Skip to content

Commit 60d246c

Browse files
authored
Update identity-provider-microsoft-account-custom.md
fixes: https://github.com/MicrosoftDocs/azure-docs/issues/48465
1 parent b746e67 commit 60d246c

File tree

1 file changed

+20
-5
lines changed

1 file changed

+20
-5
lines changed

articles/active-directory-b2c/identity-provider-microsoft-account-custom.md

Lines changed: 20 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: celestedg
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: conceptual
12-
ms.date: 07/08/2019
12+
ms.date: 02/19/2020
1313
ms.author: marsma
1414
ms.subservice: B2C
1515
---
@@ -25,7 +25,7 @@ This article shows you how to enable sign-in for users from a Microsoft account
2525
- Complete the steps in [Get started with custom policies in Azure Active Directory B2C](custom-policy-get-started.md).
2626
- If you don't already have a Microsoft account, create one at [https://www.live.com/](https://www.live.com/).
2727

28-
## Add an application
28+
## Register an application
2929

3030
To enable sign-in for users with a Microsoft account, you need to register an application within the Azure AD tenant. The Azure AD tenant is not the same as your Azure AD B2C tenant.
3131

@@ -43,6 +43,19 @@ To enable sign-in for users with a Microsoft account, you need to register an ap
4343
1. Enter a **Description** for the secret, for example *MSA Application Client Secret*, and then click **Add**.
4444
1. Record the application password shown in the **Value** column. You use this value in the next section.
4545

46+
## Configuring optional claims
47+
48+
If you want to get the `family_name` and `given_name` claims from Azure AD, you can configure optional claims for your application in the Azure portal UI or application manifest. For more information, see [How to provide optional claims to your Azure AD app](../active-directory/develop/active-directory-optional-claims.md).
49+
50+
1. Sign in to the [Azure portal](https://portal.azure.com). Search for and select **Azure Active Directory**.
51+
1. From the **Manage** section, select **App registrations**.
52+
1. Select the application you want to configure optional claims for in the list.
53+
1. From the **Manage** section, select **Token configuration (preview)**.
54+
1. Select **Add optional claim**.
55+
1. Select the token type you want to configure.
56+
1. Select the optional claims to add.
57+
1. Click **Add**.
58+
4659
## Create a policy key
4760

4861
Now that you've created the application in your Azure AD tenant, you need to store that application's client secret in your Azure AD B2C tenant.
@@ -90,10 +103,12 @@ You can define Azure AD as a claims provider by adding the **ClaimsProvider** el
90103
<Key Id="client_secret" StorageReferenceId="B2C_1A_MSASecret" />
91104
</CryptographicKeys>
92105
<OutputClaims>
93-
<OutputClaim ClaimTypeReferenceId="identityProvider" DefaultValue="live.com" />
94-
<OutputClaim ClaimTypeReferenceId="authenticationSource" DefaultValue="socialIdpAuthentication" />
95-
<OutputClaim ClaimTypeReferenceId="issuerUserId" PartnerClaimType="sub" />
106+
<OutputClaim ClaimTypeReferenceId="issuerUserId" PartnerClaimType="oid" />
107+
<OutputClaim ClaimTypeReferenceId="givenName" PartnerClaimType="given_name" />
108+
<OutputClaim ClaimTypeReferenceId="surName" PartnerClaimType="family_name" />
96109
<OutputClaim ClaimTypeReferenceId="displayName" PartnerClaimType="name" />
110+
<OutputClaim ClaimTypeReferenceId="authenticationSource" DefaultValue="socialIdpAuthentication" />
111+
<OutputClaim ClaimTypeReferenceId="identityProvider" PartnerClaimType="iss" />
97112
<OutputClaim ClaimTypeReferenceId="email" />
98113
</OutputClaims>
99114
<OutputClaimsTransformations>

0 commit comments

Comments
 (0)