Skip to content

Commit 037b621

Browse files
Merge pull request #239210 from msmimart/release-post-socialuri
[CIAM] Update Google and Facebook federation docs with the correct Valid OAuth redirect URIs for customer tenants
2 parents 93ef340 + c915c09 commit 037b621

File tree

2 files changed

+33
-23
lines changed

2 files changed

+33
-23
lines changed

articles/active-directory/external-identities/customers/how-to-facebook-federation-customers.md

Lines changed: 16 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.workload: identity
99
ms.subservice: ciam
1010
ms.topic: how-to
11-
ms.date: 04/28/2023
11+
ms.date: 05/24/2023
1212
ms.author: mimart
1313
ms.custom: it-pro
1414

@@ -38,17 +38,21 @@ If you don't already have a Facebook account, sign up at [https://www.facebook.c
3838
1. Enter a URL for the **Terms of Service URL**, for example `https://www.contoso.com/tos`. The policy URL is a page you maintain to provide terms and conditions for your application.
3939
1. Enter a URL for the **User Data Deletion**, for example `https://www.contoso.com/delete_my_data`. The User Data Deletion URL is a page you maintain to provide away for users to request that their data be deleted.
4040
1. Choose a **Category**, for example `Business and Pages`. Facebook requires this value, but it's not used for Azure AD.
41-
2. At the bottom of the page, select **Add Platform**, and then select **Website**.
42-
3. In **Site URL**, enter the address of your website, for example `https://contoso.com`.
43-
4. Select **Save Changes**.
44-
5. From the menu, select the **plus** sign or **Add Product** link next to **PRODUCTS**. Under the **Add Products to Your App**, select **Set up** under **Facebook Login**.
45-
6. From the menu, select **Facebook Login**, select **Settings**.
46-
7. In **Valid OAuth redirect URIs**, enter:
47-
- `https://login.microsoftonline.com`
48-
- `https://login.microsoftonline.com/te/<tenant ID>/oauth2/authresp`. Replace the tenant ID with your Azure AD for customers tenant ID. To find your tenant ID, go to the [Microsoft Entra admin center](https://entra.microsoft.com). Under **Azure Active Directory**, select **Overview**. Then select the **Overview** tab and copy the **Tenant ID**.
49-
- `https://login.microsoftonline.com/te/<tenant name>.onmicrosoft.com/oauth2/authresp`. Replace the tenant name with your Azure AD for customers tenant name.
50-
8. Select **Save Changes** at the bottom of the page.
51-
9. To make your Facebook application available to Azure AD, select the Status selector at the top right of the page and turn it **On** to make the Application public, and then select **Switch Mode**. At this point, the Status should change from **Development** to **Live**. For more information, see [Facebook App Development](https://developers.facebook.com/docs/development/release).
41+
1. At the bottom of the page, select **Add Platform**, and then select **Website**.
42+
1. In **Site URL**, enter the address of your website, for example `https://contoso.com`.
43+
1. Select **Save Changes**.
44+
1. From the menu, select the **plus** sign or **Add Product** link next to **PRODUCTS**. Under the **Add Products to Your App**, select **Set up** under **Facebook Login**.
45+
1. From the menu, select **Facebook Login**, select **Settings**.
46+
1. In **Valid OAuth redirect URIs**, enter the following URIs, replacing `<tenant-ID>` with your customer tenant ID and `<tenant-name>` with your customer tenant name:
47+
- `https://login.microsoftonline.com/te/<tenant-ID>/oauth2/authresp`
48+
- `https://<tenant-ID>.ciamlogin.com/<tenant-ID>/federation/oidc/www.facebook.com`
49+
- `https://<tenant-ID>.ciamlogin.com/<tenant-name>.onmicrosoft.com/federation/oidc/www.facebook.com`
50+
- `https://<tenant-ID>.ciamlogin.com/<tenant-ID>/federation/oauth2`
51+
- `https://<tenant-ID>.ciamlogin.com/<tenant-name>.onmicrosoft.com/federation/oauth2`
52+
> [!NOTE]
53+
> To find your customer tenant ID, go to the [Microsoft Entra admin center](https://entra.microsoft.com). Under **Azure Active Directory**, select **Overview**. Then select the **Overview** tab and copy the **Tenant ID**.
54+
1. Select **Save Changes** at the bottom of the page.
55+
1. To make your Facebook application available to Azure AD, select the Status selector at the top right of the page and turn it **On** to make the Application public, and then select **Switch Mode**. At this point, the Status should change from **Development** to **Live**. For more information, see [Facebook App Development](https://developers.facebook.com/docs/development/release).
5256

