|
| 1 | +--- |
| 2 | +title: Disable email verification during customer sign-up with a custom policy |
| 3 | +titleSuffix: Azure AD B2C |
| 4 | +description: Learn how to disable email verification during customer sign-up in Azure Active Directory B2C. |
| 5 | +services: active-directory-b2c |
| 6 | +author: msmimart |
| 7 | +manager: celestedg |
| 8 | + |
| 9 | +ms.service: active-directory |
| 10 | +ms.workload: identity |
| 11 | +ms.topic: conceptual |
| 12 | +ms.date: 03/11/2020 |
| 13 | +ms.author: mimart |
| 14 | +ms.subservice: B2C |
| 15 | +--- |
| 16 | + |
| 17 | +# Disable email verification during customer sign-up using a custom policy in Azure Active Directory B2C |
| 18 | + |
| 19 | +[!INCLUDE [disable email verification intro](../../includes/active-directory-b2c-disable-email-verification.md)] |
| 20 | + |
| 21 | +## Prerequisites |
| 22 | + |
| 23 | +Complete the steps in [Get started with custom policies](custom-policy-get-started.md). You should have a working custom policy for sign-up and sign-in with social and local accounts. |
| 24 | + |
| 25 | +## Add the metadata to the self-asserted technical profile |
| 26 | + |
| 27 | +The **LocalAccountSignUpWithLogonEmail** technical profile is a [self-asserted](self-asserted-technical-profile.md), which is invoked during the sign-up flow. To disable the email verification, set the `EnforceEmailVerification` metadata to false. Override the LocalAccountSignUpWithLogonEmail technical profiles in the extension file. Find the `ClaimsProviders` element. Add the following claims provider to the `ClaimsProviders` element: |
| 28 | + |
| 29 | + |
| 30 | +```XML |
| 31 | +<ClaimsProvider> |
| 32 | + <DisplayName>Local Account</DisplayName> |
| 33 | + <TechnicalProfiles> |
| 34 | + <TechnicalProfile Id="SelfAsserted-LocalAccountSignin-Email"> |
| 35 | + <Metadata> |
| 36 | + <Item Key="EnforceEmailVerification">false</Item> |
| 37 | + </Metadata> |
| 38 | + </TechnicalProfile> |
| 39 | + </TechnicalProfiles> |
| 40 | +</ClaimsProvider> |
| 41 | +``` |
| 42 | + |
| 43 | +## Test the custom policy |
| 44 | + |
| 45 | +1. Sign in to the [Azure portal](https://portal.azure.com). |
| 46 | +2. Make sure you're using the directory that contains your Azure AD tenant by selecting the **Directory + subscription** filter in the top menu and choosing the directory that contains your Azure AD tenant. |
| 47 | +3. Choose **All services** in the top-left corner of the Azure portal, and then search for and select **App registrations**. |
| 48 | +4. Select **Identity Experience Framework**. |
| 49 | +5. Select **Upload Custom Policy**, and then upload the two policy files that you changed. |
| 50 | +2. Select the sign-up or sign-in policy that you uploaded, and click the **Run now** button. |
| 51 | +3. You should be able to sign up using an email address without the validation. |
| 52 | + |
| 53 | + |
| 54 | +## Next steps |
| 55 | + |
| 56 | +- Learn more about the [self-asserted technical profile](self-asserted-technical-profile.md) in the IEF reference. |
0 commit comments