Skip to content

Commit 71d49f8

Browse files
authored
Merge pull request #57802 from davidmu1/engfix5
Engfix5
2 parents 78a6bd1 + 13cc016 commit 71d49f8

File tree

4 files changed

+14
-15
lines changed

4 files changed

+14
-15
lines changed

articles/active-directory-b2c/active-directory-b2c-setup-aad-custom.md

Lines changed: 8 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -27,21 +27,20 @@ Complete the steps in [Get started with custom policies in Azure Active Director
2727

2828
To enable sign-in for users from a specific Azure AD organization, you need to register an application within the organizational Azure AD tenant.
2929

30-
>[!NOTE]
31-
>`Contoso.com` is used for the organizational Azure AD tenant and `fabrikamb2c.onmicrosoft.com` is used as the Azure AD B2C tenant in the following instructions.
32-
3330
1. Sign in to the [Azure portal](https://portal.azure.com).
3431
2. Make sure you're using the directory that contains organizational Azure AD tenant (contoso.com) by clicking the **Directory and subscription filter** in the top menu and choosing the directory that contains your tenant.
3532
3. Choose **All services** in the top-left corner of the Azure portal, and then search for and select **App registrations**.
3633
4. Select **New application registration**.
3734
5. Enter a name for your application. For example, `Azure AD B2C App`.
3835
6. For the **Application type**, select `Web app / API`.
39-
7. For the **Sign-on URL**, enter the following URL in all lowercase letters, where `your-tenant` is replaced with the name of your Azure AD B2C tenant (fabrikamb2c.onmicrosoft.com):
36+
7. For the **Sign-on URL**, enter the following URL in all lowercase letters, where `your-B2C-tenant-name` is replaced with the name of your Azure AD B2C tenant:
4037

4138
```
42-
https://yourtenant.b2clogin.com/your-tenant.onmicrosoft.com/oauth2/authresp
39+
https://your-B2C-tenant-name.b2clogin.com/your-B2C-tenant-name.onmicrosoft.com/oauth2/authresp
4340
```
4441
42+
For example, `https://contoso.b2clogin.com/contoso.onmicrosoft.com/oauth2/authresp`.
43+
4544
8. Click **Create**. Copy the **Application ID** to be used later.
4645
9. Select the application, and then select **Settings**.
4746
10. Select **Keys**, enter the key description, select a duration, and then click **Save**. Copy the value of the key that is displayed to be used later.
@@ -81,7 +80,7 @@ You can define Azure AD as a claims provider by adding Azure AD to the **ClaimsP
8180
<Protocol Name="OpenIdConnect"/>
8281
<OutputTokenFormat>JWT</OutputTokenFormat>
8382
<Metadata>
84-
<Item Key="METADATA">https://login.windows.net/your-tenant/.well-known/openid-configuration</Item>
83+
<Item Key="METADATA">https://login.windows.net/your-AD-tenant-name.onmicrosoft.com/.well-known/openid-configuration</Item>
8584
<Item Key="ProviderName">https://sts.windows.net/00000000-0000-0000-0000-000000000000/</Item>
8685
<Item Key="client_id">00000000-0000-0000-0000-000000000000</Item>
8786
<Item Key="IdTokenAudience">00000000-0000-0000-0000-000000000000</Item>
@@ -115,7 +114,7 @@ You can define Azure AD as a claims provider by adding Azure AD to the **ClaimsP
115114
</ClaimsProvider>
116115
```
117116
118-
4. Under the **ClaimsProvider** element, update the value for **Domain** to a unique value that can be used to distinguish it from other identity providers.
117+
4. Under the **ClaimsProvider** element, update the value for **Domain** to a unique value that can be used to distinguish it from other identity providers. For example `Contoso`. You don't put a `.com` at the end of this domain setting.
119118
5. Under the **ClaimsProvider** element, update the value for **DisplayName** to a friendly name for the claims provider. This value is not currently used.
120119
121120
### Update the technical profile
@@ -126,7 +125,7 @@ To get a token from the Azure AD endpoint, you need to define the protocols that
126125
2. Update the value for **DisplayName**. This value will be displayed on the sign-in button on your sign-in screen.
127126
3. Update the value for **Description**.
128127
4. Azure AD uses the OpenID Connect protocol, so make sure that the value for **Protocol** is `OpenIdConnect`.
129-
5. Set value of the **METADATA** to `https://login.windows.net/your-tenant/.well-known/openid-configuration`, where `your-tenant` is your Azure AD tenant name (contoso.com).
128+
5. Set value of the **METADATA** to `https://login.windows.net/your-AD-tenant-name.onmicrosoft.com/.well-known/openid-configuration`, where `your-AD-tenant-name` is your Azure AD tenant name. For example, `https://login.windows.net/fabrikam.onmicrosoft.com/.well-known/openid-configuration`
130129
6. Open your browser and go to the **METADATA** URL that you just updated, look for the **issuer** object, copy and paste the value into the value for **ProviderName** in the XML file.
131130
8. Set **client_id** and **IdTokenAudience** to the application ID from the application registration.
132131
9. Under **CryptograhicKeys**, Update the value for **StorageReferenceId** to the policy key that you defined. For example, `ContosoAppSecret`.
@@ -154,7 +153,7 @@ At this point, the identity provider has been set up, but it’s not available i
154153
The **ClaimsProviderSelection** element is analogous to an identity provider button on a sign-up/sign-in screen. If you add a **ClaimsProviderSelection** element for Azure AD, a new button shows up when a user lands on the page.
155154
156155
1. Find the **OrchestrationStep** element that includes `Order="1"` in the user journey that you created.
157-
2. Under **ClaimsProviderSelects**, add the following element. Set the value of **TargetClaimsExchangeId** to an appropriate value, for example `ContosoExchange`:
156+
2. Under **ClaimsProviderSelections**, add the following element. Set the value of **TargetClaimsExchangeId** to an appropriate value, for example `ContosoExchange`:
158157
159158
```XML
160159
<ClaimsProviderSelection TargetClaimsExchangeId="ContosoExchange" />

