You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/develop/active-directory-jwt-claims-customization.md
+6-6Lines changed: 6 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -19,7 +19,7 @@ The Microsoft identity platform supports single sign-on (SSO) with most enterpri
19
19
20
20
These JSON Web tokens (JWT) used by OIDC & OAuth applications contain pieces of information about the user known as *claims*. A *claim* is information that an identity provider states about a user inside the token they issue for that user.
21
21
22
-
In an [OIDC response](https://learn.microsoft.com/en-us/azure/active-directory/develop/v2-protocols-oidc), *claims* data is typically contained in the ID Token issued by the identity provider in the form of a JWT.
22
+
In an [OIDC response](v2-protocols-oidc.md), *claims* data is typically contained in the ID Token issued by the identity provider in the form of a JWT.
23
23
24
24
## View or edit claims
25
25
@@ -47,7 +47,7 @@ You can use the following special claims transformations functions.
47
47
48
48
| Function | Description |
49
49
|----------|-------------|
50
-
|**ExtractMailPrefix()**| Removes the domain suffix from either the email address or the user principal name. This funtion extracts only the first part of the user name being passed through (for example, "joe_smith" instead of [email protected]). |
50
+
|**ExtractMailPrefix()**| Removes the domain suffix from either the email address or the user principal name. This function extracts only the first part of the user name being passed through (for example, "joe_smith" instead of [email protected]). |
51
51
|**ToLower()**| Converts the characters of the selected attribute into lowercase characters. |
52
52
|**ToUpper()**| Converts the characters of the selected attribute into uppercase characters. |
53
53
@@ -74,8 +74,8 @@ You can use the following functions to transform claims.
74
74
75
75
| Function | Description |
76
76
|----------|-------------|
77
-
|**ExtractMailPrefix()**| Removes the domain suffix from either the email address or the user principal name. This extracts only the first part of the user name being passed through (for example, "joe_smith" instead of [email protected]). |
78
-
|**Join()**| Creates a new value by joining two attributes. Optionally, you can use a separator between the two attributes. For NameID claim transformation, the Join() function has specific behavior when the transformation input has a domain part. It removes the domain part from input before joining it with the separator and the selected parameter. For example, if the input of the transformation is '[email protected]' and the separator is '@' and the parameter is 'fabrikam.com', this input combiniation results in '[email protected]'. |
77
+
|**ExtractMailPrefix()**| Removes the domain suffix from either the email address or the user principal name. This function extracts only the first part of the user name being passed through (for example, "joe_smith" instead of [email protected]). |
78
+
|**Join()**| Creates a new value by joining two attributes. Optionally, you can use a separator between the two attributes. For NameID claim transformation, the Join() function has specific behavior when the transformation input has a domain part. It removes the domain part from input before joining it with the separator and the selected parameter. For example, if the input of the transformation is '[email protected]' and the separator is '@' and the parameter is 'fabrikam.com', this input combination results in '[email protected]'. |
79
79
|**ToLowercase()**| Converts the characters of the selected attribute into lowercase characters. |
80
80
|**ToUppercase()**| Converts the characters of the selected attribute into uppercase characters. |
81
81
|**Contains()**| Outputs an attribute or constant if the input matches the specified value. Otherwise, you can specify another output if there's no match. <br/>For example, if you want to emit a claim where the value is the user's email address if it contains the domain "@contoso.com", otherwise you want to output the user principal name. To perform this function, you configure the following values:<br/>*Parameter 1(input)*: user.email<br/>*Value*: "@contoso.com"<br/>Parameter 2 (output): user.email<br/>Parameter 3 (output if there's no match): user.userprincipalname |
@@ -124,7 +124,7 @@ The following table provides information about using transformations. The action
124
124
| 18 | Test transformation result | If evaluation succeeds, an output of test transformation will be rendered against the **Test transformation result** label. |
125
125
| 19 | Remove transformation | The administrator can remove the second level transformation by selecting **Remove transformation**. |
126
126
| 20 | Specify output if no match | When a regex input value is configured against the **Parameter 1** which doesn't matches the **Regular expression**, the transformation is skipped. In such cases, the administrator can configure the alternate user attribute, which is added to the token for the claim by checking **Specify output if no match**. |
127
-
| 21 | Parameter 3 | If an administrator wants to return alternate user attribute when there is no match and **Specify output if no match** is checked, they can select an alternate user attribute by using the dropdown. This dropdown is available against **Parameter 3 (output if no match)**. |
127
+
| 21 | Parameter 3 | If an administrator wants to return alternate user attribute when there's no match and **Specify output if no match** is checked, they can select an alternate user attribute by using the dropdown. This dropdown is available against **Parameter 3 (output if no match)**. |
128
128
| 22 | Summary | At the bottom of the blade, a full summary of the format is displayed that explains the meaning of the transformation in simple text. |
129
129
| 23 | Add | Once the administrator is satisfied with the configuration settings for the transformation, they can save it to claims policy by selecting **Add**. Changes won't be saved unless the administrator manually selects **Save** available on **Manage Claim** blade. |
130
130
@@ -137,7 +137,7 @@ When the following conditions occur after **Add** or **Run test** is selected, a
137
137
* Input parameters with duplicate user attributes aren't allowed.
