Skip to content

Commit 783a385

Browse files
[msid][content-health] clarity
1 parent 262350c commit 783a385

File tree

1 file changed

+4
-4
lines changed

1 file changed

+4
-4
lines changed

articles/active-directory/develop/howto-add-app-roles-in-azure-ad-apps.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
title: Add app roles and get them from a token
3-
description: Learn how to add app roles to an application registered in Azure Active Directory, assign users and groups to these roles, and receive them in the 'roles' claim in the token.
3+
description: Learn how to add app roles to an application registered in Azure Active Directory. Assign users and groups to these roles, and receive them in the 'roles' claim in the token.
44
services: active-directory
55
author: kalyankrishna1
66
manager: CelesteDG
@@ -17,9 +17,9 @@ ms.custom: aaddev
1717

1818
# Add app roles to your application and receive them in the token
1919

20-
Role-based access control (RBAC) is a popular mechanism to enforce authorization in applications. When using RBAC, an administrator grants permissions to roles, not to individual users or groups. The administrator can then assign roles to different users and groups to control who has access to what content and functionality.
20+
Role-based access control (RBAC) is a popular mechanism to enforce authorization in applications. RBAC allows administrators to grant permissions to roles rather than to specific users or groups. The administrator can then assign roles to different users and groups to control who has access to what content and functionality.
2121

22-
Using RBAC with application role and role claims, developers can securely enforce authorization in their apps with less effort.
22+
By using RBAC with application role and role claims, developers can securely enforce authorization in their apps with less effort.
2323

2424
Another approach is to use Azure Active Directory (Azure AD) groups and group claims as shown in the [active-directory-aspnetcore-webapp-openidconnect-v2](https://aka.ms/groupssample) code sample on GitHub. Azure AD groups and application roles aren't mutually exclusive; they can be used in tandem to provide even finer-grained access control.
2525

@@ -71,7 +71,7 @@ To assign users and groups to roles by using the Azure portal:
7171
1. Select the application in which you want to assign users or security group to roles.
7272
1. Under **Manage**, select **Users and groups**.
7373
1. Select **Add user** to open the **Add Assignment** pane.
74-
1. Select the **Users and groups** selector from the **Add Assignment** pane. A list of users and security groups is displayed. You can search for a certain user or group as well as select multiple users and groups that appear in the list.
74+
1. Select the **Users and groups** selector from the **Add Assignment** pane. A list of users and security groups is displayed. You can search for a certain user or group and select multiple users and groups that appear in the list.
7575
1. Once you've selected users and groups, select the **Select** button to proceed.
7676
1. Select **Select a role** in the **Add assignment** pane. All the roles that you've defined for the application are displayed.
7777
1. Choose a role and select the **Select** button.

0 commit comments

Comments
 (0)