You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory-b2c/active-directory-b2c-get-started-custom.md
+33-33Lines changed: 33 additions & 33 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,7 +8,7 @@ manager: celestedg
8
8
ms.service: active-directory
9
9
ms.workload: identity
10
10
ms.topic: conceptual
11
-
ms.date: 07/16/2019
11
+
ms.date: 09/26/2019
12
12
ms.author: marsma
13
13
ms.subservice: B2C
14
14
---
@@ -21,44 +21,45 @@ ms.subservice: B2C
21
21
22
22
## Prerequisites
23
23
24
-
- If you don't have one already, you need to [create an Azure AD B2C tenant](tutorial-create-tenant.md) that is linked to your Azure subscription.
24
+
- If you don't have one already, [create an Azure AD B2C tenant](tutorial-create-tenant.md) that is linked to your Azure subscription.
25
25
-[Register your application](tutorial-register-applications.md) in the tenant that you created so that it can communicate with Azure AD B2C.
26
+
- Complete the steps in [Set up sign-up and sign-in with a Facebook account](active-directory-b2c-setup-fb-app.md) to configure a Facebook application.
26
27
27
28
## Add signing and encryption keys
28
29
29
-
1. Sign in to the [Azure portal](https://portal.azure.com/) as the global administrator of your Azure AD B2C tenant.
30
-
2. Make sure you're using the directory that contains your Azure AD B2C tenant. Select the **Directory + subscription** filter in the top menu and choose the directory that contains your tenant.
31
-
3. Choose **All services** in the top-left corner of the Azure portal, search for and select **Azure AD B2C**.
32
-
4. On the Overview page, select **Identity Experience Framework**.
30
+
1. Sign in to the [Azure portal](https://portal.azure.com)
31
+
1. Use the **Directory + subscription** filter in the top menu to select the directory that contains your Azure AD B2C tenant.
32
+
1. In the left menu, select **Azure AD B2C**. Or, select **All services** and search for and select **Azure AD B2C**.
33
+
1. On the Overview page, select **Identity Experience Framework**.
33
34
34
35
### Create the signing key
35
36
36
37
1. Select **Policy Keys** and then select **Add**.
37
-
2. For **Options**, choose `Generate`.
38
-
3. In **Name**, enter `TokenSigningKeyContainer`. The prefix `B2C_1A_` might be added automatically.
39
-
4. For **Key type**, select **RSA**.
40
-
5. For **Key usage**, select **Signature**.
41
-
6. Click**Create**.
38
+
1. For **Options**, choose `Generate`.
39
+
1. In **Name**, enter `TokenSigningKeyContainer`. The prefix `B2C_1A_` might be added automatically.
40
+
1. For **Key type**, select **RSA**.
41
+
1. For **Key usage**, select **Signature**.
42
+
1. Select**Create**.
42
43
43
44
### Create the encryption key
44
45
45
46
1. Select **Policy Keys** and then select **Add**.
46
-
2. For **Options**, choose `Generate`.
47
-
3. In **Name**, enter `TokenEncryptionKeyContainer`. The prefix `B2C_1A`_ might be added automatically.
48
-
4. For **Key type**, select **RSA**.
49
-
5. For **Key usage**, select **Encryption**.
50
-
6. Click**Create**.
47
+
1. For **Options**, choose `Generate`.
48
+
1. In **Name**, enter `TokenEncryptionKeyContainer`. The prefix `B2C_1A`_ might be added automatically.
49
+
1. For **Key type**, select **RSA**.
50
+
1. For **Key usage**, select **Encryption**.
51
+
1. Select**Create**.
51
52
52
53
### Create the Facebook key
53
54
54
-
If you already have a [Facebook application secret](active-directory-b2c-setup-fb-app.md), add it as a policy key to your tenant. Otherwise, you must create the key with a placeholder value so that your policies pass validation.
55
+
Add your Facebook application's [App Secret](active-directory-b2c-setup-fb-app.md)as a policy key. You can use the App Secret of the application you created as part of this article's prerequisites.
55
56
56
57
1. Select **Policy Keys** and then select **Add**.
57
-
2. For **Options**, choose `Manual`.
58
-
3. For **Name**, enter `FacebookSecret`. The prefix `B2C_1A_` might be added automatically.
59
-
4. In **Secret**, enter your Facebook secret from developers.facebook.com or `0` as a placeholder. This value is the secret, not the application ID.
