Skip to content

Commit 770f29b

Browse files
authored
Merge pull request #109428 from yoelhor/patch-22
Update claim-resolver-overview.md
2 parents 4e28e67 + c8cf510 commit 770f29b

File tree

2 files changed

+8
-8
lines changed

2 files changed

+8
-8
lines changed

articles/active-directory-b2c/claim-resolver-overview.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: celestedg
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: reference
12-
ms.date: 03/20/2020
12+
ms.date: 03/30/2020
1313
ms.author: mimart
1414
ms.subservice: B2C
1515
---
@@ -72,7 +72,7 @@ The following sections list available claim resolvers.
7272
| {OIDC:Prompt} | The `prompt` query string parameter. | login |
7373
| {OIDC:RedirectUri} |The `redirect_uri` query string parameter. | https://jwt.ms |
7474
| {OIDC:Resource} |The `resource` query string parameter. | N/A |
75-
| {OIDC:scope} |The `scope` query string parameter. | openid |
75+
| {OIDC:Scope} |The `scope` query string parameter. | openid |
7676
| {OIDC:Username}| The [resource owner password credentials flow](ropc-custom.md) user's username.| [email protected]|
7777

7878
### Context
@@ -158,7 +158,7 @@ The following example shows a RESTful technical profile with this scenario:
158158
<InputClaims>
159159
<InputClaim ClaimTypeReferenceId="userLanguage" DefaultValue="{Culture:LCID}" AlwaysUseDefaultValue="true" />
160160
<InputClaim ClaimTypeReferenceId="policyName" DefaultValue="{Policy:PolicyId}" AlwaysUseDefaultValue="true" />
161-
<InputClaim ClaimTypeReferenceId="scope" DefaultValue="{OIDC:scope}" AlwaysUseDefaultValue="true" />
161+
<InputClaim ClaimTypeReferenceId="scope" DefaultValue="{OIDC:Scope}" AlwaysUseDefaultValue="true" />
162162
<InputClaim ClaimTypeReferenceId="clientId" DefaultValue="{OIDC:ClientId}" AlwaysUseDefaultValue="true" />
163163
</InputClaims>
164164
<UseTechnicalProfileForSessionManagement ReferenceId="SM-Noop" />
@@ -171,7 +171,7 @@ Using claim resolvers, you can prepopulate the sign-in name or direct sign-in to
171171

172172
### Dynamic UI customization
173173

174-
Azure AD B2C enables you to pass query string parameters to your HTML content definition endpoints to dynamically render the page content. For example, this allows the ability to modify the background image on the Azure AD B2C sign-up or sign-in page based on a custom parameter that you pass from your web or mobile application. For more information, see [Dynamically configure the UI by using custom policies in Azure Active Directory B2C](custom-policy-ui-customization.md). You can also localize your HTML page based on a language parameter, or you can change the content based on the client ID.
174+
Azure AD B2C enables you to pass query string parameters to your HTML content definition endpoints to dynamically render the page content. For example, this feature allows the ability to modify the background image on the Azure AD B2C sign-up or sign-in page based on a custom parameter that you pass from your web or mobile application. For more information, see [Dynamically configure the UI by using custom policies in Azure Active Directory B2C](custom-policy-ui-customization.md#configure-dynamic-custom-page-content-uri). You can also localize your HTML page based on a language parameter, or you can change the content based on the client ID.
175175

176176
The following example passes in the query string parameter named **campaignId** with a value of `Hawaii`, a **language** code of `en-US`, and **app** representing the client ID:
177177

articles/active-directory-b2c/custom-policy-ui-customization.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,7 @@ Complete the steps in [Get started with custom policies](custom-policy-get-start
2525

2626
[!INCLUDE [active-directory-b2c-html-how-to](../../includes/active-directory-b2c-html-how-to.md)]
2727

28-
## 4. Modify the extensions file
28+
### 4. Modify the extensions file
2929

3030
To configure UI customization, copy the **ContentDefinition** and its child elements from the base file to the extensions file.
3131

@@ -55,17 +55,17 @@ To configure UI customization, copy the **ContentDefinition** and its child elem
5555

5656
1. Save the extensions file.
5757

58-
## 5. Upload and test your updated custom policy
58+
### 5. Upload and test your updated custom policy
5959

60-
### 5.1 Upload the custom policy
60+
#### 5.1 Upload the custom policy
6161

6262
1. Make sure you're using the directory that contains your Azure AD B2C tenant by selecting the **Directory + subscription** filter in the top menu and choosing the directory that contains your tenant.
6363
1. Search for and select **Azure AD B2C**.
6464
1. Under **Policies**, select **Identity Experience Framework**.
6565
1. Select **Upload custom policy**.
6666
1. Upload the extensions file that you previously changed.
6767

68-
### 5.2 Test the custom policy by using **Run now**
68+
#### 5.2 Test the custom policy by using **Run now**
6969

7070
1. Select the policy that you uploaded, and then select **Run now**.
7171
1. You should be able to sign up by using an email address.

0 commit comments

Comments
 (0)