Skip to content

Commit 1f98354

Browse files
authored
Merge pull request #92392 from jelledruyts/jelledruyts-29279
Added important note to not use v2.0 metadata endpoint
2 parents da36537 + 8181722 commit 1f98354

File tree

1 file changed

+3
-0
lines changed

1 file changed

+3
-0
lines changed

articles/active-directory-b2c/active-directory-b2c-setup-oidc-azure-active-directory.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -11,6 +11,7 @@ ms.topic: conceptual
1111
ms.date: 08/08/2019
1212
ms.author: marsma
1313
ms.subservice: B2C
14+
ms.custom: fasttrack-edit
1415
---
1516

1617
# Set up sign-in for a specific Azure Active Directory organization in Azure Active Directory B2C
@@ -55,6 +56,8 @@ To enable sign-in for users from a specific Azure AD organization, you need to r
5556
5657
For example, `https://login.microsoftonline.com/contoso.onmicrosoft.com/.well-known/openid-configuration`.
5758
59+
**Do not** use the Azure AD v2.0 metadata endpoint, for example `https://login.microsoftonline.com/contoso.onmicrosoft.com/v2.0/.well-known/openid-configuration`. Doing so results in an error similar to `AADB2C: A claim with id 'UserId' was not found, which is required by ClaimsTransformation 'CreateAlternativeSecurityId' with id 'CreateAlternativeSecurityId' in policy 'B2C_1_SignUpOrIn' of tenant 'contoso.onmicrosoft.com'` when attempting to sign in.
60+
5861
1. For **Client ID**, enter the application ID that you previously recorded.
5962
1. For **Client secret**, enter the client secret that you previously recorded.
6063
1. Leave the default values for **Scope**, **Response type**, and **Response mode**.

0 commit comments

Comments
 (0)