Skip to content

Commit 735e535

Browse files
committed
acrolinx corrections
1 parent ea4ab19 commit 735e535

File tree

4 files changed

+14
-14
lines changed

4 files changed

+14
-14
lines changed

articles/active-directory/develop/active-directory-jwt-claims-customization.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ The Microsoft identity platform supports single sign-on (SSO) with most enterpri
1919

2020
These JSON Web tokens (JWT) used by OIDC & OAuth applications contain pieces of information about the user known as *claims*. A *claim* is information that an identity provider states about a user inside the token they issue for that user.
2121

22-
In an [OIDC response](https://learn.microsoft.com/en-us/azure/active-directory/develop/v2-protocols-oidc), *claims* data is typically contained in the ID Token issued by the identity provider in the form of a JWT.
22+
In an [OIDC response](v2-protocols-oidc.md), *claims* data is typically contained in the ID Token issued by the identity provider in the form of a JWT.
2323

2424
## View or edit claims
2525

@@ -47,7 +47,7 @@ You can use the following special claims transformations functions.
4747

4848
| Function | Description |
4949
|----------|-------------|
50-
| **ExtractMailPrefix()** | Removes the domain suffix from either the email address or the user principal name. This funtion extracts only the first part of the user name being passed through (for example, "joe_smith" instead of [email protected]). |
50+
| **ExtractMailPrefix()** | Removes the domain suffix from either the email address or the user principal name. This function extracts only the first part of the user name being passed through (for example, "joe_smith" instead of [email protected]). |
5151
| **ToLower()** | Converts the characters of the selected attribute into lowercase characters. |
5252
| **ToUpper()** | Converts the characters of the selected attribute into uppercase characters. |
5353

@@ -74,8 +74,8 @@ You can use the following functions to transform claims.
7474

7575
| Function | Description |
7676
|----------|-------------|
77-
| **ExtractMailPrefix()** | Removes the domain suffix from either the email address or the user principal name. This extracts only the first part of the user name being passed through (for example, "joe_smith" instead of [email protected]). |
78-
| **Join()** | Creates a new value by joining two attributes. Optionally, you can use a separator between the two attributes. For NameID claim transformation, the Join() function has specific behavior when the transformation input has a domain part. It removes the domain part from input before joining it with the separator and the selected parameter. For example, if the input of the transformation is '[email protected]' and the separator is '@' and the parameter is 'fabrikam.com', this input combiniation results in '[email protected]'. |
77+
| **ExtractMailPrefix()** | Removes the domain suffix from either the email address or the user principal name. This function extracts only the first part of the user name being passed through (for example, "joe_smith" instead of [email protected]). |
78+
| **Join()** | Creates a new value by joining two attributes. Optionally, you can use a separator between the two attributes. For NameID claim transformation, the Join() function has specific behavior when the transformation input has a domain part. It removes the domain part from input before joining it with the separator and the selected parameter. For example, if the input of the transformation is '[email protected]' and the separator is '@' and the parameter is 'fabrikam.com', this input combination results in '[email protected]'. |
7979
| **ToLowercase()** | Converts the characters of the selected attribute into lowercase characters. |
8080
| **ToUppercase()** | Converts the characters of the selected attribute into uppercase characters. |
8181
| **Contains()** | Outputs an attribute or constant if the input matches the specified value. Otherwise, you can specify another output if there's no match. <br/>For example, if you want to emit a claim where the value is the user's email address if it contains the domain "@contoso.com", otherwise you want to output the user principal name. To perform this function, you configure the following values:<br/>*Parameter 1(input)*: user.email<br/>*Value*: "@contoso.com"<br/>Parameter 2 (output): user.email<br/>Parameter 3 (output if there's no match): user.userprincipalname |
@@ -124,7 +124,7 @@ The following table provides information about using transformations. The action
124124
| 18 | Test transformation result | If evaluation succeeds, an output of test transformation will be rendered against the **Test transformation result** label. |
125125
| 19 | Remove transformation | The administrator can remove the second level transformation by selecting **Remove transformation**. |
126126
| 20 | Specify output if no match | When a regex input value is configured against the **Parameter 1** which doesn't matches the **Regular expression**, the transformation is skipped. In such cases, the administrator can configure the alternate user attribute, which is added to the token for the claim by checking **Specify output if no match**. |
127-
| 21 | Parameter 3 | If an administrator wants to return alternate user attribute when there is no match and **Specify output if no match** is checked, they can select an alternate user attribute by using the dropdown. This dropdown is available against **Parameter 3 (output if no match)**. |
127+
| 21 | Parameter 3 | If an administrator wants to return alternate user attribute when there's no match and **Specify output if no match** is checked, they can select an alternate user attribute by using the dropdown. This dropdown is available against **Parameter 3 (output if no match)**. |
128128
| 22 | Summary | At the bottom of the blade, a full summary of the format is displayed that explains the meaning of the transformation in simple text. |
129129
| 23 | Add | Once the administrator is satisfied with the configuration settings for the transformation, they can save it to claims policy by selecting **Add**. Changes won't be saved unless the administrator manually selects **Save** available on **Manage Claim** blade. |
130130

