Skip to content

Commit de9d4a9

Browse files
committed
acrolinx corrections
1 parent 1747160 commit de9d4a9

File tree

1 file changed

+27
-27
lines changed

1 file changed

+27
-27
lines changed

articles/active-directory/develop/active-directory-optional-claims.md

Lines changed: 27 additions & 27 deletions
Original file line numberDiff line numberDiff line change
@@ -39,7 +39,7 @@ While optional claims are supported in both v1.0 and v2.0 format tokens, as well
3939

4040
## v1.0 and v2.0 optional claims set
4141

42-
The set of optional claims available by default for applications to use are listed below. To add custom optional claims for your application, see [Directory Extensions](#configuring-directory-extension-optional-claims), below. When adding claims to the **access token**, this will apply to access tokens requested *for* the application (a web API), not those *by* the application. This ensures that no matter the client accessing your API, the right data is present in the access token they use to authenticate against your API.
42+
The set of optional claims available by default for applications to use are listed below. To add custom optional claims for your application, see [Directory Extensions](#configuring-directory-extension-optional-claims), below. When adding claims to the **access token**, the claims apply to access tokens requested *for* the application (a web API), not claims requested *by* the application. No matter how the client accesses your API, the right data is present in the access token that is used to authenticate against your API.
4343

4444
> [!NOTE]
4545
> The majority of these claims can be included in JWTs for v1.0 and v2.0 tokens, but not SAML tokens, except where noted in the Token Type column. Consumer accounts support a subset of these claims, marked in the "User Type" column. Many of the claims listed do not apply to consumer users (they have no tenant, so `tenant_ctry` has no value).
@@ -51,7 +51,7 @@ The set of optional claims available by default for applications to use are list
5151
| `auth_time` | Time when the user last authenticated. See OpenID Connect spec.| JWT | | |
5252
| `tenant_region_scope` | Region of the resource tenant | JWT | | |
5353
| `home_oid` | For guest users, the object ID of the user in the user’s home tenant.| JWT | | |
54-
| `sid` | Session ID, used for per-session user sign out. | JWT | Personal and Azure AD accounts. | |
54+
| `sid` | Session ID, used for per-session user sign-out. | JWT | Personal and Azure AD accounts. | |
5555
| `platf` | Device platform | JWT | | Restricted to managed devices that can verify device type.|
5656
| `verified_primary_email` | Sourced from the user’s PrimaryAuthoritativeEmail | JWT | | |
5757
| `verified_secondary_email` | Sourced from the user’s SecondaryAuthoritativeEmail | JWT | | |
@@ -60,12 +60,12 @@ The set of optional claims available by default for applications to use are list
6060
| `fwd` | IP address.| JWT | | Adds the original IPv4 address of the requesting client (when inside a VNET) |
6161
| `ctry` | User’s country | JWT | | Azure AD returns the `ctry` optional claim if it's present and the value of the claim is a standard two-letter country code, such as FR, JP, SZ, and so on. |
6262
| `tenant_ctry` | Resource tenant’s country | JWT | | |
63-
| `xms_pdl` | Preferred data location | JWT | | For Multi-Geo tenants, this is the 3-letter code showing the geographic region the user is in. For more info, see the [Azure AD Connect documentation about preferred data location](https://docs.microsoft.com/azure/active-directory/connect/active-directory-aadconnectsync-feature-preferreddatalocation).<br/>For example: `APC` for Asia Pacific. |
63+
| `xms_pdl` | Preferred data location | JWT | | For Multi-Geo tenants, the preferred data location is the three-letter code showing the geographic region the user is in. For more info, see the [Azure AD Connect documentation about preferred data location](https://docs.microsoft.com/azure/active-directory/connect/active-directory-aadconnectsync-feature-preferreddatalocation).<br/>For example: `APC` for Asia Pacific. |
6464
| `xms_pl` | User preferred language | JWT ||The user’s preferred language, if set. Sourced from their home tenant, in guest access scenarios. Formatted LL-CC (“en-us”). |
6565
| `xms_tpl` | Tenant preferred language| JWT | | The resource tenant’s preferred language, if set. Formatted LL (“en”). |
6666
| `ztdid` | Zero-touch Deployment ID | JWT | | The device identity used for [Windows AutoPilot](https://docs.microsoft.com/windows/deployment/windows-autopilot/windows-10-autopilot) |
67-
| `email` | The addressable email for this user, if the user has one. | JWT, SAML | MSA, Azure AD | This value is included by default if the user is a guest in the tenant. For managed users (those inside the tenant), it must be requested through this optional claim or, on v2.0 only, with the OpenID scope. For managed users, the email address must be set in the [Office admin portal](https://portal.office.com/adminportal/home#/users).|
68-
| `groups`| Optional formatting for group claims |JWT, SAML| |Used in conjunction with the GroupMembershipClaims setting in the [application manifest](reference-app-manifest.md), which must be set as well. For details see [Group claims](#configuring-groups-optional-claims) below. For more information on group claims see [How to configure group claims](../hybrid/how-to-connect-fed-group-claims.md)
67+
| `email` | The addressable email for this user, if the user has one. | JWT, SAML | MSA, Azure AD | This value is included by default if the user is a guest in the tenant. For managed users (the users inside the tenant), it must be requested through this optional claim or, on v2.0 only, with the OpenID scope. For managed users, the email address must be set in the [Office admin portal](https://portal.office.com/adminportal/home#/users).|
68+
| `groups`| Optional formatting for group claims |JWT, SAML| |Used in conjunction with the GroupMembershipClaims setting in the [application manifest](reference-app-manifest.md), which must be set as well. For details see [Group claims](#configuring-groups-optional-claims) below. For more information about group claims, see [How to configure group claims](../hybrid/how-to-connect-fed-group-claims.md)
6969
| `acct` | Users account status in tenant. | JWT, SAML | | If the user is a member of the tenant, the value is `0`. If they are a guest, the value is `1`. |
7070
| `upn` | UserPrincipalName claim. | JWT, SAML | | Although this claim is automatically included, you can specify it as an optional claim to attach additional properties to modify its behavior in the guest user case. |
7171

