Skip to content

Commit d8f2373

Browse files
(Azure CXP) Technical Doc Update
Added the overage claim information as per Microsoftdocs/Azure-docs#39289 following on Line 115 . > [!Groups overage claim] > To ensure that the token size doesn’t exceed HTTP header size limits, Azure AD limits the number of object Ids that it includes in the groups claim. If a user is member of more groups than the overage limit (150 for SAML tokens, 200 for JWT tokens), then Azure AD does not emit the groups claim in the token. Instead, it includes an overage claim in the token that indicates to the application to query the Graph API to retrieve the user’s group membership. > { ... "_claim_names": { "groups": "src1" }, { "_claim_sources": { "src1": { "endpoint":"[Graph Url to get this user's group membership from]" } } ... } > > You can use the `BulkCreateGroups.ps1` provided in the [App Creation Scripts](https://github.com/Azure-Samples/active-directory-dotnet-webapp-groupclaims/blob/master/AppCreationScripts/) folder to help test overage scenarios.
1 parent 10bab18 commit d8f2373

File tree

1 file changed

+18
-0
lines changed

1 file changed

+18
-0
lines changed

articles/active-directory/develop/access-tokens.md

Lines changed: 18 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -111,6 +111,24 @@ Claims are present only if a value exists to fill it. So, your app shouldn't tak
111111
| `rh` | Opaque String | An internal claim used by Azure to revalidate tokens. Resources should not use this claim. |
112112
| `ver` | String, either `1.0` or `2.0` | Indicates the version of the access token. |
113113

114+
115+
> [!Groups overage claim]
116+
> To ensure that the token size doesn’t exceed HTTP header size limits, Azure AD limits the number of object Ids that it includes in the groups claim. If a user is member of more groups than the overage limit (150 for SAML tokens, 200 for JWT tokens), then Azure AD does not emit the groups claim in the token. Instead, it includes an overage claim in the token that indicates to the application to query the Graph API to retrieve the user’s group membership.
117+
{
118+
...
119+
"_claim_names": {
120+
"groups": "src1"
121+
},
122+
{
123+
"_claim_sources": {
124+
"src1": {
125+
"endpoint":"[Graph Url to get this user's group membership from]"
126+
}
127+
}
128+
...
129+
}
130+
> You can use the `BulkCreateGroups.ps1` provided in the [App Creation Scripts](https://github.com/Azure-Samples/active-directory-dotnet-webapp-groupclaims/blob/master/AppCreationScripts/) folder to help test overage scenarios.
131+
114132
#### v1.0 basic claims
115133

116134
The following claims will be included in v1.0 tokens if applicable, but aren't included in v2.0 tokens by default. If you're using v2.0 and need one of these claims, request them using [optional claims](active-directory-optional-claims.md).

0 commit comments

Comments
 (0)