Skip to content

Commit 6ff9920

Browse files
authored
Update partner-keyless.md
1 parent 933f647 commit 6ff9920

File tree

1 file changed

+22
-21
lines changed

1 file changed

+22
-21
lines changed

articles/active-directory-b2c/partner-keyless.md

Lines changed: 22 additions & 21 deletions
Original file line numberDiff line numberDiff line change
@@ -38,7 +38,7 @@ To get started, you'll need:
3838

3939
The Keyless integration includes the following components:
4040

41-
* **Azure AD B2C** – authorization server that verifies user credentials, or the IdP
41+
* **Azure AD B2C** – authorization server that verifies user credentials. Also known as the IdP.
4242
* **Web and mobile applications** – mobile or web applications to protect with Keyless and Azure AD B2C
4343
* **The Keyless Authenticator mobile app** – Sift mobile app for authentication to the Azure AD B2C enabled applications
4444

@@ -60,7 +60,7 @@ Use the following sections to add an IdP, configure the IdP, and create a user f
6060

6161
To add a new Identity provider:
6262

63-
1. Sign in to the **[Azure portal](https://portal.azure.com/#home)** as Global Administrator of the Azure AD B2C tenant.
63+
1. Sign in to the [Azure portal](https://portal.azure.com/#home) as Global Administrator of the Azure AD B2C tenant.
6464
2. Select **Directories + subscriptions**.
6565
3. On the **Portal settings, Directories + subscriptions** page, in the **Directory name** list, find your Azure AD B2C directory.
6666
4. Select **Switch**.
@@ -93,25 +93,26 @@ To configure an IdP:
9393

9494
Keyless appears as a new OpenID Connect (OIDC) IdP with B2C identity providers.
9595

96-
1. In your Azure AD B2C tenant, under **Policies**, select **User flows**.
97-
2. Select **New** user flow.
98-
3. Select **Sign up and sign in**.
99-
4. Select a **version**.
100-
5. Select **Create**.
101-
6. Enter a **Name** for your policy.
102-
7. In the Identity providers section, select the created Keyless Identity Provider.
103-
8. Enter a name.
104-
9. Select the IdP you created.
105-
10. Add an email address. Azure won’t redirect the sign-in to Keyless; a screen appears with a user option.
106-
11. Leave the **Multi-factor Authentication** field.
107-
12. Select **Enforce conditional access policies**.
108-
13. Under **User attributes and token claims**, in the **Collect attribute** option, select **Email Address**.
109-
14. Add user attributes Azure AD collects with claims Azure AD B2C returns to the client application.
110-
15. Select **Create**.
111-
16. Select the new **User flow**.
112-
17. On the left panel, select **Application Claims**.
113-
18. Under options, select the **email** checkbox.
114-
19. Select **Save**.
96+
1. Open the Azure AD B2C tenant.
97+
2. Under **Policies**, select **User flows**.
98+
3. Select **New** user flow.
99+
4. Select **Sign up and sign in**.
100+
5. Select a **version**.
101+
6. Select **Create**.
102+
7. Enter a **Name** for your policy.
103+
8. In the Identity providers section, select the created Keyless Identity Provider.
104+
9. Enter a name.
105+
10. Select the IdP you created.
106+
11. Add an email address. Azure won’t redirect the sign-in to Keyless; a screen appears with a user option.
107+
12. Leave the **Multi-factor Authentication** field.
108+
13. Select **Enforce conditional access policies**.
109+
14. Under **User attributes and token claims**, in the **Collect attribute** option, select **Email Address**.
110+
15. Add user attributes Azure AD collects with claims Azure AD B2C returns to the client application.
111+
16. Select **Create**.
112+
17. Select the new **User flow**.
113+
18. On the left panel, select **Application Claims**.
114+
19. Under options, select the **email** checkbox.
115+
20. Select **Save**.
115116

116117
## Test the user flow
117118

0 commit comments

Comments
 (0)