You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory-b2c/identity-provider-twitter.md
+28-28Lines changed: 28 additions & 28 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,7 +1,7 @@
1
1
---
2
-
title: Set up sign-up and sign-in with a Twitter account
2
+
title: Set up sign-up and sign-in with an X account
3
3
titleSuffix: Azure AD B2C
4
-
description: Provide sign-up and sign-in to customers with Twitter accounts in your applications using Azure Active Directory B2C.
4
+
description: Provide sign-up and sign-in to customers with X accounts in your applications using Azure Active Directory B2C.
5
5
author: garrodonnell
6
6
manager: CelesteDG
7
7
ms.service: active-directory
@@ -11,11 +11,11 @@ ms.author: godonnell
11
11
ms.subservice: B2C
12
12
zone_pivot_groups: b2c-policy-type
13
13
14
-
#Customer Intent: As a developer setting up sign-up and sign-in with a Twitter account using Azure Active Directory B2C, I want to configure Twitter as an identity provider so that I can enable users to sign in with their Twitter accounts.
14
+
#Customer Intent: As a developer setting up sign-up and sign-in with an X account using Azure Active Directory B2C, I want to configure X as an identity provider so that I can enable users to sign in with their X accounts.
15
15
16
16
---
17
17
18
-
# Set up sign-up and sign-in with a Twitter account using Azure Active Directory B2C
18
+
# Set up sign-up and sign-in with an X account using Azure Active Directory B2C
To enable sign-in for users with a Twitter account in Azure AD B2C, you need to create a Twitter application. If you don't already have a Twitter account, you can sign up at [`https://twitter.com/signup`](https://twitter.com/signup). You also need to [Apply for a developer account](https://developer.twitter.com/). For more information, see [Apply for access](https://developer.twitter.com/en/apply-for-access).
33
+
To enable sign-in for users with an X account in Azure AD B2C, you need to create an X application. If you don't already have an X account, you can sign up at [`https://x.com/signup`](https://x.com/signup). You also need to [Apply for a developer account](https://developer.x.com/). For more information, see [Apply for access](https://developer.x.com/en/apply-for-access).
34
34
35
35
::: zone pivot="b2c-custom-policy"
36
-
1. Sign in to the [Twitter Developer Portal](https://developer.twitter.com/portal/projects-and-apps) with your Twitter account credentials.
36
+
1. Sign in to the [X Developer Portal](https://developer.x.com/portal/projects-and-apps) with your X account credentials.
37
37
1. Select **+ Create Project** button.
38
38
1. Under **Project name** tab, enter a preferred name of your project, and then select **Next** button.
39
39
1. Under **Use case** tab, select your preferred use case, and then select **Next**.
@@ -47,7 +47,7 @@ To enable sign-in for users with a Twitter account in Azure AD B2C, you need to
47
47
1. For the **Callback URI/Redirect URL**, enter `https://your-tenant-name.b2clogin.com/your-tenant-name.onmicrosoft.com/your-policy-id/oauth1/authresp`. If you use a [custom domain](custom-domain.md), enter `https://your-domain-name/your-tenant-name.onmicrosoft.com/your-user-flow-Id/oauth1/authresp`. Use all lowercase letters when entering your tenant name and user flow ID even if they are defined with uppercase letters in Azure AD B2C. Replace:
48
48
-`your-tenant-name` with the name of your tenant name.
49
49
-`your-domain-name` with your custom domain.
50
-
-`your-policy-id` with the identifier of your user flow. For example, `b2c_1a_signup_signin_twitter`.
50
+
-`your-policy-id` with the identifier of your user flow. For example, `b2c_1a_signup_signin_x`.
51
51
1. For the **Website URL**, enter `https://your-tenant.b2clogin.com`. Replace `your-tenant` with the name of your tenant. For example, `https://contosob2c.b2clogin.com`. If you use a [custom domain](custom-domain.md), enter `https://your-domain-name`.