60
-
5. For **Key usage**, select **Signature**.
61
-
6. Click**Create**.
58
+
1. For **Options**, choose `Manual`.
59
+
1. For **Name**, enter `FacebookSecret`. The prefix `B2C_1A_` might be added automatically.
60
+
1. In **Secret**, enter your Facebook application's *App Secret*from developers.facebook.com. This value is the secret, not the application ID.
@@ -74,19 +75,19 @@ Azure AD B2C requires you to register two applications that are used to sign up
74
75
1. For **Name**, enter `IdentityExperienceFramework`.
75
76
1. For **Application type**, choose **Web app/API**.
76
77
1. For **Sign-on URL**, enter `https://your-tenant-name.b2clogin.com/your-tenant-name.onmicrosoft.com`, where `your-tenant-name` is your Azure AD B2C tenant domain name. All URLs should now be using [b2clogin.com](b2clogin.md).
77
-
1.Click**Create**. After it's created, copy the application ID and save it to use later.
78
+
1.Select**Create**. After it's created, copy the application ID and save it to use later.
78
79
79
80
### Register the ProxyIdentityExperienceFramework application
80
81
81
82
1. In **App registrations (Legacy)**, select **New application registration**.
82
-
2. For **Name**, enter `ProxyIdentityExperienceFramework`.
83
-
3. For **Application type**, choose **Native**.
84
-
4. For **Redirect URI**, enter `https://your-tenant-name.b2clogin.com/your-tenant-name.onmicrosoft.com`, where `your-tenant-name` is your Azure AD B2C tenant.
85
-
5. Click**Create**. After it's created, copy the application ID and save it to use later.
86
-
6. On the Settings page, select **Required permissions**, and then select **Add**.
87
-
7. Choose **Select an API**, search for and select **IdentityExperienceFramework**, and then click **Select**.
88
-
9. Select the check box next to **Access IdentityExperienceFramework**, click **Select**, and then click **Done**.
89
-
10. Select **Grant Permissions**, and then confirm by selecting **Yes**.
83
+
1. For **Name**, enter `ProxyIdentityExperienceFramework`.
84
+
1. For **Application type**, choose **Native**.
85
+
1. For **Redirect URI**, enter `https://your-tenant-name.b2clogin.com/your-tenant-name.onmicrosoft.com`, where `your-tenant-name` is your Azure AD B2C tenant.
86
+
1. Select**Create**. After it's created, copy the application ID and save it to use later.
87
+
1. Select **Settings**, then select **Required permissions**, and then select **Add**.
88
+
1. Choose **Select an API**, search for and select **IdentityExperienceFramework**, and then click **Select**.
89
+
1. Select the check box next to **Access IdentityExperienceFramework**, click **Select**, and then click **Done**.
90
+
1. Select **Grant permissions**, and then confirm by selecting **Yes**.
90
91
91
92
## Custom policy starter pack
92
93
@@ -156,7 +157,6 @@ As you upload the files, Azure adds the prefix `B2C_1A_` to each.
156
157
157
158
## Add Facebook as an identity provider
158
159
159
-
1. Complete the steps in [Set up sign-up and sign-in with a Facebook account](active-directory-b2c-setup-fb-app.md) to configure a Facebook application.
160
160
1. In the `SocialAndLocalAccounts/`**`TrustFrameworkExtensions.xml`** file, replace the value of `client_id` with the Facebook application ID:
161
161
162
162
```xml
@@ -168,7 +168,7 @@ As you upload the files, Azure adds the prefix `B2C_1A_` to each.
168
168
169
169
1. Upload the *TrustFrameworkExtensions.xml* file to your tenant.
170
170
1. Under **Custom policies**, select **B2C_1A_signup_signin**.
171
-
1. Select **Run now** and select Facebook to sign in with Facebook and test the custom policy. Or, invoke the policy directly from your registered application.
