Skip to content

Commit 69ade38

Browse files
authored
Added missing session manager to embedded password reset
Without this session manager the user journey can fall into the password reset flow unwillingly when using SSO.
1 parent 7450d57 commit 69ade38

File tree

1 file changed

+6
-0
lines changed

1 file changed

+6
-0
lines changed

articles/active-directory-b2c/add-password-reset-policy.md

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -130,6 +130,7 @@ Declare your claims in the [claims schema](claimsschema.md). Open the extensions
130130
</BuildingBlocks> -->
131131
```
132132

133+
### Add the Technical Profiles
133134
A claims transformation technical profile initiates the **isForgotPassword** claim. The technical profile is referenced later. When invoked, it sets the value of the **isForgotPassword** claim to `true`. Find the **ClaimsProviders** element. If the element doesn't exist, add it. Then add the following claims provider:
134135

135136
```xml
@@ -151,6 +152,9 @@ A claims transformation technical profile initiates the **isForgotPassword** cla
151152
<Item Key="setting.forgotPasswordLinkOverride">ForgotPasswordExchange</Item>
152153
</Metadata>
153154
</TechnicalProfile>
155+
<TechnicalProfile Id="LocalAccountWritePasswordUsingObjectId">
156+
<UseTechnicalProfileForSessionManagement ReferenceId="SM-AAD" />
157+
</TechnicalProfile>
154158
</TechnicalProfiles>
155159
</ClaimsProvider>
156160
<!--
@@ -159,6 +163,8 @@ A claims transformation technical profile initiates the **isForgotPassword** cla
159163

160164
The **SelfAsserted-LocalAccountSignin-Email** technical profile **setting.forgotPasswordLinkOverride** defines the password reset claims exchange that executes in your user journey.
161165

166+
The **LocalAccountWritePasswordUsingObjectId** technical profile **UseTechnicalProfileForSessionManagement** AAD session manager is required for sessions to persist correctly for SSO.
167+
162168
### Add the password reset sub journey
163169

164170
The user can now sign in, sign up, and perform password reset in your user journey. To better organize the user journey, you can use a [sub journey](subjourneys.md) to handle the password reset flow.

0 commit comments

Comments
 (0)