52
52
1. (Optional) Enter a URL for the **Terms of service**, for example `http://www.contoso.com/tos`. The policy URL is a page you maintain to provide terms and conditions for your application.
53
53
1. (Optional) Enter a URL for the **Privacy policy**, for example `http://www.contoso.com/privacy`. The policy URL is a page you maintain to provide privacy information for your application.
@@ -57,21 +57,21 @@ To enable sign-in for users with a Twitter account in Azure AD B2C, you need to
57
57
58
58
::: zone pivot="b2c-user-flow"
59
59
60
-
1. Sign in to the [Twitter Developer Portal](https://developer.twitter.com/portal/projects-and-apps) with your Twitter account credentials.
60
+
1. Sign in to the [X Developer Portal](https://developer.x.com/portal/projects-and-apps) with your X account credentials.
61
61
1. Select **+ Create Project** button.
62
62
1. Under **Project name** tab, enter a preferred name of your project, and then select **Next** button.
63
63
1. Under **Use case** tab, select your preferred use case, and then select **Next**.
64
64
1. Under **Project description** tab, enter your project description, and then select **Next** button.
65
65
1. Under **App name** tab, enter a name for your app, such as *azureadb2c*, and the select **Next** button.
66
-
1. Under **Keys & Tokens** tab, copy the value of **API Key** and **API Key Secret** for later. You use both of them to configure Twitter as an identity provider in your Azure AD B2C tenant.
66
+
1. Under **Keys & Tokens** tab, copy the value of **API Key** and **API Key Secret** for later. You use both of them to configure X as an identity provider in your Azure AD B2C tenant.
67
67
1. Select **App settings** to open the app settings.
68
68
1. At the lower part of the page, under **User authentication settings**, select **Set up**.
69
69
1. Under **Type of app**, select your appropriate app type such as *Web App*.
70
70
1. Under **App Info**:
71
71
1. For the **Callback URI/Redirect URL**, enter `https://your-tenant.b2clogin.com/your-tenant-name.onmicrosoft.com/your-user-flow-name/oauth1/authresp`. If you use a [custom domain](custom-domain.md), enter `https://your-domain-name/your-tenant-name.onmicrosoft.com/your-user-flow-Id/oauth1/authresp`. Use all lowercase letters when entering your tenant name and user flow ID even if they are defined with uppercase letters in Azure AD B2C. Replace:
72
72
-`your-tenant-name` with the name of your tenant name.
73
73
-`your-domain-name` with your custom domain.
74
-
-`your-user-flow-name` with the identifier of your user flow. For example, `b2c_1_signup_signin_twitter`.
74
+
-`your-user-flow-name` with the identifier of your user flow. For example, `b2c_1_signup_signin_x`.
75
75
1. For the **Website URL**, enter `https://your-tenant.b2clogin.com`. Replace `your-tenant` with the name of your tenant. For example, `https://contosob2c.b2clogin.com`. If you use a [custom domain](custom-domain.md), enter `https://your-domain-name`.
76
76
1. Enter a URL for the **Terms of service**, for example `http://www.contoso.com/tos`. The policy URL is a page you maintain to provide terms and conditions for your application.
77
77
1. Enter a URL for the **Privacy policy**, for example `http://www.contoso.com/privacy`. The policy URL is a page you maintain to provide privacy information for your application.
@@ -81,23 +81,23 @@ To enable sign-in for users with a Twitter account in Azure AD B2C, you need to
81
81
82
82
::: zone pivot="b2c-user-flow"
83
83
84
-
## Configure Twitter as an identity provider
84
+
## Configure X as an identity provider
85
85
86
86
1. Sign in to the [Azure portal](https://portal.azure.com/) as the global administrator of your Azure AD B2C tenant.
87
87
1. If you have access to multiple tenants, select the **Settings** icon in the top menu to switch to your Azure AD B2C tenant from the **Directories + subscriptions** menu.