171
+
1. Select **Run now** and select Facebook to sign in with Facebook and test the custom policy.
Copy file name to clipboardExpand all lines: articles/active-directory-b2c/active-directory-b2c-setup-fb-app.md
+6-6Lines changed: 6 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,7 +8,7 @@ manager: celestedg
8
8
ms.service: active-directory
9
9
ms.workload: identity
10
10
ms.topic: conceptual
11
-
ms.date: 08/08/2019
11
+
ms.date: 09/26/2019
12
12
ms.author: marsma
13
13
ms.subservice: B2C
14
14
---
@@ -21,20 +21,20 @@ To use a Facebook account as an [identity provider](active-directory-b2c-referen
21
21
22
22
1. Sign in to [Facebook for developers](https://developers.facebook.com/) with your Facebook account credentials.
23
23
1. If you have not already done so, you need to register as a Facebook developer. To do this, select **Get Started** on the upper-right corner of the page, accept Facebook's policies, and complete the registration steps.
24
-
1. Select **My Apps** and then **Add New App**.
24
+
1. Select **My Apps** and then **Create App**.
25
25
1. Enter a **Display Name** and a valid **Contact Email**.
26
-
1.Click**Create App ID**. This may require you to accept Facebook platform policies and complete an online security check.
26
+
1.Select**Create App ID**. This may require you to accept Facebook platform policies and complete an online security check.
27
27
1. Select **Settings** > **Basic**.
28
28
1. Choose a **Category**, for example `Business and Pages`. This value is required by Facebook, but not used for Azure AD B2C.
29
29
1. At the bottom of the page, select **Add Platform**, and then select **Website**.
30
30
1. In **Site URL**, enter `https://your-tenant-name.b2clogin.com/` replacing `your-tenant-name` with the name of your tenant. Enter a URL for the **Privacy Policy URL**, for example `http://www.contoso.com`. The policy URL is a page you maintain to provide privacy information for your application.
31
31
1. Select **Save Changes**.
32
32
1. At the top of the page, copy the value of **App ID**.
33
-
1.Click**Show** and copy the value of **App Secret**. You use both of them to configure Facebook as an identity provider in your tenant. **App Secret** is an important security credential.
33
+
1.Select**Show** and copy the value of **App Secret**. You use both of them to configure Facebook as an identity provider in your tenant. **App Secret** is an important security credential.
34
34
1. Select the plus sign next to **PRODUCTS**, and then select **Set up** under **Facebook Login**.
35
35
1. Under **Facebook Login**, select **Settings**.
36
-
1. In **Valid OAuth redirect URIs**, enter `https://your-tenant-name.b2clogin.com/your-tenant-name.onmicrosoft.com/oauth2/authresp`. Replace `your-tenant-name` with the name of your tenant. Click**Save Changes** at the bottom of the page.
37
-
1. To make your Facebook application available to Azure AD B2C, click the Status selector at the top right of the page and turn it **On** to make the Application public, and then click**Confirm**. At this point the Status should change from **Development** to **Live**.
36
+
1. In **Valid OAuth redirect URIs**, enter `https://your-tenant-name.b2clogin.com/your-tenant-name.onmicrosoft.com/oauth2/authresp`. Replace `your-tenant-name` with the name of your tenant. Select**Save Changes** at the bottom of the page.
37
+
1. To make your Facebook application available to Azure AD B2C, select the Status selector at the top right of the page and turn it **On** to make the Application public, and then select**Switch Mode**. At this point the Status should change from **Development** to **Live**.
38
38
39
39
## Configure a Facebook account as an identity provider
Copy file name to clipboardExpand all lines: articles/active-directory/develop/authentication-scenarios.md
+20-1Lines changed: 20 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -14,7 +14,7 @@ ms.devlang: na
14
14
ms.topic: conceptual
15
15
ms.tgt_pltfrm: na
16
16
ms.workload: identity
17
-
ms.date: 04/05/2019
17
+
ms.date: 09/23/2019
18
18
ms.author: ryanwi
19
19
ms.reviewer: saeeda, sureshja, hirsin
20
20
ms.custom: aaddev, identityplatformtop40
@@ -57,6 +57,25 @@ In the example scenario above, you can classify the apps according to these two
57
57
* Apps that need to securely access resources
58
58
* Apps that play the role of the resource itself
59
59
60
+
### How each flow emits tokens and codes
61
+
62
+
Depending on how your client is built, it can use one (or several) of the authentication flows supported by the Microsoft identity platform. These flows can produce a variety of tokens (id_tokens, refresh tokens, access tokens) as well as authorization codes, and require different tokens to make them work. This chart proides an overview:
|[Client credentials](v2-oauth2-client-creds-grant-flow.md)||| x (app-only)|||
73
+
74
+
**Notes**:
75
+
76
+
Tokens issued via the implicit mode have a length limitation due to being passed back to the browser via the URL (where `response_mode` is `query` or `fragment`). Some browsers have a limit on the size of the URL that can be put in the browser bar and fail when it is too long. Thus, these tokens do not have `groups` or `wids` claims.