@@ -82,7 +82,7 @@ These claims are always included in v1.0 Azure AD tokens, but not included in v2
8282
| `pwd_exp` | Password Expiration Time | The datetime at which the password expires. | |
8383
| `pwd_url` | Change Password URL | A URL that the user can visit to change their password. | |
8484
| `in_corp` | Inside Corporate Network | Signals if the client is logging in from the corporate network. If they're not, the claim isn't included. | Based off of the [trusted IPs](../authentication/howto-mfa-mfasettings.md#trusted-ips) settings in MFA. |
85-
| `nickname` | Nickname | An additional name for the user, separate from first or last name. |
85+
| `nickname` | Nickname | An additional name for the user. The nickname is separate from first or last name. |
8686
| `family_name` | Last Name | Provides the last name, surname, or family name of the user as defined in the user object. <br>"family_name":"Miller" | Supported in MSA and Azure AD |
8787
| `given_name` | First name | Provides the first or "given" name of the user, as set on the user object.<br>"given_name": "Frank" | Supported in MSA and Azure AD |
8888
| `upn` | User Principal Name | An identifer for the user that can be used with the username_hint parameter. Not a durable identifier for the user and should not be used to key data. | See [additional properties](#additional-properties-of-optional-claims) below for configuration of the claim. |
@@ -97,7 +97,7 @@ Some optional claims can be configured to change the way the claim is returned.
9797
|----------------|--------------------------|-------------|
9898
| `upn` | | Can be used for both SAML and JWT responses, and for v1.0 and v2.0 tokens. |
9999
| | `include_externally_authenticated_upn` | Includes the guest UPN as stored in the resource tenant. For example, `foo_hometenant.com#EXT#@resourcetenant.com` |
100-
| | `include_externally_authenticated_upn_without_hash` | Same as above, except that the hash marks (`#`) are replaced with underscores (`_`) , for example `[email protected]` |
100+
| | `include_externally_authenticated_upn_without_hash` | Same as above, except that the hash marks (`#`) are replaced with underscores (`_`), for example `[email protected]` |
101101

