Skip to content

Commit be450af

Browse files
author
Kalyan Krishna
authored
update a few links and text
based on SO feedback
1 parent c1a2beb commit be450af

File tree

1 file changed

+3
-2
lines changed

1 file changed

+3
-2
lines changed

5-WebApp-AuthZ/5-1-Roles/README-incremental-instructions.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -36,7 +36,7 @@ For more information about how the protocols work in this scenario and other sce
3636

3737
## Scenario
3838

39-
This sample first leverages the ASP.NET Core OpenID Connect middleware to sign in the user. On the home page it displays the various `claims` that the user's [ID Token](https://docs.microsoft.com/azure/active-directory/develop/id-tokens) contained. The ID token is used by the asp.net security middleware to build the [ClaimsPrincipal](https://docs.microsoft.com/dotnet/api/system.security.claims.claimsprincipal), accessible via **HttpContext.User** in the code.
39+
This sample first leverages the ASP.NET Core OpenID Connect middleware to sign in the user. On the home page it displays the various `claims` that the user's [ID Token](https://docs.microsoft.com/azure/active-directory/develop/id-tokens) contained. The ID token is used by the asp.net security middleware to build the [ClaimsPrincipal](https://docs.microsoft.com/dotnet/api/system.security.claims.claimsprincipal), accessible via **HttpContext.User** in the code. The sample also shows how to use the [Policy-based authorization in ASP.NET Core](https://docs.microsoft.com/aspnet/core/security/authorization/policies).
4040

4141
This web application allows users to list all users in their tenant or a list of all the app roles and groups the signed in user is assigned to depending on the app role they have been assigned to. The idea is to provide an example of how, within an application, access to certain functionality is restricted to subsets of users depending on which role they belong to.
4242

@@ -271,7 +271,7 @@ The following files have the code that would be of interest to you.
271271

272272
## Learn more
273273

274-
- Learn how [Microsoft.Identity.Web](../../Microsoft.Identity.Web) works, in particular hooks-up to the ASP.NET Core ODIC events
274+
- Learn how [Microsoft.Identity.Web](https://github.com/AzureAD/microsoft-identity-web/wiki) works, in particular hooks-up to the ASP.NET Core OIDC events
275275
276276
## Community Help and Support
277277

@@ -292,6 +292,7 @@ To understand more about app registration, see:
292292
293293
To understand more about groups roles and the various claims in tokens, see:
294294

295+
- [Policy-based authorization in ASP.NET Core](https://docs.microsoft.com/aspnet/core/security/authorization/policies)
295296
- [Azure Active Directory app manifest](https://docs.microsoft.com/azure/active-directory/develop/reference-app-manifest)
296297
- [ID tokens](https://docs.microsoft.com/azure/active-directory/develop/id-tokens)
297298
- [Azure Active Directory access tokens](https://docs.microsoft.com/azure/active-directory/develop/access-tokens)

0 commit comments

Comments
 (0)