Skip to content

Commit 338736e

Browse files
authored
Update partner-bindid.md
1 parent ac7a313 commit 338736e

File tree

1 file changed

+8
-2
lines changed

1 file changed

+8
-2
lines changed

articles/active-directory-b2c/partner-bindid.md

Lines changed: 8 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -50,11 +50,13 @@ Sign in to the [Transmit Admin Portal](https://portal.transmitsecurity.io/) and
5050

5151
1. From **Applications**, select **Add application**.
5252
1. Configure the application with the following attributes:
53+
5354
| Property | Description |
5455
|:---------|:---------------------|
5556
| **Application name** | Application name|
5657
| **Client name** | Client name|
5758
| **Redirect URIs** | `https://<your-B2C-tenant>.b2clogin.com/<your-B2C-tenant>.onmicrosoft.com/oauth2/authresp` where `<your-B2C-tenant>` is your Azure AD B2C tenant domain (or `<your-B2C-tenant>.b2clogin.com` is your custom domain)|
59+
5860
3. Select **Add**.
5961

6062
4. Upon registration, a **Client ID** and **Client Secret** appear. Record the values to use later.
@@ -66,12 +68,14 @@ From the [Transmit Admin Portal](https://portal.transmitsecurity.io/), configure
6668
1. Select **Authentication**, and then select **Experiences Management**.
6769
1. From the drop-down menu, select your application.
6870
1. Configure your application with the following attributes:
71+
6972
| Property | Description |
7073
|:---------|:---------------------|
7174
| **User identifier** | Select **Email**|
7275
| **Primary authentication method** | Select **Passkey**|
7376
| **Secondary authentication method** | Only enable **WebAuthn QR** and **Email OTP**|
7477
| **Select user information** | Delete all the default fields|
78+
7579
1. Select **Save**.
7680

7781
::: zone pivot="b2c-user-flow"
@@ -87,6 +91,7 @@ To enable users to sign in with Transmit Security, configure Transmit Security a
8791
1. Under **Azure services**, select **Azure AD B2C** (or select **More services** and use the **All services** search box to search for Azure AD B2C).
8892
1. Select **Identity providers**, and then select **New OpenID Connect provider**.
8993
1. Configure the provider as follows:
94+
9095
| Property | Description |
9196
|:---------|:---------------------|
9297
| **Name** | Name, such as Transmit Security|
@@ -98,9 +103,8 @@ To enable users to sign in with Transmit Security, configure Transmit Security a
98103
| **Response mode** | **form_post**|
99104
| **Display name** | `email`|
100105
| **Email** | `email`|
101-
1. Select **Save**.
102-
103106

107+
1. Select **Save**.
104108

105109
## Step 4: Create a user flow
106110

@@ -141,12 +145,14 @@ You need to store the client secret of your Transmit application that you previo
141145
1. On the Overview page, under **Policies**, select **Identity Experience Framework**.
142146
1. Select **Policy Keys**, and then select **Add**.
143147
1. Configure the policy key as follows:
148+
144149
| Property | Description |
145150
|:---------|:---------------------|
146151
| **Options** | **Manual**|
147152
| **Name** | Policy key name, such as *TransmitClientSecret*|
148153
| **Secret** | Client secret provided by Transmit|
149154
| **Key usage** | **Signature**|
155+
150156
1. Select **Create** to add the policy key.
151157

152158
## Step 4: Add Transmit as an identity provider

0 commit comments

Comments
 (0)