Skip to content

Commit 4eb39ac

Browse files
authored
Update partner-eid-me.md
1 parent eb31bc3 commit 4eb39ac

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

articles/active-directory-b2c/partner-eid-me.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -146,7 +146,7 @@ For the following instructions, eID-Me appears as a new OIDC identity provider i
146146
5. In **Identity providers**, select the created eID-Me identity provider.
147147
6. For **Local Accounts**, select **None**. The selection disables email and password authentication.
148148
7. Select **Run user flow**.
149-
8. In the form, enter a **Replying URL**, such as `https://jwt.ms`.
149+
8. Enter a **Replying URL**, such as `https://jwt.ms`.
150150
9. The browser redirects to the eID-Me sign-in page.
151151
10. Enter the account name from user registration.
152152
11. The user receives push notification on the mobile device with eID-Me.
@@ -178,7 +178,7 @@ Store the Client Secret you recorded in your Azure AD B2C tenant. For the follow
178178

179179
## Configure eID-Me as an Identity provider
180180

181-
To enable user sign in with eID-Me, define eID-Me as a claims provider. Azure AD B2C communicates with it, through an endpoint. The endpoint provides claims used by Azure AD B2C to verify user authentication with a digital ID on their device.
181+
Define eID-Me as a claims provider to enable users to sign in with eID-Me. Azure AD B2C communicates with it, through an endpoint. The endpoint provides claims used by Azure AD B2C to verify user authentication with a digital ID on their device.
182182

183183
To define eID-Me as a claims provider, add it to the **ClaimsProvider** element in the policy extension file.
184184

0 commit comments

Comments
 (0)