Skip to content

Commit 7503aed

Browse files
committed
PR review team comments
1 parent 2332173 commit 7503aed

6 files changed

+35
-35
lines changed

articles/active-directory-b2c/custom-policies-series-collect-user-input.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -45,7 +45,7 @@ In this article, you'll learn how to write a custom policy that collects user in
4545

4646
[!INCLUDE [active-directory-b2c-app-integration-call-api](../../includes/active-directory-b2c-common-note-custom-policy-how-to-series.md)]
4747

48-
## Step 1 - Declare Claims
48+
## Step 1 - Declare claims
4949

5050
Declare additional claims alongside *objectId* and *message*:
5151

@@ -82,7 +82,7 @@ Declare additional claims alongside *objectId* and *message*:
8282
- **DisplayName** specifies the label for the UI control that appears on the user interface if you want to collect the value of the claim from the user.
8383

8484

85-
## Step 2 - Define Claims Transformations
85+
## Step 2 - Define claims transformations
8686

8787
A [ClaimsTransformation](claimstransformations.md) contains a function that you use to convert a given claim into another one. For instance, you can change a string claim from lower case to upper case. Learn more about [Claims transformations supported by Azure AD B2C](claimstransformations.md#claims-transformations-reference).
8888

@@ -138,7 +138,7 @@ A [ClaimsTransformation](claimstransformations.md) contains a function that you
138138

139139
- *CreateMessageTransformation* concatenates *Hello* and *displayName* to form *message*.
140140

141-
## Step 3 - Configure Content Definitions
141+
## Step 3 - Configure content definitions
142142

143143
[ContentDefinitions](contentdefinitions.md) allow you to specify URL to HTML templates that control the layout of the web pages you show to your users. You can specify specific user interfaces for each step, such as sign-in or sign-up, password reset, or error pages.
144144

@@ -154,15 +154,15 @@ To add content definition, add the following code in `BuildingBlocks` section of
154154
</ContentDefinitions>
155155
```
156156

157-
## Step 4 - Configure Technical Profiles
157+
## Step 4 - Configure technical profiles
158158

159159
In a custom policy, a [TechnicalProfile](technicalprofiles.md) is the element that implements functionality. Now that you've defined Claims and Claims Transformations, you need Technical Profiles to execute your definitions. A technical profile is declared inside the `ClaimsProvider` elements.
160160

161161
Azure AD B2C provides a set of technical profiles. Each technical profile performs a specific role. For instance, you use a [REST technical profile](restful-technical-profile.md) to make an HTTP call to a service endpoint. You can use a claims transformation technical profile to execute the operation you define in a Claims Transformation. Learn more about the [types of technical profiles](technicalprofiles.md) that Azure AD B2C custom policies provide.
162162

163163
### Set values for your claims
164164

165-
To set values for *objectId*, *displayName* and *message* claims, you configure a technical profile that executes the *GenerateRandomObjectIdTransformation*, *CreateDisplayNameTransformation*, and *CreateMessageTransformation* claims transformations. The claims transformation are executed by the order defined in the OutputClaimsTransformations element. For example, it first creates the display name, then the message.
165+
To set values for *objectId*, *displayName* and *message* claims, you configure a technical profile that executes the *GenerateRandomObjectIdTransformation*, *CreateDisplayNameTransformation*, and *CreateMessageTransformation* claims transformations. The claims transformations are executed by the order defined in the `OutputClaimsTransformations` element. For example, it first creates the display name, then the message.
166166

167167
1. Add the following `ClaimsProvider` as a child of the `ClaimsProviders` section.
168168

@@ -233,7 +233,7 @@ You generate the *displayName* claim from *givenName* and *surname*, so you need
233233

234234
Notice the two display claims for the *givenName* and *surname* claims. Both of the claims are marked as required, so the user must enter the values before they submit the form displayed to them. The claims are displayed on the screen in the order defined in the *DisplayClaims* element such as, the **Given Name** and then the **Surname**.
235235

236-
## Step 5 - Define User Journeys
236+
## Step 5 - Define user journeys
237237

238238
You use user journeys to define order in which the technical profiles are called. You use the `OrchestrationSteps` element to specify the steps in a user journey.
239239

@@ -257,7 +257,7 @@ Replace the existing contents of the `HelloWorldJourney` User Journey with the f
257257

258258
According to the orchestration steps, we collect user inputs, set values for *objectId*, *displayName* and *message* claims, and finally send the Jwt token.
259259

260-
## Step 6 - Update Relying Party
260+
## Step 6 - Update relying party
261261

262262
Replace the contents of the `OutputClaims` element of the `RelyingParty` section with the following code:
263263

articles/active-directory-b2c/custom-policies-series-hello-world.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -81,7 +81,7 @@ If you haven't already done so, create the following encryption keys. To automat
8181
```
8282
Replace `yourtenant` with the subdomain part of your tenant name, such as `contoso`. Learn how to [Get your tenant name](tenant-management-read-tenant-name.md#get-your-tenant-name).
8383