5357
## Configure Facebook federation in Azure AD for customers
5458

articles/active-directory/external-identities/customers/how-to-google-federation-customers.md

Lines changed: 17 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.workload: identity
99
ms.subservice: ciam
1010
ms.topic: how-to
11-
ms.date: 04/28/2023
11+
ms.date: 05/24/2023
1212
ms.author: mimart
1313
ms.custom: it-pro
1414

@@ -31,21 +31,27 @@ To enable sign-in for customers with a Google account, you need to create an app
3131
1. Under the **Quick access**, or in the left menu, select **APIs & services** and then **OAuth consent screen**.
3232
1. For the **User Type**, select **External** and then select **Create**.
3333
1. On the **OAuth consent screen**, under **App information**
34-
1. Enter a **Name** for your application.
35-
2. Select a **User support email** address.
36-
1. Under the **Authorized domains** section, select **Add domain**, and then type *microsoftonline.com*.
34+
1. Enter a **Name** for your application.
35+
1. Select a **User support email** address.
36+
1. Under the **Authorized domains** section, select **Add domain**, and then add `ciamlogin.com` and `microsoftonline.com`.
3737
1. In the **Developer contact information** section, enter comma separated emails for Google to notify you about any changes to your project.
3838
1. Select **Save and Continue**.
3939
1. From the left menu, select **Credentials**
4040
1. Select **Create credentials**, and then **OAuth client ID**.
4141
1. Under **Application type**, select **Web application**.
42-
1. Enter a suitable **Name** for your application, such as "Azure AD for customers."
43-
1. For the **Authorized redirect URIs**, enter:
44-
- `https://login.microsoftonline.com`
45-
- `https://login.microsoftonline.com/te/<tenant ID>/oauth2/authresp`. Replace the tenant ID with your Azure AD for customers tenant ID. To find your tenant ID, go to the [Microsoft Entra admin center](https://entra.microsoft.com). Under **Azure Active Directory**, select **Overview**. Then select the **Overview** tab and copy the **Tenant ID**.
46-
- `https://login.microsoftonline.com/te/<tenant name>.onmicrosoft.com/oauth2/authresp`. Replace the tenant name with your Azure AD for customers tenant name.
47-
1. Select **Create**.
48-
1. Copy the values of **Client ID** and **Client secret**. You need both values to configure Google as an identity provider in your tenant. **Client secret** is an important security credential.
42+
1. Enter a suitable **Name** for your application, such as "Azure AD for customers."
43+
1. In **Valid OAuth redirect URIs**, enter the following URIs, replacing `<tenant-ID>` with your customer tenant ID and `<tenant-name>` with your customer tenant name:
44+
- `https://login.microsoftonline.com`
45+
- `https://login.microsoftonline.com/te/<tenant-ID>/oauth2/authresp`
46+
- `https://login.microsoftonline.com/te/<tenant-name>.onmicrosoft.com/oauth2/authresp`
47+
- `https://<tenant-ID>.ciamlogin.com/<tenant-ID>/federation/oidc/accounts.google.com`
48+
- `https://<tenant-ID>.ciamlogin.com/<tenant-name>.onmicrosoft.com/federation/oidc/accounts.google.com`
49+
- `https://<tenant-ID>.ciamlogin.com/<tenant-ID>/federation/oauth2`
50+
- `https://<tenant-ID>.ciamlogin.com/<tenant-name>.onmicrosoft.com/federation/oauth2`
51+
> [!NOTE]
52+
> To find your customer tenant ID, go to the [Microsoft Entra admin center](https://entra.microsoft.com). Under **Azure Active Directory**, select **Overview**. Then select the **Overview** tab and copy the **Tenant ID**.
53+
2. Select **Create**.
54+
3. Copy the values of **Client ID** and **Client secret**. You need both values to configure Google as an identity provider in your tenant. **Client secret** is an important security credential.
4955

5056
> [!NOTE]
5157
> In some cases, your app might require verification by Google (for example, if you update the application logo). For more information, check out the [Google's verification status guid](https://support.google.com/cloud/answer/10311615#verification-status).

0 commit comments

Comments
 (0)