Skip to content

Commit 232ad90

Browse files
authored
Merge pull request #53635 from paulgarn/patch-5
Update how-to-connect-fed-group-claims.md
2 parents d02b5bc + 8ca8f4a commit 232ad90

File tree

1 file changed

+4
-4
lines changed

1 file changed

+4
-4
lines changed

articles/active-directory/hybrid/how-to-connect-fed-group-claims.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -14,15 +14,15 @@ ms.author: billmath
1414
author: billmath
1515
---
1616

17-
# Configure group claims for applications with Azure Active Directory (Public Preview)
17+
# Configure group claims for applications with Azure Active Directory
1818

1919
Azure Active Directory can provide a users group membership information in tokens for use within applications. Two main patterns are supported:
2020

21-
- Groups identified by their Azure Active Directory object identifier (OID) attribute (Generally Available)
22-
- Groups identified by sAMAccountName or GroupSID attributes for Active Directory (AD) synchronized groups and users (Public Preview)
21+
- Groups identified by their Azure Active Directory object identifier (OID) attribute
22+
- Groups identified by sAMAccountName or GroupSID attributes for Active Directory (AD) synchronized groups and users
2323

2424
> [!IMPORTANT]
25-
> There are a number of caveats to note for this preview functionality:
25+
> There are a number of caveats to note for this functionality:
2626
>
2727
>- Support for use of sAMAccountName and security identifier (SID) attributes synced from on-premises is designed to enable moving existing applications from AD FS and other identity providers. Groups managed in Azure AD do not contain the attributes necessary to emit these claims.
2828
>- In larger organizations the number of groups a user is a member of may exceed the limit that Azure Active Directory will add to a token. 150 groups for a SAML token, and 200 for a JWT. This can lead to unpredictable results. If your users have large numbers of group memberships, we recommend using the option to restrict the groups emitted in claims to the relevant groups for the application.

0 commit comments

Comments
 (0)