Skip to content

Commit 85766b2

Browse files
authored
Merge pull request #120953 from saraswatshantanu/patch-3
Update custom-domain.md to remove flawed sample and replace with inst…
2 parents ad2da7e + f5af80e commit 85766b2

File tree

1 file changed

+0
-8
lines changed

1 file changed

+0
-8
lines changed

articles/active-directory-b2c/custom-domain.md

Lines changed: 0 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -331,14 +331,6 @@ https://<domain-name>/11111111-1111-1111-1111-111111111111/v2.0/
331331
```
332332
::: zone pivot="b2c-custom-policy"
333333

334-
## (Optional) Block access to the default domain name
335-
336-
After you add the custom domain and configure your application, users will still be able to access the &lt;tenant-name&gt;.b2clogin.com domain. If you want to prevent access, you can configure the policy to check the authorization request "host name" against an allowed list of domains. The host name is the domain name that appears in the URL. The host name is available through `{Context:HostName}` [claim resolvers](claim-resolver-overview.md). Then you can present a custom error message.
337-
338-
1. Get the example of a conditional access policy that checks the host name from [GitHub](https://github.com/azure-ad-b2c/samples/tree/master/policies/check-host-name).
339-
1. In each file, replace the string `yourtenant` with the name of your Azure AD B2C tenant. For example, if the name of your B2C tenant is *contosob2c*, all instances of `yourtenant.onmicrosoft.com` become `contosob2c.onmicrosoft.com`.
340-
1. Upload the policy files in the following order: `B2C_1A_TrustFrameworkExtensions_HostName.xml` and then `B2C_1A_signup_signin_HostName.xml`.
341-
342334
::: zone-end
343335

344336

0 commit comments

Comments
 (0)