articles/active-directory-b2c/active-directory-b2c-token-session-sso.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -22,9 +22,9 @@ This feature gives you fine-grained control, on a [per-policy basis](active-dire
2222
- Formats of important claims in the security tokens emitted by Azure AD B2C.
2323
- Single sign-on (SSO) behavior across multiple apps and policies in your Azure AD B2C tenant.
2424

25-
For built-in policies, you can use this feature in your Azure AD B2C directory as follows:
25+
You can use this feature on any policy type, but this example show how to use the feature with a sign-up or sign-in policy. For built-in policies, you can use this feature in your Azure AD B2C directory as follows:
2626

27-
1. Click **Sign-up or sign-in policies**. *Note: You can use this feature on any policy type, not just on **Sign-up or sign-in policies***.
27+
1. Click **Sign-up or sign-in policies**.
2828
2. Open a policy by clicking it. For example, click on **B2C_1_SiUpIn**.
2929
3. Click **Edit** at the top of the menu.
3030
4. Click **Token, session & single sign-on config**.

articles/active-directory-b2c/b2clogin.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,7 @@ When you set up an identity provider for sign-up and sign-in in your Azure Activ
2020
Using b2clogin.com gives you additional benefits, such as:
2121

2222
- Cookies are no longer shared with the other Microsoft services.
23-
- Your URLs no longer include a reference to Microsoft. For example, `https://your-tenant-name.b2clogin.com/tfp/your-tenant-ID/policyname/v2.0/.well-known/openid-configuration`.
23+
- Your URLs no longer include a reference to Microsoft. For example, `https://your-tenant-name.b2clogin.com/your-tenant-name.onmicrosoft.com/oauth2/authresp`.
2424

2525
Consider these settings that might need to change when using b2clogin.com:
2626

articles/active-directory-b2c/saml-technical-profile.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -30,14 +30,14 @@ Each SAML identity provider has different steps to expose and set the service pr
3030
The following example shows a URL address to the SAML metadata of an Azure AD B2C technical profile:
3131

3232
```
33-
https://login.microsoftonline.com/te/your-tenant/your-policy/samlp/metadata?idptp=your-technical-profile
33+
https://your-tenant-name.b2clogin.com/your-tenant-name/your-policy/samlp/metadata?idptp=your-technical-profile
3434
```
3535

3636
Replace the following values:
3737

38-
- **your-tenant** with your tenant name, such as your-tenant.onmicrosoft.com
38+
- **your-tenant-name** with your tenant name, such as fabrikam.b2clogin.com.
3939
- **your-policy** with your policy name. Use the policy where you configure the SAML provider technical profile, or a policy that inherits from that policy.
40-
- **your-technical-profile** with your SAML identity provider technical profile name
40+
- **your-technical-profile** with your SAML identity provider technical profile name.
4141

4242
## Digital signing certificates exchange
4343

0 commit comments

Comments
 (0)