102102
#### Additional properties example
103103

@@ -114,7 +114,7 @@ Some optional claims can be configured to change the way the claim is returned.
114114
}
115115
```
116116

117-
This OptionalClaims object causes the ID token returned to the client to include another upn with the additional home tenant and resource tenant information. This will only change the `upn` claim in the token if the user is a guest in the tenant (that uses a different IDP for authentication).
117+
This OptionalClaims object causes the ID token returned to the client to include another upn with the additional home tenant and resource tenant information. The `upn` claim is only changed in the token if the user is a guest in the tenant (that uses a different IDP for authentication).
118118

119119
## Configuring optional claims
120120

@@ -124,8 +124,8 @@ This OptionalClaims object causes the ID token returned to the client to include
124124
You can configure optional claims for your application through the UI or application manifest.
125125

126126
1. Sign in to the [Azure portal](https://portal.azure.com).
127-
1. After you've authenticated, choose your Azure AD tenant by selecting it from the top right corner of the page.
128-
1. Select **Azure Active Directory** from the left hand menu.
127+
1. After you've authenticated, choose your Azure AD tenant by selecting it from the top-right corner of the page.
128+
1. Select **Azure Active Directory** from the left-hand menu.
129129
1. From the **Manage** section, select **App registrations**.
130130
1. Select the application you want to configure optional claims for in the list.
131131

@@ -145,7 +145,7 @@ You can configure optional claims for your application through the UI or applica
145145

146146
1. From the **Manage** section, select **Manifest**. A web-based manifest editor opens, allowing you to edit the manifest. Optionally, you can select **Download** and edit the manifest locally, and then use **Upload** to reapply it to your application. For more information on the application manifest, see the [Understanding the Azure AD application manifest article](reference-app-manifest.md).
147147

148-
The following application manifest entry adds the auth_time, ipaddr and upn optional claims to ID, access and SAML tokens.
148+
The following application manifest entry adds the auth_time, ipaddr, and upn optional claims to ID, access, and SAML tokens.
149149

150150
```json
151151
"optionalClaims":
@@ -227,31 +227,31 @@ Within the SAML tokens, these claims will be emitted with the following URI form
227227
This section covers the configuration options under optional claims for changing the group attributes used in group claims from the default group objectID to attributes synced from on-premises Windows Active Directory. You can configure groups optional claims for your application through the UI or application manifest.
228228

229229
> [!IMPORTANT]
230-
> See [Configure group claims for applications with Azure AD](../hybrid/how-to-connect-fed-group-claims.md) for more details including important caveats for the public preview of group claims from on-premises attributes.
230+
> For more details including important caveats for the public preview of group claims from on-premises attributes, see [Configure group claims for applications with Azure AD](../hybrid/how-to-connect-fed-group-claims.md).
231231
232232
**Configuring groups optional claims through the UI:**
233233
1. Sign in to the [Azure portal](https://portal.azure.com)
234-
1. After you've authenticated, choose your Azure AD tenant by selecting it from the top right corner of the page
235-
1. Select **Azure Active Directory** from the left hand menu
234+
1. After you've authenticated, choose your Azure AD tenant by selecting it from the top-right corner of the page
235+
1. Select **Azure Active Directory** from the left-hand menu
236236
1. Under the **Manage** section, select **App registrations**
237237
1. Select the application you want to configure optional claims for in the list
238238
1. Under the **Manage** section, select **Token configuration (preview)**
239239
2. Select **Add groups claim**
240-
3. Select the group types to return (**All Groups**, **SecurityGroup** or **DirectoryRole**). The **All Groups** option includes **SecurityGroup**, **DirectoryRole** and **DistributionList**
240+
3. Select the group types to return (**All Groups**, **SecurityGroup**, or **DirectoryRole**). The **All Groups** option includes **SecurityGroup**, **DirectoryRole**, and **DistributionList**
241241
4. Optional: click on the specific token type properties to modify the groups claim value to contain on premises group attributes or to change the claim type to a role
242242
5. Click **Save**
243243

