Skip to content

Commit 33b7d5b

Browse files
authored
Update active-directory-technical-profile.md
Removing the input claims
1 parent 8b2945f commit 33b7d5b

File tree

1 file changed

+8
-16
lines changed

1 file changed

+8
-16
lines changed

articles/active-directory-b2c/active-directory-technical-profile.md

Lines changed: 8 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -60,13 +60,13 @@ To read, update, or delete an existing user account, the input claim is a key th
6060

6161
To create a new user account, the input claim is a key that uniquely identifies a local or federated account. For example, local account: **signInNames.emailAddress**, or **signInNames.userName**. For a federated account: the **alternativeSecurityId**.
6262

63-
The InputClaimsTransformations element may contain a collection of input claims transformation elements that are used to modify the input claim or generate new one.
63+
The [InputClaimsTransformations](technicalprofiles.md#inputclaimstransformations) element may contain a collection of input claims transformation elements that are used to modify the input claim or generate new one.
6464

6565
## OutputClaims
6666

6767
The **OutputClaims** element contains a list of claims returned by the Azure AD technical profile. You may need to map the name of the claim defined in your policy to the name defined in Azure Active Directory. You can also include claims that aren't returned by the Azure Active Directory, as long as you set the `DefaultValue` attribute.
6868

69-
The **OutputClaimsTransformations** element may contain a collection of **OutputClaimsTransformation** elements that are used to modify the output claims or generate new ones.
69+
The [OutputClaimsTransformations](technicalprofiles.md#outputclaimstransformations) element may contain a collection of **OutputClaimsTransformation** elements that are used to modify the output claims or generate new ones.
7070

7171
For example, the **AAD-UserWriteUsingLogonEmail** technical profile creates a local account and returns the following claims:
7272

@@ -88,7 +88,7 @@ For example, the **AAD-UserWriteUsingLogonEmail** technical profile creates a lo
8888

8989
## PersistedClaims
9090

91-
The **PersistedClaims** element contains all of the values that should be persisted by Azure AD with possible mapping information between a claim type already defined in the ClaimsSchema section in the policy and the Azure AD attribute name.
91+
The **PersistedClaims** element contains all of the values that should be persisted by Azure AD with possible mapping information between a claim type already defined in the [ClaimsSchema](claimsschema.md) section in the policy and the Azure AD attribute name.
9292

9393
The **AAD-UserWriteUsingLogonEmail** technical profile, which creates new local account, persists following claims:
9494

@@ -119,9 +119,7 @@ The name of the claim is the name of the Azure AD attribute unless the **Partner
119119

120120
### Read
121121

122-
The **Read** operation reads data about a single user account. To read user data, you need to provide a key as an input claim, such as **objectId**, **userPrincipalName**, **signInNames** (any type, user name and email-based account) or **alternativeSecurityId**.
123-
124-
The following technical profile reads data about a user account using the user's objectId:
122+
The **Read** operation reads data about a single user account. The following technical profile reads data about a user account using the user's objectId:
125123

126124
```XML
127125
<TechnicalProfile Id="AAD-UserReadUsingObjectId">
@@ -151,9 +149,7 @@ The following technical profile reads data about a user account using the user's
151149

152150
### Write
153151

154-
The **Write** operation creates or updates a single user account. To write a user account, you need to provide a key as an input claim, such as **objectId**, **userPrincipalName**, **signInNames.emailAddress**, or **alternativeSecurityId**.
155-
156-
The following technical profile creates new social account:
152+
The **Write** operation creates or updates a single user account. The following technical profile creates new social account:
157153

158154
```XML
159155
<TechnicalProfile Id="AAD-UserWriteUsingAlternativeSecurityId">
@@ -193,9 +189,7 @@ The following technical profile creates new social account:
193189

194190
### DeleteClaims
195191

196-
The **DeleteClaims** operation clears the information from a provided list of claims. To delete information from claims, you need to provide a key as an input claim, such as **objectId**, **userPrincipalName**, **signInNames.emailAddress** or **alternativeSecurityId**.
197-
198-
The following technical profile deletes claims:
192+
The **DeleteClaims** operation clears the information from a provided list of claims. The following technical profile deletes claims:
199193

200194
```XML
201195
<TechnicalProfile Id="AAD-DeleteClaimsUsingObjectId">
@@ -216,9 +210,7 @@ The following technical profile deletes claims:
216210

217211
### DeleteClaimsPrincipal
218212

219-
The **DeleteClaimsPrincipal** operation deletes a single user account from the directory. To delete a user account, you need to provide a key as an input claim, such as **objectId**, **userPrincipalName**, **signInNames.emailAddress** or **alternativeSecurityId**.
220-
221-
The following technical profile deletes a user account from the directory using the user principal name:
213+
The **DeleteClaimsPrincipal** operation deletes a single user account from the directory. The following technical profile deletes a user account from the directory using the user principal name:
222214

223215
```XML
224216
<TechnicalProfile Id="AAD-DeleteUserUsingObjectId">
@@ -270,7 +262,7 @@ The following settings can be used to configure the error message displayed upon
270262

271263
## Next steps
272264

273-
See the following article for example of using Azure AD technical profile:
265+
See the following article, for example of using Azure AD technical profile:
274266

275267
- [Add claims and customize user input using custom policies in Azure Active Directory B2C](custom-policy-configure-user-input.md)
276268

0 commit comments

Comments
 (0)