You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory-b2c/active-directory-b2c-setup-aad-custom.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -127,7 +127,7 @@ To get a token from the Azure AD endpoint, you need to define the protocols that
127
127
1. Set value of the **METADATA** to `https://login.windows.net/your-AD-tenant-name.onmicrosoft.com/.well-known/openid-configuration`, where `your-AD-tenant-name` is your Azure AD tenant name. For example, `https://login.windows.net/fabrikam.onmicrosoft.com/.well-known/openid-configuration`
128
128
1. Open your browser and go to the **METADATA** URL that you just updated, look for the **issuer** object, and then copy and paste the value into the value for **ProviderName** in the XML file.
129
129
1. Set **client_id** to the application ID from the application registration.
130
-
1. Under **CryptographicKeys**, update the value of **StorageReferenceId** to the name of the policy key that created earlier. For example, `B2C_1A_ContosoAppSecret`.
130
+
1. Under **CryptographicKeys**, update the value of **StorageReferenceId** to the name of the policy key that you created earlier. For example, `B2C_1A_ContosoAppSecret`.
131
131
132
132
### Upload the extension file for verification
133
133
@@ -152,7 +152,7 @@ At this point, the identity provider has been set up, but it's not yet available
152
152
The **ClaimsProviderSelection** element is analogous to an identity provider button on a sign-up/sign-in page. If you add a **ClaimsProviderSelection** element for Azure AD, a new button shows up when a user lands on the page.
153
153
154
154
1. Find the **OrchestrationStep** element that includes `Order="1"` in the user journey that you created in *TrustFrameworkExtensions.xml*.
155
-
2. Under **ClaimsProviderSelections**, add the following element. Set the value of **TargetClaimsExchangeId** to an appropriate value, for example `ContosoExchange`:
155
+
1. Under **ClaimsProviderSelections**, add the following element. Set the value of **TargetClaimsExchangeId** to an appropriate value, for example `ContosoExchange`:
@@ -191,12 +191,12 @@ Update the relying party (RP) file that initiates the user journey that you crea
191
191
192
192
1. Make a copy of *SignUpOrSignIn.xml* in your working directory, and rename it. For example, rename it to *SignUpSignInContoso.xml*.
193
193
1. Open the new file and update the value of the **PolicyId** attribute for **TrustFrameworkPolicy** with a unique value. For example, `SignUpSignInContoso`.
194
-
1. Update the value of **PublicPolicyUri** with a URI for the policy. For example,`http://contoso.com/B2C_1A_signup_signin_contoso`
194
+
1. Update the value of **PublicPolicyUri** with the URI for the policy. For example,`http://contoso.com/B2C_1A_signup_signin_contoso`.
195
195
1. Update the value of the **ReferenceId** attribute in **DefaultUserJourney** to match the ID of the user journey that you created earlier. For example, *SignUpSignInContoso*.
196
196
1. Save your changes and upload the file.
197
197
1. Under **Custom policies**, select the new policy in the list.
198
198
1. In the **Select application** drop-down, select the Azure AD B2C application that you created earlier. For example, *testapp1*.
199
-
1. Copy the **Run now endpoint** and open it in a private browser window, for example, Incognito Mode in Google Chrome or an InPrivate window in Microsoft Edge. Opening in a private browser window allows you to test the full user journey by not using any currently cached credentials.
199
+
1. Copy the **Run now endpoint** and open it in a private browser window, for example, Incognito Mode in Google Chrome or an InPrivate window in Microsoft Edge. Opening in a private browser window allows you to test the full user journey by not using any currently cached Azure AD credentials.
200
200
1. Select the Azure AD sign in button, for example, *Contoso Employee*, and then enter the credentials for a user in your Azure AD organizational tenant. You're asked to authorize the application, and then enter information for your profile.
201
201
202
202
If the sign in process is successful, your browser is redirected to `https://jwt.ms`, which displays the contents of the token returned by Azure AD B2C.
Copy file name to clipboardExpand all lines: articles/active-directory-b2c/active-directory-b2c-setup-commonaad-custom.md
+12-11Lines changed: 12 additions & 11 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -66,8 +66,8 @@ If you want users to sign in by using Azure AD, you need to define Azure AD as a
66
66
You can define Azure AD as a claims provider by adding Azure AD to the **ClaimsProvider** element in the extension file of your policy.
67
67
68
68
1. Open the *TrustFrameworkExtensions.xml* file.
69
-
2. Find the **ClaimsProviders** element. If it does not exist, add it under the root element.
70
-
3. Add a new **ClaimsProvider** as follows:
69
+
1. Find the **ClaimsProviders** element. If it does not exist, add it under the root element.
70
+
1. Add a new **ClaimsProvider** as follows:
71
71
72
72
```XML
73
73
<ClaimsProvider>
@@ -117,9 +117,10 @@ You can define Azure AD as a claims provider by adding Azure AD to the **ClaimsP
117
117
</ClaimsProvider>
118
118
```
119
119
120
-
4. Under the **ClaimsProvider** element, update the value for **Domain** to a unique value that can be used to distinguish it from other identity providers.