@@ -137,7 +137,7 @@ When the following conditions occur after **Add** or **Run test** is selected, a
137137
* Input parameters with duplicate user attributes aren't allowed.
138138
* Unused input parameters found. Defined input parameters should have respective usage into the Replacement pattern text.
139139
* The provided test regex input doesn't match with the provided regular expression.
140-
* The source for the groups into the replacement pattern aren't found.
140+
* The source for the groups into the replacement pattern isn't found.
141141

142142
## Emit claims based on conditions
143143

articles/active-directory/develop/active-directory-saml-claims-customization.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -94,7 +94,7 @@ You can use the following special claims transformations functions.
9494

9595
| Function | Description |
9696
|----------|-------------|
97-
| **ExtractMailPrefix()** | Removes the domain suffix from either the email address or the user principal name. This funtion extracts only the first part of the user name being passed through (for example, "joe_smith" instead of [email protected]). |
97+
| **ExtractMailPrefix()** | Removes the domain suffix from either the email address or the user principal name. This function extracts only the first part of the user name being passed through (for example, "joe_smith" instead of [email protected]). |
9898
| **ToLower()** | Converts the characters of the selected attribute into lowercase characters. |
9999
| **ToUpper()** | Converts the characters of the selected attribute into uppercase characters. |
100100

@@ -121,8 +121,8 @@ You can use the following functions to transform claims.
121121

122122
| Function | Description |
123123
|----------|-------------|
124-
| **ExtractMailPrefix()** | Removes the domain suffix from either the email address or the user principal name. This extracts only the first part of the user name being passed through (for example, "joe_smith" instead of [email protected]). |
125-
| **Join()** | Creates a new value by joining two attributes. Optionally, you can use a separator between the two attributes. For NameID claim transformation, the Join() function has specific behavior when the transformation input has a domain part. It removes the domain part from input before joining it with the separator and the selected parameter. For example, if the input of the transformation is '[email protected]' and the separator is '@' and the parameter is 'fabrikam.com', this input combiniation results in '[email protected]'. |
124+
| **ExtractMailPrefix()** | Removes the domain suffix from either the email address or the user principal name. This function extracts only the first part of the user name being passed through (for example, "joe_smith" instead of [email protected]). |
125+
| **Join()** | Creates a new value by joining two attributes. Optionally, you can use a separator between the two attributes. For NameID claim transformation, the Join() function has specific behavior when the transformation input has a domain part. It removes the domain part from input before joining it with the separator and the selected parameter. For example, if the input of the transformation is '[email protected]' and the separator is '@' and the parameter is 'fabrikam.com', this input combination results in '[email protected]'. |
126126
| **ToLowercase()** | Converts the characters of the selected attribute into lowercase characters. |
127127
| **ToUppercase()** | Converts the characters of the selected attribute into uppercase characters. |
128128
| **Contains()** | Outputs an attribute or constant if the input matches the specified value. Otherwise, you can specify another output if there's no match. <br/>For example, if you want to emit a claim where the value is the user's email address if it contains the domain "@contoso.com", otherwise you want to output the user principal name. To perform this function, you configure the following values:<br/>*Parameter 1(input)*: user.email<br/>*Value*: "@contoso.com"<br/>Parameter 2 (output): user.email<br/>Parameter 3 (output if there's no match): user.userprincipalname |
@@ -171,7 +171,7 @@ The following table provides information about using transformations. The action
171171
| 18 | Test transformation result | If evaluation succeeds, an output of test transformation will be rendered against the **Test transformation result** label. |
172172
| 19 | Remove transformation | The administrator can remove the second level transformation by selecting **Remove transformation**. |
173173
| 20 | Specify output if no match | When a regex input value is configured against the **Parameter 1** which doesn't matches the **Regular expression**, the transformation is skipped. In such cases, the administrator can configure the alternate user attribute, which is added to the token for the claim by checking **Specify output if no match**. |
174-
| 21 | Parameter 3 | If an administrator wants to return alternate user attribute when there is no match and **Specify output if no match** is checked, they can select an alternate user attribute by using the dropdown. This dropdown is available against **Parameter 3 (output if no match)**. |
174+
| 21 | Parameter 3 | If an administrator wants to return alternate user attribute when there's no match and **Specify output if no match** is checked, they can select an alternate user attribute by using the dropdown. This dropdown is available against **Parameter 3 (output if no match)**. |
175175
| 22 | Summary | At the bottom of the blade, a full summary of the format is displayed that explains the meaning of the transformation in simple text. |
176176
| 23 | Add | Once the administrator is satisfied with the configuration settings for the transformation, they can save it to claims policy by selecting **Add**. Changes won't be saved unless the administrator manually selects **Save** available on **Manage Claim** blade. |
177177

