Skip to content

Commit 3487352

Browse files
committed
update custom policy procedure
1 parent 1b9e1f3 commit 3487352

File tree

1 file changed

+10
-9
lines changed

1 file changed

+10
-9
lines changed

articles/active-directory-b2c/identity-provider-twitter.md

Lines changed: 10 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: CelesteDG
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: how-to
12-
ms.date: 09/16/2021
12+
ms.date: 07/20/2022
1313
ms.custom: project-no-code
1414
ms.author: kengaderdus
1515
ms.subservice: B2C
@@ -91,25 +91,26 @@ If the sign-in process is successful, your browser is redirected to `https://jwt
9191

9292
## Create a policy key
9393

94-
You need to store the secret key that you previously recorded in your Azure AD B2C tenant.
94+
You need to store the secret key that you previously recorded for Twitter app in your Azure AD B2C tenant.
9595

9696
1. Sign in to the [Azure portal](https://portal.azure.com/).
97-
1. Make sure you're using the directory that contains your Azure AD B2C tenant. Select the **Directories + subscriptions** icon in the portal toolbar.
98-
1. On the **Portal settings | Directories + subscriptions** page, find your Azure AD B2C directory in the **Directory name** list, and then select **Switch**.
99-
1. Choose **All services** in the top-left corner of the Azure portal, and then search for and select **Azure AD B2C**.
100-
1. On the Overview page, select **Identity Experience Framework**.
97+
1. Make sure you're using the directory that contains your Azure AD B2C tenant.
98+
1. Select the **Directories + subscriptions** icon in the portal toolbar.
99+
1. On the **Portal settings | Directories + subscriptions** page, find your Azure AD B2C directory in the **Directory name** list, and then select **Switch**.
100+
1. In the Azure portal, search for and select **Azure AD B2C**.
101+
1. On the left menu, under **Policies**, select **Identity Experience Framework**.
101102
1. Select **Policy Keys** and then select **Add**.
102103
1. For **Options**, choose `Manual`.
103104
1. Enter a **Name** for the policy key. For example, `TwitterSecret`. The prefix `B2C_1A_` is added automatically to the name of your key.
104-
1. In **Secret**, enter your client secret that you previously recorded.
105+
1. For **Secret**, enter your *API key secret* value that you previously recorded.
105106
1. For **Key usage**, select `Encryption`.
106107
1. Click **Create**.
107108

108109
## Configure Twitter as an identity provider
109110

110111
To enable users to sign in using a Twitter account, you need to define the account as a claims provider that Azure AD B2C can communicate with through an endpoint. The endpoint provides a set of claims that are used by Azure AD B2C to verify that a specific user has authenticated.
111112

112-
You can define a Twitter account as a claims provider by adding it to the **ClaimsProviders** element in the extension file of your policy.
113+
You can define a Twitter account as a claims provider by adding it to the **ClaimsProviders** element in the extension file of your policy. Refer to the custom policy starter pack that you downloaded in the Prerequisites of this article.
113114

114115
1. Open the *TrustFrameworkExtensions.xml*.
115116
2. Find the **ClaimsProviders** element. If it does not exist, add it under the root element.
@@ -154,7 +155,7 @@ You can define a Twitter account as a claims provider by adding it to the **Clai
154155
</ClaimsProvider>
155156
```
156157

157-
4. Replace the value of **client_id** with the *API key secret* that you previously recorded.
158+
4. Replace the value of **client_id** with the *API key* that you previously recorded.
158159
5. Save the file.
159160

160161
[!INCLUDE [active-directory-b2c-add-identity-provider-to-user-journey](../../includes/active-directory-b2c-add-identity-provider-to-user-journey.md)]

0 commit comments

Comments
 (0)