88
88
1. Choose **All services** in the top-left corner of the Azure portal, search for and select **Azure AD B2C**.
89
89
1. Select **Identity providers**, then select **Twitter**.
90
-
1. Enter a **Name**. For example, *Twitter*.
91
-
1. For the **Client ID**, enter the *API Key* of the Twitter application that you created earlier.
90
+
1. Enter a **Name**. For example, *X*.
91
+
1. For the **Client ID**, enter the *API Key* of the X application that you created earlier.
92
92
1. For the **Client secret**, enter the *API key secret* that you recorded.
93
93
1. Select **Save**.
94
94
95
-
## Add Twitter identity provider to a user flow
95
+
## Add X identity provider to a user flow
96
96
97
-
At this point, the Twitter identity provider has been set up, but it's not yet available in any of the sign-in pages. To add the Twitter identity provider to a user flow:
97
+
At this point, the X identity provider has been set up, but it's not yet available in any of the sign-in pages. To add the X identity provider to a user flow:
98
98
99
99
1. In your Azure AD B2C tenant, select **User flows**.
100
-
1. Select the user flow that you want to add the Twitter identity provider.
100
+
1. Select the user flow that you want to add the X identity provider.
101
101
1. Under the **Social identity providers**, select **Twitter**.
102
102
1. Select **Save**.
103
103
@@ -106,44 +106,44 @@ At this point, the Twitter identity provider has been set up, but it's not yet a
106
106
1. To test your policy, select **Run user flow**.
107
107
1. For **Application**, select the web application named *testapp1* that you previously registered. The **Reply URL** should show `https://jwt.ms`.
108
108
1. Select the **Run user flow** button.
109
-
1. From the sign-up or sign-in page, select **Twitter** to sign in with Twitter account.
109
+
1. From the sign-up or sign-in page, select **Twitter** to sign in with X account.
110
110
111
111
::: zone-end
112
112
113
113
::: zone pivot="b2c-custom-policy"
114
114
115
115
## Create a policy key
116
116
117
-
You need to store the secret key that you previously recorded for Twitter app in your Azure AD B2C tenant.
117
+
You need to store the secret key that you previously recorded for X app in your Azure AD B2C tenant.
118
118
119
119
1. Sign in to the [Azure portal](https://portal.azure.com/).
120
120
1. If you have access to multiple tenants, select the **Settings** icon in the top menu to switch to your Azure AD B2C tenant from the **Directories + subscriptions** menu.
121
121
1. In the Azure portal, search for and select **Azure AD B2C**.
122
122
1. On the left menu, under **Policies**, select **Identity Experience Framework**.
123
123
1. Select **Policy Keys** and then select **Add**.
124
124
1. For **Options**, choose `Manual`.
125
-
1. Enter a **Name** for the policy key. For example, `TwitterSecret`. The prefix `B2C_1A_` is added automatically to the name of your key.
125
+
1. Enter a **Name** for the policy key. For example, `XSecret`. The prefix `B2C_1A_` is added automatically to the name of your key.
126
126
1. For **Secret**, enter your *API key secret* value that you previously recorded.
127
127
1. For **Key usage**, select `Signature`.
128
128
1. Click **Create**.
129
129
130
-
## Configure Twitter as an identity provider
130
+
## Configure X as an identity provider
131
131
132
-
To enable users to sign in using a Twitter account, you need to define the account as a claims provider that Azure AD B2C can communicate with through an endpoint. The endpoint provides a set of claims that are used by Azure AD B2C to verify that a specific user has authenticated.
132
+
To enable users to sign in using an X account, you need to define the account as a claims provider that Azure AD B2C can communicate with through an endpoint. The endpoint provides a set of claims that are used by Azure AD B2C to verify that a specific user has authenticated.
