You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
- **DisplayName** specifies the label for the UI control that appears on the user interface if you want to collect the value of the claim from the user.
83
83
84
84
85
-
## Step 2 - Define Claims Transformations
85
+
## Step 2 - Define claims transformations
86
86
87
87
A [ClaimsTransformation](claimstransformations.md) contains a function that you use to convert a given claim into another one. For instance, you can change a string claim from lower case to upper case. Learn more about [Claims transformations supported by Azure AD B2C](claimstransformations.md#claims-transformations-reference).
88
88
@@ -138,7 +138,7 @@ A [ClaimsTransformation](claimstransformations.md) contains a function that you
138
138
139
139
- *CreateMessageTransformation* concatenates *Hello* and *displayName* to form *message*.
140
140
141
-
## Step 3 - Configure Content Definitions
141
+
## Step 3 - Configure content definitions
142
142
143
143
[ContentDefinitions](contentdefinitions.md) allow you to specify URL to HTML templates that control the layout of the web pages you show to your users. You can specify specific user interfaces for each step, such as sign-in or sign-up, password reset, or error pages.
144
144
@@ -154,15 +154,15 @@ To add content definition, add the following code in `BuildingBlocks` section of
154
154
</ContentDefinitions>
155
155
```
156
156
157
-
## Step 4 - Configure Technical Profiles
157
+
## Step 4 - Configure technical profiles
158
158
159
159
In a custom policy, a [TechnicalProfile](technicalprofiles.md) is the element that implements functionality. Now that you've defined Claims and Claims Transformations, you need Technical Profiles to execute your definitions. A technical profile is declared inside the `ClaimsProvider` elements.
160
160
161
161
Azure AD B2C provides a set of technical profiles. Each technical profile performs a specific role. For instance, you use a [REST technical profile](restful-technical-profile.md) to make an HTTP call to a service endpoint. You can use a claims transformation technical profile to execute the operation you define in a Claims Transformation. Learn more about the [types of technical profiles](technicalprofiles.md) that Azure AD B2C custom policies provide.
162
162
163
163
### Set values for your claims
164
164
165
-
To set values for *objectId*, *displayName* and *message* claims, you configure a technical profile that executes the *GenerateRandomObjectIdTransformation*, *CreateDisplayNameTransformation*, and *CreateMessageTransformation* claims transformations. The claims transformation are executed by the order defined in the OutputClaimsTransformations element. For example, it first creates the display name, then the message.
165
+
To set values for *objectId*, *displayName* and *message* claims, you configure a technical profile that executes the *GenerateRandomObjectIdTransformation*, *CreateDisplayNameTransformation*, and *CreateMessageTransformation* claims transformations. The claims transformations are executed by the order defined in the `OutputClaimsTransformations` element. For example, it first creates the display name, then the message.
166
166
167
167
1. Add the following `ClaimsProvider` as a child of the `ClaimsProviders` section.
168
168
@@ -233,7 +233,7 @@ You generate the *displayName* claim from *givenName* and *surname*, so you need
233
233
234
234
Notice the two display claims for the *givenName* and *surname* claims. Both of the claims are marked as required, so the user must enter the values before they submit the form displayed to them. The claims are displayed on the screen in the order defined in the *DisplayClaims* element such as, the **Given Name** and then the **Surname**.
235
235
236
-
## Step 5 - Define User Journeys
236
+
## Step 5 - Define user journeys
237
237
238
238
You use user journeys to define order in which the technical profiles are called. You use the `OrchestrationSteps` element to specify the steps in a user journey.
239
239
@@ -257,7 +257,7 @@ Replace the existing contents of the `HelloWorldJourney` User Journey with the f
257
257
258
258
According to the orchestration steps, we collect user inputs, set values for *objectId*, *displayName* and *message* claims, and finally send the Jwt token.
259
259
260
-
## Step 6 - Update Relying Party
260
+
## Step 6 - Update relying party
261
261
262
262
Replace the contents of the `OutputClaims` element of the `RelyingParty` section with the following code:
Copy file name to clipboardExpand all lines: articles/active-directory-b2c/custom-policies-series-hello-world.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -81,7 +81,7 @@ If you haven't already done so, create the following encryption keys. To automat
81
81
```
82
82
Replace `yourtenant` with the subdomain part of your tenant name, such as `contoso`. Learn how to [Get your tenant name](tenant-management-read-tenant-name.md#get-your-tenant-name).
83
83
84
-
The XML elements define the top-level `TrustFrameworkPolicy` element of a policy file with its policy ID and tenant name. The TrustFrameworkPolicy element contains other XML elements that you will use in this series.
84
+
The XML elements define the top-level `TrustFrameworkPolicy` element of a policy file with its policy ID and tenant name. The TrustFrameworkPolicy element contains other XML elements that you'll use in this series.
