You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory-b2c/identity-provider-azure-ad-single-tenant-custom.md
+22-13Lines changed: 22 additions & 13 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -9,7 +9,7 @@ manager: celestedg
9
9
ms.service: active-directory
10
10
ms.workload: identity
11
11
ms.topic: conceptual
12
-
ms.date: 09/13/2019
12
+
ms.date: 02/11/2020
13
13
ms.author: marsma
14
14
ms.subservice: B2C
15
15
---
@@ -46,6 +46,19 @@ To enable sign-in for users from a specific Azure AD organization, you need to r
46
46
1. Select **Certificates & secrets**, and then select **New client secret**.
47
47
1. Enter a **Description** for the secret, select an expiration, and then select **Add**. Record the **Value** of the secret for use in a later step.
48
48
49
+
## Configuring optional claims
50
+
51
+
If you want to get the `family_name` and `given_name` claims from Azure AD, you can configure optional claims for your application in the Azure portal UI or application manifest. For more information, see [How to provide optional claims to your Azure AD app](../active-directory/develop/active-directory-optional-claims.md).
52
+
53
+
1. Sign in to the [Azure portal](https://portal.azure.com). Search for and select **Azure Active Directory**.
54
+
1. From the **Manage** section, select **App registrations**.
55
+
1. Select the application you want to configure optional claims for in the list.
56
+
1. From the **Manage** section, select **Token configuration (preview)**.
57
+
1. Select **Add optional claim**.
58
+
1. Select the token type you want to configure.
59
+
1. Select the optional claims to add.
60
+
1. Click **Add**.
61
+
49
62
## Create a policy key
50
63
51
64
You need to store the application key that you created in your Azure AD B2C tenant.
@@ -69,23 +82,20 @@ You can define Azure AD as a claims provider by adding Azure AD to the **ClaimsP
69
82
1. Open the *TrustFrameworkExtensions.xml* file.
70
83
2. Find the **ClaimsProviders** element. If it does not exist, add it under the root element.
71
84
3. Add a new **ClaimsProvider** as follows:
72
-
73
-
```XML
85
+
```xml
74
86
<ClaimsProvider>
75
87
<Domain>Contoso</Domain>
76
88
<DisplayName>Login using Contoso</DisplayName>
77
89
<TechnicalProfiles>
78
-
<TechnicalProfile Id="ContosoProfile">
90
+
<TechnicalProfile Id="OIDC-Contoso">
79
91
<DisplayName>Contoso Employee</DisplayName>
80
92
<Description>Login with your Contoso account</Description>
@@ -121,12 +131,11 @@ You can define Azure AD as a claims provider by adding Azure AD to the **ClaimsP
121
131
122
132
To get a token from the Azure AD endpoint, you need to define the protocols that Azure AD B2C should use to communicate with Azure AD. This is done inside the **TechnicalProfile** element of **ClaimsProvider**.
123
133
124
-
1. Update the ID of the **TechnicalProfile** element. This ID is used to refer to this technical profile from other parts of the policy.
134
+
1. Update the ID of the **TechnicalProfile** element. This ID is used to refer to this technical profile from other parts of the policy, for example `OIDC-Contoso`.
125
135
1. Update the value for **DisplayName**. This value will be displayed on the sign-in button on your sign-in screen.
126
136
1. Update the value for **Description**.
127
137
1. Azure AD uses the OpenID Connect protocol, so make sure that the value for **Protocol** is `OpenIdConnect`.
128
-
1. Set value of the **METADATA** to `https://login.windows.net/your-AD-tenant-name.onmicrosoft.com/.well-known/openid-configuration`, where `your-AD-tenant-name` is your Azure AD tenant name. For example, `https://login.windows.net/fabrikam.onmicrosoft.com/.well-known/openid-configuration`
129
-
1. Open your browser and go to the **METADATA** URL that you just updated, look for the **issuer** object, and then copy and paste the value into the value for **ProviderName** in the XML file.
138
+
1. Set value of the **METADATA** to `https://login.microsoftonline.com/tenant-name.onmicrosoft.com/v2.0/.well-known/openid-configuration`, where `tenant-name` is your Azure AD tenant name. For example, `https://login.microsoftonline.com/contoso.onmicrosoft.com/v2.0/.well-known/openid-configuration`
130
139
1. Set **client_id** to the application ID from the application registration.
131
140
1. Under **CryptographicKeys**, update the value of **StorageReferenceId** to the name of the policy key that you created earlier. For example, `B2C_1A_ContosoAppSecret`.
132
141
@@ -167,10 +176,10 @@ Now that you have a button in place, you need to link it to an action. The actio
167
176
1. Add the following **ClaimsExchange** element making sure that you use the same value for **Id** that you used for **TargetClaimsExchangeId**:
0 commit comments