244244
**Configuring groups optional claims through the application manifest:**
245245
1. Sign in to the [Azure portal](https://portal.azure.com)
246-
1. After you've authenticated, choose your Azure AD tenant by selecting it from the top right corner of the page
247-
1. Select **Azure Active Directory** from the left hand menu
246+
1. After you've authenticated, choose your Azure AD tenant by selecting it from the top-right corner of the page
247+
1. Select **Azure Active Directory** from the left-hand menu
248248
1. Select the application you want to configure optional claims for in the list
249249
1. Under the **Manage** section, select **Manifest**
250250
3. Add the following entry using the manifest editor:
251251

252252
The valid values are:
253253

254-
- "All" (this option includes SecurityGroup, DirectoryRole and DistributionList)
254+
- "All" (this option includes SecurityGroup, DirectoryRole, and DistributionList)
255255
- "SecurityGroup"
256256
- "DirectoryRole"
257257

@@ -360,33 +360,33 @@ In the example below, you will use the **Token configuration (preview)** UI and
360360

361361
1. Sign in to the [Azure portal](https://portal.azure.com)
362362

363-
1. After you've authenticated, choose your Azure AD tenant by selecting it from the top right corner of the page.
363+
1. After you've authenticated, choose your Azure AD tenant by selecting it from the top-right corner of the page.
364364

365-
1. Select **Azure Active Directory** from the left hand menu.
365+
1. Select **Azure Active Directory** from the left-hand menu.
366366

367367
1. Under the **Manage** section, select **App registrations**.
368368

369369
1. Find the application you want to configure optional claims for in the list and click on it.
370370

371371
1. Under the **Manage** section, click **Token configuration (preview)**.
372372

373-
1. Select **Add optional claim**, select the **ID** token type, select **upn** from the list of claims and then click **Add**.
373+
1. Select **Add optional claim**, select the **ID** token type, select **upn** from the list of claims, and then click **Add**.
374374

375-
1. Select **Add optional claim**, select the **Access** token type, select **auth_time** from the list of claims then click **Add**.
375+
1. Select **Add optional claim**, select the **Access** token type, select **auth_time** from the list of claims, then click **Add**.
376376

377-
1. From the Token Configuration overview screen, click on the pencil icon next to **upn**, click the **Externally authenticated** toggle and then click **Save**.
377+
1. From the Token Configuration overview screen, click on the pencil icon next to **upn**, click the **Externally authenticated** toggle, and then click **Save**.
378378

379-
1. Select **Add optional claim**, select the **SAML** token type, select **extn.skypeID** from the list of claims (only applicable if you've created an Azure AD user object called skypeID) and then click **Add**.
379+
1. Select **Add optional claim**, select the **SAML** token type, select **extn.skypeID** from the list of claims (only applicable if you've created an Azure AD user object called skypeID), and then click **Add**.
380380

381381
[![Shows how to configure optional claims using the UI](./media/active-directory-optional-claims/token-config-example.png)](./media/active-directory-optional-claims/token-config-example.png)
382382

383383
**Manifest configuration:**
384384
1. Sign in to the [Azure portal](https://portal.azure.com).
385-
1. After you've authenticated, choose your Azure AD tenant by selecting it from the top right corner of the page.
386-
1. Select **Azure Active Directory** from the left hand menu.
385+
1. After you've authenticated, choose your Azure AD tenant by selecting it from the top-right corner of the page.
386+
1. Select **Azure Active Directory** from the left-hand menu.
387387
1. Find the application you want to configure optional claims for in the list and click on it.
388388
1. Under the **Manage** section, click **Manifest** to open the inline manifest editor.
389-
1. You can directly edit the manifest using this editor. The manifest follows the schema for the [Application entity].(https://docs.microsoft.com/azure/active-directory/develop/reference-app-manifest), and auto-formats the manifest once saved. New elements will be added to the `OptionalClaims` property.
389+
1. You can directly edit the manifest using this editor. The manifest follows the schema for the [Application entity](https://docs.microsoft.com/azure/active-directory/develop/reference-app-manifest), and automatically formats the manifest once saved. New elements will be added to the `OptionalClaims` property.
390390

391391
```json
392392
"optionalClaims": {

0 commit comments

Comments
 (0)