Skip to content

Commit 644b1da

Browse files
committed
Account type info link
1 parent 72a7556 commit 644b1da

File tree

1 file changed

+3
-1
lines changed

1 file changed

+3
-1
lines changed

articles/active-directory-b2c/active-directory-b2c-setup-msa-app.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -24,12 +24,14 @@ To use a Microsoft account as an [identity provider](active-directory-b2c-refere
2424
1. Select **New registration**
2525
1. Enter a **Name** for your application. For example, *MSAapp1*.
2626
1. Under **Supported account types**, select **Accounts in any organizational directory and personal Microsoft accounts (e.g. Skype, Xbox, Outlook.com)**. This option targets the widest set of Microsoft identities.
27+
28+
For more information on the different account type selections, see [Quickstart: Register an application with the Microsoft identity platform](../active-directory/develop/quickstart-register-app.md).
2729
1. Under **Redirect URI (optional)**, select **Web** and enter `https://your-tenant-name.b2clogin.com/your-tenant-name.onmicrosoft.com/oauth2/authresp` in the text box. Replace `your-tenant-name` with your Azure AD B2C tenant name.
2830
1. Select **Register**
2931
1. Record the **Application (client) ID** shown on the application Overview page. You need this when you configure the identity provider in the next section.
3032
1. Select **Certificates & secrets**
3133
1. Click **New client secret**
32-
1. Enter a **Description** for the secret, for example *Application password 1*, and then click **Add**
34+
1. Enter a **Description** for the secret, for example *Application password 1*, and then click **Add**.
3335
1. Record the application password shown in the **VALUE** column. You need this when you configure the identity provider in the next section.
3436

3537
## Configure a Microsoft account as an identity provider

0 commit comments

Comments
 (0)