Skip to content

Commit c1a2beb

Browse files
author
Kalyan Krishna
authored
updated a few links and text
from feedback on SO
1 parent d52951f commit c1a2beb

File tree

1 file changed

+3
-2
lines changed

1 file changed

+3
-2
lines changed

5-WebApp-AuthZ/5-1-Roles/README.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -38,7 +38,7 @@ For more information about how the protocols work in this scenario and other sce
3838

3939
This sample first leverages the ASP.NET Core OpenID Connect middleware to sign in the user. On the home page it displays the various `claims` that the user's [ID Token](https://docs.microsoft.com/azure/active-directory/develop/id-tokens) contained. The ID token is used by the asp.net security middleware to build the [ClaimsPrincipal](https://docs.microsoft.com/dotnet/api/system.security.claims.claimsprincipal), accessible via **HttpContext.User** in the code.
4040

41-
This web application allows users to list all users in their tenant or a list of all the app roles and groups the signed in user is assigned to depending on the app role they have been assigned to. The idea is to provide an example of how, within an application, access to certain functionality is restricted to subsets of users depending on which role they belong to.
41+
This web application allows users to list all users in their tenant or a list of all the app roles and groups the signed in user is assigned to depending on the app role they have been assigned to. The idea is to provide an example of how, within an application, access to certain functionality is restricted to subsets of users depending on which role they belong to. The sample also shows how to use the [Policy-based authorization in ASP.NET Core](https://docs.microsoft.com/aspnet/core/security/authorization/policies).
4242

4343
This kind of authorization is implemented using role-based access control (RBAC). When using RBAC, an administrator grants permissions to roles, not to individual users or groups. The administrator can then assign roles to different users and groups to control who has then access to certain content and functionality.
4444

@@ -389,7 +389,7 @@ In the left-hand navigation pane, select the **Azure Active Directory** service,
389389
390390
## Learn more
391391
392-
- Learn how [Microsoft.Identity.Web](../../Microsoft.Identity.Web) works, in particular hooks-up to the ASP.NET Core ODIC events
392+
- Learn how [Microsoft.Identity.Web](https://github.com/AzureAD/microsoft-identity-web/wiki) works, in particular hooks-up to the ASP.NET Core OIDC events
393393
394394
## Community Help and Support
395395
@@ -410,6 +410,7 @@ To understand more about app registration, see:
410410
411411
To understand more about groups roles and the various claims in tokens, see:
412412
413+
- [Policy-based authorization in ASP.NET Core](https://docs.microsoft.com/aspnet/core/security/authorization/policies)
413414
- [Azure Active Directory app manifest](https://docs.microsoft.com/azure/active-directory/develop/reference-app-manifest)
414415
- [ID tokens](https://docs.microsoft.com/azure/active-directory/develop/id-tokens)
415416
- [Azure Active Directory access tokens](https://docs.microsoft.com/azure/active-directory/develop/access-tokens)

0 commit comments

Comments
 (0)