77
+
78
+
60
79
Now that you have an overview of the basics, read on to understand the identity app model and API, how provisioning works in Microsoft identity platform, and links to detailed info about the common scenarios that Microsoft identity platform supports.
Both Microsoft Authentication Library for .NET (MSAL.NET) and Azure AD Authentication Library for .NET (ADAL.NET) are used to authenticate Azure AD entities and request tokens from Azure AD. Up until now, most developers have worked with Azure AD for developers platform (v1.0) to authenticate Azure AD identities (work and school accounts) by requesting tokens using Azure AD Authentication Library (ADAL). Now, using MSAL.NET, you can authenticate a broader set of Microsoft identities (Azure AD identities and Microsoft accounts, and social and local accounts through Azure AD B2C) through the Microsoft identity platform endpoint.
26
+
Both Microsoft Authentication Library for .NET (MSAL.NET) and Azure AD Authentication Library for .NET (ADAL.NET) are used to authenticate Azure AD entities and request tokens from Azure AD. Up until now, most developers have worked with Azure AD for developers platform (v1.0) to authenticate Azure AD identities (work and school accounts) by requesting tokens using Azure AD Authentication Library (ADAL). Using MSAL:
27
27
28
-
This article describes how to choose between the Microsoft Authentication Library for .NET (MSAL.NET) and Azure AD Authentication Library for .NET (ADAL.NET) and compares the two libraries.
28
+
- you can authenticate a broader set of Microsoft identities (Azure AD identities and Microsoft accounts, and social and local accounts through Azure AD B2C) as it uses the Microsoft identity platform endpoint,
29
+
- your users will get the best single-sign-on experience.
30
+
- your application can enable incremental consent, and supporting conditional access is easier
31
+
- you benefit from the innovation.
32
+
33
+
**MSAL.NET is now the recommended auth library to use with the Microsoft identity platform**. No new features will be implemented on ADAL.NET. The efforts are focused on improving MSAL.
34
+
35
+
This article describes the differences between the Microsoft Authentication Library for .NET (MSAL.NET) and Azure AD Authentication Library for .NET (ADAL.NET) and helps you migrate to MSAL.
29
36
30
37
## Differences between ADAL and MSAL apps
38
+
31
39
In most cases you want to use MSAL.NET and the Microsoft identity platform endpoint, which is the latest generation of Microsoft authentication libraries. Using MSAL.NET, you acquire tokens for users signing-in to your application with Azure AD (work and school accounts), Microsoft (personal) accounts (MSA), or Azure AD B2C.
32
40
33
41
If you are already familiar with the Azure AD for developers (v1.0) endpoint (and ADAL.NET), you might want to read [What's different about the Microsoft identity platform (v2.0) endpoint?](active-directory-v2-compare.md).
34
42
35
-
However, you still need to use ADAL.NET if your application needs to sign in users with earlier versions of [Active Directory Federation Services (ADFS)](/windows-server/identity/active-directory-federation-services). For more details, see [ADFS support](https://aka.ms/msal-net-adfs-support).
43
+
However, you still need to use ADAL.NET if your application needs to sign in users with earlier versions of [Active Directory Federation Services (ADFS)](/windows-server/identity/active-directory-federation-services). For more information, see [ADFS support](https://aka.ms/msal-net-adfs-support).
36
44
37
45
The following picture summarizes some of the differences between ADAL.NET and MSAL.NET
@@ -204,7 +212,7 @@ var scopes = new [] { ResourceId+"/.default"};
204
212
205
213
### Scopes to request in the case of client credential flow / daemon app
206
214
207
-
Inthecaseofclientcredentialflow, thescopetopasswouldalsobe `/.default`. ThistellstoAzureAD: "all the app-level permissions that the admin has consented to in the application registration.
215
+
Inthecaseofclientcredentialflow, thescopetopasswouldalsobe `/.default`. ThisscopetellstoAzureAD: "all the app-level permissions that the admin has consented to in the application registration.
208
216
209
217
## ADAL to MSAL migration
210
218
@@ -213,9 +221,9 @@ Some of those solutions were used in scenarios such as:
0 commit comments