Skip to content

Commit 89e96fc

Browse files
authored
Merge pull request #110493 from yoelhor/patch-31
Update identity-provider-azure-ad-single-tenant.md
2 parents 1a5c5ff + c00e687 commit 89e96fc

File tree

4 files changed

+57
-70
lines changed

4 files changed

+57
-70
lines changed

articles/active-directory-b2c/identity-provider-azure-ad-multi-tenant-custom.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -40,7 +40,7 @@ To enable sign-in for users from a specific Azure AD organization, you need to r
4040
https://your-B2C-tenant-name.b2clogin.com/your-B2C-tenant-name.onmicrosoft.com/oauth2/authresp
4141
```
4242
43-
For example, `https://contoso.b2clogin.com/contoso.onmicrosoft.com/oauth2/authresp`.
43+
For example, `https://fabrikam.b2clogin.com/fabrikam.onmicrosoft.com/oauth2/authresp`.
4444
4545
1. Select **Register**. Record the **Application (client) ID** for use in a later step.
4646
1. Select **Certificates & secrets**, and then select **New client secret**.
@@ -53,10 +53,10 @@ If you want to get the `family_name` and `given_name` claims from Azure AD, you
5353
1. Sign in to the [Azure portal](https://portal.azure.com). Search for and select **Azure Active Directory**.
5454
1. From the **Manage** section, select **App registrations**.
5555
1. Select the application you want to configure optional claims for in the list.
56-
1. From the **Manage** section, select **Token configuration (preview)**.
56+
1. From the **Manage** section, select **Token configuration**.
5757
1. Select **Add optional claim**.
58-
1. Select the token type you want to configure.
59-
1. Select the optional claims to add.
58+
1. For the **Token type**, select **ID**.
59+
1. Select the optional claims to add, `family_name` and `given_name`.
6060
1. Click **Add**.
6161
6262
## Create a policy key

articles/active-directory-b2c/identity-provider-azure-ad-single-tenant-custom.md

Lines changed: 2 additions & 34 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: celestedg
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: conceptual
12-
ms.date: 02/11/2020
12+
ms.date: 04/20/2020
1313
ms.author: mimart
1414
ms.subservice: B2C
1515
---
@@ -24,40 +24,8 @@ This article shows you how to enable sign-in for users from an Azure Active Dire
2424

2525
Complete the steps in [Get started with custom policies in Azure Active Directory B2C](custom-policy-get-started.md).
2626

27-
## Register an application
2827

29-
To enable sign-in for users from a specific Azure AD organization, you need to register an application within the organizational Azure AD tenant.
30-
31-
1. Sign in to the [Azure portal](https://portal.azure.com).
32-
1. Make sure you're using the directory that contains your organizational Azure AD tenant (for example, contoso.com). Select the **Directory + subscription filter** in the top menu, and then choose the directory that contains your Azure AD tenant.
33-
1. Choose **All services** in the top-left corner of the Azure portal, and then search for and select **App registrations**.
34-
1. Select **New registration**.
35-
1. Enter a **Name** for your application. For example, `Azure AD B2C App`.
36-
1. Accept the default selection of **Accounts in this organizational directory only** for this application.
37-
1. For the **Redirect URI**, accept the value of **Web**, and enter the following URL in all lowercase letters, where `your-B2C-tenant-name` is replaced with the name of your Azure AD B2C tenant.
38-
39-
```
40-
https://your-B2C-tenant-name.b2clogin.com/your-B2C-tenant-name.onmicrosoft.com/oauth2/authresp
41-
```
42-
43-
For example, `https://contoso.b2clogin.com/contoso.onmicrosoft.com/oauth2/authresp`.
44-
45-
1. Select **Register**. Record the **Application (client) ID** for use in a later step.
46-
1. Select **Certificates & secrets**, and then select **New client secret**.
47-
1. Enter a **Description** for the secret, select an expiration, and then select **Add**. Record the **Value** of the secret for use in a later step.
48-
49-
## Configuring optional claims
50-
51-
If you want to get the `family_name` and `given_name` claims from Azure AD, you can configure optional claims for your application in the Azure portal UI or application manifest. For more information, see [How to provide optional claims to your Azure AD app](../active-directory/develop/active-directory-optional-claims.md).
52-
53-