84-
The XML elements define the top-level `TrustFrameworkPolicy` element of a policy file with its policy ID and tenant name. The TrustFrameworkPolicy element contains other XML elements that you will use in this series.
84+
The XML elements define the top-level `TrustFrameworkPolicy` element of a policy file with its policy ID and tenant name. The TrustFrameworkPolicy element contains other XML elements that you'll use in this series.
8585

8686
1. To declare a claim, add the following code in `BuildingBlocks` section of the `ContosoCustomPolicy.XML` file:
8787

@@ -147,7 +147,7 @@ If you haven't already done so, create the following encryption keys. To automat
147147
</UserJourney>
148148
```
149149

150-
We've added a [UserJourney](userjourneys.md). The user journey specifies the business logic the end user goes through as Azure AD B2C processes a request. This user journey has only one step that issues a JTW token with the claims the you will define in the next step.
150+
We've added a [UserJourney](userjourneys.md). The user journey specifies the business logic the end user goes through as Azure AD B2C processes a request. This user journey has only one step that issues a JTW token with the claims that you'll define in the next step.
151151

152152
1. In the `RelyingParty` section of the `ContosoCustomPolicy.XML` file, add the following code:
153153

articles/active-directory-b2c/custom-policies-series-sign-up-or-sign-in-federation.md

Lines changed: 11 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -50,16 +50,16 @@ Use the steps outlined in [Create the Facebook key](identity-provider-facebook.m
5050

5151
To configure sign in with Facebook, you need to perform the following steps:
5252

53-
- Declare additional claims
54-
- Define additional Claims transformations to help with claims manipulations such as creating *AlternativeSecurityId*.
53+
- Declare more claims
54+
- Define more claims transformations to help with claims manipulations such as creating *AlternativeSecurityId*.
5555
- Configure Facebook claims provider
56-
- Configure Azure AD Technical Profiles to read and write the social account from and to the Azure AD database.
57-
- Configure a SelfAsserted technical profile (for accepting additional input from user or updating user details) and its content definition.
56+
- Configure Azure AD technical profiles to read and write the social account from and to the Azure AD database.
57+
- Configure a self-asserted technical profile (for accepting additional input from user or updating user details) and its content definition.
5858

5959

60-
### Step 3.1 - Declare additional claims
60+
### Step 3.1 - Declare more claims
6161

62-
In the `ContosoCustomPolicy.XML` file, locate the *ClaimsSchema* section, and then declare additional claims by using the following code:
62+
In the `ContosoCustomPolicy.XML` file, locate the *ClaimsSchema* section, and then declare more claims by using the following code:
6363

6464
```xml
6565
<!--<ClaimsSchema>-->
@@ -152,7 +152,7 @@ In the `ContosoCustomPolicy.XML` file, locate the *ClaimsTransformations* elemen
152152
<!--</ClaimsTransformations>-->
153153
```
154154

155-
We've defined three Claims Transformations, which we use to generate values for *alternativeSecurityId* and *userPrincipalName* claims. These ClaimsTransformations are invoked in the OAuth2 Technical Profile in [step 3.3](#step-33---configure-facebook-claims-provider).
155+
We've defined three Claims Transformations, which we use to generate values for *alternativeSecurityId* and *userPrincipalName* claims. These ClaimsTransformations are invoked in the OAuth2 technical profile in [step 3.3](#step-33---configure-facebook-claims-provider).
156156

157157
### Step 3.3 - Configure Facebook claims provider
158158

@@ -259,7 +259,7 @@ Just like in sign-in with a local account, you need to configure the [Azure AD T
259259

260260
1. Replace *B2C_1A_TokenSigningKeyContainer* with the token signing key you created in [Configure the signing](custom-policies-series-hello-world.md#step-1---configure-the-signing-and-encryption-keys).
261261

262-
1. In the `ContosoCustomPolicy.XML` file add another Azure AD technical profile after the *AAD-UserWriteUsingAlternativeSecurityId* Technical Profile by using the following code:
262+
1. In the `ContosoCustomPolicy.XML` file, add another Azure AD technical profile after the *AAD-UserWriteUsingAlternativeSecurityId* Technical Profile by using the following code:
263263

264264
```xml
265265
<TechnicalProfile Id="AAD-UserReadUsingAlternativeSecurityId">
@@ -502,7 +502,7 @@ Notice the identity provider, `"idp": "facebook.com"`, has been included in the
502502

