You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory-b2c/active-directory-technical-profile.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -9,7 +9,7 @@ manager: celestedg
9
9
ms.service: active-directory
10
10
ms.workload: identity
11
11
ms.topic: reference
12
-
ms.date: 03/24/2020
12
+
ms.date: 03/26/2020
13
13
ms.author: mimart
14
14
ms.subservice: B2C
15
15
---
@@ -251,7 +251,7 @@ The following technical profile deletes a social user account using **alternativ
251
251
| ClientId | No | The client identifier for accessing the tenant as a third party. For more information, see [Use custom attributes in a custom profile edit policy](custom-policy-custom-attributes.md)|
252
252
| IncludeClaimResolvingInClaimsHandling | No | For input and output claims, specifies whether [claims resolution](claim-resolver-overview.md) is included in the technical profile. Possible values: `true`, or `false` (default). If you want to use a claims resolver in the technical profile, set this to `true`. |
253
253
254
-
### Error messages
254
+
### UI elements
255
255
256
256
The following settings can be used to configure the error message displayed upon failure. The metadata should be configured in the [self-asserted](self-asserted-technical-profile.md) technical profile. The error messages can be [localized](localization.md).
Copy file name to clipboardExpand all lines: articles/active-directory-b2c/custom-policy-keep-me-signed-in.md
+20-2Lines changed: 20 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,7 +8,7 @@ manager: celestedg
8
8
ms.service: active-directory
9
9
ms.workload: identity
10
10
ms.topic: conceptual
11
-
ms.date: 03/24/2020
11
+
ms.date: 03/26/2020
12
12
ms.author: mimart
13
13
ms.subservice: B2C
14
14
---
@@ -48,9 +48,27 @@ To enable KMSI, set the content definition `DataUri` element to [page identifier
48
48
</BuildingBlocks>
49
49
```
50
50
51
-
1. Save the extensions file.
51
+
## Add the metadata to the self-asserted technical profile
52
+
53
+
To add the KMSI checkbox to the sign-up and sign-in page, set the `setting.enableRememberMe` metadata to false. Override the SelfAsserted-LocalAccountSignin-Email technical profiles in the extension file.
54
+
55
+
1. Find the ClaimsProviders element. If the element doesn't exist, add it.
56
+
1. Add the following claims provider to the ClaimsProviders element:
The Identity Experience Framework (IEF) that underpins Azure Active Directory B2C (Azure AD B2C) enables identity developers to integrate an interaction with a RESTful API in a user journey.
21
+
The Identity Experience Framework (IEF) that underpins Azure Active Directory B2C (Azure AD B2C) enables identity developers to integrate an interaction with a RESTful API in a user journey. At the end of this walkthrough, you'll be able to create an Azure AD B2C user journey that interacts with [RESTful services](custom-policy-rest-api-intro.md) to validate user input.
22
22
23
-
At the end of this walkthrough, you will be able to create an Azure AD B2C user journey that interacts with RESTful services.
24
-
25
-
IEF can send data that has been stored in a claims bag during a user journey to your REST API. It can also parse JSON responses received from the REST API into the Azure AD B2C claim bag. The interaction with the API:
26
-
27
-
- Can be designed as a REST API claims exchange called from an orchestration step, or as a [validation technical profile](validation-technical-profile.md) called from within a [self asserted technical profile](self-asserted-technical-profile.md).
28
-
- Typically validates input from the user. If the value from the user is rejected, the user can try again to enter a valid value with the opportunity to return an error message.
23
+
In this scenario, we'll add the ability for users to enter a loyalty number into the Azure AD B2C sign-up page. We'll validate whether this combination of email and loyalty number is mapped to a promotional code by sending this data to a REST API. If the REST API finds a promotional code for this user, it will be returned to Azure AD B2C. Finally, the promotional code will be inserted into the token claims for the application to consume.
