Skip to content

Commit 72c2f06

Browse files
rmca14cilwerner
andauthored
Apply suggestions from code review
Co-authored-by: Chris Werner <[email protected]>
1 parent 6cf3389 commit 72c2f06

File tree

2 files changed

+3
-3
lines changed

2 files changed

+3
-3
lines changed

articles/active-directory-b2c/claim-resolver-overview.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -61,7 +61,7 @@ The following table lists the claim resolvers with information about the policy
6161
| ----- | ----------- | --------|
6262
| {Policy:PolicyId} | The relying party policy name. | B2C_1A_signup_signin |
6363
| {Policy:RelyingPartyTenantId} | The tenant ID of the relying party policy. | your-tenant.onmicrosoft.com |
64-
| {Policy:TenantObjectId} | The tenant object ID of the relying party policy. | ffffffff-eeee-dddd-cccc-bbbbbbbbbbb0 |
64+
| {Policy:TenantObjectId} | The tenant object ID of the relying party policy. | 00000000-0000-0000-0000-000000000000 |
6565
| {Policy:TrustFrameworkTenantId} | The tenant ID of the trust framework. | your-tenant.onmicrosoft.com |
6666

6767
Check out the [Live demo](https://github.com/azure-ad-b2c/unit-tests/tree/main/claims-resolver#policy) of the policy claim resolvers.
@@ -73,7 +73,7 @@ The following table lists the contextual claim resolvers of the authorization re
7373
| Claim | Description | Example |
7474
| ----- | ----------- | --------|
7575
| {Context:BuildNumber} | The Identity Experience Framework version (build number). | 1.0.507.0 |
76-
| {Context:CorrelationId} | The correlation ID. | ffffffff-eeee-dddd-cccc-bbbbbbbbbbb0 |
76+
| {Context:CorrelationId} | The correlation ID. | 00000000-0000-0000-0000-000000000000 |
7777
| {Context:DateTimeInUtc} |The date time in UTC. | 10/10/2021 12:00:00 PM |
7878
| {Context:DeploymentMode} |The policy deployment mode. | Production |
7979
| {Context:HostName} | The host name of the current request. | contoso.b2clogin.com |

articles/active-directory-b2c/identity-provider-azure-ad-multi-tenant.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -169,7 +169,7 @@ To obtain the values, look at the OpenID Connect discovery metadata for each of
169169
170170
Perform these steps for each Microsoft Entra tenant that should be used to sign in:
171171
172-
1. Open your browser and go to the OpenID Connect metadata URL for the tenant. Find the `issuer` object and record its value. It should look similar to `https://login.microsoftonline.com/ffffffff-eeee-dddd-cccc-bbbbbbbbbbb0/v2.0`.
172+
1. Open your browser and go to the OpenID Connect metadata URL for the tenant. Find the `issuer` object and record its value. It should look similar to `https://login.microsoftonline.com/ aaaabbbb-0000-cccc-1111-dddd2222eeee/v2.0`.
173173
1. Copy and paste the value into the **ValidTokenIssuerPrefixes** key. Separate multiple issuers with a comma. An example with two issuers appears in the previous `ClaimsProvider` XML sample.
174174
175175
[!INCLUDE [active-directory-b2c-add-identity-provider-to-user-journey](../../includes/active-directory-b2c-add-identity-provider-to-user-journey.md)]

0 commit comments

Comments
 (0)