You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory-b2c/active-directory-b2c-setup-aad-custom.md
+8-9Lines changed: 8 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -27,21 +27,20 @@ Complete the steps in [Get started with custom policies in Azure Active Director
27
27
28
28
To enable sign-in for users from a specific Azure AD organization, you need to register an application within the organizational Azure AD tenant.
29
29
30
-
>[!NOTE]
31
-
>`Contoso.com` is used for the organizational Azure AD tenant and `fabrikamb2c.onmicrosoft.com` is used as the Azure AD B2C tenant in the following instructions.
32
-
33
30
1. Sign in to the [Azure portal](https://portal.azure.com).
34
31
2. Make sure you're using the directory that contains organizational Azure AD tenant (contoso.com) by clicking the **Directory and subscription filter** in the top menu and choosing the directory that contains your tenant.
35
32
3. Choose **All services** in the top-left corner of the Azure portal, and then search for and select **App registrations**.
36
33
4. Select **New application registration**.
37
34
5. Enter a name for your application. For example, `Azure AD B2C App`.
38
35
6. For the **Application type**, select `Web app / API`.
39
-
7. For the **Sign-on URL**, enter the following URL in all lowercase letters, where `your-tenant` is replaced with the name of your Azure AD B2C tenant (fabrikamb2c.onmicrosoft.com):
36
+
7. For the **Sign-on URL**, enter the following URL in all lowercase letters, where `your-B2C-tenant-name` is replaced with the name of your Azure AD B2C tenant:
For example, `https://contoso.b2clogin.com/contoso.onmicrosoft.com/oauth2/authresp`.
43
+
45
44
8. Click **Create**. Copy the **Application ID** to be used later.
46
45
9. Select the application, and then select **Settings**.
47
46
10. Select **Keys**, enter the key description, select a duration, and then click **Save**. Copy the value of the key that is displayed to be used later.
@@ -81,7 +80,7 @@ You can define Azure AD as a claims provider by adding Azure AD to the **ClaimsP
@@ -115,7 +114,7 @@ You can define Azure AD as a claims provider by adding Azure AD to the **ClaimsP
115
114
</ClaimsProvider>
116
115
```
117
116
118
-
4. Under the **ClaimsProvider** element, update the value for **Domain** to a unique value that can be used to distinguish it from other identity providers.
117
+
4. Under the **ClaimsProvider** element, update the value for **Domain** to a unique value that can be used to distinguish it from other identity providers. For example `Contoso`. You don't put a `.com` at the end of this domain setting.
119
118
5. Under the **ClaimsProvider** element, update the value for **DisplayName** to a friendly name for the claims provider. This value is not currently used.
120
119
121
120
### Update the technical profile
@@ -126,7 +125,7 @@ To get a token from the Azure AD endpoint, you need to define the protocols that
126
125
2. Update the value for **DisplayName**. This value will be displayed on the sign-in button on your sign-in screen.
127
126
3. Update the value for **Description**.
128
127
4. Azure AD uses the OpenID Connect protocol, so make sure that the value for **Protocol** is `OpenIdConnect`.
129
-
5. Set value of the **METADATA** to `https://login.windows.net/your-tenant/.well-known/openid-configuration`, where `your-tenant` is your Azure AD tenant name (contoso.com).
128
+
5. Set value of the **METADATA** to `https://login.windows.net/your-AD-tenant-name.onmicrosoft.com/.well-known/openid-configuration`, where `your-AD-tenant-name` is your Azure AD tenant name. For example, `https://login.windows.net/fabrikam.onmicrosoft.com/.well-known/openid-configuration`
130
129
6. Open your browser and go to the **METADATA** URL that you just updated, look for the **issuer** object, copy and paste the value into the value for **ProviderName** in the XML file.
131
130
8. Set **client_id** and **IdTokenAudience** to the application ID from the application registration.
132
131
9. Under **CryptograhicKeys**, Update the value for **StorageReferenceId** to the policy key that you defined. For example, `ContosoAppSecret`.
@@ -154,7 +153,7 @@ At this point, the identity provider has been set up, but it’s not available i
154
153
The **ClaimsProviderSelection** element is analogous to an identity provider button on a sign-up/sign-in screen. If you add a **ClaimsProviderSelection** element for Azure AD, a new button shows up when a user lands on the page.
155
154
156
155
1. Find the **OrchestrationStep** element that includes `Order="1"` in the user journey that you created.
157
-
2. Under **ClaimsProviderSelects**, add the following element. Set the value of **TargetClaimsExchangeId** to an appropriate value, for example `ContosoExchange`:
156
+
2. Under **ClaimsProviderSelections**, add the following element. Set the value of **TargetClaimsExchangeId** to an appropriate value, for example `ContosoExchange`:
Copy file name to clipboardExpand all lines: articles/active-directory-b2c/active-directory-b2c-token-session-sso.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -22,9 +22,9 @@ This feature gives you fine-grained control, on a [per-policy basis](active-dire
22
22
- Formats of important claims in the security tokens emitted by Azure AD B2C.
23
23
- Single sign-on (SSO) behavior across multiple apps and policies in your Azure AD B2C tenant.
24
24
25
-
For built-in policies, you can use this feature in your Azure AD B2C directory as follows:
25
+
You can use this feature on any policy type, but this example show how to use the feature with a sign-up or sign-in policy. For built-in policies, you can use this feature in your Azure AD B2C directory as follows:
26
26
27
-
1. Click **Sign-up or sign-in policies**.*Note: You can use this feature on any policy type, not just on **Sign-up or sign-in policies***.
27
+
1. Click **Sign-up or sign-in policies**.
28
28
2. Open a policy by clicking it. For example, click on **B2C_1_SiUpIn**.
29
29
3. Click **Edit** at the top of the menu.
30
30
4. Click **Token, session & single sign-on config**.
Copy file name to clipboardExpand all lines: articles/active-directory-b2c/b2clogin.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -20,7 +20,7 @@ When you set up an identity provider for sign-up and sign-in in your Azure Activ
20
20
Using b2clogin.com gives you additional benefits, such as:
21
21
22
22
- Cookies are no longer shared with the other Microsoft services.
23
-
- Your URLs no longer include a reference to Microsoft. For example, `https://your-tenant-name.b2clogin.com/tfp/your-tenant-ID/policyname/v2.0/.well-known/openid-configuration`.
23
+
- Your URLs no longer include a reference to Microsoft. For example, `https://your-tenant-name.b2clogin.com/your-tenant-name.onmicrosoft.com/oauth2/authresp`.
24
24
25
25
Consider these settings that might need to change when using b2clogin.com:
-**your-tenant** with your tenant name, such as your-tenant.onmicrosoft.com
38
+
-**your-tenant-name** with your tenant name, such as fabrikam.b2clogin.com.
39
39
-**your-policy** with your policy name. Use the policy where you configure the SAML provider technical profile, or a policy that inherits from that policy.
40
-
-**your-technical-profile** with your SAML identity provider technical profile name
40
+
-**your-technical-profile** with your SAML identity provider technical profile name.
0 commit comments