121
-
5. Under the **TechnicalProfile** element, update the value for **DisplayName**, for example, `Contoso Employee`. This value is displayed on the sign-in button on your sign-in page.
122
-
6. Set **client_id** to the application ID of the Azure AD multi-tenant application that you registered earlier.
120
+
1. Under the **ClaimsProvider** element, update the value for **Domain** to a unique value that can be used to distinguish it from other identity providers.
121
+
1. Under the **TechnicalProfile** element, update the value for **DisplayName**, for example, `Contoso Employee`. This value is displayed on the sign-in button on your sign-in page.
122
+
1. Set **client_id** to the application ID of the Azure AD multi-tenant application that you registered earlier.
123
+
1. Under **CryptographicKeys**, update the value of **StorageReferenceId** to the name of the policy key that created earlier. For example, `B2C_1A_AADAppSecret`.
123
124
124
125
### Restrict access
125
126
@@ -143,7 +144,7 @@ By now, you have configured your policy so that Azure AD B2C knows how to commun
143
144
144
145
1. On the **Custom Policies** page in your Azure AD B2C tenant, select **Upload Policy**.
145
146
2. Enable **Overwrite the policy if it exists**, and then browse to and select the *TrustFrameworkExtensions.xml* file.
146
-
3. Click **Upload**.
147
+
3. Select **Upload**.
147
148
148
149
## Register the claims provider
149
150
@@ -159,8 +160,8 @@ At this point, the identity provider has been set up, but it’s not available i
159
160
160
161
The **ClaimsProviderSelection** element is analogous to an identity provider button on a sign-up/sign-in screen. If you add a **ClaimsProviderSelection** element for Azure AD, a new button shows up when a user lands on the page.
161
162
162
-
1. Find the **OrchestrationStep** element that includes `Order="1"` in the user journey that you created.
163
-
2. Under **ClaimsProviderSelects**, add the following element. Set the value of **TargetClaimsExchangeId** to an appropriate value, for example `AzureADExchange`:
163
+
1. Find the **OrchestrationStep** element that includes `Order="1"` in the user journey that you created in *TrustFrameworkExtensions.xml*.
164
+
1. Under **ClaimsProviderSelects**, add the following element. Set the value of **TargetClaimsExchangeId** to an appropriate value, for example `AzureADExchange`:
@@ -183,7 +184,7 @@ Now that you have a button in place, you need to link it to an action. The actio
183
184
184
185
## Create an Azure AD B2C application
185
186
186
-
Communication with Azure AD B2C occurs through an application that you create in your tenant. This section lists optional steps you can complete to create a test application if you haven't already done so.
187
+
Communication with Azure AD B2C occurs through an application that you register in your B2C tenant. This section lists optional steps you can complete to create a test application if you haven't already done so.
187
188
188
189
1. Sign in to the [Azure portal](https://portal.azure.com).
189
190
1. Make sure you're using the directory that contains your Azure AD B2C tenant. Select the **Directory + subscription filter** in the top menu, and then choose the directory that contains your Azure AD B2C tenant.
@@ -199,12 +200,12 @@ Update the relying party (RP) file that initiates the user journey that you crea
199
200
200
201
1. Make a copy of *SignUpOrSignIn.xml* in your working directory, and rename it. For example, rename it to *SignUpSignContoso.xml*.
201
202
1. Open the new file and update the value of the **PolicyId** attribute for **TrustFrameworkPolicy** with a unique value. For example, `SignUpSignInContoso`.
202
-
1. Update the value of **PublicPolicyUri** with the URI for the policy. For example,`http://contoso.com/B2C_1A_signup_signin_contoso`
203
+
1. Update the value of **PublicPolicyUri** with the URI for the policy. For example,`http://contoso.com/B2C_1A_signup_signin_contoso`.
203
204
1. Update the value of the **ReferenceId** attribute in **DefaultUserJourney** to match the ID of the user journey that you created earlier. For example, *SignUpSignInContoso*.
204
205
1. Save your changes and upload the file.
205
206
1. Under **Custom policies**, select the new policy in the list.
206
207
1. In the **Select application** drop-down, select the Azure AD B2C application that you created earlier. For example, *testapp1*.
207
-
1. Copy the **Run now endpoint** and open it in a private browser window, for example, Incognito Mode in Google Chrome or an InPrivate window in Microsoft Edge. Opening in a private browser window allows you to test the full user journey by not using any currently cached credentials.
208
+
1. Copy the **Run now endpoint** and open it in a private browser window, for example, Incognito Mode in Google Chrome or an InPrivate window in Microsoft Edge. Opening in a private browser window allows you to test the full user journey by not using any currently cached Azure AD credentials.
208
209
1. Select the Azure AD sign in button, for example, *Contoso Employee*, and then enter the credentials for a user in one of your Azure AD organizational tenants. You're asked to authorize the application, and then enter information for your profile.
209
210
210
211
If the sign in process is successful, your browser is redirected to `https://jwt.ms`, which displays the contents of the token returned by Azure AD B2C.
0 commit comments