You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/external-identities/customers/how-to-facebook-federation-customers.md
+16-12Lines changed: 16 additions & 12 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
8
8
ms.workload: identity
9
9
ms.subservice: ciam
10
10
ms.topic: how-to
11
-
ms.date: 04/28/2023
11
+
ms.date: 05/24/2023
12
12
ms.author: mimart
13
13
ms.custom: it-pro
14
14
@@ -38,17 +38,21 @@ If you don't already have a Facebook account, sign up at [https://www.facebook.c
38
38
1. Enter a URL for the **Terms of Service URL**, for example `https://www.contoso.com/tos`. The policy URL is a page you maintain to provide terms and conditions for your application.
39
39
1. Enter a URL for the **User Data Deletion**, for example `https://www.contoso.com/delete_my_data`. The User Data Deletion URL is a page you maintain to provide away for users to request that their data be deleted.
40
40
1. Choose a **Category**, for example `Business and Pages`. Facebook requires this value, but it's not used for Azure AD.
41
-
2. At the bottom of the page, select **Add Platform**, and then select **Website**.
42
-
3. In **Site URL**, enter the address of your website, for example `https://contoso.com`.
43
-
4. Select **Save Changes**.
44
-
5. From the menu, select the **plus** sign or **Add Product** link next to **PRODUCTS**. Under the **Add Products to Your App**, select **Set up** under **Facebook Login**.
45
-
6. From the menu, select **Facebook Login**, select **Settings**.
46
-
7. In **Valid OAuth redirect URIs**, enter:
47
-
-`https://login.microsoftonline.com`
48
-
-`https://login.microsoftonline.com/te/<tenant ID>/oauth2/authresp`. Replace the tenant ID with your Azure AD for customers tenant ID. To find your tenant ID, go to the [Microsoft Entra admin center](https://entra.microsoft.com). Under **Azure Active Directory**, select **Overview**. Then select the **Overview** tab and copy the **Tenant ID**.
49
-
-`https://login.microsoftonline.com/te/<tenant name>.onmicrosoft.com/oauth2/authresp`. Replace the tenant name with your Azure AD for customers tenant name.
50
-
8. Select **Save Changes** at the bottom of the page.
51
-
9. To make your Facebook application available to Azure AD, select the Status selector at the top right of the page and turn it **On** to make the Application public, and then select **Switch Mode**. At this point, the Status should change from **Development** to **Live**. For more information, see [Facebook App Development](https://developers.facebook.com/docs/development/release).
41
+
1. At the bottom of the page, select **Add Platform**, and then select **Website**.
42
+
1. In **Site URL**, enter the address of your website, for example `https://contoso.com`.
43
+
1. Select **Save Changes**.
44
+
1. From the menu, select the **plus** sign or **Add Product** link next to **PRODUCTS**. Under the **Add Products to Your App**, select **Set up** under **Facebook Login**.
45
+
1. From the menu, select **Facebook Login**, select **Settings**.
46
+
1. In **Valid OAuth redirect URIs**, enter the following URIs, replacing `<tenant-ID>` with your customer tenant ID and `<tenant-name>` with your customer tenant name:
> To find your customer tenant ID, go to the [Microsoft Entra admin center](https://entra.microsoft.com). Under **Azure Active Directory**, select **Overview**. Then select the **Overview** tab and copy the **Tenant ID**.
54
+
1. Select **Save Changes** at the bottom of the page.
55
+
1. To make your Facebook application available to Azure AD, select the Status selector at the top right of the page and turn it **On** to make the Application public, and then select **Switch Mode**. At this point, the Status should change from **Development** to **Live**. For more information, see [Facebook App Development](https://developers.facebook.com/docs/development/release).
52
56
53
57
## Configure Facebook federation in Azure AD for customers
Copy file name to clipboardExpand all lines: articles/active-directory/external-identities/customers/how-to-google-federation-customers.md
+17-11Lines changed: 17 additions & 11 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
8
8
ms.workload: identity
9
9
ms.subservice: ciam
10
10
ms.topic: how-to
11
-
ms.date: 04/28/2023
11
+
ms.date: 05/24/2023
12
12
ms.author: mimart
13
13
ms.custom: it-pro
14
14
@@ -31,21 +31,27 @@ To enable sign-in for customers with a Google account, you need to create an app
31
31
1. Under the **Quick access**, or in the left menu, select **APIs & services** and then **OAuth consent screen**.
32
32
1. For the **User Type**, select **External** and then select **Create**.
33
33
1. On the **OAuth consent screen**, under **App information**
34
-
1. Enter a **Name** for your application.
35
-
2. Select a **User support email** address.
36
-
1. Under the **Authorized domains** section, select **Add domain**, and then type *microsoftonline.com*.
34
+
1. Enter a **Name** for your application.
35
+
1. Select a **User support email** address.
36
+
1. Under the **Authorized domains** section, select **Add domain**, and then add `ciamlogin.com` and `microsoftonline.com`.
37
37
1. In the **Developer contact information** section, enter comma separated emails for Google to notify you about any changes to your project.
38
38
1. Select **Save and Continue**.
39
39
1. From the left menu, select **Credentials**
40
40
1. Select **Create credentials**, and then **OAuth client ID**.
41
41
1. Under **Application type**, select **Web application**.
42
-
1. Enter a suitable **Name** for your application, such as "Azure AD for customers."
43
-
1. For the **Authorized redirect URIs**, enter:
44
-
-`https://login.microsoftonline.com`
45
-
-`https://login.microsoftonline.com/te/<tenant ID>/oauth2/authresp`. Replace the tenant ID with your Azure AD for customers tenant ID. To find your tenant ID, go to the [Microsoft Entra admin center](https://entra.microsoft.com). Under **Azure Active Directory**, select **Overview**. Then select the **Overview** tab and copy the **Tenant ID**.
46
-
-`https://login.microsoftonline.com/te/<tenant name>.onmicrosoft.com/oauth2/authresp`. Replace the tenant name with your Azure AD for customers tenant name.
47
-
1. Select **Create**.
48
-
1. Copy the values of **Client ID** and **Client secret**. You need both values to configure Google as an identity provider in your tenant. **Client secret** is an important security credential.
42
+
1. Enter a suitable **Name** for your application, such as "Azure AD for customers."
43
+
1. In **Valid OAuth redirect URIs**, enter the following URIs, replacing `<tenant-ID>` with your customer tenant ID and `<tenant-name>` with your customer tenant name:
> To find your customer tenant ID, go to the [Microsoft Entra admin center](https://entra.microsoft.com). Under **Azure Active Directory**, select **Overview**. Then select the **Overview** tab and copy the **Tenant ID**.
53
+
2. Select **Create**.
54
+
3. Copy the values of **Client ID** and **Client secret**. You need both values to configure Google as an identity provider in your tenant. **Client secret** is an important security credential.
49
55
50
56
> [!NOTE]
51
57
> In some cases, your app might require verification by Google (for example, if you update the application logo). For more information, check out the [Google's verification status guid](https://support.google.com/cloud/answer/10311615#verification-status).
0 commit comments