Skip to content

Commit c14564e

Browse files
committed
updated for freshness
1 parent 8db7c38 commit c14564e

File tree

3 files changed

+5
-9
lines changed

3 files changed

+5
-9
lines changed

articles/active-directory/develop/TOC.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -122,8 +122,6 @@
122122
items:
123123
- name: Configure optional claims
124124
href: active-directory-optional-claims.md
125-
- name: Claims mapping policy type
126-
href: reference-claims-mapping-policy-type.md
127125
- name: Use directory extension attributes in claims
128126
href: active-directory-schema-extensions.md
129127
- name: Customize claims using Azure portal
@@ -812,6 +810,8 @@
812810
href: reply-url.md
813811
- name: Validation differences by supported account types
814812
href: supported-accounts-validation.md
813+
- name: Claims mapping policy type
814+
href: reference-claims-mapping-policy-type.md
815815
- name: Microsoft auth libraries by app type
816816
displayName: MSAL, auth client library, SDK, token validation
817817
href: reference-v2-libraries.md

articles/active-directory/develop/reference-claims-mapping-policy-type.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,9 +9,8 @@ ms.subservice: develop
99
ms.custom: aaddev
1010
ms.workload: identity
1111
ms.topic: reference
12-
ms.date: 09/16/2022
12+
ms.date: 12/30/2022
1313
ms.author: davidmu
14-
ms.reviewer: paulgarn, ludwignick, jeedes, luleon
1514
---
1615

1716
# Claims mapping policy type

articles/active-directory/develop/secure-group-access-control.md

Lines changed: 2 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -4,16 +4,13 @@ description: Learn about how groups are used to securely control access to resou
44
services: active-directory
55
author: davidmu1
66
manager: CelesteDG
7-
87
ms.service: active-directory
98
ms.subservice: develop
109
ms.topic: conceptual
1110
ms.workload: identity
12-
ms.date: 6/16/2022
11+
ms.date: 12/30/2022
1312
ms.custom: template-concept
1413
ms.author: davidmu
15-
ms.reviewer: jodah, marsma
16-
1714
# Customer intent: As a developer, I want to learn how to most securely use Azure AD groups to control access to resources.
1815
---
1916

@@ -27,7 +24,7 @@ Azure Active Directory (Azure AD) allows the use of groups to manage access to r
2724

2825
To learn more about the benefits of groups for access control, see [manage access to an application](../manage-apps/what-is-access-management.md).
2926

30-
While developing an application, authorize access with the [groups claim](/graph/api/resources/application?view=graph-rest-1.0#properties&preserve-view=true). To learn more, see how to [configure group claims for applications with Azure AD](../hybrid/how-to-connect-fed-group-claims.md).
27+
While developing an application, authorize access with the groups claim. To learn more, see how to [configure group claims for applications with Azure AD](../hybrid/how-to-connect-fed-group-claims.md).
3128

3229
Today, many applications select a subset of groups with the `securityEnabled` flag set to `true` to avoid scale challenges, that is, to reduce the number of groups returned in the token. Setting the `securityEnabled` flag to be true for a group doesn't guarantee that the group is securely managed.
3330

0 commit comments

Comments
 (0)