Skip to content

Commit 5c1327d

Browse files
authored
Update partner-idemia.md
1 parent d2ae4a1 commit 5c1327d

File tree

1 file changed

+48
-47
lines changed

1 file changed

+48
-47
lines changed

articles/active-directory-b2c/partner-idemia.md

Lines changed: 48 additions & 47 deletions
Original file line numberDiff line numberDiff line change
@@ -72,6 +72,7 @@ To get started, you need:
7272
* Your business web application registered in Azure AD B2C tenant.
7373
* For testing, configure https://jwt.ms, a Microsoft-owned web application with decoded token contents.
7474

75+
7576
>[!NOTE]
7677
>The token contents never leave your browser.
7778
@@ -165,18 +166,18 @@ Set client_id to the application ID from the application registration.
165166

166167
|Property | Description|
167168
|---|---|
168-
|Scope| For OpenID Connect (OIDC) the minimum requirement is scope parameter is set to **openid**. Append more scopes as a space-delimited list.|
169+
|Scope| For OpenID Connect (OIDC), the minimum requirement is set scope parameter to **openid**. Append more scopes as a space-delimited list.|
169170
|redirect_uri | This location is where the user agent sends the authorization code to Azure AD B2C.|
170-
|response_type| For the authorization code flow, this is set to **code**|
171+
|response_type| For the authorization code flow, select **code**|
171172
|acr_values| This parameter controls the authentication methods the user must perform during authentication. |
172173

173174
Select one of the following values:
174175

175176
|Parameter value| Effect on user authentication process |
176177
|---|---|
177-
|`loa-2`| Crypto-based Azure AD Multi-Factor Authentication only|
178-
|`loa-3`| Crypto-based Azure AD Multi-Factor Authentication plus one additional factor|
179-
|`loa-4`| Crypto-based Azure AD Multi-Factor Authentication with the requirement the user must perform PIN-based and biometric authentication |
178+
|`loa-2`| Crypto-based Azure AD Multi-Factor Authentication (MFA) only|
179+
|`loa-3`| Crypto-based MFA, plus an additional factor|
180+
|`loa-4`| Crypto-based MFA, plus the user performs PIN and biometric authentication |
180181

181182
The **/userinfo** endpoint provides the claims for the scope(s) requested in the authorization request. For the **<mt_scope>** this includes claims like First Name, Last Name, and Driver's License Number, among other items.
182183
The claims set for a scope are published in the **scope_to_claims_mapping** section of the discovery API.
@@ -195,25 +196,25 @@ Azure AD B2C requests claims from the claims endpoint and returns them in the Ou
195196

196197
### Add a user journey
197198

198-
At this point, the IdP has been set up, but it's not yet available in any of the sign-in pages. If you don't have your own custom user journey, create a duplicate of an existing template user journey, otherwise continue to the next step.
199-
200-
1. Open the `TrustFrameworkBase.xml` file from the starter pack.
201-
202-
2. Find and copy the entire contents of the **UserJourneys** element that includes `ID=SignUpOrSignIn`.
203-
204-
3. Open the `TrustFrameworkExtensions.xml` and find the **UserJourneys** element. If the element doesn't exist, add one.
205-
206-
4. Paste the entire content of the **UserJourney** element that you copied as a child of the UserJourneys element.
199+
The IdP is set up, but it's not in any sign-in page. If you don't have a custom user journey, copy a template user journey.
207200

208-
5. Rename the ID of the user journey. For example, `ID=CustomSignUpSignIn`.
201+
1. From the starter pack, open the `TrustFrameworkBase.xml` file.
202+
2. Locate and copy the contents of the `UserJourneys` element, which includes `ID=SignUpOrSignIn`.
203+
3. Open the `TrustFrameworkExtensions.xml`.
204+
4. Locate the **UserJourneys** element. If there is no element, add one.
205+
5. Paste the contents of the **UserJourney** element as a child of the UserJourneys element.
206+
6. Rename the user journey ID. For example, `ID=CustomSignUpSignIn`.
209207

210-
### Part 5 - Add the IdP to a user journey
208+
### Add the IdP to a user journey
211209

212-
Now that you have a user journey, add the new IdP to the user journey. First add a sign-in button, then link the button to an action. The action is the technical profile you created earlier.
210+
If there's a user journey, add the new IdP to it. First add a sign-in button, then link it to an action, which is the technical profile you created.
213211

214-
1. Find the orchestration step element that includes Type=`CombinedSignInAndSignUp`, or Type=`ClaimsProviderSelection` in the user journey. It's usually the first orchestration step. The **ClaimsProviderSelections** element contains a list of IdPs that a user can sign in with. The order of the elements controls the order of the sign-in buttons presented to the user. Add a **ClaimsProviderSelection** XML element. Set the value of **TargetClaimsExchangeId** to a friendly name.
215-
216-
2. In the next orchestration step, add a **ClaimsExchange** element. Set the **Id** to the value of the target claims exchange ID. Update the value of **TechnicalProfileReferenceId** to the ID of the technical profile you created earlier.
212+
1. In the user journey, locate the orchestration step element with Type=`CombinedSignInAndSignUp`, or Type=`ClaimsProviderSelection`. It's usually the first orchestration step. The **ClaimsProviderSelections** element has an IdP list users sign in with. The order of the elements controls is the order of the sign-in buttons the user sees.
213+
2. Add a **ClaimsProviderSelection** XML element.
214+
3. Set the **TargetClaimsExchangeId** value to a friendly name.
215+
4. Add a **ClaimsExchange** element.
216+
5. Set the **Id** to the value of the target claims exchange ID.
217+
6. Update the **TechnicalProfileReferenceId** value to the technical profile ID you created.
217218

