Skip to content

Commit 81b7e90

Browse files
committed
Typo fixes
1 parent 28b78f2 commit 81b7e90

File tree

2 files changed

+16
-15
lines changed

2 files changed

+16
-15
lines changed

articles/active-directory-b2c/active-directory-b2c-setup-aad-custom.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -127,7 +127,7 @@ To get a token from the Azure AD endpoint, you need to define the protocols that
127127
1. Set value of the **METADATA** to `https://login.windows.net/your-AD-tenant-name.onmicrosoft.com/.well-known/openid-configuration`, where `your-AD-tenant-name` is your Azure AD tenant name. For example, `https://login.windows.net/fabrikam.onmicrosoft.com/.well-known/openid-configuration`
128128
1. Open your browser and go to the **METADATA** URL that you just updated, look for the **issuer** object, and then copy and paste the value into the value for **ProviderName** in the XML file.
129129
1. Set **client_id** to the application ID from the application registration.
130-
1. Under **CryptographicKeys**, update the value of **StorageReferenceId** to the name of the policy key that created earlier. For example, `B2C_1A_ContosoAppSecret`.
130+
1. Under **CryptographicKeys**, update the value of **StorageReferenceId** to the name of the policy key that you created earlier. For example, `B2C_1A_ContosoAppSecret`.
131131
132132
### Upload the extension file for verification
133133
@@ -152,7 +152,7 @@ At this point, the identity provider has been set up, but it's not yet available
152152
The **ClaimsProviderSelection** element is analogous to an identity provider button on a sign-up/sign-in page. If you add a **ClaimsProviderSelection** element for Azure AD, a new button shows up when a user lands on the page.
153153
154154
1. Find the **OrchestrationStep** element that includes `Order="1"` in the user journey that you created in *TrustFrameworkExtensions.xml*.
155-
2. Under **ClaimsProviderSelections**, add the following element. Set the value of **TargetClaimsExchangeId** to an appropriate value, for example `ContosoExchange`:
155+
1. Under **ClaimsProviderSelections**, add the following element. Set the value of **TargetClaimsExchangeId** to an appropriate value, for example `ContosoExchange`:
156156
157157
```XML
158158
<ClaimsProviderSelection TargetClaimsExchangeId="ContosoExchange" />
@@ -191,12 +191,12 @@ Update the relying party (RP) file that initiates the user journey that you crea
191191
192192
1. Make a copy of *SignUpOrSignIn.xml* in your working directory, and rename it. For example, rename it to *SignUpSignInContoso.xml*.
193193
1. Open the new file and update the value of the **PolicyId** attribute for **TrustFrameworkPolicy** with a unique value. For example, `SignUpSignInContoso`.
194-
1. Update the value of **PublicPolicyUri** with a URI for the policy. For example,`http://contoso.com/B2C_1A_signup_signin_contoso`
194+
1. Update the value of **PublicPolicyUri** with the URI for the policy. For example, `http://contoso.com/B2C_1A_signup_signin_contoso`.
195195
1. Update the value of the **ReferenceId** attribute in **DefaultUserJourney** to match the ID of the user journey that you created earlier. For example, *SignUpSignInContoso*.
196196
1. Save your changes and upload the file.
197197
1. Under **Custom policies**, select the new policy in the list.
198198
1. In the **Select application** drop-down, select the Azure AD B2C application that you created earlier. For example, *testapp1*.
199-
1. Copy the **Run now endpoint** and open it in a private browser window, for example, Incognito Mode in Google Chrome or an InPrivate window in Microsoft Edge. Opening in a private browser window allows you to test the full user journey by not using any currently cached credentials.
199+
1. Copy the **Run now endpoint** and open it in a private browser window, for example, Incognito Mode in Google Chrome or an InPrivate window in Microsoft Edge. Opening in a private browser window allows you to test the full user journey by not using any currently cached Azure AD credentials.
200200
1. Select the Azure AD sign in button, for example, *Contoso Employee*, and then enter the credentials for a user in your Azure AD organizational tenant. You're asked to authorize the application, and then enter information for your profile.
201201
202202
If the sign in process is successful, your browser is redirected to `https://jwt.ms`, which displays the contents of the token returned by Azure AD B2C.

articles/active-directory-b2c/active-directory-b2c-setup-commonaad-custom.md

Lines changed: 12 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -66,8 +66,8 @@ If you want users to sign in by using Azure AD, you need to define Azure AD as a
6666
You can define Azure AD as a claims provider by adding Azure AD to the **ClaimsProvider** element in the extension file of your policy.
6767
6868
1. Open the *TrustFrameworkExtensions.xml* file.
69-
2. Find the **ClaimsProviders** element. If it does not exist, add it under the root element.
70-
3. Add a new **ClaimsProvider** as follows:
69+
1. Find the **ClaimsProviders** element. If it does not exist, add it under the root element.
70+
1. Add a new **ClaimsProvider** as follows:
7171
7272
```XML
7373
<ClaimsProvider>
@@ -117,9 +117,10 @@ You can define Azure AD as a claims provider by adding Azure AD to the **ClaimsP
117117
</ClaimsProvider>
118118
```
119119
120-
4. Under the **ClaimsProvider** element, update the value for **Domain** to a unique value that can be used to distinguish it from other identity providers.
