from-active-directory).
73-
74-
> To receive the `groups` claim with the object id of the security groups, please ensure that the user accounts you plan to sign-in to this app is assigned to a few security groups in this AAD tenant.
72+
> To get the on-premise group's `samAccountName` or `On Premises Group Security Identifier` instead of Group id, please refer to the document [Configure group claims for applications with Azure Active Directory](https://docs.microsoft.com/azure/active-directory/hybrid/how-to-connect-fed-group-claims#prerequisites-for-using-group-attributes-synchronized-from-active-directory).
7573
7674
#### Configure your application to receive **all the groups** the signed-in user is assigned to, included nested groups
7775

@@ -109,7 +107,7 @@ Now you have two different options available to you on how you can further confi
109107

110108
> **Important security tip**
111109
>
112-
> Wwhen you set **User assignment required?** to **Yes**, Azure AD will check that only users assigned to your application in the **Users and groups** blade are able to sign-in to your app. You can assign users directly or by assigning security groups they belong to.
110+
> When you set **User assignment required?** to **Yes**, Azure AD will check that only users assigned to your application in the **Users and groups** blade are able to sign-in to your app. You can assign users directly or by assigning security groups they belong to.
113111
114112
### Step 4: Run the sample
115113

5-WebApp-AuthZ/5-2-Groups/README.md

Lines changed: 3 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
services: active-directory
33
platforms: dotnet
44
author: kalyankrishna1
5-
level: 400
5+
level: 300
66
client: ASP.NET Core Web App
77
service: Microsoft Graph
88
endpoint: Microsoft identity platform
@@ -61,7 +61,7 @@ git clone https://github.com/Azure-Samples/microsoft-identity-platform-aspnetcor
6161

6262
or download and extract the repository .zip file.
6363

64-
> Given that the name of the sample is quiet long, and so are the names of the referenced NuGet packages, you might want to clone it in a folder close to the root of your hard drive, to avoid file size limitations on Windows.
64+
> Given that the name of the sample is quiet long, and so are the names of the referenced NuGet packages, you might want to clone it in a folder close to the root of your hard drive, to avoid file name length limitations on Windows.
6565
6666
Navigate to the `"5-WebApp-AuthZ"` folder
6767

@@ -153,9 +153,7 @@ Now you have two different options available to you on how you can further confi
153153
1. [Receive **all the groups** that the signed-in user is assigned to in an Azure AD tenant, included nested groups](#configure-your-application-to-receive-all-the-groups-the-signed-in-user-is-assigned-to-included-nested-groups).
154154
1. [Receive the **groups** claim values from a **filtered set of groups** that your application is programmed to work with](#configure-your-application-to-receive-the-groups-claim-values-from-a-filtered-set-of-groups-a-user-may-be-assigned-to). (Not available in the [Azure AD Free edition](https://azure.microsoft.com/pricing/details/active-directory/)).
155155

156-
> To get the on-premise group's `samAccountName` or `On Premises Group Security Identifier` instead of Group id, check out the document [Configure group claims for applications with Azure Active Directory](https://docs.microsoft.com/azure/active-directory/hybrid/how-to-connect-fed-group-claims#prerequisites-for-using-group-attributes-synchronized-from-active-directory).
157-
158-
> To receive the `groups` claim with the object id of the security groups, please ensure that the user accounts you plan to sign-in to this app is assigned to a few security groups in this AAD tenant.
156+
> To get the on-premise group's `samAccountName` or `On Premises Group Security Identifier` instead of Group id, please refer to the document [Configure group claims for applications with Azure Active Directory](https://docs.microsoft.com/azure/active-directory/hybrid/how-to-connect-fed-group-claims#prerequisites-for-using-group-attributes-synchronized-from-active-directory).
159157
160158
##### Configure your application to receive **all the groups** the signed-in user is assigned to, included nested groups
161159

5-WebApp-AuthZ/5-2-Groups/WebApp-OpenIDConnect-DotNet.csproj

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -18,9 +18,9 @@
1818
</ItemGroup>
1919

2020
<ItemGroup>
21-
<PackageReference Include="Microsoft.Graph" Version="3.3.0" />
22-
<PackageReference Include="Microsoft.Identity.Web" Version="0.1.0-preview" />
23-
<PackageReference Include="Microsoft.Identity.Web.UI" Version="0.1.0-preview" />
21+
<PackageReference Include="Microsoft.Graph" Version="3.4.0" />
22+
<PackageReference Include="Microsoft.Identity.Web" Version="0.1.2-preview" />
23+
<PackageReference Include="Microsoft.Identity.Web.UI" Version="0.1.2-preview" />
2424
</ItemGroup>
2525

2626
</Project>

0 commit comments

Comments
 (0)