Skip to content

Commit 9ebd056

Browse files
[msid][content-health] improve correctness
1 parent 2ad57b1 commit 9ebd056

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

articles/active-directory/develop/howto-add-app-roles-in-azure-ad-apps.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ ms.custom: aaddev
1717

1818
# Add app roles to your application and receive them in the token
1919

20-
Role-based access control (RBAC) is a popular mechanism to enforce authorization in applications. When using RBAC, an administrator grants permissions to roles, and not to individual users or groups. The administrator can then assign roles to different users and groups to control who has access to what content and functionality.
20+
Role-based access control (RBAC) is a popular mechanism to enforce authorization in applications. When using RBAC, an administrator grants permissions to roles, not to individual users or groups. The administrator can then assign roles to different users and groups to control who has access to what content and functionality.
2121

2222
Using RBAC with application role and role claims, developers can securely enforce authorization in their apps with less effort.
2323

@@ -83,7 +83,7 @@ Confirm that the users and groups you added appear in the **Users and groups** l
8383

8484
Once you've added app roles in your application, you can assign an app role to a client app by using the Azure portal or programmatically by using [Microsoft Graph](/graph/api/user-post-approleassignments).
8585

86-
When you assign app roles to an application, you create _application permissions_. Application permissions are typically used by daemon apps or back-end services that need to authenticate and make authorized API calls as themselves, without the interaction of a user.
86+
When you assign app roles to an application, you create _application permissions_. Application permissions are typically used by daemon apps or back-end services that need to authenticate and make authorized API call as themselves, without the interaction of a user.
8787

8888
To assign app roles to an application by using the Azure portal:
8989

0 commit comments

Comments
 (0)