Skip to content

Commit 74d7930

Browse files
authored
Merge pull request #224160 from barclayn/patch-12
Update how-to-use-quickstart-idtoken.md
2 parents e206bfd + 356fda0 commit 74d7930

File tree

1 file changed

+3
-3
lines changed

1 file changed

+3
-3
lines changed

articles/active-directory/verifiable-credentials/how-to-use-quickstart-idtoken.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -91,7 +91,7 @@ The claims mapping in the following example requires that you configure the toke
9191
{
9292
"clientId": "8d5b446e-22b2-4e01-bb2e-9070f6b20c90",
9393
"configuration": "https://didplayground.b2clogin.com/didplayground.onmicrosoft.com/B2C_1_sisu/v2.0/.well-known/openid-configuration",
94-
"redirectUri": "vcclient://openid",
94+
"redirectUri": "vcclient://openid/",
9595
"scope": "openid profile email",
9696
"mapping": [
9797
{
@@ -143,7 +143,7 @@ The clientId attribute is the application ID of a registered application in the
143143

144144
If you want only accounts in your tenant to be able to sign in, keep the **Accounts in this directory only** checkbox selected.
145145

146-
1. In **Redirect URI (optional)**, select **Public client/native (mobile & desktop)**, and then enter **vcclient://openid**.
146+
1. In **Redirect URI (optional)**, select **Public client/native (mobile & desktop)**, and then enter **vcclient://openid/**.
147147

148148
If you want to be able to test what claims are in the Azure Active Directory ID token, do the following:
149149

@@ -226,4 +226,4 @@ The easiest way to find this information for a custom credential is to go to you
226226

227227
## Next steps
228228

229-
See the [Rules and display definitions reference](rules-and-display-definitions-model.md).
229+
See the [Rules and display definitions reference](rules-and-display-definitions-model.md).

0 commit comments

Comments
 (0)