1. Sign in to the [Azure portal](https://portal.azure.com). Search for and select **Azure Active Directory**.
54-
1. From the **Manage** section, select **App registrations**.
55-
1. Select the application you want to configure optional claims for in the list.
56-
1. From the **Manage** section, select **Token configuration (preview)**.
57-
1. Select **Add optional claim**.
58-
1. Select the token type you want to configure.
59-
1. Select the optional claims to add.
60-
1. Click **Add**.
28+
[!INCLUDE [active-directory-b2c-identity-provider-azure-ad](../../includes/active-directory-b2c-identity-provider-azure-ad.md)]
6129

6230
## Create a policy key
6331

articles/active-directory-b2c/identity-provider-azure-ad-single-tenant.md

Lines changed: 9 additions & 32 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: celestedg
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: conceptual
12-
ms.date: 08/08/2019
12+
ms.date: 04/20/2020
1313
ms.author: mimart
1414
ms.subservice: B2C
1515
ms.custom: fasttrack-edit
@@ -19,51 +19,28 @@ ms.custom: fasttrack-edit
1919

2020
To use an Azure Active Directory (Azure AD) as an [identity provider](authorization-code-flow.md) in Azure AD B2C, you need to create an application that represents it. This article shows you how to enable sign-in for users from a specific Azure AD organization using a user flow in Azure AD B2C.
2121

22-
## Create an Azure AD app
23-
24-
To enable sign-in for users from a specific Azure AD organization, you need to register an application within the organizational Azure AD tenant, which is not the same as your Azure AD B2C tenant.
25-
26-
1. Sign in to the [Azure portal](https://portal.azure.com).
27-
2. Make sure you're using the directory that contains your Azure AD tenant. Select the **Directory + subscription** filter in the top menu and choose the directory that contains your Azure AD tenant. This is not the same tenant as your Azure AD B2C tenant.
28-
3. Choose **All services** in the top-left corner of the Azure portal, and then search for and select **App registrations**.
29-
4. Select **New registration**.
30-
5. Enter a name for your application. For example, `Azure AD B2C App`.
31-
6. Accept the selection of **Accounts in this organizational directory only** for this application.
32-
7. For the **Redirect URI**, accept the value of **Web**, and enter the following URL in all lowercase letters, where `your-B2C-tenant-name` is replaced with the name of your Azure AD B2C tenant. For example, `https://fabrikam.b2clogin.com/fabrikam.onmicrosoft.com/oauth2/authresp`:
33-
34-
```
35-
https://your-B2C-tenant-name.b2clogin.com/your-B2C-tenant-name.onmicrosoft.com/oauth2/authresp
36-
```
37-
38-
All URLs should now be using [b2clogin.com](b2clogin.md).
39-
40-
8. Click **Register**. Copy the **Application (client) ID** to be used later.
41-
9. Select **Certificates & secrets** in the application menu, and then select **New client secret**.
42-
10. Enter a name for the client secret. For example, `Azure AD B2C App Secret`.
43-
11. Select the expiration period. For this application, accept the selection of **In 1 year**.
44-
12. Select **Add** and copy the value of the new client secret that is displayed to be used later.
22+
[!INCLUDE [active-directory-b2c-identity-provider-azure-ad](../../includes/active-directory-b2c-identity-provider-azure-ad.md)]
4523

4624
## Configure Azure AD as an identity provider
4725

4826
1. Make sure you're using the directory that contains Azure AD B2C tenant. Select the **Directory + subscription** filter in the top menu and choose the directory that contains your Azure AD B2C tenant.
4927
1. Choose **All services** in the top-left corner of the Azure portal, and then search for and select **Azure AD B2C**.
5028
1. Select **Identity providers**, and then select **New OpenID Connect provider**.
5129
1. Enter a **Name**. For example, enter *Contoso Azure AD*.
52-
1. For **Metadata url**, enter the following URL replacing `your-AD-tenant-domain` with the domain name of your Azure AD tenant:
30+
1. For **Metadata url**, enter the following URL replacing `{tenant}` with the domain name of your Azure AD tenant:
5331

5432
```
55-
https://login.microsoftonline.com/your-AD-tenant-domain/.well-known/openid-configuration
33+
https://login.microsoftonline.com/{tenant}/v2.0/.well-known/openid-configuration
5634
```
5735
58-
