You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/develop/active-directory-enterprise-app-role-management.md
+3-24Lines changed: 3 additions & 24 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -21,9 +21,9 @@ In Azure Active Directory (Azure AD), you can customize the role claim in the ac
21
21
## Prerequisites
22
22
23
23
- An Azure AD subscription with a set up tenant. For more information, see [Quickstart: Set up a tenant](quickstart-create-new-tenant.md).
24
-
- An enterprise application that has been added to the tenent. For more information, see [Quickstart: Add an enterprise application](../manage-apps/add-application-portal.md).
24
+
- An enterprise application that has been added to the tenant. For more information, see [Quickstart: Add an enterprise application](../manage-apps/add-application-portal.md).
25
25
- Single sign-on (SSO) configured for the application. For more information, see [Enable single sign-on for an enterprise application](../manage-apps/add-application-portal-setup-sso.md).
26
-
- A user account that is assigned to the role. For more information, see [Quickstart: Create and assign a user account](../manage-apps/add-application-portal-assign-users.md).
26
+
- A user account that will be assigned to the role. For more information, see [Quickstart: Create and assign a user account](../manage-apps/add-application-portal-assign-users.md).
27
27
28
28
> [!NOTE]
29
29
> This article explains how to create, update, or delete application roles on the service principal using APIs in Azure AD. To use the new user interface for App Roles, see [Add app roles to your application and receive them in the token](howto-add-app-roles-in-azure-ad-apps.md).
@@ -68,17 +68,6 @@ Use the Microsoft Graph Explorer to add roles to an enterprise application.
68
68
"isEnabled": true,
69
69
"origin": "Application",
70
70
"value": null
71
-
},
72
-
{
73
-
"allowedMemberTypes": [
74
-
"User"
75
-
],
76
-
"description": "User",
77
-
"displayName": "User",
78
-
"id": "e18f0405-fdec-4ae8-a8a0-d8edb98b061f",
79
-
"isEnabled": true,
80
-
"origin": "Application",
81
-
"value": null
82
71
}
83
72
]
84
73
}
@@ -101,17 +90,6 @@ Use the Microsoft Graph Explorer to add roles to an enterprise application.
101
90
"origin": "Application",
102
91
"value": null
103
92
},
104
-
{
105
-
"allowedMemberTypes": [
106
-
"User"
107
-
],
108
-
"description": "User",
109
-
"displayName": "User",
110
-
"id": "e18f0405-fdec-4ae8-a8a0-d8edb98b061f",
111
-
"isEnabled": true,
112
-
"origin": "Application",
113
-
"value": null
114
-
},
115
93
{
116
94
"allowedMemberTypes": [
117
95
"User"
@@ -133,6 +111,7 @@ Use the Microsoft Graph Explorer to add roles to an enterprise application.
133
111
134
112
Update the attributes to define the role claim that is included in the token.
135
113
114
+
1. Locate the application in the Azure portal, and then select **Single sign-on** in the left menu.
136
115
1. In the **Attributes & Claims** section, select **Edit**.
137
116
1. Select **Add new claim**.
138
117
1. In the **Name** box, type the attribute name. This example uses **Role Name** as the claim name.
0 commit comments