Skip to content

Commit 9255aa1

Browse files
committed
fixed typo
1 parent ebedeff commit 9255aa1

File tree

1 file changed

+3
-3
lines changed

1 file changed

+3
-3
lines changed

articles/active-directory/develop/active-directory-claims-mapping.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -460,7 +460,7 @@ In this example, you create a policy that removes the basic claim set from token
460460
Get-AzureADPolicy
461461
```
462462
1. Assign the policy to your service principal. You also need to get the ObjectId of your service principal.
463-
1. To see all your organization's service principals, you can [query Microsoft Graph](/graph/traverse-the-graph). Or, in [Micrsoft Graph Explorer](https://developer.microsoft.com/graph/graph-explorer), sign in to your Azure AD account.
463+
1. To see all your organization's service principals, you can [query Microsoft Graph](/graph/traverse-the-graph). Or, in [Graph Explorer](https://developer.microsoft.com/graph/graph-explorer), sign in to your Azure AD account.
464464
2. When you have the ObjectId of your service principal, run the following command:
465465
466466
``` powershell
@@ -484,7 +484,7 @@ In this example, you create a policy that adds the EmployeeID and TenantCountry
484484
Get-AzureADPolicy
485485
```
486486
1. Assign the policy to your service principal. You also need to get the ObjectId of your service principal.
487-
1. To see all your organization's service principals, you can [query Microsoft Graph](/graph/traverse-the-graph). Or, in [Micrsoft Graph Explorer](https://developer.microsoft.com/graph/graph-explorer), sign in to your Azure AD account.
487+
1. To see all your organization's service principals, you can [query Microsoft Graph](/graph/traverse-the-graph). Or, in [Graph Explorer](https://developer.microsoft.com/graph/graph-explorer), sign in to your Azure AD account.
488488
2. When you have the ObjectId of your service principal, run the following command:
489489
490490
``` powershell
@@ -508,7 +508,7 @@ In this example, you create a policy that emits a custom claim “JoinedData”
508508
Get-AzureADPolicy
509509
```
510510
1. Assign the policy to your service principal. You also need to get the ObjectId of your service principal.
511-
1. To see all your organization's service principals, you can [query Microsoft Graph](/graph/traverse-the-graph). Or, in [Micrsoft Graph Explorer](https://developer.microsoft.com/graph/graph-explorer), sign in to your Azure AD account.
511+
1. To see all your organization's service principals, you can [query Microsoft Graph](/graph/traverse-the-graph). Or, in [Graph Explorer](https://developer.microsoft.com/graph/graph-explorer), sign in to your Azure AD account.
512512
2. When you have the ObjectId of your service principal, run the following command:
513513
514514
``` powershell

0 commit comments

Comments
 (0)