-
Feature Request
-
Resolution: Unresolved
-
Normal
-
None
-
2.5
-
False
-
-
False
If utilizing Azure AD as an authentication source, to ensure that the token size doesn't exceed HTTP header size limits, the number of object IDs that it includes in the groups claim is limited. If a user is a member of more groups than the overage limit (150 for SAML tokens, 200 for JWT tokens), the groups claim isn't included in the token. Instead, it includes an overage claim in the token that indicates to the application to query the Microsoft Graph API to retrieve the user's group membership.
https://learn.microsoft.com/en-us/entra/identity-platform/reference-saml-tokens
This is what the payload looks like
{ ... "_claim_names": { "groups": "src1" }, { "_claim_sources": { "src1": { "endpoint":"[Url to get this user's group membership from]" } } } ... }