85
85
86
86
1. To declare a claim, add the following code in `BuildingBlocks` section of the `ContosoCustomPolicy.XML` file:
87
87
@@ -147,7 +147,7 @@ If you haven't already done so, create the following encryption keys. To automat
147
147
</UserJourney>
148
148
```
149
149
150
-
We've added a [UserJourney](userjourneys.md). The user journey specifies the business logic the end user goes through as Azure AD B2C processes a request. This user journey has only one step that issues a JTW token with the claims the you will define in the next step.
150
+
We've added a [UserJourney](userjourneys.md). The user journey specifies the business logic the end user goes through as Azure AD B2C processes a request. This user journey has only one step that issues a JTW token with the claims that you'll define in the next step.
151
151
152
152
1. In the `RelyingParty` section of the `ContosoCustomPolicy.XML` file, add the following code:
Copy file name to clipboardExpand all lines: articles/active-directory-b2c/custom-policies-series-sign-up-or-sign-in-federation.md
+11-11Lines changed: 11 additions & 11 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -50,16 +50,16 @@ Use the steps outlined in [Create the Facebook key](identity-provider-facebook.m
50
50
51
51
To configure sign in with Facebook, you need to perform the following steps:
52
52
53
-
- Declare additional claims
54
-
- Define additional Claims transformations to help with claims manipulations such as creating *AlternativeSecurityId*.
53
+
- Declare more claims
54
+
- Define more claims transformations to help with claims manipulations such as creating *AlternativeSecurityId*.
55
55
- Configure Facebook claims provider
56
-
- Configure Azure AD Technical Profiles to read and write the social account from and to the Azure AD database.
57
-
- Configure a SelfAsserted technical profile (for accepting additional input from user or updating user details) and its content definition.
56
+
- Configure Azure AD technical profiles to read and write the social account from and to the Azure AD database.
57
+
- Configure a self-asserted technical profile (for accepting additional input from user or updating user details) and its content definition.
58
58
59
59
60
-
### Step 3.1 - Declare additional claims
60
+
### Step 3.1 - Declare more claims
61
61
62
-
In the `ContosoCustomPolicy.XML` file, locate the *ClaimsSchema* section, and then declare additional claims by using the following code:
62
+
In the `ContosoCustomPolicy.XML` file, locate the *ClaimsSchema* section, and then declare more claims by using the following code:
63
63
64
64
```xml
65
65
<!--<ClaimsSchema>-->
@@ -152,7 +152,7 @@ In the `ContosoCustomPolicy.XML` file, locate the *ClaimsTransformations* elemen
152
152
<!--</ClaimsTransformations>-->
153
153
```
154
154
155
-
We've defined three Claims Transformations, which we use to generate values for *alternativeSecurityId* and *userPrincipalName* claims. These ClaimsTransformations are invoked in the OAuth2 Technical Profile in [step 3.3](#step-33---configure-facebook-claims-provider).
155
+
We've defined three Claims Transformations, which we use to generate values for *alternativeSecurityId* and *userPrincipalName* claims. These ClaimsTransformations are invoked in the OAuth2 technical profile in [step 3.3](#step-33---configure-facebook-claims-provider).
156
156
157
157
### Step 3.3 - Configure Facebook claims provider
158
158
@@ -259,7 +259,7 @@ Just like in sign-in with a local account, you need to configure the [Azure AD T
259
259
260
260
1. Replace *B2C_1A_TokenSigningKeyContainer* with the token signing key you created in [Configure the signing](custom-policies-series-hello-world.md#step-1---configure-the-signing-and-encryption-keys).
261
261
262
-
1. In the `ContosoCustomPolicy.XML` file add another Azure AD technical profile after the *AAD-UserWriteUsingAlternativeSecurityId* Technical Profile by using the following code:
262
+
1. In the `ContosoCustomPolicy.XML` file, add another Azure AD technical profile after the *AAD-UserWriteUsingAlternativeSecurityId* Technical Profile by using the following code:
@@ -502,7 +502,7 @@ Notice the identity provider, `"idp": "facebook.com"`, has been included in the
502
502
503
503
## A combined local and social sign-in
504
504
505
-
In this article, our user journey orchestration steps only references technical profiles that enable a user to sign in by using a social account. We can modify the orchestration steps to enable a user to sign in by using either a local account or a social account. To do so, the first orchestration step's `ClaimsProviderSelections` element lists the signin options available to the user.
505
+
In this article, our user journey orchestration steps only reference technical profiles that enable a user to sign in by using a social account. We can modify the orchestration steps to enable a user to sign in by using either a local account or a social account. To do so, the first orchestration step's `ClaimsProviderSelections` element lists the sign-in options available to the user.