503503
## A combined local and social sign-in
504504

505-
In this article, our user journey orchestration steps only references technical profiles that enable a user to sign in by using a social account. We can modify the orchestration steps to enable a user to sign in by using either a local account or a social account. To do so, the first orchestration step's `ClaimsProviderSelections` element lists the sign in options available to the user.
505+
In this article, our user journey orchestration steps only reference technical profiles that enable a user to sign in by using a social account. We can modify the orchestration steps to enable a user to sign in by using either a local account or a social account. To do so, the first orchestration step's `ClaimsProviderSelections` element lists the sign-in options available to the user.
506506

507507
Use the following steps to add a combined local and social account:
508508

@@ -525,7 +525,7 @@ Use the following steps to add a combined local and social account:
525525
<!--</UserJourneys>-->
526526
```
527527

528-
1. In the user journey you just created, *LocalAndSocialSignInAndSignUp*, add orchestration steps by using the following code:
528+
1. In the user journey you've created, *LocalAndSocialSignInAndSignUp*, add orchestration steps by using the following code:
529529

530530
```xml
531531
<!--<UserJourneys>
@@ -680,7 +680,7 @@ Use the following steps to add a combined local and social account:
680680

681681
1. Use the procedure in [step 6](#step-6---upload-policy) and [step 7](#step-7---test-policy) to upload and run your policy. After you run the policy, you'll see a screen similar to the following screenshot.
682682

683-
:::image type="content" source="media/custom-policies-series-sign-up-or-sign-in-federation/screenshot-combined-local-and-social-sign-up-or-sign-in.png" alt-text="A screenshot combined local and social sign up or sign in interface.":::
683+
:::image type="content" source="media/custom-policies-series-sign-up-or-sign-in-federation/screenshot-combined-local-and-social-sign-up-or-sign-in.png" alt-text="A screenshot of combined local and social sign-up or sign-in interface.":::
684684

685685
You can observe that a user can sign up or sign in by using either a local account or a social account.
686686

articles/active-directory-b2c/custom-policies-series-sign-up-or-sign-in.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -45,15 +45,15 @@ Azure AD B2C custom policy provides a OpenID Connect technical profile, which yo
4545

