You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory-b2c/identity-provider-microsoft-account-custom.md
+20-5Lines changed: 20 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -9,7 +9,7 @@ manager: celestedg
9
9
ms.service: active-directory
10
10
ms.workload: identity
11
11
ms.topic: conceptual
12
-
ms.date: 07/08/2019
12
+
ms.date: 02/19/2020
13
13
ms.author: marsma
14
14
ms.subservice: B2C
15
15
---
@@ -25,7 +25,7 @@ This article shows you how to enable sign-in for users from a Microsoft account
25
25
- Complete the steps in [Get started with custom policies in Azure Active Directory B2C](custom-policy-get-started.md).
26
26
- If you don't already have a Microsoft account, create one at [https://www.live.com/](https://www.live.com/).
27
27
28
-
## Add an application
28
+
## Register an application
29
29
30
30
To enable sign-in for users with a Microsoft account, you need to register an application within the Azure AD tenant. The Azure AD tenant is not the same as your Azure AD B2C tenant.
31
31
@@ -43,6 +43,19 @@ To enable sign-in for users with a Microsoft account, you need to register an ap
43
43
1. Enter a **Description** for the secret, for example *MSA Application Client Secret*, and then click **Add**.
44
44
1. Record the application password shown in the **Value** column. You use this value in the next section.
45
45
46
+
## Configuring optional claims
47
+
48
+
If you want to get the `family_name` and `given_name` claims from Azure AD, you can configure optional claims for your application in the Azure portal UI or application manifest. For more information, see [How to provide optional claims to your Azure AD app](../active-directory/develop/active-directory-optional-claims.md).
49
+
50
+
1. Sign in to the [Azure portal](https://portal.azure.com). Search for and select **Azure Active Directory**.
51
+
1. From the **Manage** section, select **App registrations**.
52
+
1. Select the application you want to configure optional claims for in the list.
53
+
1. From the **Manage** section, select **Token configuration (preview)**.
54
+
1. Select **Add optional claim**.
55
+
1. Select the token type you want to configure.
56
+
1. Select the optional claims to add.
57
+
1. Click **Add**.
58
+
46
59
## Create a policy key
47
60
48
61
Now that you've created the application in your Azure AD tenant, you need to store that application's client secret in your Azure AD B2C tenant.
@@ -90,10 +103,12 @@ You can define Azure AD as a claims provider by adding the **ClaimsProvider** el
0 commit comments