29
24
30
25
You can also design the interaction as an orchestration step. This is suitable when the REST API will not be validating data on screen, and always return claims. For more information, see [Walkthrough: Integrate REST API claims exchanges in your Azure AD B2C user journey as an orchestration step](custom-policy-rest-api-claims-exchange.md).
31
26
32
-
For the validation profile example, we will use the profile edit user journey in the starter pack file ProfileEdit.xml.
33
-
34
-
We can verify that the name provided by the user in the profile edit is not part of an exclusion list.
35
-
36
-
## Scenario
37
-
38
-
In this scenario, we'll add the ability for users to enter a loyalty number into the Azure AD B2C sign-up page. We'll validate whether this combination of email and loyalty number is mapped to a promotional code by sending this data to a REST API. If the REST API finds a promotional code for this user, it will be returned to Azure AD B2C. Finally, the promotional code will be inserted into the token claims for the application to consume.
39
-
40
27
## Prerequisites
41
28
42
-
Complete the steps in [Get started with custom policies](custom-policy-get-started.md). You should have a working custom policy for sign-up and sign-in with local accounts.
29
+
- Complete the steps in [Get started with custom policies](custom-policy-get-started.md). You should have a working custom policy for sign-up and sign-in with local accounts.
30
+
- Learn how to [Integrate REST API claims exchanges in your Azure AD B2C custom policy](custom-policy-rest-api-intro.md).
43
31
44
32
## Prepare a REST API endpoint
45
33
@@ -110,7 +98,7 @@ A [Restful technical profile](restful-technical-profile.md) provides support for
110
98
<DisplayName>REST APIs</DisplayName>
111
99
<TechnicalProfiles>
112
100
<TechnicalProfileId="REST-ValidateProfile">
113
-
<DisplayName>Check Player Tag Web Hook Azure Function</DisplayName>
101
+
<DisplayName>Check loyaltyId Azure Function web hook</DisplayName>
@@ -138,7 +126,7 @@ A [Restful technical profile](restful-technical-profile.md) provides support for
138
126
139
127
In this example, the `userLanguage` will be sent to the REST service as `lang` within the JSON payload. The value of the `userLanguage` claim contains the current user language ID. For more information, see [claim resolver](claim-resolver-overview.md).
140
128
141
-
The comments above `AuthenticationType` and `AllowInsecureAuthInProduction` specify changes you should make when you move to a production environment. To learn how to secure your RESTful APIs for production, see [Secure RESTful APIs with basic auth](secure-rest-api-dotnet-basic-auth.md) and [Secure RESTful APIs with certificate auth](secure-rest-api-dotnet-certificate-auth.md).
129
+
The comments above `AuthenticationType` and `AllowInsecureAuthInProduction` specify changes you should make when you move to a production environment. To learn how to secure your RESTful APIs for production, see [Secure RESTful API](secure-rest-api.md).
142
130
143
131
## Validate the user input
144
132
@@ -253,7 +241,7 @@ To return the promo code claim back to the relying party application, add an out
253
241
"iat": 1584292103,
254
242
"auth_time": 1584292103,
255
243
"name": "Emily Smith",
256
-
"email": "joe@outlook.com",
244
+
"email": "emily@outlook.com",
257
245
"given_name": "Emily",
258
246
"family_name": "Smith",
259
247
"promoCode": "84362"
@@ -263,10 +251,8 @@ To return the promo code claim back to the relying party application, add an out
263
251
264
252
## Next steps
265
253
266
-
267
254
To learn how to secure your APIs, see the following articles:
268
255
269
256
-[Walkthrough: Integrate REST API claims exchanges in your Azure AD B2C user journey as an orchestration step](custom-policy-rest-api-claims-exchange.md)
270
-
-[Secure your RESTful API with basic authentication (username and password)](secure-rest-api-dotnet-basic-auth.md)
271
-
-[Secure your RESTful API with client certificates](secure-rest-api-dotnet-certificate-auth.md)
0 commit comments