4646
## Step 1 - Configure OpenID Connect technical profile
4747

48-
To configure an OpenID Connect Technical Profile you need to perform three steps:
48+
To configure an OpenID Connect technical profile, you need to perform three steps:
4949

50-
- Declare additional claims.
50+
- Declare more claims.
5151
- Register apps in your Azure portal.
5252
- Finally, configure OpenID Connect Technical Profile itself
5353

54-
### Step 1.1 - Declare additional claims
54+
### Step 1.1 - Declare more claims
5555

56-
In the `ContosoCustomPolicy.XML` file, locate the *ClaimsSchema* section, and then add additional claims by using the following code:
56+
In the `ContosoCustomPolicy.XML` file, locate the *ClaimsSchema* section, and then add more claims by using the following code:
5757

5858
```xml
5959
<!--<ClaimsSchema>-->
@@ -98,9 +98,9 @@ Azure AD B2C requires you to register two applications that it uses to sign up a
9898

9999
If you haven't already done so, register the following applications. To automate the walk-through below, visit the [IEF Setup App](https://aka.ms/iefsetup) and follow the instructions:
100100

101-
1. Follow the steps in [Register the IdentityExperienceFramework application](tutorial-create-user-flows.md?pivots=b2c-custom-policy#register-the-identityexperienceframework-application) to register the Identity Experience Framework application. Copy the **Application (client) ID**, *appID*, for the Identity Experience Framework application registration for use on the next step.
101+
1. Use the steps in [Register the IdentityExperienceFramework application](tutorial-create-user-flows.md?pivots=b2c-custom-policy#register-the-identityexperienceframework-application) to register the Identity Experience Framework application. Copy the **Application (client) ID**, *appID*, for the Identity Experience Framework application registration for use on the next step.
102102

103-
1. For low the steps in [Register the ProxyIdentityExperienceFramework application](tutorial-create-user-flows.md?pivots=b2c-custom-policy#register-the-proxyidentityexperienceframework-application) to register Proxy Identity Experience Framework application. Copy the **Application (client) ID**, *proxyAppID*, for the Proxy Identity Experience Framework application registration for use on the next step.
103+
1. Use the steps in [Register the ProxyIdentityExperienceFramework application](tutorial-create-user-flows.md?pivots=b2c-custom-policy#register-the-proxyidentityexperienceframework-application) to register Proxy Identity Experience Framework application. Copy the **Application (client) ID**, *proxyAppID*, for the Proxy Identity Experience Framework application registration for use on the next step.
104104

105105
### Step 1.3 - Configure OpenID Connect technical profile
106106

@@ -191,7 +191,7 @@ In the `ContosoCustomPolicy.XML` file, locate the `SignInUser` technical profile
191191
</TechnicalProfile>
192192
```
193193

194-
We've added a SelfAsserted Technical Profile, *UserSignInCollector*, which displays the sign-in form to the user. We've configured the technical profile to collect the user’s email address as their sign-in name as indicated in the `setting.operatingMode` metadata. The sign in form includes a sign-up link, which leads the user to a sign-up form as indicated by the `SignUpTarget` metadata. You'll see how we set up the *SignUpWithLogonEmailExchange* `ClaimsExchange` in the orchestration steps.
194+
We've added a SelfAsserted Technical Profile, *UserSignInCollector*, which displays the sign-in form to the user. We've configured the technical profile to collect the user’s email address as their sign-in name as indicated in the `setting.operatingMode` metadata. The sign-in form includes a sign-up link, which leads the user to a sign-up form as indicated by the `SignUpTarget` metadata. You'll see how we set up the *SignUpWithLogonEmailExchange* `ClaimsExchange` in the orchestration steps.
195195

196196
Also, we've added the *SignInUser* OpenID Connect Technical Profile as a *ValidationTechnicalProfile*. So, the *SignInUser* technical profile executes when the user selects the **Sign in** button (see screenshot in [step 5](#step-5---test-policy)).
197197

0 commit comments

Comments
 (0)