Skip to content

Commit 4b0a636

Browse files
committed
update
1 parent fafe30e commit 4b0a636

1 file changed

Lines changed: 6 additions & 6 deletions

File tree

support/entra/entra-id/app-integration/get-signed-in-users-groups-in-access-token.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1,16 +1,16 @@
11
---
22
title: Get signed in user groups from groups overage claim
3-
description: Provides a sample project to introduce how to to get signed in user groups when groups overage claim is displayed for access tokens.
3+
description: Provides a sample project to introduce how to to get signed in user groups when groups overage claim is displayed in access tokens.
44
ms.reviewer: v-weizhu
55
ms.service: entra-id
66
ms.date: 03/07/2025
77
ms.custom: sap:Developing or Registering apps with Microsoft identity platform
88
---
9-
# How to get signed in user groups when groups overage claim is displayed for access tokens
9+
# How to get signed in user groups when groups overage claim is displayed in access tokens
1010

1111
When you configure the `groups` claim in an access token for your application, Microsoft Entra ID has a maximum number of groups that can be returned in an access token. When the limit is exceeded, Azure provides a groups overage claim which is a URL that can be used to get the full groups list for the currently signed in user. This URL uses the Microsoft Graph endpoint. For more information about the `groups` claim, see [Access tokens in the Microsoft identity platform](/entra/identity-platform/access-tokens).
1212

13-
This article introduces how to reproduce this scenario and get the actual user groups from the groups overage claim URL by using a sample project.
13+
This article introduces how to reproduce this scenario and get the actual user groups from the groups overage claim by using a sample project.
1414

1515
> [!NOTE]
1616
> For JSON web tokens (JWT), Azure has a limit of 200 groups that can be present in the token. When requesting an access token for the resource that has the `groups` claim configured on it, if you are a member of more than 200 groups, you will get a groups overage claim URL instead of getting the actual groups.
@@ -23,7 +23,7 @@ If the application is a first party app (Microsoft App), you can't configure the
2323

2424
## Download the sample project
2525

26-
Download the sample project [MSAL.Net_GroupOveragesClaim](https://github.com/RayGHeld/MSAL.Net_GroupOveragesClaim). It shows how to get the groups list from a groups overage claim URL.
26+
Download the sample project [MSAL.Net_GroupOveragesClaim](https://github.com/RayGHeld/MSAL.Net_GroupOveragesClaim). It shows how to get the groups list from a groups overage claim.
2727

2828
## Before running the sample project
2929

@@ -78,9 +78,9 @@ Download the sample project [MSAL.Net_GroupOveragesClaim](https://github.com/Ray
7878
> Disconnect-AzureAD
7979
> ```
8080

81-
## Get the full users groups list using groups overage claim URL
81+
## Get the full users groups list using groups overage claim
8282

83-
1. Run the sample application.
83+
1. Run the sample application.
8484
2. Sign in to the application.
8585

8686
Authentication occurs in a browser because the sample application is a .NET console application.

0 commit comments

Comments
 (0)