@@ -184,7 +184,7 @@ When the following conditions occur after **Add** or **Run test** is selected, a
184184
* Input parameters with duplicate user attributes aren't allowed.
185185
* Unused input parameters found. Defined input parameters should have respective usage into the Replacement pattern text.
186186
* The provided test regex input doesn't match with the provided regular expression.
187-
* The source for the groups into the replacement pattern aren't found.
187+
* The source for the groups into the replacement pattern isn't found.
188188

189189
## Add the UPN claim to SAML tokens
190190

articles/active-directory/fundamentals/whats-new-archive.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4200,7 +4200,7 @@ Azure Support is now available for Azure AD integration components of Microsoft
42004200
**Service category:** Enterprise Apps
42014201
**Product capability:** SSO
42024202

4203-
Previously, the number of groups you could use when you conditionally change claims based on group membership within any single application configuration was limited to 10. The use of group membership conditions in SSO claims configuration has now increased to a maximum of 50 groups. For more information on how to configure claims, refer to [Enterprise Applications SSO claims configuration](../develop/active-directory-saml-claims-customization.md#emitting-claims-based-on-conditions).
4203+
Previously, the number of groups you could use when you conditionally change claims based on group membership within any single application configuration was limited to 10. The use of group membership conditions in SSO claims configuration has now increased to a maximum of 50 groups. For more information on how to configure claims, refer to [Enterprise Applications SSO claims configuration](../develop/active-directory-saml-claims-customization.md).
42044204

42054205
---
42064206

articles/active-directory/manage-apps/application-sign-in-problem-application-error.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ ms.collection: M365-identity-device-management
1717

1818
In this scenario, Azure Active Directory (Azure AD) signs the user in. But the application displays an error message and doesn't let the user finish the sign-in flow. The problem is that the app didn't accept the response that Azure AD issued.
1919

20-
There are several possible reasons why the app didn't accept the response from Azure AD. If there is an error message or code displayed, use the following resources to diagnose the error:
20+
There are several possible reasons why the app didn't accept the response from Azure AD. If there's an error message or code displayed, use the following resources to diagnose the error:
2121

2222
* [Azure AD Authentication and authorization error codes](../develop/reference-aadsts-error-codes.md)
2323

@@ -96,7 +96,7 @@ To change the User Identifier value, follow these steps:
9696

9797
### Change the NameID format
9898

99-
If the application expects another format for the **NameID** (User Identifier) attribute, see [Editing nameID](../develop/active-directory-saml-claims-customization.md#editing-nameid) to change the NameID format.
99+
If the application expects another format for the **NameID** (User Identifier) attribute, see the [Edit nameID](../develop/active-directory-saml-claims-customization.md#edit-nameid) section to change the NameID format.
100100

101101
Azure AD selects the format for the **NameID** attribute (User Identifier) based on the value that's selected or the format that's requested by the app in the SAML AuthRequest. For more information, see the "NameIDPolicy" section of [Single sign-on SAML protocol](../develop/single-sign-on-saml-protocol.md#nameidpolicy).
102102

0 commit comments

Comments
 (0)