Skip to content

Commit aa8a48d

Browse files
authored
Merge pull request #206633 from FaithOmbongi/patch-4
Microsoft Graph extensions doc updates
2 parents ac16852 + 9d9a2e8 commit aa8a48d

File tree

6 files changed

+60
-58
lines changed

6 files changed

+60
-58
lines changed

articles/active-directory/develop/TOC.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -123,7 +123,7 @@
123123
href: active-directory-optional-claims.md
124124
- name: Claims mapping policy type
125125
href: reference-claims-mapping-policy-type.md
126-
- name: Use directory schema extension attributes in claims
126+
- name: Use directory extension attributes in claims
127127
href: active-directory-schema-extensions.md
128128
- name: Customize claims using Azure portal
129129
href: active-directory-saml-claims-customization.md

articles/active-directory/develop/active-directory-claims-mapping.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -32,7 +32,7 @@ In this article, we walk through a few common scenarios that can help you unders
3232

3333
In the following examples, you create, update, link, and delete policies for service principals. Claims-mapping policies can only be assigned to service principal objects. If you are new to Azure AD, we recommend that you [learn about how to get an Azure AD tenant](quickstart-create-new-tenant.md) before you proceed with these examples.
3434

35-
When creating a claims-mapping policy, you can also emit a claim from a directory schema extension attribute in tokens. Use *ExtensionID* for the extension attribute instead of *ID* in the `ClaimsSchema` element. For more info on extension attributes, see [Using directory schema extension attributes](active-directory-schema-extensions.md).
35+
When creating a claims-mapping policy, you can also emit a claim from a directory extension attribute in tokens. Use *ExtensionID* for the extension attribute instead of *ID* in the `ClaimsSchema` element. For more info on extension attributes, see [Using directory extension attributes](active-directory-schema-extensions.md).
3636

3737
> [!NOTE]
3838
> The [Azure AD PowerShell Module public preview release](https://www.powershellgallery.com/packages/AzureADPreview) is required to configure claims-mapping policies. The PowerShell module is in preview, while the claims mapping and token creation runtime in Azure is generally available. Updates to the preview PowerShell module could require you to update or change your configuration scripts.
@@ -423,4 +423,4 @@ If you're not using a verified domain, Azure AD will return an `AADSTS501461` er
423423

424424
- Read the [claims-mapping policy type](reference-claims-mapping-policy-type.md) reference article to learn more.
425425
- To learn how to customize claims issued in the SAML token through the Azure portal, see [How to: Customize claims issued in the SAML token for enterprise applications](active-directory-saml-claims-customization.md)
426-
- To learn more about extension attributes, see [Using directory schema extension attributes in claims](active-directory-schema-extensions.md).
426+
- To learn more about extension attributes, see [Using directory extension attributes in claims](active-directory-schema-extensions.md).

0 commit comments

Comments
 (0)