138
138
* Unused input parameters found. Defined input parameters should have respective usage into the Replacement pattern text.
139
139
* The provided test regex input doesn't match with the provided regular expression.
140
-
* The source for the groups into the replacement pattern aren't found.
140
+
* The source for the groups into the replacement pattern isn't found.
Copy file name to clipboardExpand all lines: articles/active-directory/develop/active-directory-saml-claims-customization.md
+5-5Lines changed: 5 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -94,7 +94,7 @@ You can use the following special claims transformations functions.
94
94
95
95
| Function | Description |
96
96
|----------|-------------|
97
-
|**ExtractMailPrefix()**| Removes the domain suffix from either the email address or the user principal name. This funtion extracts only the first part of the user name being passed through (for example, "joe_smith" instead of [email protected]). |
97
+
|**ExtractMailPrefix()**| Removes the domain suffix from either the email address or the user principal name. This function extracts only the first part of the user name being passed through (for example, "joe_smith" instead of [email protected]). |
98
98
|**ToLower()**| Converts the characters of the selected attribute into lowercase characters. |
99
99
|**ToUpper()**| Converts the characters of the selected attribute into uppercase characters. |
100
100
@@ -121,8 +121,8 @@ You can use the following functions to transform claims.
121
121
122
122
| Function | Description |
123
123
|----------|-------------|
124
-
|**ExtractMailPrefix()**| Removes the domain suffix from either the email address or the user principal name. This extracts only the first part of the user name being passed through (for example, "joe_smith" instead of [email protected]). |
125
-
|**Join()**| Creates a new value by joining two attributes. Optionally, you can use a separator between the two attributes. For NameID claim transformation, the Join() function has specific behavior when the transformation input has a domain part. It removes the domain part from input before joining it with the separator and the selected parameter. For example, if the input of the transformation is '[email protected]' and the separator is '@' and the parameter is 'fabrikam.com', this input combiniation results in '[email protected]'. |
124
+
|**ExtractMailPrefix()**| Removes the domain suffix from either the email address or the user principal name. This function extracts only the first part of the user name being passed through (for example, "joe_smith" instead of [email protected]). |
125
+
|**Join()**| Creates a new value by joining two attributes. Optionally, you can use a separator between the two attributes. For NameID claim transformation, the Join() function has specific behavior when the transformation input has a domain part. It removes the domain part from input before joining it with the separator and the selected parameter. For example, if the input of the transformation is '[email protected]' and the separator is '@' and the parameter is 'fabrikam.com', this input combination results in '[email protected]'. |
126
126
|**ToLowercase()**| Converts the characters of the selected attribute into lowercase characters. |
127
127
|**ToUppercase()**| Converts the characters of the selected attribute into uppercase characters. |
128
128
|**Contains()**| Outputs an attribute or constant if the input matches the specified value. Otherwise, you can specify another output if there's no match. <br/>For example, if you want to emit a claim where the value is the user's email address if it contains the domain "@contoso.com", otherwise you want to output the user principal name. To perform this function, you configure the following values:<br/>*Parameter 1(input)*: user.email<br/>*Value*: "@contoso.com"<br/>Parameter 2 (output): user.email<br/>Parameter 3 (output if there's no match): user.userprincipalname |
@@ -171,7 +171,7 @@ The following table provides information about using transformations. The action
171
171
| 18 | Test transformation result | If evaluation succeeds, an output of test transformation will be rendered against the **Test transformation result** label. |
172
172
| 19 | Remove transformation | The administrator can remove the second level transformation by selecting **Remove transformation**. |
173
173
| 20 | Specify output if no match | When a regex input value is configured against the **Parameter 1** which doesn't matches the **Regular expression**, the transformation is skipped. In such cases, the administrator can configure the alternate user attribute, which is added to the token for the claim by checking **Specify output if no match**. |
