You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory-b2c/partner-idemia.md
+48-47Lines changed: 48 additions & 47 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -72,6 +72,7 @@ To get started, you need:
72
72
* Your business web application registered in Azure AD B2C tenant.
73
73
* For testing, configure https://jwt.ms, a Microsoft-owned web application with decoded token contents.
74
74
75
+
75
76
>[!NOTE]
76
77
>The token contents never leave your browser.
77
78
@@ -165,18 +166,18 @@ Set client_id to the application ID from the application registration.
165
166
166
167
|Property | Description|
167
168
|---|---|
168
-
|Scope| For OpenID Connect (OIDC) the minimum requirement is scope parameter is set to **openid**. Append more scopes as a space-delimited list.|
169
+
|Scope| For OpenID Connect (OIDC), the minimum requirement is set scope parameter to **openid**. Append more scopes as a space-delimited list.|
169
170
|redirect_uri | This location is where the user agent sends the authorization code to Azure AD B2C.|
170
-
|response_type| For the authorization code flow, this is set to**code**|
171
+
|response_type| For the authorization code flow, select**code**|
171
172
|acr_values| This parameter controls the authentication methods the user must perform during authentication. |
172
173
173
174
Select one of the following values:
174
175
175
176
|Parameter value| Effect on user authentication process |
176
177
|---|---|
177
-
|`loa-2`| Crypto-based Azure AD Multi-Factor Authentication only|
178
-
|`loa-3`| Crypto-based Azure AD Multi-Factor Authentication plus one additional factor|
179
-
|`loa-4`| Crypto-based Azure AD Multi-Factor Authentication with the requirement the user must perform PIN-based and biometric authentication |
178
+
|`loa-2`| Crypto-based Azure AD Multi-Factor Authentication (MFA) only|
179
+
|`loa-3`| Crypto-based MFA, plus an additional factor|
180
+
|`loa-4`| Crypto-based MFA, plus the user performs PIN and biometric authentication |
180
181
181
182
The **/userinfo** endpoint provides the claims for the scope(s) requested in the authorization request. For the **<mt_scope>** this includes claims like First Name, Last Name, and Driver's License Number, among other items.
182
183
The claims set for a scope are published in the **scope_to_claims_mapping** section of the discovery API.
@@ -195,25 +196,25 @@ Azure AD B2C requests claims from the claims endpoint and returns them in the Ou
195
196
196
197
### Add a user journey
197
198
198
-
At this point, the IdP has been set up, but it's not yet available in any of the sign-in pages. If you don't have your own custom user journey, create a duplicate of an existing template user journey, otherwise continue to the next step.
199
-
200
-
1. Open the `TrustFrameworkBase.xml` file from the starter pack.
201
-
202
-
2. Find and copy the entire contents of the **UserJourneys** element that includes `ID=SignUpOrSignIn`.
203
-
204
-
3. Open the `TrustFrameworkExtensions.xml` and find the **UserJourneys** element. If the element doesn't exist, add one.
205
-
206
-
4. Paste the entire content of the **UserJourney** element that you copied as a child of the UserJourneys element.
199
+
The IdP is set up, but it's not in any sign-in page. If you don't have a custom user journey, copy a template user journey.
207
200
208
-
5. Rename the ID of the user journey. For example, `ID=CustomSignUpSignIn`.
201
+
1. From the starter pack, open the `TrustFrameworkBase.xml` file.
202
+
2. Locate and copy the contents of the `UserJourneys` element, which includes `ID=SignUpOrSignIn`.
203
+
3. Open the `TrustFrameworkExtensions.xml`.
204
+
4. Locate the **UserJourneys** element. If there is no element, add one.
205
+
5. Paste the contents of the **UserJourney** element as a child of the UserJourneys element.
206
+
6. Rename the user journey ID. For example, `ID=CustomSignUpSignIn`.
209
207
210
-
### Part 5 - Add the IdP to a user journey
208
+
### Add the IdP to a user journey
211
209
212
-
Now that you have a user journey, add the new IdP to the user journey. First add a sign-in button, then link the button to an action. The action is the technical profile you created earlier.
210
+
If there's a user journey, add the new IdP to it. First add a sign-in button, then link it to an action, which is the technical profile you created.
213
211
214
-
1. Find the orchestration step element that includes Type=`CombinedSignInAndSignUp`, or Type=`ClaimsProviderSelection` in the user journey. It's usually the first orchestration step. The **ClaimsProviderSelections** element contains a list of IdPs that a user can sign in with. The order of the elements controls the order of the sign-in buttons presented to the user. Add a **ClaimsProviderSelection** XML element. Set the value of **TargetClaimsExchangeId** to a friendly name.
215
-
216
-
2. In the next orchestration step, add a **ClaimsExchange** element. Set the **Id** to the value of the target claims exchange ID. Update the value of **TechnicalProfileReferenceId** to the ID of the technical profile you created earlier.
212
+
1. In the user journey, locate the orchestration step element with Type=`CombinedSignInAndSignUp`, or Type=`ClaimsProviderSelection`. It's usually the first orchestration step. The **ClaimsProviderSelections** element has an IdP list users sign in with. The order of the elements controls is the order of the sign-in buttons the user sees.
