Skip to content

Commit 7051e59

Browse files
authored
Merge pull request #94301 from bolt-io/patch-15
Added missing session manager to embedded password reset
2 parents b1bcab1 + 81b028a commit 7051e59

File tree

1 file changed

+7
-1
lines changed

1 file changed

+7
-1
lines changed

articles/active-directory-b2c/add-password-reset-policy.md

Lines changed: 7 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -130,7 +130,8 @@ Declare your claims in the [claims schema](claimsschema.md). Open the extensions
130130
</BuildingBlocks> -->
131131
```
132132

133-
A claims transformation technical profile initiates the **isForgotPassword** claim. The technical profile is referenced later. When invoked, it sets the value of the **isForgotPassword** claim to `true`. Find the **ClaimsProviders** element. If the element doesn't exist, add it. Then add the following claims provider:
133+
### Add the technical profiles
134+
A claims transformation technical profile accesses the `isForgotPassword` claim. The technical profile is referenced later. When it's invoked, it sets the value of the `isForgotPassword` claim to `true`. Find the **ClaimsProviders** element (if the element doesn't exist, create it), and then add the following claims provider:
134135

135136
```xml
136137
<!--
@@ -151,6 +152,9 @@ A claims transformation technical profile initiates the **isForgotPassword** cla
151152
<Item Key="setting.forgotPasswordLinkOverride">ForgotPasswordExchange</Item>
152153
</Metadata>
153154
</TechnicalProfile>
155+
<TechnicalProfile Id="LocalAccountWritePasswordUsingObjectId">
156+
<UseTechnicalProfileForSessionManagement ReferenceId="SM-AAD" />
157+
</TechnicalProfile>
154158
</TechnicalProfiles>
155159
</ClaimsProvider>
156160
<!--
@@ -159,6 +163,8 @@ A claims transformation technical profile initiates the **isForgotPassword** cla
159163

160164
The **SelfAsserted-LocalAccountSignin-Email** technical profile **setting.forgotPasswordLinkOverride** defines the password reset claims exchange that executes in your user journey.
161165

166+
The **LocalAccountWritePasswordUsingObjectId** technical profile **UseTechnicalProfileForSessionManagement** `SM-AAD` session manager is required for the user to preform subsequent logins successfully under [SSO](./custom-policy-reference-sso.md) conditions.
167+
162168
### Add the password reset sub journey
163169

164170
The user can now sign in, sign up, and perform password reset in your user journey. To better organize the user journey, you can use a [sub journey](subjourneys.md) to handle the password reset flow.

0 commit comments

Comments
 (0)