218219
The following XML demonstrates the first two orchestration steps of a user journey with the IdP:
219220

@@ -234,9 +235,12 @@ The following XML demonstrates the first two orchestration steps of a user journ
234235
</OrchestrationStep>
235236
```
236237

237-
### Part 6 - Configure the relying party policy
238+
### Configure the relying party policy
239+
240+
The relying party policy, for example [SignUpSignIn.xml](https://github.com/Azure-Samples/active-directory-b2c-custom-policy-starterpack/blob/master/SocialAndLocalAccounts/SignUpOrSignin.xml), specifies the user journey tkhe Azure AD B2C executes.
238241

239-
The relying party policy, for example [SignUpSignIn.xml](https://github.com/Azure-Samples/active-directory-b2c-custom-policy-starterpack/blob/master/SocialAndLocalAccounts/SignUpOrSignin.xml), specifies the user journey which Azure AD B2C will execute. Find the **DefaultUserJourney** element within relying party. Update the **ReferenceId** to match the user journey ID, in which you added the IdP.
242+
1. Find the **DefaultUserJourney** element in relying party.
243+
2. Update the **ReferenceId** to match the user journey ID, in which you added the IdP.
240244

241245
In the following example, for the `CustomSignUpOrSignIn` user journey, the **ReferenceId** is set to `CustomSignUpOrSignIn`.
242246

@@ -247,39 +251,36 @@ In the following example, for the `CustomSignUpOrSignIn` user journey, the **Ref
247251
</RelyingParty>
248252
```
249253

250-
### Part 7 - Upload the custom policy
251-
252-
1. Sign in to the [Azure portal](https://portal.azure.com/#home).
253-
254-
2. Make sure you're using the directory that contains your Azure AD B2C tenant. Select the **Directories + subscriptions** icon in the portal toolbar.
254+
### Upload the custom policy
255255

256-
3. On the **Portal settings | Directories + subscriptions** page, find your Azure AD B2C directory in the **Directory name** list, and then select **Switch**.
256+
For the following instructions, use the directory with your Azure AD B2C tenant.
257257

258-
4. In the [Azure portal](https://portal.azure.com/#home), search for and select **Azure AD B2C**.
259-
260-
5. Under Policies, select **Identity Experience Framework**.
258+
1. Sign in to the [Azure portal](https://portal.azure.com/#home).
259+
2. In the portal toolbar, select the **Directories + subscriptions**.
260+
3. On the **Portal settings, Directories + subscriptions** page, in the **Directory name** list, find your Azure AD B2C directory.
261+
4. Select **Switch**.
262+
5. In the Azure portal, search for and select **Azure AD B2C**.
263+
6. Under **Policies**, select **Identity Experience Framework**.
264+
7. Select **Upload Custom Policy**.
265+
8. Upload the two policy files you changed, in the following order:
261266

262-
Select **Upload Custom Policy**, and then upload the two policy files that you changed, in the following order: the extension policy, for example `TrustFrameworkExtensions.xml`, then the relying party policy, such as `SignUpSignIn.xml`.
267+
* The extension policy, for example `TrustFrameworkExtensions.xml`
268+
* The relying party policy, such as `SignUpSignIn.xml`
263269

264-
### Part 8 - Test your custom policy
270+
### Test your custom policy
265271

266272
1. Select your relying party policy, for example `B2C_1A_signup_signin`.
273+
2. For **Application**, select a web application you registered.
274+
3. `https://jwt.ms`appears for **Reply URL**.
275+
4. Select **Run now**.
276+
5. From the sign-up or sign-in page, select **IDEMIA**.
277+
6. The browser is redirected to `https://jwt.ms`. See the token contents returned by Azure AD B2C.
267278

268-
2. For **Application**, select a web application that you [previously registered](./tutorial-register-applications.md). The **Reply URL** should show `https://jwt.ms`.
269-
270-
3. Select the **Run now** button.
271-
272-
4. From the sign-up or sign-in page, select **IDEMIA** to sign in with an IDEMIA - US State issued mID (Mobile ID Credential).
273-
274-
If the sign-in process is successful, your browser is redirected to `https://jwt.ms`, which displays the contents of the token returned by Azure AD B2C.
279+
Learn more: [Tutorial: Register a web application in Azure AD B2C](./tutorial-register-applications.md)
275280

276281

277282
## Next steps
278283

279-
For additional information, review the following articles:
280-
281-
- [Custom policies in Azure AD B2C](custom-policy-overview.md)
282-
283-
- [Get started with custom policies in Azure AD B2C](tutorial-create-user-flows.md?pivots=b2c-custom-policy)
284-
285-
- [Learn more about IDEMIA mID](https://www.idemia.com/mobile-id)
284+
* [Azure AD B2C custom policy overview](custom-policy-overview.md)
285+
* [Tutorial: Create user flows and custom policies in Azure AD B2C](tutorial-create-user-flows.md?pivots=b2c-custom-policy)
286+
* Go to idemia.com for [Mobile ID: Proving your identity with greater privacy](https://www.idemia.com/mobile-id)

0 commit comments

Comments
 (0)