Skip to content

Commit 388b3a0

Browse files
authored
Fix typo
infomation→information
1 parent ad0a969 commit 388b3a0

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

articles/active-directory/hybrid/how-to-connect-fed-group-claims.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -26,7 +26,7 @@ Azure Active Directory can provide a users group membership information in token
2626
>
2727
>- Support for use of sAMAccountName and security identifier (SID) attributes synced from on-premises is designed to enable moving existing applications from AD FS and other identity providers. Groups managed in Azure AD do not contain the attributes necessary to emit these claims.
2828
>- In larger organizations the number of groups a user is a member of may exceed the limit that Azure Active Directory will add to a token. 150 groups for a SAML token, and 200 for a JWT. This can lead to unpredictable results. If your users have large numbers of group memberships, we recommend using the option to restrict the groups emitted in claims to the relevant groups for the application.
29-
>- For new application development, or in cases where the application can be configured for it, and where nested group support isn't required, we recommend that in-app authorization is based on application roles rather than groups. This limits the amount of infomation that needs to go into the token, is more secure, and separates user assignment from app configuration.
29+
>- For new application development, or in cases where the application can be configured for it, and where nested group support isn't required, we recommend that in-app authorization is based on application roles rather than groups. This limits the amount of information that needs to go into the token, is more secure, and separates user assignment from app configuration.
3030
3131
## Group claims for applications migrating from AD FS and other identity providers
3232

@@ -221,4 +221,4 @@ To emit group names to be returned in netbiosDomain\samAccountName format as the
221221

222222
[Methods for assigning users and groups to an app](../../active-directory/manage-apps/methods-for-assigning-users-and-groups.md#assign-groups)
223223

224-
[Configure role claims](../../active-directory/develop/active-directory-enterprise-app-role-management.md)
224+
[Configure role claims](../../active-directory/develop/active-directory-enterprise-app-role-management.md)

0 commit comments

Comments
 (0)