You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
In your applications you may have user flows that enable users to sign up, sign in, or manage their profile. You can create multiple user flows of different types in your Azure Active Directory B2C (Azure AD B2C) tenant and use them in your applications as needed. User flows can be reused across applications.
22
22
23
23
::: zone pivot="b2c-user-flow"
24
-
A user flow lets you determine how users interact with your application when they do things like signin, signup, edit a profile, or reset a password. In this article, you learn how to:
24
+
A user flow lets you determine how users interact with your application when they do things like sign-in, sign-up, edit a profile, or reset a password. In this article, you learn how to:
25
25
::: zone-end
26
26
27
27
::: zone pivot="b2c-custom-policy"
@@ -68,31 +68,32 @@ The sign-up and sign-in user flow handles both sign-up and sign-in experiences w
68
68
69
69
1. On the **Create a user flow** page, select the **Sign up and sign in** user flow.
70
70
71
-

71
+

72
72
73
73
1. Under **Select a version**, select **Recommended**, and then select **Create**. ([Learn more](user-flow-versions.md) about user flow versions.)
74
74
75
75

76
76
77
77
1. Enter a **Name** for the user flow. For example, *signupsignin1*.
78
78
1. For **Identity providers**, select **Email signup**.
79
-
1. For **User attributes and claims**, choose the claims and attributes that you want to collect and send from the user during sign-up. For example, select **Show more**, and then choose attributes and claims for **Country/Region**, **Display Name**, and **Postal Code**. Click**OK**.
79
+
1. For **User attributes and claims**, choose the claims and attributes that you want to collect and send from the user during sign-up. For example, select **Show more**, and then choose attributes and claims for **Country/Region**, **Display Name**, and **Postal Code**. Select**OK**.
80
80
81
81

82
82
83
-
1.Click**Create** to add the user flow. A prefix of *B2C_1* is automatically prepended to the name.
83
+
1.Select**Create** to add the user flow. A prefix of *B2C_1_* is automatically prepended to the name.
84
84
85
85
### Test the user flow
86
86
87
-
1. Select the user flow you created to open its overview page, then select **Run user flow**.
87
+
1. Select the user flow you created to open its overview page.
88
+
1. At the top of the user flow overview page, select **Run user flow**. A pane opens at the right side of the page.
88
89
1. For **Application**, select the web application named *webapp1* that you previously registered. The **Reply URL** should show `https://jwt.ms`.
89
-
1.Click**Run user flow**, and then select **Sign up now**.
90
+
1.Select**Run user flow**, and then select **Sign up now**.
90
91
91
92

