Skip to content

Commit 11321f2

Browse files
authored
Merge pull request #45991 from MicrosoftDocs/master
7/6 AM Publish
2 parents ab3b248 + 3482c81 commit 11321f2

File tree

157 files changed

+2485
-1013
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

157 files changed

+2485
-1013
lines changed

.openpublishing.redirection.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -25954,6 +25954,11 @@
2595425954
"source_path": "articles/cloud-shell/persisting-shell-storage-powershell.md",
2595525955
"redirect_url": "/azure/cloud-shell/persisting-shell-storage",
2595625956
"redirect_document_id": false
25957+
},
25958+
{
25959+
"source_path": "articles/cognitive-services/LUIS/luis-tutorial-interchangeable-phrase-list.md",
25960+
"redirect_url": "/azure/cognitive-services/LUIS/luis-quickstart-primary-and-secondary-data",
25961+
"redirect_document_id": true
2595725962
}
2595825963
]
2595925964
}
Lines changed: 28 additions & 40 deletions
Original file line numberDiff line numberDiff line change
@@ -1,54 +1,42 @@
11
---
2-
title: Microsoft account configuration in Azure Active Directory B2C | Microsoft Docs
3-
description: Provide sign-up and sign-in to consumers with Microsoft accounts in your applications that are secured by Azure Active Directory B2C.
2+
title: Set up sign-up and sign-in with a Microsoft account using Azure Active Directory B2C | Microsoft Docs
3+
description: Provide sign-up and sign-in to customers with Microsoft accounts in your applications using Azure Active Directory B2C.
44
services: active-directory-b2c
55
author: davidmu1
66
manager: mtillman
77

88
ms.service: active-directory
99
ms.workload: identity
1010
ms.topic: conceptual
11-
ms.date: 12/06/2016
11+
ms.date: 07/05/2018
1212
ms.author: davidmu
1313
ms.component: B2C
1414
---
15-
# Azure Active Directory B2C: Provide sign-up and sign-in to consumers with Microsoft accounts
15+
16+
# Set up sign-up and sign-in with a Microsoft account using Azure Active Directory B2C
17+
1618
## Create a Microsoft account application
17-
To use Microsoft account as an identity provider in Azure Active Directory (Azure AD) B2C, you need to create a Microsoft account application and supply it with the right parameters. You need a Microsoft account to do this. If you don’t have one, you can get it at [https://www.live.com/](https://www.live.com/).
18-
19-
1. Go to the [Microsoft Application Registration Portal](https://apps.dev.microsoft.com/?referrer=https://azure.microsoft.com/documentation/articles&deeplink=/appList) and sign in with your Microsoft account credentials.
20-
2. Click **Add an app**.
21-
22-
![Microsoft account - Add a new app](./media/active-directory-b2c-setup-msa-app/msa-add-new-app.png)
23-
3. Provide a **Name** for your application and click **Create application**.
24-
25-
![Microsoft account - App name](./media/active-directory-b2c-setup-msa-app/msa-app-name.png)
26-
4. Copy the value of **Application Id**. You will need it to configure Microsoft account as an identity provider in your tenant.
27-
28-
![Microsoft account - Application Id](./media/active-directory-b2c-setup-msa-app/msa-app-id.png)
29-
5. Click on **Add platform** and choose **Web**.
30-
31-
![Microsoft account - Add platform](./media/active-directory-b2c-setup-msa-app/msa-add-platform.png)
32-
33-
![Microsoft account - Web](./media/active-directory-b2c-setup-msa-app/msa-web.png)
34-
6. Enter `https://login.microsoftonline.com/te/{tenant}/oauth2/authresp` in the **Redirect URIs** field. Replace **{tenant}** with your tenant's name (for example, contosob2c.onmicrosoft.com).
35-
36-
![Microsoft account - Redirect URL](./media/active-directory-b2c-setup-msa-app/msa-redirect-url.png)
37-
7. Click on **Generate New Password** under the **Application Secrets** section. Copy the new password displayed on screen. You will need it to configure Microsoft account as an identity provider in your tenant. This password is an important security credential.
38-
39-
![Microsoft account - Generate new password](./media/active-directory-b2c-setup-msa-app/msa-generate-new-password.png)
40-
41-
![Microsoft account - New password](./media/active-directory-b2c-setup-msa-app/msa-new-password.png)
42-
8. Check the box that says **Live SDK support** under the **Advanced Options** section. Click **Save**.
43-
44-
![Microsoft account - Live SDK support](./media/active-directory-b2c-setup-msa-app/msa-live-sdk-support.png)
45-
46-
## Configure Microsoft account as an identity provider in your tenant
47-
1. Follow these steps to [navigate to the B2C features blade](active-directory-b2c-app-registration.md#navigate-to-b2c-settings) on the Azure portal.
48-
2. On the B2C features blade, click **Identity providers**.
49-
3. Click **+Add** at the top of the blade.
50-
4. Provide a friendly **Name** for the identity provider configuration. For example, enter "MSA".
51-
5. Click **Identity provider type**, select **Microsoft account**, and click **OK**.
52-
6. Click **Set up this identity provider** and enter the Application Id and password of the Microsoft account application that you created earlier.
19+
20+
To use a Microsoft account as an identity provider in Azure Active Directory (Azure AD) B2C, you need to create an application in your tenant that represents it. If you don’t already have a Microsoft account, you can get it at [https://www.live.com/](https://www.live.com/).
21+
22+
1. Sign in to the [Microsoft Application Registration Portal](https://apps.dev.microsoft.com/?referrer=https://azure.microsoft.com/documentation/articles&deeplink=/appList) with your Microsoft account credentials.
23+
2. In the upper-right corner, select **Add an app**.
24+
3. Provide a **Name** for your application and click **Create**.
25+
4. On the registration page, copy the value of **Application Id**. You use it to configure your Microsoft account as an identity provider in your tenant.
26+
5. Select **Add platform**, and then and choose **Web**.
27+
6. Enter `https://login.microsoftonline.com/te/{tenant}/oauth2/authresp` in **Redirect URLs**. Replace **{tenant}** with your tenant's name (for example, contosob2c.onmicrosoft.com).
28+
7. Select **Generate New Password** under **Application Secrets**. Copy the new password displayed on screen. You need it to configure a Microsoft account as an identity provider in your tenant. This password is an important security credential.
29+
30+
## Configure a Microsoft account as an identity provider
31+
32+
1. Sign in to the [Azure portal](https://portal.azure.com/) as the global administrator of your Azure AD B2C tenant.
33+
34+
[!INCLUDE [active-directory-b2c-switch-b2c-tenant](../../includes/active-directory-b2c-switch-b2c-tenant.md)]
35+
36+
2. Choose **All services** in the top-left corner of the Azure portal, search for and select **Azure AD B2C**.
37+
2. Select **Identity providers**, and then select **Add**.
38+
4. Provide a **Name**. For example, enter *MSA*.
39+
5. Select **Identity provider type**, select **Microsoft Account**, and click **OK**.
40+
6. Select **Set up this identity provider** and enter the Application Id that you recorded earlier as the **Client ID** and enter the password that you recorded as the **Client secret** of the Microsoft account application that you created earlier.
5341
7. Click **OK** and then click **Create** to save your Microsoft account configuration.
5442

0 commit comments

Comments
 (0)