You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory-b2c/add-ropc-policy.md
+5-9Lines changed: 5 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -40,9 +40,9 @@ The following flows aren't supported:
40
40
-**Server-to-server**: The identity protection system needs a reliable IP address gathered from the caller (the native client) as part of the interaction. In a server-side API call, only the server’s IP address is used. If a dynamic threshold of failed authentications is exceeded, the identity protection system may identify a repeated IP address as an attacker.
41
41
-**Confidential client flow**: The application client ID is validated, but the application secret isn't validated.
42
42
43
-
When using the ROPC flow, consider the following:
43
+
When using the ROPC flow, consider the following limitations:
44
44
45
-
- ROPC doesn’t work when there's any interruption to the authentication flow that needs user interaction. For example, when a password has expired or needs to be changed, [multifactor authentication](multi-factor-authentication.md) is required, or when more information needs to be collected during sign-in (for example, user consent).
45
+
- ROPC doesn’t work when there's any interruption to the authentication flow that needs user interaction. For example, when a password expires or needs to be changed, [multifactor authentication](multi-factor-authentication.md) is required, or when more information needs to be collected during sign-in (for example, user consent).
46
46
- ROPC supports local accounts only. Users can’t sign in with [federated identity providers](add-identity-provider.md) like Microsoft, Google+, Twitter, AD-FS, or Facebook.
47
47
-[Session Management](session-behavior.md), including [keep me signed-in (KMSI)](session-behavior.md#enable-keep-me-signed-in-kmsi), isn't applicable.
48
48
@@ -70,7 +70,7 @@ When using the ROPC flow, consider the following:
70
70
71
71
::: zone pivot="b2c-custom-policy"
72
72
73
-
## Pre-requisite
73
+
## Prerequisite
74
74
If you've not done so, learn how to use the custom policy starter pack in [Get started with custom policies in Active Directory B2C](tutorial-create-user-flows.md).
75
75
76
76
## Create a resource owner policy
@@ -375,12 +375,8 @@ A successful response looks like the following example:
375
375
376
376
***Symptom** - You run the ROPC flow, and get the following message: *AADB2C90057: The provided application isn't configured to allow the 'OAuth' Implicit flow*.
377
377
***Possible causes** - The implicit flow isn't allowed for your application.
378
-
***Resolution**: When creating your [app registration](#register-an-application) in Azure AD B2C, you need to manually edit the application manifest and set the value of the `oauth2AllowImplicitFlow` property to `true`. After you configure the `oauth2AllowImplicitFlow` property, it can take a few minutes (typically no more than five) for the change to take affect.
378
+
***Resolution**: When creating your [app registration](#register-an-application) in Azure AD B2C, you need to manually edit the application manifest and set the value of the `oauth2AllowImplicitFlow` property to `true`. After you configure the `oauth2AllowImplicitFlow` property, it can take a few minutes (typically no more than five) for the change to take effect.
379
379
380
380
## Use a native SDK or App-Auth
381
381
382
-
Azure AD B2C meets OAuth 2.0 standards for public client resource owner password credentials and should be compatible with most client SDKs. For the latest information, see [Native App SDK for OAuth 2.0 and OpenID Connect implementing modern best practices](https://appauth.io/).
383
-
384
-
## Next steps
385
-
386
-
Download working samples that have been configured for use with Azure AD B2C from GitHub, [for Android](https://aka.ms/aadb2cappauthropc) and [for iOS](https://aka.ms/aadb2ciosappauthropc).
382
+
Azure AD B2C meets OAuth 2.0 standards for public client resource owner password credentials and should be compatible with most client SDKs. For the latest information, see [Native App SDK for OAuth 2.0 and OpenID Connect implementing modern best practices](https://appauth.io/).
Copy file name to clipboardExpand all lines: articles/active-directory-b2c/api-connectors-overview.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -29,7 +29,7 @@ As a developer or IT administrator, you can use API connectors to integrate your
29
29
-**Validate user input data**. Validate against malformed or invalid user data. For example, you can validate user-provided data against existing data in an external data store or list of permitted values. If invalid, you can ask a user to provide valid data or block the user from continuing the sign-up flow.
30
30
-**Verify user identity**. Use an identity verification service or external identity data sources to add an extra level of security to account creation decisions.
31
31
-**Integrate with a custom approval workflow**. Connect to a custom approval system for managing and limiting account creation.
32
-
-**Augment tokens with attributes from external sources**. Enrich tokens with attributes about the user from sources that are external to Azure AD B2C such as cloud systems, custom user stores, custom permission systems, legacy identity services, and more.
32
+
-**Augment tokens with attributes from external sources**. Enrich tokens with user attributes from sources that are external to Azure AD B2C such as cloud systems, custom user stores, custom permission systems, legacy identity services, and more.
33
33
-**Overwrite user attributes**. Reformat or assign a value to an attribute collected from the user. For example, if a user enters the first name in all lowercase or all uppercase letters, you can format the name with only the first letter capitalized.
34
34
-**Run custom business logic**. You can trigger downstream events in your cloud systems to send push notifications, update corporate databases, manage permissions, audit databases, and perform other custom actions.
Copy file name to clipboardExpand all lines: articles/active-directory-b2c/configure-user-input.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -75,10 +75,10 @@ To provide a set list of values for the city attribute:
75
75
1. Select your policy (for example, "B2C_1_SignupSignin") to open it.
76
76
1. On the **Languages** page for the user flow, select the language that you want to customize.
77
77
1. Under **Page-level resources files**, select **Local account sign up page**.
78
-
1. Select **Download defaults** (or **Download overrides** if you have previously edited this language).
78
+
1. Select **Download defaults** (or **Download overrides** if you previously edited this language).
79
79
1. Create a `LocalizedCollections` attribute.
80
80
81
-
The `LocalizedCollections` is an array of `Name` and `Value` pairs. The order for the items will be the order they are displayed.
81
+
The `LocalizedCollections` is an array of `Name` and `Value` pairs. The order for the items is the order they are displayed.
82
82
83
83
*`ElementId` is the user attribute that this `LocalizedCollections` attribute is a response to.
84
84
*`Name` is the value that's shown to the user.
@@ -134,7 +134,7 @@ The `LocalizedCollections` is an array of `Name` and `Value` pairs. The order fo
134
134
135
135
## Overview
136
136
137
-
You can gather initial data from your users by using the sign-up or sign-in user journey. Additional claims can be gathered later by using a profile edit user journey. Anytime Azure AD B2C gathers information directly from the user interactively, it uses the [self-asserted technical profile](self-asserted-technical-profile.md). In this sample, you:
137
+
You can gather initial data from your users by using the sign-up or sign-in user journey. You can gather more claims later by using a profile edit user journey. Anytime Azure AD B2C gathers information directly from the user interactively, it uses the [self-asserted technical profile](self-asserted-technical-profile.md). In this sample, you:
You can customize your Azure AD B2C pages with a banner logo, background image, and background color by using Microsoft Entra ID [Company branding](../active-directory/fundamentals/how-to-customize-branding.md). The company branding includes signing up, signing in, profile editing, and password resetting.
62
62
63
-
The following example shows a *Signup and signin* page with a custom logo, background image, using Ocean Blue template:
63
+
The following example shows a *Sign-up and sign-in* page with a custom logo, background image, using Ocean Blue template:
64
64
65
65

0 commit comments