Skip to content

Commit 4fba023

Browse files
committed
minor corrections
1 parent 43cea0e commit 4fba023

File tree

1 file changed

+3
-24
lines changed

1 file changed

+3
-24
lines changed

articles/active-directory/develop/active-directory-enterprise-app-role-management.md

Lines changed: 3 additions & 24 deletions
Original file line numberDiff line numberDiff line change
@@ -21,9 +21,9 @@ In Azure Active Directory (Azure AD), you can customize the role claim in the ac
2121
## Prerequisites
2222

2323
- An Azure AD subscription with a set up tenant. For more information, see [Quickstart: Set up a tenant](quickstart-create-new-tenant.md).
24-
- An enterprise application that has been added to the tenent. For more information, see [Quickstart: Add an enterprise application](../manage-apps/add-application-portal.md).
24+
- An enterprise application that has been added to the tenant. For more information, see [Quickstart: Add an enterprise application](../manage-apps/add-application-portal.md).
2525
- Single sign-on (SSO) configured for the application. For more information, see [Enable single sign-on for an enterprise application](../manage-apps/add-application-portal-setup-sso.md).
26-
- A user account that is assigned to the role. For more information, see [Quickstart: Create and assign a user account](../manage-apps/add-application-portal-assign-users.md).
26+
- A user account that will be assigned to the role. For more information, see [Quickstart: Create and assign a user account](../manage-apps/add-application-portal-assign-users.md).
2727

2828
> [!NOTE]
2929
> This article explains how to create, update, or delete application roles on the service principal using APIs in Azure AD. To use the new user interface for App Roles, see [Add app roles to your application and receive them in the token](howto-add-app-roles-in-azure-ad-apps.md).
@@ -68,17 +68,6 @@ Use the Microsoft Graph Explorer to add roles to an enterprise application.
6868
"isEnabled": true,
6969
"origin": "Application",
7070
"value": null
71-
},
72-
{
73-
"allowedMemberTypes": [
74-
"User"
75-
],
76-
"description": "User",
77-
"displayName": "User",
78-
"id": "e18f0405-fdec-4ae8-a8a0-d8edb98b061f",
79-
"isEnabled": true,
80-
"origin": "Application",
81-
"value": null
8271
}
8372
]
8473
}
@@ -101,17 +90,6 @@ Use the Microsoft Graph Explorer to add roles to an enterprise application.
10190
"origin": "Application",
10291
"value": null
10392
},
104-
{
105-
"allowedMemberTypes": [
106-
"User"
107-
],
108-
"description": "User",
109-
"displayName": "User",
110-
"id": "e18f0405-fdec-4ae8-a8a0-d8edb98b061f",
111-
"isEnabled": true,
112-
"origin": "Application",
113-
"value": null
114-
},
11593
{
11694
"allowedMemberTypes": [
11795
"User"
@@ -133,6 +111,7 @@ Use the Microsoft Graph Explorer to add roles to an enterprise application.
133111

134112
Update the attributes to define the role claim that is included in the token.
135113

114+
1. Locate the application in the Azure portal, and then select **Single sign-on** in the left menu.
136115
1. In the **Attributes & Claims** section, select **Edit**.
137116
1. Select **Add new claim**.
138117
1. In the **Name** box, type the attribute name. This example uses **Role Name** as the claim name.

0 commit comments

Comments
 (0)