Skip to content

Commit e3ccc4a

Browse files
authored
Merge pull request #198823 from nickludwig/patch-9
fix typo in manifest sample
2 parents 8138839 + c31735e commit e3ccc4a

File tree

1 file changed

+3
-3
lines changed

1 file changed

+3
-3
lines changed

articles/active-directory/hybrid/how-to-connect-fed-group-claims.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -252,12 +252,12 @@ Emit group names to be returned in `NetbiosDomain\sAMAccountName` format as the
252252
"optionalClaims": {
253253
"saml2Token": [{
254254
"name": "groups",
255-
"additionalProperties": ["netbios_name_and_sam_account_name", "emit_as_roles"]
255+
"additionalProperties": ["netbios_domain_and_sam_account_name", "emit_as_roles"]
256256
}],
257257

258258
"idToken": [{
259259
"name": "groups",
260-
"additionalProperties": ["netbios_name_and_sam_account_name", "emit_as_roles"]
260+
"additionalProperties": ["netbios_domain_and_sam_account_name", "emit_as_roles"]
261261
}]
262262
}
263263
```
@@ -266,4 +266,4 @@ Emit group names to be returned in `NetbiosDomain\sAMAccountName` format as the
266266

267267
- [Add authorization using groups & group claims to an ASP.NET Core web app (code sample)](https://github.com/Azure-Samples/active-directory-aspnetcore-webapp-openidconnect-v2/blob/master/5-WebApp-AuthZ/5-2-Groups/README.md)
268268
- [Assign a user or group to an enterprise app](../../active-directory/manage-apps/assign-user-or-group-access-portal.md)
269-
- [Configure role claims](../../active-directory/develop/active-directory-enterprise-app-role-management.md)
269+
- [Configure role claims](../../active-directory/develop/active-directory-enterprise-app-role-management.md)

0 commit comments

Comments
 (0)