For example, `https://login.microsoftonline.com/contoso.onmicrosoft.com/.well-known/openid-configuration`.
59-
60-
**Do not** use the Azure AD v2.0 metadata endpoint, for example `https://login.microsoftonline.com/contoso.onmicrosoft.com/v2.0/.well-known/openid-configuration`. Doing so results in an error similar to `AADB2C: A claim with id 'UserId' was not found, which is required by ClaimsTransformation 'CreateAlternativeSecurityId' with id 'CreateAlternativeSecurityId' in policy 'B2C_1_SignUpOrIn' of tenant 'contoso.onmicrosoft.com'` when attempting to sign in.
36+
For example, `https://login.microsoftonline.com/contoso.onmicrosoft.com/v2.0/.well-known/openid-configuration`.
6137
6238
1. For **Client ID**, enter the application ID that you previously recorded.
6339
1. For **Client secret**, enter the client secret that you previously recorded.
64-
1. Leave the default values for **Scope**, **Response type**, and **Response mode**.
65-
1. (Optional) Enter a value for **Domain_hint**. For example, *ContosoAD*. This is the value to use when referring to this identity provider using *domain_hint* in the request.
66-
1. Under **Identity provider claims mapping**, enter the following claims mapping values:
40+
1. For the **Scope**, enter the `openid profile`.
41+
1. Leave the default values for **Response type**, and **Response mode**.
42+
1. (Optional) For the **Domain hint**, enter `contoso.com`. For more information, see [Set up direct sign-in using Azure Active Directory B2C](direct-signin.md#redirect-sign-in-to-a-social-provider).
43+
1. Under **Identity provider claims mapping**, select the following claims:
6744
6845
* **User ID**: *oid*
6946
* **Display name**: *name*
Lines changed: 42 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,42 @@
1+
---
2+
author: msmimart
3+
ms.service: active-directory-b2c
4+
ms.subservice: B2C
5+
ms.topic: include
6+
ms.date: 04/07/2020
7+
ms.author: mimart
8+
---
9+
## Register an Azure AD app
10+
11+
To enable sign-in for users from a specific Azure AD organization, you need to register an application within the organizational Azure AD tenant.
12+
13+
1. Sign in to the [Azure portal](https://portal.azure.com).
14+
1. Make sure you're using the directory that contains your organizational Azure AD tenant (for example, contoso.com). Select the **Directory + subscription filter** in the top menu, and then choose the directory that contains your Azure AD tenant.
15+
1. Choose **All services** in the top-left corner of the Azure portal, and then search for and select **App registrations**.
16+
1. Select **New registration**.
17+
1. Enter a **Name** for your application. For example, `Azure AD B2C App`.
18+
1. Accept the default selection of **Accounts in this organizational directory only** for this application.
19+
1. For the **Redirect URI**, accept the value of **Web**, and enter the following URL in all lowercase letters, where `your-B2C-tenant-name` is replaced with the name of your Azure AD B2C tenant.
20+
21+
```
22+
https://your-B2C-tenant-name.b2clogin.com/your-B2C-tenant-name.onmicrosoft.com/oauth2/authresp
23+
```
24+
25+
For example, `https://fabrikam.b2clogin.com/fabrikam.onmicrosoft.com/oauth2/authresp`.
26+
27+
1. Select **Register**. Record the **Application (client) ID** for use in a later step.
28+
1. Select **Certificates & secrets**, and then select **New client secret**.
29+
1. Enter a **Description** for the secret, select an expiration, and then select **Add**. Record the **Value** of the secret for use in a later step.
30+
31+
### Configuring optional claims
32+
33+
If you want to get the `family_name` and `given_name` claims from Azure AD, you can configure optional claims for your application in the Azure portal UI or application manifest. For more information, see [How to provide optional claims to your Azure AD app](/active-directory/develop/active-directory-optional-claims.md).
34+
35+
1. Sign in to the [Azure portal](https://portal.azure.com). Search for and select **Azure Active Directory**.
36+
1. From the **Manage** section, select **App registrations**.
37+
1. Select the application you want to configure optional claims for in the list.
38+
1. From the **Manage** section, select **Token configuration**.
39+
1. Select **Add optional claim**.
40+
1. For the **Token type**, select **ID**.
41+
1. Select the optional claims to add, `family_name` and `given_name`.
42+
1. Click **Add**.

0 commit comments

Comments
 (0)