121-
5. Under the **TechnicalProfile** element, update the value for **DisplayName**, for example, `Contoso Employee`. This value is displayed on the sign-in button on your sign-in page.
122-
6. Set **client_id** to the application ID of the Azure AD multi-tenant application that you registered earlier.
120+
1. Under the **ClaimsProvider** element, update the value for **Domain** to a unique value that can be used to distinguish it from other identity providers.
121+
1. Under the **TechnicalProfile** element, update the value for **DisplayName**, for example, `Contoso Employee`. This value is displayed on the sign-in button on your sign-in page.
122+
1. Set **client_id** to the application ID of the Azure AD multi-tenant application that you registered earlier.
123+
1. Under **CryptographicKeys**, update the value of **StorageReferenceId** to the name of the policy key that created earlier. For example, `B2C_1A_AADAppSecret`.
123124
124125
### Restrict access
125126
@@ -143,7 +144,7 @@ By now, you have configured your policy so that Azure AD B2C knows how to commun
143144
144145
1. On the **Custom Policies** page in your Azure AD B2C tenant, select **Upload Policy**.
145146
2. Enable **Overwrite the policy if it exists**, and then browse to and select the *TrustFrameworkExtensions.xml* file.
146-
3. Click **Upload**.
147+
3. Select **Upload**.
147148
148149
## Register the claims provider
149150
@@ -159,8 +160,8 @@ At this point, the identity provider has been set up, but it’s not available i
159160
160161
The **ClaimsProviderSelection** element is analogous to an identity provider button on a sign-up/sign-in screen. If you add a **ClaimsProviderSelection** element for Azure AD, a new button shows up when a user lands on the page.
161162
162-
1. Find the **OrchestrationStep** element that includes `Order="1"` in the user journey that you created.
163-
2. Under **ClaimsProviderSelects**, add the following element. Set the value of **TargetClaimsExchangeId** to an appropriate value, for example `AzureADExchange`:
163+
1. Find the **OrchestrationStep** element that includes `Order="1"` in the user journey that you created in *TrustFrameworkExtensions.xml*.
164+
1. Under **ClaimsProviderSelects**, add the following element. Set the value of **TargetClaimsExchangeId** to an appropriate value, for example `AzureADExchange`:
164165
165166
```XML
166167
<ClaimsProviderSelection TargetClaimsExchangeId="AzureADExchange" />
@@ -183,7 +184,7 @@ Now that you have a button in place, you need to link it to an action. The actio
183184
184185
## Create an Azure AD B2C application
185186
186-
Communication with Azure AD B2C occurs through an application that you create in your tenant. This section lists optional steps you can complete to create a test application if you haven't already done so.
187+
Communication with Azure AD B2C occurs through an application that you register in your B2C tenant. This section lists optional steps you can complete to create a test application if you haven't already done so.
187188
188189
1. Sign in to the [Azure portal](https://portal.azure.com).
189190
1. Make sure you're using the directory that contains your Azure AD B2C tenant. Select the **Directory + subscription filter** in the top menu, and then choose the directory that contains your Azure AD B2C tenant.
@@ -199,12 +200,12 @@ Update the relying party (RP) file that initiates the user journey that you crea
199200
200201
1. Make a copy of *SignUpOrSignIn.xml* in your working directory, and rename it. For example, rename it to *SignUpSignContoso.xml*.
201202
1. Open the new file and update the value of the **PolicyId** attribute for **TrustFrameworkPolicy** with a unique value. For example, `SignUpSignInContoso`.
202-
1. Update the value of **PublicPolicyUri** with the URI for the policy. For example,`http://contoso.com/B2C_1A_signup_signin_contoso`
203+
1. Update the value of **PublicPolicyUri** with the URI for the policy. For example, `http://contoso.com/B2C_1A_signup_signin_contoso`.
203204
1. Update the value of the **ReferenceId** attribute in **DefaultUserJourney** to match the ID of the user journey that you created earlier. For example, *SignUpSignInContoso*.
204205
1. Save your changes and upload the file.
205206
1. Under **Custom policies**, select the new policy in the list.
206207
1. In the **Select application** drop-down, select the Azure AD B2C application that you created earlier. For example, *testapp1*.
207-
1. Copy the **Run now endpoint** and open it in a private browser window, for example, Incognito Mode in Google Chrome or an InPrivate window in Microsoft Edge. Opening in a private browser window allows you to test the full user journey by not using any currently cached credentials.
208+
1. Copy the **Run now endpoint** and open it in a private browser window, for example, Incognito Mode in Google Chrome or an InPrivate window in Microsoft Edge. Opening in a private browser window allows you to test the full user journey by not using any currently cached Azure AD credentials.
208209
1. Select the Azure AD sign in button, for example, *Contoso Employee*, and then enter the credentials for a user in one of your Azure AD organizational tenants. You're asked to authorize the application, and then enter information for your profile.
209210
210211
If the sign in process is successful, your browser is redirected to `https://jwt.ms`, which displays the contents of the token returned by Azure AD B2C.

0 commit comments

Comments
 (0)