You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/develop/active-directory-claims-mapping.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -460,7 +460,7 @@ In this example, you create a policy that removes the basic claim set from token
460
460
Get-AzureADPolicy
461
461
```
462
462
1. Assign the policy to your service principal. You also need to get the ObjectId of your service principal.
463
-
1. To see all your organization's service principals, you can [query Microsoft Graph](/graph/traverse-the-graph). Or, in [Micrsoft Graph Explorer](https://developer.microsoft.com/graph/graph-explorer), sign in to your Azure AD account.
463
+
1. To see all your organization's service principals, you can [query Microsoft Graph](/graph/traverse-the-graph). Or, in [Graph Explorer](https://developer.microsoft.com/graph/graph-explorer), sign in to your Azure AD account.
464
464
2. When you have the ObjectId of your service principal, run the following command:
465
465
466
466
``` powershell
@@ -484,7 +484,7 @@ In this example, you create a policy that adds the EmployeeID and TenantCountry
484
484
Get-AzureADPolicy
485
485
```
486
486
1. Assign the policy to your service principal. You also need to get the ObjectId of your service principal.
487
-
1. To see all your organization's service principals, you can [query Microsoft Graph](/graph/traverse-the-graph). Or, in [Micrsoft Graph Explorer](https://developer.microsoft.com/graph/graph-explorer), sign in to your Azure AD account.
487
+
1. To see all your organization's service principals, you can [query Microsoft Graph](/graph/traverse-the-graph). Or, in [Graph Explorer](https://developer.microsoft.com/graph/graph-explorer), sign in to your Azure AD account.
488
488
2. When you have the ObjectId of your service principal, run the following command:
489
489
490
490
``` powershell
@@ -508,7 +508,7 @@ In this example, you create a policy that emits a custom claim “JoinedData”
508
508
Get-AzureADPolicy
509
509
```
510
510
1. Assign the policy to your service principal. You also need to get the ObjectId of your service principal.
511
-
1. To see all your organization's service principals, you can [query Microsoft Graph](/graph/traverse-the-graph). Or, in [Micrsoft Graph Explorer](https://developer.microsoft.com/graph/graph-explorer), sign in to your Azure AD account.
511
+
1. To see all your organization's service principals, you can [query Microsoft Graph](/graph/traverse-the-graph). Or, in [Graph Explorer](https://developer.microsoft.com/graph/graph-explorer), sign in to your Azure AD account.
512
512
2. When you have the ObjectId of your service principal, run the following command:
0 commit comments