133
133
134
-
You can define a Twitter account as a claims provider by adding it to the **ClaimsProviders** element in the extension file of your policy. Refer to the custom policy starter pack that you downloaded in the Prerequisites of this article.
134
+
You can define an X account as a claims provider by adding it to the **ClaimsProviders** element in the extension file of your policy. Refer to the custom policy starter pack that you downloaded in the Prerequisites of this article.
135
135
136
136
1. Open the *TrustFrameworkExtensions.xml*.
137
137
2. Find the **ClaimsProviders** element. If it does not exist, add it under the root element.
138
138
3. Add a new **ClaimsProvider** as follows:
139
139
140
140
```xml
141
141
<ClaimsProvider>
142
-
<Domain>twitter.com</Domain>
143
-
<DisplayName>Twitter</DisplayName>
142
+
<Domain>x.com</Domain>
143
+
<DisplayName>X</DisplayName>
144
144
<TechnicalProfiles>
145
145
<TechnicalProfileId="Twitter-OAuth1">
146
-
<DisplayName>Twitter</DisplayName>
146
+
<DisplayName>X</DisplayName>
147
147
<ProtocolName="OAuth1" />
148
148
<Metadata>
149
149
<ItemKey="ProviderName">Twitter</Item>
@@ -152,7 +152,7 @@ You can define a Twitter account as a claims provider by adding it to the **Clai
@@ -206,10 +206,10 @@ You can define a Twitter account as a claims provider by adding it to the **Clai
206
206
1. Select your relying party policy, for example `B2C_1A_signup_signin`.
207
207
1. For **Application**, select a web application that you [previously registered](tutorial-register-applications.md). The **Reply URL** should show `https://jwt.ms`.
208
208
1. Select the **Run now** button.
209
-
1. From the sign-up or sign-in page, select **Twitter** to sign in with Twitter account.
209
+
1. From the sign-up or sign-in page, select **Twitter** to sign in with X account.
210
210
::: zone-end
211
211
212
212
If the sign-in process is successful, your browser is redirected to `https://jwt.ms`, which displays the contents of the token returned by Azure AD B2C.
213
213
214
214
> [!TIP]
215
-
> If you're facing `unauthorized` error while testing this identity provider, make sure you use the correct Twitter API Key and API Key Secret, or try to apply for [elevated](https://developer.twitter.com/en/portal/products/elevated) access. Also, we recommend you've a look at [Twitter's projects structure](https://developer.twitter.com/en/docs/projects/overview), if you registered your app before the feature was available.
215
+
> If you're facing `unauthorized` error while testing this identity provider, make sure you use the correct X API Key and API Key Secret, or try to apply for [elevated](https://developer.x.com/en/portal/products/elevated) access. Also, we recommend you've a look at [X's projects structure](https://developer.x.com/en/docs/projects/overview), if you registered your app before the feature was available.
Copy file name to clipboardExpand all lines: articles/active-directory-b2c/oauth1-technical-profile.md
+5-5Lines changed: 5 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -14,23 +14,23 @@ ms.author: kengaderdus
14
14
ms.subservice: B2C
15
15
16
16
17
-
#Customer intent: As a developer implementing Azure Active Directory B2C custom policies, I want to define an OAuth1 technical profile, so that I can federate with an OAuth1 based identity provider like Twitter and allow users to sign in with their existing social or enterprise identities.
17
+
#Customer intent: As a developer implementing Azure Active Directory B2C custom policies, I want to define an OAuth1 technical profile, so that I can federate with an OAuth1 based identity provider like X and allow users to sign in with their existing social or enterprise identities.
18
18
19
19
---
20
20
21
21
# Define an OAuth1 technical profile in an Azure Active Directory B2C custom policy
Azure Active Directory B2C (Azure AD B2C) provides support for the [OAuth 1.0 protocol](https://tools.ietf.org/html/rfc5849) identity provider. This article describes the specifics of a technical profile for interacting with a claims provider that supports this standardized protocol. With an OAuth1 technical profile, you can federate with an OAuth1 based identity provider, such as Twitter. Federating with the identity provider allows users to sign in with their existing social or enterprise identities.
