|
1 | 1 | ---
|
2 |
| -title: Microsoft account configuration in Azure Active Directory B2C | Microsoft Docs |
3 |
| -description: Provide sign-up and sign-in to consumers with Microsoft accounts in your applications that are secured by Azure Active Directory B2C. |
| 2 | +title: Set up sign-up and sign-in with a Microsoft account using Azure Active Directory B2C | Microsoft Docs |
| 3 | +description: Provide sign-up and sign-in to customers with Microsoft accounts in your applications using Azure Active Directory B2C. |
4 | 4 | services: active-directory-b2c
|
5 | 5 | author: davidmu1
|
6 | 6 | manager: mtillman
|
7 | 7 |
|
8 | 8 | ms.service: active-directory
|
9 | 9 | ms.workload: identity
|
10 | 10 | ms.topic: conceptual
|
11 |
| -ms.date: 12/06/2016 |
| 11 | +ms.date: 07/05/2018 |
12 | 12 | ms.author: davidmu
|
13 | 13 | ms.component: B2C
|
14 | 14 | ---
|
15 |
| -# Azure Active Directory B2C: Provide sign-up and sign-in to consumers with Microsoft accounts |
| 15 | + |
| 16 | +# Set up sign-up and sign-in with a Microsoft account using Azure Active Directory B2C |
| 17 | + |
16 | 18 | ## Create a Microsoft account application
|
17 |
| -To use Microsoft account as an identity provider in Azure Active Directory (Azure AD) B2C, you need to create a Microsoft account application and supply it with the right parameters. You need a Microsoft account to do this. If you don’t have one, you can get it at [https://www.live.com/](https://www.live.com/). |
18 |
| - |
19 |
| -1. Go to the [Microsoft Application Registration Portal](https://apps.dev.microsoft.com/?referrer=https://azure.microsoft.com/documentation/articles&deeplink=/appList) and sign in with your Microsoft account credentials. |
20 |
| -2. Click **Add an app**. |
21 |
| - |
22 |
| -  |
23 |
| -3. Provide a **Name** for your application and click **Create application**. |
24 |
| - |
25 |
| -  |
26 |
| -4. Copy the value of **Application Id**. You will need it to configure Microsoft account as an identity provider in your tenant. |
27 |
| - |
28 |
| -  |
29 |
| -5. Click on **Add platform** and choose **Web**. |
30 |
| - |
31 |
| -  |
32 |
| - |
33 |
| -  |
34 |
| -6. Enter `https://login.microsoftonline.com/te/{tenant}/oauth2/authresp` in the **Redirect URIs** field. Replace **{tenant}** with your tenant's name (for example, contosob2c.onmicrosoft.com). |
35 |
| - |
36 |
| -  |
37 |
| -7. Click on **Generate New Password** under the **Application Secrets** section. Copy the new password displayed on screen. You will need it to configure Microsoft account as an identity provider in your tenant. This password is an important security credential. |
38 |
| - |
39 |
| -  |
40 |
| - |
41 |
| -  |
42 |
| -8. Check the box that says **Live SDK support** under the **Advanced Options** section. Click **Save**. |
43 |
| - |
44 |
| -  |
45 |
| - |
46 |
| -## Configure Microsoft account as an identity provider in your tenant |
47 |
| -1. Follow these steps to [navigate to the B2C features blade](active-directory-b2c-app-registration.md#navigate-to-b2c-settings) on the Azure portal. |
48 |
| -2. On the B2C features blade, click **Identity providers**. |
49 |
| -3. Click **+Add** at the top of the blade. |
50 |
| -4. Provide a friendly **Name** for the identity provider configuration. For example, enter "MSA". |
51 |
| -5. Click **Identity provider type**, select **Microsoft account**, and click **OK**. |
52 |
| -6. Click **Set up this identity provider** and enter the Application Id and password of the Microsoft account application that you created earlier. |
| 19 | + |
| 20 | +To use a Microsoft account as an identity provider in Azure Active Directory (Azure AD) B2C, you need to create an application in your tenant that represents it. If you don’t already have a Microsoft account, you can get it at [https://www.live.com/](https://www.live.com/). |
| 21 | + |
| 22 | +1. Sign in to the [Microsoft Application Registration Portal](https://apps.dev.microsoft.com/?referrer=https://azure.microsoft.com/documentation/articles&deeplink=/appList) with your Microsoft account credentials. |
| 23 | +2. In the upper-right corner, select **Add an app**. |
| 24 | +3. Provide a **Name** for your application and click **Create**. |
| 25 | +4. On the registration page, copy the value of **Application Id**. You use it to configure your Microsoft account as an identity provider in your tenant. |
| 26 | +5. Select **Add platform**, and then and choose **Web**. |
| 27 | +6. Enter `https://login.microsoftonline.com/te/{tenant}/oauth2/authresp` in **Redirect URLs**. Replace **{tenant}** with your tenant's name (for example, contosob2c.onmicrosoft.com). |
| 28 | +7. Select **Generate New Password** under **Application Secrets**. Copy the new password displayed on screen. You need it to configure a Microsoft account as an identity provider in your tenant. This password is an important security credential. |
| 29 | + |
| 30 | +## Configure a Microsoft account as an identity provider |
| 31 | + |
| 32 | +1. Sign in to the [Azure portal](https://portal.azure.com/) as the global administrator of your Azure AD B2C tenant. |
| 33 | + |
| 34 | + [!INCLUDE [active-directory-b2c-switch-b2c-tenant](../../includes/active-directory-b2c-switch-b2c-tenant.md)] |
| 35 | + |
| 36 | +2. Choose **All services** in the top-left corner of the Azure portal, search for and select **Azure AD B2C**. |
| 37 | +2. Select **Identity providers**, and then select **Add**. |
| 38 | +4. Provide a **Name**. For example, enter *MSA*. |
| 39 | +5. Select **Identity provider type**, select **Microsoft Account**, and click **OK**. |
| 40 | +6. Select **Set up this identity provider** and enter the Application Id that you recorded earlier as the **Client ID** and enter the password that you recorded as the **Client secret** of the Microsoft account application that you created earlier. |
53 | 41 | 7. Click **OK** and then click **Create** to save your Microsoft account configuration.
|
54 | 42 |
|
0 commit comments