174
-
| 21 | Parameter 3 | If an administrator wants to return alternate user attribute when there is no match and **Specify output if no match** is checked, they can select an alternate user attribute by using the dropdown. This dropdown is available against **Parameter 3 (output if no match)**. |
174
+
| 21 | Parameter 3 | If an administrator wants to return alternate user attribute when there's no match and **Specify output if no match** is checked, they can select an alternate user attribute by using the dropdown. This dropdown is available against **Parameter 3 (output if no match)**. |
175
175
| 22 | Summary | At the bottom of the blade, a full summary of the format is displayed that explains the meaning of the transformation in simple text. |
176
176
| 23 | Add | Once the administrator is satisfied with the configuration settings for the transformation, they can save it to claims policy by selecting **Add**. Changes won't be saved unless the administrator manually selects **Save** available on **Manage Claim** blade. |
177
177
@@ -184,7 +184,7 @@ When the following conditions occur after **Add** or **Run test** is selected, a
184
184
* Input parameters with duplicate user attributes aren't allowed.
185
185
* Unused input parameters found. Defined input parameters should have respective usage into the Replacement pattern text.
186
186
* The provided test regex input doesn't match with the provided regular expression.
187
-
* The source for the groups into the replacement pattern aren't found.
187
+
* The source for the groups into the replacement pattern isn't found.
Copy file name to clipboardExpand all lines: articles/active-directory/fundamentals/whats-new-archive.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4200,7 +4200,7 @@ Azure Support is now available for Azure AD integration components of Microsoft
4200
4200
**Service category:** Enterprise Apps
4201
4201
**Product capability:** SSO
4202
4202
4203
-
Previously, the number of groups you could use when you conditionally change claims based on group membership within any single application configuration was limited to 10. The use of group membership conditions in SSO claims configuration has now increased to a maximum of 50 groups. For more information on how to configure claims, refer to [Enterprise Applications SSO claims configuration](../develop/active-directory-saml-claims-customization.md#emitting-claims-based-on-conditions).
4203
+
Previously, the number of groups you could use when you conditionally change claims based on group membership within any single application configuration was limited to 10. The use of group membership conditions in SSO claims configuration has now increased to a maximum of 50 groups. For more information on how to configure claims, refer to [Enterprise Applications SSO claims configuration](../develop/active-directory-saml-claims-customization.md).
In this scenario, Azure Active Directory (Azure AD) signs the user in. But the application displays an error message and doesn't let the user finish the sign-in flow. The problem is that the app didn't accept the response that Azure AD issued.
19
19
20
-
There are several possible reasons why the app didn't accept the response from Azure AD. If there is an error message or code displayed, use the following resources to diagnose the error:
20
+
There are several possible reasons why the app didn't accept the response from Azure AD. If there's an error message or code displayed, use the following resources to diagnose the error:
21
21
22
22
*[Azure AD Authentication and authorization error codes](../develop/reference-aadsts-error-codes.md)
23
23
@@ -96,7 +96,7 @@ To change the User Identifier value, follow these steps:
96
96
97
97
### Change the NameID format
98
98
99
-
If the application expects another format for the **NameID** (User Identifier) attribute, see [Editing nameID](../develop/active-directory-saml-claims-customization.md#editing-nameid) to change the NameID format.
99
+
If the application expects another format for the **NameID** (User Identifier) attribute, see the [Edit nameID](../develop/active-directory-saml-claims-customization.md#edit-nameid) section to change the NameID format.
100
100
101
101
Azure AD selects the format for the **NameID** attribute (User Identifier) based on the value that's selected or the format that's requested by the app in the SAML AuthRequest. For more information, see the "NameIDPolicy" section of [Single sign-on SAML protocol](../develop/single-sign-on-saml-protocol.md#nameidpolicy).
0 commit comments