25
+
Azure Active Directory B2C (Azure AD B2C) provides support for the [OAuth 1.0 protocol](https://tools.ietf.org/html/rfc5849) identity provider. This article describes the specifics of a technical profile for interacting with a claims provider that supports this standardized protocol. With an OAuth1 technical profile, you can federate with an OAuth1 based identity provider, such as X. Federating with the identity provider allows users to sign in with their existing social or enterprise identities.
26
26
27
27
## Protocol
28
28
29
29
The **Name** attribute of the **Protocol** element needs to be set to `OAuth1`. For example, the protocol for the **Twitter-OAUTH1** technical profile is `OAuth1`.
30
30
31
31
```xml
32
32
<TechnicalProfileId="Twitter-OAUTH1">
33
-
<DisplayName>Twitter</DisplayName>
33
+
<DisplayName>X</DisplayName>
34
34
<ProtocolName="OAuth1" />
35
35
...
36
36
```
@@ -45,7 +45,7 @@ The **OutputClaims** element contains a list of claims returned by the OAuth1 id
45
45
46
46
The **OutputClaimsTransformations** element may contain a collection of **OutputClaimsTransformation** elements that are used to modify the output claims or generate new ones.
47
47
48
-
The following example shows the claims returned by the Twitter identity provider:
48
+
The following example shows the claims returned by the X identity provider:
49
49
50
50
- The **user_id** claim that is mapped to the **issuerUserId** claim.
51
51
- The **screen_name** claim that is mapped to the **displayName** claim.
@@ -92,4 +92,4 @@ When you configure the redirect URI of your identity provider, enter `https://{t
92
92
93
93
Examples:
94
94
95
-
-[Add Twitter as an OAuth1 identity provider by using custom policies](identity-provider-twitter.md)
95
+
-[Add X as an OAuth1 identity provider by using custom policies](identity-provider-twitter.md)
Copy file name to clipboardExpand all lines: articles/active-directory-b2c/userjourneys.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -261,7 +261,7 @@ The **ClaimsProviderSelection** element contains the following attributes:
261
261
262
262
### Claims provider selection example
263
263
264
-
In the following orchestration step, the user can choose to sign in with Facebook, LinkedIn, Twitter, Google, or a local account. If the user selects one of the social identity providers, the second orchestration step executes with the selected claim exchange specified in the `TargetClaimsExchangeId` attribute. The second orchestration step redirects the user to the social identity provider to complete the sign-in process. If the user chooses to sign in with the local account, Azure AD B2C stays on the same orchestration step (the same sign-up page or sign-in page) and skips the second orchestration step.
264
+
In the following orchestration step, the user can choose to sign in with Facebook, LinkedIn, X, Google, or a local account. If the user selects one of the social identity providers, the second orchestration step executes with the selected claim exchange specified in the `TargetClaimsExchangeId` attribute. The second orchestration step redirects the user to the social identity provider to complete the sign-in process. If the user chooses to sign in with the local account, Azure AD B2C stays on the same orchestration step (the same sign-up page or sign-in page) and skips the second orchestration step.
Copy file name to clipboardExpand all lines: articles/advisor/index.yml
+3-3Lines changed: 3 additions & 3 deletions
Original file line number
Diff line number
Diff line change
@@ -6,11 +6,11 @@ summary: Azure Advisor scans your Azure configuration and recommends changes to
6
6
metadata:
7
7
title: Azure Advisor documentation
8
8
description: Azure Advisor is a personalized cloud consultant that helps you follow best practices to optimize your Azure deployments. It analyzes your resource configuration and usage telemetry. It then recommends solutions to help improve the performance, security, and high availability of your resources while looking for opportunities to reduce your overall Azure spend.
0 commit comments