Skip to content

Commit 289cca0

Browse files
Apply suggestions from code review
Co-authored-by: shainaraskas <[email protected]>
1 parent 8309ea1 commit 289cca0

File tree

2 files changed

+6
-4
lines changed

2 files changed

+6
-4
lines changed

deploy-manage/users-roles/cluster-or-deployment-auth/oidc-examples.md

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -100,9 +100,11 @@ For more information about OpenID connect in Azure, refer to [Azure OAuth 2.0 an
100100
* `YOUR_DOMAIN` and `TLD` in the `claim_patterns.principal` regular expression are your organization email domain and top level domain.
101101

102102
::::{tip} for organizations with many group memberships
103-
If you use [`claims.groups`](/deploy-manage/users-roles/cluster-or-deployment-auth/openid-connect.md#oidc-user-properties) to map the list of Azure AD groups included in the ID token, be aware that users with a large number of group memberships may exceed the token size limit. To avoid this, enable the **Groups assigned to the application** option in Azure Entra (**App registration > Token configuration > Edit group claims**). This limits the groups included in the ID token to those assigned to the application.
103+
If you use [`claims.groups`](/deploy-manage/users-roles/cluster-or-deployment-auth/openid-connect.md#oidc-user-properties) to map the list of Azure AD groups included in the ID token, users with a large number of group memberships might exceed the token size limit.
104+
105+
To avoid this, enable the **Groups assigned to the application** option in Azure Entra (**App registrations > Token configuration > Edit groups claim**). This limits the groups included in the ID token to those assigned to the application.
104106

105-
For more details, refer to [Configure group claims for tokens and app roles in Azure AD](https://learn.microsoft.com/en-us/security/zero-trust/develop/configure-tokens-group-claims-app-roles).
107+
For more details, refer to [Configure group claims and app roles in tokens](https://learn.microsoft.com/en-us/security/zero-trust/develop/configure-tokens-group-claims-app-roles) in the Microsoft Security documentation.
106108
::::
107109

108110
If you're using {{ece}} or {{ech}}, and you're using machine learning or a deployment with hot-warm architecture, you must include this configuration in the user settings section for each node type.

deploy-manage/users-roles/cluster-or-deployment-auth/openid-connect.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -254,10 +254,10 @@ groups
254254
: *(Recommended)* If you want to use your OP’s concept of groups or roles as the basis for a user’s {{es}} privileges, you should map them with this property. The `groups` are passed directly to your [role mapping rules](/deploy-manage/users-roles/cluster-or-deployment-auth/openid-connect.md#oidc-role-mappings).
255255

256256
name
257-
: *(Optional)* The user’s full name. It will be used in {{kib}}'s profile page to display user details. Use the payload key of your ID token that fit best here.
257+
: *(Optional)* The user’s full name. It will be used in {{kib}}'s profile page to display user details. Use the payload key of your ID token that fits best here.
258258

259259
mail
260-
: *(Optional)* The user’s email address. It will be used in {{kib}}'s profile page to display user details. Use the payload of for your ID token that fit best here.
260+
: *(Optional)* The user’s email address. It will be used in {{kib}}'s profile page to display user details. Use the payload key of your ID token that fits best here.
261261

262262
dn
263263
: *(Optional)* The user’s X.500 Distinguished Name.

0 commit comments

Comments
 (0)