You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/develop/custom-claims-provider-overview.md
+4-1Lines changed: 4 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -10,7 +10,7 @@ ms.service: active-directory
10
10
ms.subservice: develop
11
11
ms.workload: identity
12
12
ms.topic: conceptual
13
-
ms.date: 03/06/2023
13
+
ms.date: 03/13/2023
14
14
ms.author: davidmu
15
15
ms.reviewer: JasSuri
16
16
ms.custom: aaddev
@@ -24,6 +24,9 @@ When a user authenticates to an application, a custom claims provider can be use
24
24
25
25
Key data about a user is often stored in systems external to Azure AD. For example, secondary email, billing tier, or sensitive information. Some applications may rely on these attributes for the application to function as designed. For example, the application may block access to certain features based on a claim in the token.
26
26
27
+
The following short video provides an excellent overview of the Azure AD custom extensions and custom claims providers:
Use a custom claims provider for the following scenarios:
28
31
29
32
-**Migration of legacy systems** - You may have legacy identity systems such as Active Directory Federation Services (AD FS) or data stores (such as LDAP directory) that hold information about users. You'd like to migrate these applications, but can't fully migrate the identity data into Azure AD. Your apps may depend on certain information on the token, and can't be rearchitected.
Copy file name to clipboardExpand all lines: articles/active-directory/develop/custom-extension-get-started.md
+6-4Lines changed: 6 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -10,7 +10,7 @@ ms.service: active-directory
10
10
ms.subservice: develop
11
11
ms.topic: how-to
12
12
ms.workload: identity
13
-
ms.date: 03/06/2023
13
+
ms.date: 03/13/2023
14
14
ms.author: davidmu
15
15
ms.custom: aaddev
16
16
ms.reviewer: JasSuri
@@ -21,7 +21,9 @@ ms.reviewer: JasSuri
21
21
22
22
This article describes how to configure and setup a custom claims provider with the [token issuance start event](custom-claims-provider-overview.md#token-issuance-start-event-listener) type. This event is triggered right before the token is issued, and allows you to call a REST API to add claims to the token.
23
23
24
-
This how-to guide demonstrates the token issuance start event with a REST API running in Azure Functions and a sample OpenID Connect application.
24
+
This how-to guide demonstrates the token issuance start event with a REST API running in Azure Functions and a sample OpenID Connect application. Before you start, take a look at following video, which demonstrates how to configure Azure AD custom claims provider with Function App:
0 commit comments