506
506
507
507
Use the following steps to add a combined local and social account:
508
508
@@ -525,7 +525,7 @@ Use the following steps to add a combined local and social account:
525
525
<!--</UserJourneys>-->
526
526
```
527
527
528
-
1. In the user journey you just created, *LocalAndSocialSignInAndSignUp*, add orchestration steps by using the following code:
528
+
1. In the user journey you've created, *LocalAndSocialSignInAndSignUp*, add orchestration steps by using the following code:
529
529
530
530
```xml
531
531
<!--<UserJourneys>
@@ -680,7 +680,7 @@ Use the following steps to add a combined local and social account:
680
680
681
681
1. Use the procedure in [step 6](#step-6---upload-policy) and [step 7](#step-7---test-policy) to upload and run your policy. After you run the policy, you'll see a screen similar to the following screenshot.
682
682
683
-
:::image type="content" source="media/custom-policies-series-sign-up-or-sign-in-federation/screenshot-combined-local-and-social-sign-up-or-sign-in.png" alt-text="A screenshot combined local and social signup or signin interface.":::
683
+
:::image type="content" source="media/custom-policies-series-sign-up-or-sign-in-federation/screenshot-combined-local-and-social-sign-up-or-sign-in.png" alt-text="A screenshot of combined local and social sign-up or sign-in interface.":::
684
684
685
685
You can observe that a user can sign up or sign in by using either a local account or a social account.
In the `ContosoCustomPolicy.XML` file, locate the *ClaimsSchema* section, and then add additional claims by using the following code:
56
+
In the `ContosoCustomPolicy.XML` file, locate the *ClaimsSchema* section, and then add more claims by using the following code:
57
57
58
58
```xml
59
59
<!--<ClaimsSchema>-->
@@ -98,9 +98,9 @@ Azure AD B2C requires you to register two applications that it uses to sign up a
98
98
99
99
If you haven't already done so, register the following applications. To automate the walk-through below, visit the [IEF Setup App](https://aka.ms/iefsetup) and follow the instructions:
100
100
101
-
1.Follow the steps in [Register the IdentityExperienceFramework application](tutorial-create-user-flows.md?pivots=b2c-custom-policy#register-the-identityexperienceframework-application) to register the Identity Experience Framework application. Copy the **Application (client) ID**, *appID*, for the Identity Experience Framework application registration for use on the next step.
101
+
1.Use the steps in [Register the IdentityExperienceFramework application](tutorial-create-user-flows.md?pivots=b2c-custom-policy#register-the-identityexperienceframework-application) to register the Identity Experience Framework application. Copy the **Application (client) ID**, *appID*, for the Identity Experience Framework application registration for use on the next step.
102
102
103
-
1.For low the steps in [Register the ProxyIdentityExperienceFramework application](tutorial-create-user-flows.md?pivots=b2c-custom-policy#register-the-proxyidentityexperienceframework-application) to register Proxy Identity Experience Framework application. Copy the **Application (client) ID**, *proxyAppID*, for the Proxy Identity Experience Framework application registration for use on the next step.
103
+
1.Use the steps in [Register the ProxyIdentityExperienceFramework application](tutorial-create-user-flows.md?pivots=b2c-custom-policy#register-the-proxyidentityexperienceframework-application) to register Proxy Identity Experience Framework application. Copy the **Application (client) ID**, *proxyAppID*, for the Proxy Identity Experience Framework application registration for use on the next step.
@@ -191,7 +191,7 @@ In the `ContosoCustomPolicy.XML` file, locate the `SignInUser` technical profile
191
191
</TechnicalProfile>
192
192
```
193
193
194
-
We've added a SelfAsserted Technical Profile, *UserSignInCollector*, which displays the sign-in form to the user. We've configured the technical profile to collect the user’s email address as their sign-in name as indicated in the `setting.operatingMode` metadata. The signin form includes a sign-up link, which leads the user to a sign-up form as indicated by the `SignUpTarget` metadata. You'll see how we set up the *SignUpWithLogonEmailExchange*`ClaimsExchange` in the orchestration steps.
194
+
We've added a SelfAsserted Technical Profile, *UserSignInCollector*, which displays the sign-in form to the user. We've configured the technical profile to collect the user’s email address as their sign-in name as indicated in the `setting.operatingMode` metadata. The sign-in form includes a sign-up link, which leads the user to a sign-up form as indicated by the `SignUpTarget` metadata. You'll see how we set up the *SignUpWithLogonEmailExchange*`ClaimsExchange` in the orchestration steps.
195
195
196
196
Also, we've added the *SignInUser* OpenID Connect Technical Profile as a *ValidationTechnicalProfile*. So, the *SignInUser* technical profile executes when the user selects the **Sign in** button (see screenshot in [step 5](#step-5---test-policy)).
0 commit comments