Skip to content

Commit 791799a

Browse files
committed
address local accounts sign in review comments
1 parent 06cb166 commit 791799a

File tree

2 files changed

+13
-7
lines changed

2 files changed

+13
-7
lines changed

articles/active-directory-b2c/custom-policies-series-sign-up-or-sign-in.md

Lines changed: 11 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -19,9 +19,9 @@ ms.subservice: B2C
1919

2020
# Set up a sign-up and sign-in flow for a local account by using Azure Active Directory B2C custom policy
2121

22-
In [Create a user account by using Azure Active Directory B2C custom policy](custom-policies-series-store-user.md) article, a user creates a new user account but doesn't sign in to it.
22+
In [Create and read a user account by using Azure Active Directory B2C custom policy](custom-policies-series-store-user.md) article, a user creates a new user account but doesn't sign in to it.
2323

24-
In this article, you learn how to write an Azure Active Directory B2C (Azure AD B2C) custom policy that allows a user to either sign in into or create an Azure AD B2C local account. A local account refers to an account that is created in your Azure AD B2C tenant when a user signs up for your application.
24+
In this article, you learn how to write an Azure Active Directory B2C (Azure AD B2C) custom policy that allows a user to either create an Azure AD B2C local account or sign in into one. A local account refers to an account that is created in your Azure AD B2C tenant when a user signs up into your application.
2525

2626
## Overview
2727

@@ -43,7 +43,7 @@ Azure AD B2C custom policy provides a OpenID Connect technical profile, which yo
4343
[!INCLUDE [active-directory-b2c-app-integration-call-api](../../includes/active-directory-b2c-common-note-custom-policy-how-to-series.md)]
4444

4545

46-
## Step 1 - Configure OpenID Connect Technical Profile
46+
## Step 1 - Configure OpenID Connect technical profile
4747

4848
To configure an OpenID Connect Technical Profile you need to perform three steps:
4949

@@ -93,11 +93,13 @@ In the `ContosoCustomPolicy.XML` file, locate the *ClaimsSchema* section, and th
9393

9494
Azure AD B2C requires you to register two applications that it uses to sign up and sign in users with local accounts: IdentityExperienceFramework, a web API, and ProxyIdentityExperienceFramework, a native app with delegated permission to the IdentityExperienceFramework app.
9595

96+
If you haven't already done so, register the following applications. To automate the walk-through below, visit the [IEF Setup App](https://aka.ms/iefsetup) and follow the instructions:
97+
9698
1. Follow the steps in [Register the IdentityExperienceFramework application](tutorial-create-user-flows.md?pivots=b2c-custom-policy#register-the-identityexperienceframework-application) to register the Identity Experience Framework application. Copy the **Application (client) ID**, *appID*, for the Identity Experience Framework application registration for use on the next step.
9799

98100
1. For low the steps in [Register the ProxyIdentityExperienceFramework application](tutorial-create-user-flows.md?pivots=b2c-custom-policy#register-the-proxyidentityexperienceframework-application) to register Proxy Identity Experience Framework application. Copy the **Application (client) ID**, *proxyAppID*, for the Proxy Identity Experience Framework application registration for use on the next step.
99101

100-
### Step 1.3 - Configure OpenID Connect Technical Profile
102+
### Step 1.3 - Configure OpenID Connect technical profile
101103

102104
In the `ContosoCustomPolicy.XML` file, locate the *ClaimsProviders* section, and then add a Claims Provider element that holds your OpenID Connect Technical Profile by using the following code:
103105

@@ -168,9 +170,13 @@ In the `ContosoCustomPolicy.XML` file, locate the *SignInUser* technical profile
168170
<Item Key="setting.operatingMode">Email</Item>
169171
<Item Key="SignUpTarget">SignUpWithLogonEmailExchange</Item>
170172
</Metadata>
171-
<OutputClaims>
173+
<DisplayClaims>
172174
<OutputClaim ClaimTypeReferenceId="email" Required="true" />
173175
<OutputClaim ClaimTypeReferenceId="password" Required="true" />
176+
</DisplayClaims>
177+
<OutputClaims>
178+
<OutputClaim ClaimTypeReferenceId="email" />
179+
<OutputClaim ClaimTypeReferenceId="password" />
174180
<OutputClaim ClaimTypeReferenceId="objectId" />
175181
</OutputClaims>
176182
<ValidationTechnicalProfiles>

articles/active-directory-b2c/custom-policies-series-store-user.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -281,7 +281,7 @@ Test your custom policy again by using the same **Email Address**. Instead of th
281281
> [!NOTE]
282282
> The *password* claim value is a very important piece of information, so be very careful how you handle it in your custom policy. For a similar reason, Azure AD B2C treats the password claim value as a special value. When you collect the password claim value in the self-asserted technical profile, that value is only available within the same technical profile or within a validation technical profiles that are referenced by that same self-asserted technical profile. Once execution of that self-asserted technical profile completes, and moves to another technical profile, the value is lost.
283283
284-
## Verify user email
284+
## Verify user email address
285285

286286
We recommend that you verify a user's email before you use it to create a user account. When you verify email addresses, you make sure the accounts are created by real users. You also help users to be sure that they're using their correct email addresses to create an account.
287287

@@ -418,7 +418,7 @@ In this article, you've learnt how to store user details using [built-in User pr
418418

419419
## Next steps
420420

421-
- Learn how to [Read or update a user account by using Azure Active Directory B2C custom policy](custom-policies-series-read-update-user.md).
421+
- Learn how to [Set up a sign-up and sign-in flow for a local account by using Azure Active Directory B2C custom policy](custom-policies-series-sign-up-or-sign-in.md).
422422

423423
- Learn how to [define custom attributes in your custom policy](user-flow-custom-attributes.md?pivots=b2c-custom-policy).
424424

0 commit comments

Comments
 (0)