92
93
93
-
1. Enter a valid email address, click**Send verification code**, enter the verification code that you receive, then select **Verify code**.
94
+
1. Enter a valid email address, select**Send verification code**, enter the verification code that you receive, then select **Verify code**.
94
95
1. Enter a new password and confirm the password.
95
-
1. Select your country and region, enter the name that you want displayed, enter a postal code, and then click**Create**. The token is returned to `https://jwt.ms` and should be displayed to you.
96
+
1. Select your country and region, enter the name that you want displayed, enter a postal code, and then select**Create**. The token is returned to `https://jwt.ms` and should be displayed to you.
96
97
1. You can now run the user flow again and you should be able to sign in with the account that you created. The returned token includes the claims that you selected of country/region, name, and postal code.
97
98
98
99
> [!NOTE]
@@ -124,16 +125,17 @@ If you want to enable users to edit their profile in your application, you use a
124
125
1. On the **Create a user flow** page, select the **Profile editing** user flow.
125
126
1. Under **Select a version**, select **Recommended**, and then select **Create**.
126
127
1. Enter a **Name** for the user flow. For example, *profileediting1*.
127
-
1. For **Identity providers**, select**Local Account SignIn**.
128
-
2. For **User attributes**, choose the attributes that you want the customer to be able to edit in their profile. For example, select **Show more**, and then choose both attributes and claims for **Display name** and **Job title**. Click**OK**.
129
-
3.Click**Create** to add the user flow. A prefix of *B2C_1* is automatically appended to the name.
128
+
1. For **Identity providers**, under**Local accounts**, select **Email signup**.
129
+
2. For **User attributes**, choose the attributes that you want the customer to be able to edit in their profile. For example, select **Show more**, and then choose both attributes and claims for **Display name** and **Job title**. Select**OK**.
130
+
3.Select**Create** to add the user flow. A prefix of *B2C_1_* is automatically appended to the name.
130
131
131
132
### Test the user flow
132
133
133
-
1. Select the user flow you created to open its overview page, then select **Run user flow**.
134
+
1. Select the user flow you created to open its overview page.
135
+
1. At the top of the user flow overview page, select **Run user flow**. A pane opens at the right side of the page.
134
136
1. For **Application**, select the web application named *webapp1* that you previously registered. The **Reply URL** should show `https://jwt.ms`.
135
-
1.Click**Run user flow**, and then sign in with the account that you previously created.
136
-
1. You now have the opportunity to change the display name and job title for the user. Click**Continue**. The token is returned to `https://jwt.ms` and should be displayed to you.
137
+
1.Select**Run user flow**, and then sign in with the account that you previously created.
138
+
1. You now have the opportunity to change the display name and job title for the user. Select**Continue**. The token is returned to `https://jwt.ms` and should be displayed to you.
137
139
::: zone-end
138
140
139
141
::: zone pivot="b2c-custom-policy"
@@ -274,11 +276,11 @@ Add the application IDs to the extensions file *TrustFrameworkExtensions.xml*.
274
276
275
277
## Add Facebook as an identity provider
276
278
277
-
The **SocialAndLocalAccounts** starter pack includes Facebook social sign in. Facebook is *not* required for using custom policies, but we use it here to demonstrate how you can enable federated social login in a custom policy. If you don't need to enable federated social login, use the **LocalAccounts** starter pack instead, and skip [Add Facebook as an identity provider](tutorial-create-user-flows.md?pivots=b2c-custom-policy#add-facebook-as-an-identity-provider) section.
279
+
The **SocialAndLocalAccounts** starter pack includes Facebook social sign in. Facebook isn't required for using custom policies, but we use it here to demonstrate how you can enable federated social login in a custom policy. If you don't need to enable federated social login, use the **LocalAccounts** starter pack instead, and skip [Add Facebook as an identity provider](tutorial-create-user-flows.md?pivots=b2c-custom-policy#add-facebook-as-an-identity-provider) section.
278
280
279
281
### Create Facebook application
280
282
281
-
Use the steps outlined in [Create a Facebook application](identity-provider-facebook.md#create-a-facebook-application) to obtain Facebook *App ID* and *App Secret*. Skip the prerequisites and the rest of the steps in the [Set up sign-up and sign-in with a Facebook account](identity-provider-facebook.md) article.
283
+
Use the steps outlined in [Create a Facebook application](identity-provider-facebook.md#create-a-facebook-application) to obtain Facebook *App ID* and *App Secret*. Skip the prerequisites and the rest of the steps in the [Set up signup and signin with a Facebook account](identity-provider-facebook.md) article.
282
284
283
285
### Create the Facebook key
284
286
@@ -341,7 +343,7 @@ As you upload the files, Azure adds the prefix `B2C_1A_` to each.
Copy file name to clipboardExpand all lines: articles/active-directory/authentication/concept-registration-mfa-sspr-combined.md
+6-4Lines changed: 6 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ services: active-directory
6
6
ms.service: active-directory
7
7
ms.subservice: authentication
8
8
ms.topic: conceptual
9
-
ms.date: 05/24/2022
9
+
ms.date: 06/17/2022
10
10
11
11
ms.author: justinha
12
12
author: justinha
@@ -38,6 +38,8 @@ Azure AD combined security information registration is available for Azure US Go
38
38
> [!IMPORTANT]
39
39
> Users that are enabled for both the original preview and the enhanced combined registration experience see the new behavior. Users that are enabled for both experiences see only the My Account experience. The *My Account* aligns with the look and feel of combined registration and provides a seamless experience for users. Users can see My Account by going to [https://myaccount.microsoft.com](https://myaccount.microsoft.com).
40
40
>
41
+
> You can set **Require users to register when signing in** to **Yes** to require all users to register when signing in, ensuring that all users are protected.
42
+
>
41
43
> You might encounter an error message while trying to access the Security info option, such as, "Sorry, we can't sign you in". Confirm that you don't have any configuration or group policy object that blocks third-party cookies on the web browser.
42
44
43
45
*My Account* pages are localized based on the language settings of the computer accessing the page. Microsoft stores the most recent language used in the browser cache, so subsequent attempts to access the pages continue to render in the last language used. If you clear the cache, the pages re-render.
@@ -68,7 +70,7 @@ Combined registration supports the following authentication methods and actions:
68
70
69
71
Users can set one of the following options as the default Multi-Factor Authentication method:
70
72
71
-
- Microsoft Authenticator – push notification
73
+
- Microsoft Authenticator – push notification or passwordless
72
74
- Authenticator app or hardware token – code
73
75
- Phone call
74
76
- Text message
@@ -128,7 +130,7 @@ Users can access manage mode by going to [https://aka.ms/mysecurityinfo](https:/
128
130
129
131
An admin has enforced registration.
130
132
131
-
A user has not set up all required security info and goes to the Azure portal. After entering the user name and password, the user is prompted to set up security info. The user then follows the steps shown in the wizard to set up the required security info. If your settings allow it, the user can choose to set up methods other than those shown by default. After completing the wizard, users review the methods they set up and their default method for Multi-Factor Authentication. To complete the setup process, the user confirms the info and continues to the Azure portal.
133
+
A user has not set up all required security info and goes to the Azure portal. After the user enters the user name and password, the user is prompted to set up security info. The user then follows the steps shown in the wizard to set up the required security info. If your settings allow it, the user can choose to set up methods other than those shown by default. After users complete the wizard, they review the methods they set up and their default method for Multi-Factor Authentication. To complete the setup process, the user confirms the info and continues to the Azure portal.
132
134
133
135
### Set up security info from My Account
134
136
@@ -151,7 +153,7 @@ In addition, users who access a resource tenant may be confused when they change
151
153
152
154
For example, a user sets Microsoft Authenticator app push notification as the primary authentication to sign-in to home tenant and also has SMS/Text as another option.
153
155
This user is also configured with SMS/Text option on a resource tenant.
154
-
If this user removes SMS/Text as one of the authentication option on their home tenant, they get confused when access to the resource tenant asks them to respond to SMS/Text message.
156
+
If this user removes SMS/Text as one of the authentication options on their home tenant, they get confused when access to the resource tenant asks them to respond to SMS/Text message.
155
157
156
158
To switch the directory in the Azure portal, click the user account name in the upper right corner and click **Switch directory**.
0 commit comments