213
+
2. Add a **ClaimsProviderSelection** XML element.
214
+
3. Set the **TargetClaimsExchangeId** value to a friendly name.
215
+
4. Add a **ClaimsExchange** element.
216
+
5. Set the **Id** to the value of the target claims exchange ID.
217
+
6. Update the **TechnicalProfileReferenceId** value to the technical profile ID you created.
217
218
218
219
The following XML demonstrates the first two orchestration steps of a user journey with the IdP:
219
220
@@ -234,9 +235,12 @@ The following XML demonstrates the first two orchestration steps of a user journ
234
235
</OrchestrationStep>
235
236
```
236
237
237
-
### Part 6 - Configure the relying party policy
238
+
### Configure the relying party policy
239
+
240
+
The relying party policy, for example [SignUpSignIn.xml](https://github.com/Azure-Samples/active-directory-b2c-custom-policy-starterpack/blob/master/SocialAndLocalAccounts/SignUpOrSignin.xml), specifies the user journey tkhe Azure AD B2C executes.
238
241
239
-
The relying party policy, for example [SignUpSignIn.xml](https://github.com/Azure-Samples/active-directory-b2c-custom-policy-starterpack/blob/master/SocialAndLocalAccounts/SignUpOrSignin.xml), specifies the user journey which Azure AD B2C will execute. Find the **DefaultUserJourney** element within relying party. Update the **ReferenceId** to match the user journey ID, in which you added the IdP.
242
+
1. Find the **DefaultUserJourney** element in relying party.
243
+
2. Update the **ReferenceId** to match the user journey ID, in which you added the IdP.
240
244
241
245
In the following example, for the `CustomSignUpOrSignIn` user journey, the **ReferenceId** is set to `CustomSignUpOrSignIn`.
242
246
@@ -247,39 +251,36 @@ In the following example, for the `CustomSignUpOrSignIn` user journey, the **Ref
247
251
</RelyingParty>
248
252
```
249
253
250
-
### Part 7 - Upload the custom policy
251
-
252
-
1. Sign in to the [Azure portal](https://portal.azure.com/#home).
253
-
254
-
2. Make sure you're using the directory that contains your Azure AD B2C tenant. Select the **Directories + subscriptions** icon in the portal toolbar.
254
+
### Upload the custom policy
255
255
256
-
3. On the **Portal settings | Directories + subscriptions** page, find your Azure AD B2C directory in the **Directory name** list, and then select **Switch**.
256
+
For the following instructions, use the directory with your Azure AD B2C tenant.
257
257
258
-
4. In the [Azure portal](https://portal.azure.com/#home), search for and select **Azure AD B2C**.
259
-
260
-
5. Under Policies, select **Identity Experience Framework**.
258
+
1. Sign in to the [Azure portal](https://portal.azure.com/#home).
259
+
2. In the portal toolbar, select the **Directories + subscriptions**.
260
+
3. On the **Portal settings, Directories + subscriptions** page, in the **Directory name** list, find your Azure AD B2C directory.
261
+
4. Select **Switch**.
262
+
5. In the Azure portal, search for and select **Azure AD B2C**.
263
+
6. Under **Policies**, select **Identity Experience Framework**.
264
+
7. Select **Upload Custom Policy**.
265
+
8. Upload the two policy files you changed, in the following order:
261
266
262
-
Select **Upload Custom Policy**, and then upload the two policy files that you changed, in the following order: the extension policy, for example `TrustFrameworkExtensions.xml`, then the relying party policy, such as `SignUpSignIn.xml`.
267
+
* The extension policy, for example `TrustFrameworkExtensions.xml`
268
+
* The relying party policy, such as `SignUpSignIn.xml`
263
269
264
-
### Part 8 - Test your custom policy
270
+
### Test your custom policy
265
271
266
272
1. Select your relying party policy, for example `B2C_1A_signup_signin`.
273
+
2. For **Application**, select a web application you registered.
274
+
3.`https://jwt.ms`appears for **Reply URL**.
275
+
4. Select **Run now**.
276
+
5. From the sign-up or sign-in page, select **IDEMIA**.
277
+
6. The browser is redirected to `https://jwt.ms`. See the token contents returned by Azure AD B2C.
267
278
268
-
2. For **Application**, select a web application that you [previously registered](./tutorial-register-applications.md). The **Reply URL** should show `https://jwt.ms`.
269
-
270
-
3. Select the **Run now** button.
271
-
272
-
4. From the sign-up or sign-in page, select **IDEMIA** to sign in with an IDEMIA - US State issued mID (Mobile ID Credential).
273
-
274
-
If the sign-in process is successful, your browser is redirected to `https://jwt.ms`, which displays the contents of the token returned by Azure AD B2C.
279
+
Learn more: [Tutorial: Register a web application in Azure AD B2C](./tutorial-register-applications.md)
275
280
276
281
277
282
## Next steps
278
283
279
-
For additional information, review the following articles:
280
-
281
-
-[Custom policies in Azure AD B2C](custom-policy-overview.md)
282
-
283
-
-[Get started with custom policies in Azure AD B2C](tutorial-create-user-flows.md?pivots=b2c-custom-policy)
284
-
285
-
-[Learn more about IDEMIA mID](https://www.idemia.com/mobile-id)
284
+
*[Azure AD B2C custom policy overview](custom-policy-overview.md)
285
+
*[Tutorial: Create user flows and custom policies in Azure AD B2C](tutorial-create-user-flows.md?pivots=b2c-custom-policy)
286
+
* Go to idemia.com for [Mobile ID: Proving your identity with greater privacy](https://www.idemia.com/mobile-id)
0 commit comments