Skip to content

Commit 0929988

Browse files
authored
Merge pull request #190843 from Gargi-Sinha/patch-110
Update partner-bindid.md
2 parents 8cf650b + b80ecd8 commit 0929988

File tree

1 file changed

+5
-5
lines changed

1 file changed

+5
-5
lines changed

articles/active-directory-b2c/partner-bindid.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,7 @@ zone_pivot_groups: b2c-policy-type
2020
[!INCLUDE [active-directory-b2c-choose-user-flow-or-custom-policy](../../includes/active-directory-b2c-choose-user-flow-or-custom-policy.md)]
2121

2222

23-
In this sample tutorial, learn how to integrate Azure Active Directory (AD) B2C authentication with [Transmit Security](https://www.transmitsecurity.com/bindid) passwordless authentication solution **BindID**. BindID is a passwordless authentication service that uses strong Fast Identity Online (FIDO2) biometric authentication for a reliable omni-channel authentication experience. The solution ensures a smooth login experience for all customers across every device and channel eliminating fraud, phishing, and credential reuse.
23+
In this sample tutorial, learn how to integrate Azure Active Directory B2C (Azure AD B2C) authentication with [Transmit Security](https://www.transmitsecurity.com/bindid) passwordless authentication solution **BindID**. BindID is a passwordless authentication service that uses strong Fast Identity Online (FIDO2) biometric authentication for a reliable omni-channel authentication experience. The solution ensures a smooth login experience for all customers across every device and channel eliminating fraud, phishing, and credential reuse.
2424

2525
## Scenario description
2626

@@ -30,8 +30,8 @@ The following architecture diagram shows the implementation.
3030

3131
|Step | Description |
3232
|:-----| :-----------|
33-
| 1. | User arrives at a login page. Users select sign-in/sign-up and enter username into the page.
34-
| 2. | Azure AD B2C redirects the user to BindID using an OpenID Connect (OIDC) request.
33+
| 1. | User attempts to log in to an Azure AD B2C application and is forwarded to Azure AD B2C’s combined sign-in and sign-up policy.
34+
| 2. | Azure AD B2C redirects the user to BindID using the OpenID Connect (OIDC) authorization code flow.
3535
| 3. | BindID authenticates the user using appless FIDO2 biometrics, such as fingerprint.
3636
| 4. | A decentralized authentication response is returned to BindID.
3737
| 5. | The OIDC response is passed on to Azure AD B2C.
@@ -62,7 +62,7 @@ To get started, you'll need:
6262

6363
### Step 1 - Create an application registration in BindID
6464

65-
From [Applications](https://admin.bindid-sandbox.io/console/#/applications) to configure your tenant application in BindID, the following information is needed
65+
For [Applications](https://admin.bindid-sandbox.io/console/#/applications) to configure your tenant application in BindID, the following information is needed
6666

6767
| Property | Description |
6868
|:---------|:---------------------|
@@ -318,7 +318,7 @@ The relying party policy, for example [SignUpSignIn.xml](https://github.com/Azur
318318

319319
1. Open the Azure AD B2C tenant and under Policies select **Identity Experience Framework**.
320320

321-
2. Click on your previously created **CustomSignUpSignIn** and select the settings:
321+
2. Select your previously created **CustomSignUpSignIn** and select the settings:
322322

323323
a. **Application**: select the registered app (sample is JWT)
324324

0 commit comments

Comments
 (0)