@@ -38,7 +38,7 @@ To get started, you'll need:
38
38
39
39
The Keyless integration includes the following components:
40
40
41
- * ** Azure AD B2C** – authorization server that verifies user credentials, or the IdP
41
+ * ** Azure AD B2C** – authorization server that verifies user credentials. Also known as the IdP.
42
42
* ** Web and mobile applications** – mobile or web applications to protect with Keyless and Azure AD B2C
43
43
* ** The Keyless Authenticator mobile app** – Sift mobile app for authentication to the Azure AD B2C enabled applications
44
44
@@ -60,7 +60,7 @@ Use the following sections to add an IdP, configure the IdP, and create a user f
60
60
61
61
To add a new Identity provider:
62
62
63
- 1 . Sign in to the ** [ Azure portal] ( https://portal.azure.com/#home ) ** as Global Administrator of the Azure AD B2C tenant.
63
+ 1 . Sign in to the [ Azure portal] ( https://portal.azure.com/#home ) as Global Administrator of the Azure AD B2C tenant.
64
64
2 . Select ** Directories + subscriptions** .
65
65
3 . On the ** Portal settings, Directories + subscriptions** page, in the ** Directory name** list, find your Azure AD B2C directory.
66
66
4 . Select ** Switch** .
@@ -93,25 +93,26 @@ To configure an IdP:
93
93
94
94
Keyless appears as a new OpenID Connect (OIDC) IdP with B2C identity providers.
95
95
96
- 1 . In your Azure AD B2C tenant, under ** Policies** , select ** User flows** .
97
- 2 . Select ** New** user flow.
98
- 3 . Select ** Sign up and sign in** .
99
- 4 . Select a ** version** .
100
- 5 . Select ** Create** .
101
- 6 . Enter a ** Name** for your policy.
102
- 7 . In the Identity providers section, select the created Keyless Identity Provider.
103
- 8 . Enter a name.
104
- 9 . Select the IdP you created.
105
- 10 . Add an email address. Azure won’t redirect the sign-in to Keyless; a screen appears with a user option.
106
- 11 . Leave the ** Multi-factor Authentication** field.
107
- 12 . Select ** Enforce conditional access policies** .
108
- 13 . Under ** User attributes and token claims** , in the ** Collect attribute** option, select ** Email Address** .
109
- 14 . Add user attributes Azure AD collects with claims Azure AD B2C returns to the client application.
110
- 15 . Select ** Create** .
111
- 16 . Select the new ** User flow** .
112
- 17 . On the left panel, select ** Application Claims** .
113
- 18 . Under options, select the ** email** checkbox.
114
- 19 . Select ** Save** .
96
+ 1 . Open the Azure AD B2C tenant.
97
+ 2 . Under ** Policies** , select ** User flows** .
98
+ 3 . Select ** New** user flow.
99
+ 4 . Select ** Sign up and sign in** .
100
+ 5 . Select a ** version** .
101
+ 6 . Select ** Create** .
102
+ 7 . Enter a ** Name** for your policy.
103
+ 8 . In the Identity providers section, select the created Keyless Identity Provider.
104
+ 9 . Enter a name.
105
+ 10 . Select the IdP you created.
106
+ 11 . Add an email address. Azure won’t redirect the sign-in to Keyless; a screen appears with a user option.
107
+ 12 . Leave the ** Multi-factor Authentication** field.
108
+ 13 . Select ** Enforce conditional access policies** .
109
+ 14 . Under ** User attributes and token claims** , in the ** Collect attribute** option, select ** Email Address** .
110
+ 15 . Add user attributes Azure AD collects with claims Azure AD B2C returns to the client application.
111
+ 16 . Select ** Create** .
112
+ 17 . Select the new ** User flow** .
113
+ 18 . On the left panel, select ** Application Claims** .
114
+ 19 . Under options, select the ** email** checkbox.
115
+ 20 . Select ** Save** .
115
116
116
117
## Test the user flow
117
118
0 commit comments