You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory-b2c/identity-provider-amazon-custom.md
+9-10Lines changed: 9 additions & 10 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -9,7 +9,7 @@ manager: celestedg
9
9
ms.service: active-directory
10
10
ms.workload: identity
11
11
ms.topic: conceptual
12
-
ms.date: 10/05/2018
12
+
ms.date: 05/04/2020
13
13
ms.author: mimart
14
14
ms.subservice: B2C
15
15
---
@@ -25,17 +25,16 @@ This article shows you how to enable sign-in for users from an Amazon account by
25
25
- Complete the steps in [Get started with custom policies](custom-policy-get-started.md).
26
26
- If you don't already have an Amazon account, create one at [https://www.amazon.com/](https://www.amazon.com/).
27
27
28
-
## Register the application
28
+
## Create an app in the Amazon developer console
29
29
30
-
To enable sign-in for users from an Amazon account, you need to create an Amazon application.
30
+
To use an Amazon account as a federated identity provider in Azure Active Directory B2C (Azure AD B2C), you need to create an application in your [Amazon Developer Services and Technologies](https://developer.amazon.com). If you don't already have an Amazon account, you can sign up at [https://www.amazon.com/](https://www.amazon.com/).
31
31
32
-
1. Sign in to the [Amazon Developer Center](https://login.amazon.com/) with your Amazon account credentials.
33
-
2. If you have not already done so, click **Sign Up**, follow the developer registration steps, and accept the policy.
34
-
3. Select **Register new application**.
35
-
4. Enter a **Name**, **Description**, and **Privacy Notice URL**, and then click **Save**. The privacy notice is a page that you manage that provides privacy information to users.
36
-
5. In the **Web Settings** section, copy the values of **Client ID**. Select **Show Secret** to get the client secret and then copy it. You need both of them to configure an Amazon account as an identity provider in your tenant. **Client Secret** is an important security credential.
37
-
6. In the **Web Settings** section, select **Edit**, and then enter `https://your-tenant-name.b2clogin.com` in **Allowed JavaScript Origins** and `https://your-tenant-name.b2clogin.com/your-tenant-name.onmicrosoft.com/oauth2/authresp` in **Allowed Return URLs**. Replace `your-tenant-name` with the name of your tenant. Use all lowercase letters when entering your tenant name even if the tenant is defined with uppercase letters in Azure AD B2C.
38
-
7. Click **Save**.
32
+
> [!NOTE]
33
+
> Use the following URLs in **step 8** below, replacing `your-tenant-name` with the name of your tenant. When entering your tenant name, use all lowercase letters, even if the tenant is defined with uppercase letters in Azure AD B2C.
34
+
> - For **Allowed Origins**, enter `https://your-tenant-name.b2clogin.com`
35
+
> - For **Allowed Return URLs**, enter `https://your-tenant-name.b2clogin.com/your-tenant-name.onmicrosoft.com/oauth2/authresp`
Copy file name to clipboardExpand all lines: articles/active-directory-b2c/identity-provider-amazon.md
+9-10Lines changed: 9 additions & 10 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -9,24 +9,23 @@ manager: celestedg
9
9
ms.service: active-directory
10
10
ms.workload: identity
11
11
ms.topic: conceptual
12
-
ms.date: 08/08/2019
12
+
ms.date: 04/05/2020
13
13
ms.author: mimart
14
14
ms.subservice: B2C
15
15
---
16
16
17
17
# Set up sign-up and sign-in with an Amazon account using Azure Active Directory B2C
18
18
19
-
## Create an Amazon application
19
+
## Create an app in the Amazon developer console
20
20
21
-
To use an Amazon account as an [identity provider](authorization-code-flow.md) in Azure Active Directory B2C (Azure AD B2C), you need to create an application in your tenant that represents it. If you don't already have an Amazon account you can sign up at [https://www.amazon.com/](https://www.amazon.com/).
21
+
To use an Amazon account as a federated identity provider in Azure Active Directory B2C (Azure AD B2C), you need to create an application in your [Amazon Developer Services and Technologies](https://developer.amazon.com). If you don't already have an Amazon account, you can sign up at [https://www.amazon.com/](https://www.amazon.com/).
22
22
23
-
1. Sign in to the [Amazon Developer Center](https://login.amazon.com/) with your Amazon account credentials.
24
-
1. If you have not already done so, click **Sign Up**, follow the developer registration steps, and accept the policy.
25
-
1. Select **Register new application**.
26
-
1. Enter a **Name**, **Description**, and **Privacy Notice URL**, and then click **Save**. The privacy notice is a page that you manage that provides privacy information to users.
27
-
1. In the **Web Settings** section, copy the values of **Client ID**. Select **Show Secret** to get the client secret and then copy it. You need both of them to configure an Amazon account as an identity provider in your tenant. **Client Secret** is an important security credential.
28
-
1. In the **Web Settings** section, select **Edit**, and then enter `https://your-tenant-name.b2clogin.com` in **Allowed JavaScript Origins** and `https://your-tenant-name.b2clogin.com/your-tenant-name.onmicrosoft.com/oauth2/authresp` in **Allowed Return URLs**. Replace `your-tenant-name` with the name of your tenant. You need to use all lowercase letters when entering your tenant name even if the tenant is defined with uppercase letters in Azure AD B2C.
29
-
1. Click **Save**.
23
+
> [!NOTE]
24
+
> Use the following URLs in **step 8** below, replacing `your-tenant-name` with the name of your tenant. When entering your tenant name, use all lowercase letters, even if the tenant is defined with uppercase letters in Azure AD B2C.
25
+
> - For **Allowed Origins**, enter `https://your-tenant-name.b2clogin.com`
26
+
> - For **Allowed Return URLs**, enter `https://your-tenant-name.b2clogin.com/your-tenant-name.onmicrosoft.com/oauth2/authresp`
1. Sign in to the [Amazon Developer Console](https://developer.amazon.com/dashboard) with your Amazon account credentials.
11
+
1. If you have not already done so, click **Sign Up**, follow the developer registration steps, and accept the policy.
12
+
1. From the Dashboard, select **Login with Amazon**.
13
+
1. Select **Create a New Security Profile**.
14
+
1. Enter a **Security Profile Name**, **Security Profile Description**, and **Consent Privacy Notice URL**, for example `https://www.contoso.com/privacy` The privacy notice URL is a page that you manage that provides privacy information to users. Then click **Save**.
15
+
1. In the **Login with Amazon Configurations** section, select the **Security Profile Name** you created, click on the **Manage** icon and select **Web Settings**.
16
+
1. In the **Web Settings** section, copy the values of **Client ID**. Select **Show Secret** to get the client secret and then copy it. You need both of them to configure an Amazon account as an identity provider in your tenant. **Client Secret** is an important security credential.
17
+
1. In the **Web Settings** section, select **Edit**. In **Allowed Origins** and **Allowed Return URLs**, enter the appropriate URLs (noted above).
0 commit comments