Skip to content

Commit 7f77688

Browse files
Merge pull request #242634 from kengaderdus/update-tenant-name
Resolve GitHub issue #106809
2 parents 5a0cf15 + bd444b8 commit 7f77688

File tree

1 file changed

+8
-4
lines changed

1 file changed

+8
-4
lines changed

articles/active-directory-b2c/saml-service-provider.md

Lines changed: 8 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: CelesteDG
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: how-to
12-
ms.date: 04/24/2023
12+
ms.date: 06/24/2023
1313
ms.author: kengaderdus
1414
ms.subservice: B2C
1515
ms.custom: fasttrack-edit
@@ -175,15 +175,19 @@ Now that your policy can create SAML responses, you must configure the policy to
175175

176176
1. Open the *SignUpOrSigninSAML.xml* file in your preferred editor.
177177

178-
1. Change the `PolicyId` and `PublicPolicyUri` values of the policy to `B2C_1A_signup_signin_saml` and `http://<tenant-name>.onmicrosoft.com/B2C_1A_signup_signin_saml`.
178+
1. Change the value of:
179+
180+
1. `PolicyId` to `B2C_1A_signup_signin_saml`
181+
182+
1. `PublicPolicyUri` to `http://<tenant-name>.onmicrosoft.com/B2C_1A_signup_signin_saml`. Replace `<tenant-name>` placeholder with the subdomain of your Azure AD B2C tenant's domain name. For example, if your tenant primary domain is `contoso.onmicrosoft.com`, use `contoso`. If you don't have your tenant name, learn [how to read your tenant details](tenant-management-read-tenant-name.md#get-your-tenant-name).
179183

180184
```xml
181185
<TrustFrameworkPolicy
182186
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
183187
xmlns:xsd="http://www.w3.org/2001/XMLSchema"
184188
xmlns="http://schemas.microsoft.com/online/cpim/schemas/2013/06"
185189
PolicySchemaVersion="0.3.0.0"
186-
TenantId="tenant-name.onmicrosoft.com"
190+
TenantId="<tenant-name>.onmicrosoft.com"
187191
PolicyId="B2C_1A_signup_signin_saml"
188192
PublicPolicyUri="http://<tenant-name>.onmicrosoft.com/B2C_1A_signup_signin_saml">
189193
```
@@ -206,7 +210,7 @@ If you started from a different folder in the starter pack or you customized the
206210

207211
The relying party element determines which protocol your application uses. The default is `OpenId`. The `Protocol` element must be changed to `SAML`. The output claims will create the claims mapping to the SAML assertion.
208212

209-
Replace the entire `<TechnicalProfile>` element in the `<RelyingParty>` element with the following technical profile XML. Update `tenant-name` with the name of your Azure AD B2C tenant.
213+
Replace the entire `<TechnicalProfile>` element in the `<RelyingParty>` element with the following technical profile XML.
210214

211215
```xml
212216
<TechnicalProfile Id="PolicyProfile">

0 commit comments

Comments
 (0)