Skip to content

Commit 8f0612c

Browse files
authored
Merge pull request #89639 from mmacy/b2c-issue-39209
[b2c] refresh custom policy tut (fixes 39209)
2 parents ca4c914 + 517b195 commit 8f0612c

File tree

2 files changed

+39
-39
lines changed

2 files changed

+39
-39
lines changed

articles/active-directory-b2c/active-directory-b2c-get-started-custom.md

Lines changed: 33 additions & 33 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ manager: celestedg
88
ms.service: active-directory
99
ms.workload: identity
1010
ms.topic: conceptual
11-
ms.date: 07/16/2019
11+
ms.date: 09/26/2019
1212
ms.author: marsma
1313
ms.subservice: B2C
1414
---
@@ -21,44 +21,45 @@ ms.subservice: B2C
2121

2222
## Prerequisites
2323

24-
- If you don't have one already, you need to [create an Azure AD B2C tenant](tutorial-create-tenant.md) that is linked to your Azure subscription.
24+
- If you don't have one already, [create an Azure AD B2C tenant](tutorial-create-tenant.md) that is linked to your Azure subscription.
2525
- [Register your application](tutorial-register-applications.md) in the tenant that you created so that it can communicate with Azure AD B2C.
26+
- Complete the steps in [Set up sign-up and sign-in with a Facebook account](active-directory-b2c-setup-fb-app.md) to configure a Facebook application.
2627

2728
## Add signing and encryption keys
2829

29-
1. Sign in to the [Azure portal](https://portal.azure.com/) as the global administrator of your Azure AD B2C tenant.
30-
2. Make sure you're using the directory that contains your Azure AD B2C tenant. Select the **Directory + subscription** filter in the top menu and choose the directory that contains your tenant.
31-
3. Choose **All services** in the top-left corner of the Azure portal, search for and select **Azure AD B2C**.
32-
4. On the Overview page, select **Identity Experience Framework**.
30+
1. Sign in to the [Azure portal](https://portal.azure.com)
31+
1. Use the **Directory + subscription** filter in the top menu to select the directory that contains your Azure AD B2C tenant.
32+
1. In the left menu, select **Azure AD B2C**. Or, select **All services** and search for and select **Azure AD B2C**.
33+
1. On the Overview page, select **Identity Experience Framework**.
3334

3435
### Create the signing key
3536

3637
1. Select **Policy Keys** and then select **Add**.
37-
2. For **Options**, choose `Generate`.
38-
3. In **Name**, enter `TokenSigningKeyContainer`. The prefix `B2C_1A_` might be added automatically.
39-
4. For **Key type**, select **RSA**.
40-
5. For **Key usage**, select **Signature**.
41-
6. Click **Create**.
38+
1. For **Options**, choose `Generate`.
39+
1. In **Name**, enter `TokenSigningKeyContainer`. The prefix `B2C_1A_` might be added automatically.
40+
1. For **Key type**, select **RSA**.
41+
1. For **Key usage**, select **Signature**.
42+
1. Select **Create**.
4243

4344
### Create the encryption key
4445

4546
1. Select **Policy Keys** and then select **Add**.
46-
2. For **Options**, choose `Generate`.
47-
3. In **Name**, enter `TokenEncryptionKeyContainer`. The prefix `B2C_1A`_ might be added automatically.
48-
4. For **Key type**, select **RSA**.
49-
5. For **Key usage**, select **Encryption**.
50-
6. Click **Create**.
47+
1. For **Options**, choose `Generate`.
48+
1. In **Name**, enter `TokenEncryptionKeyContainer`. The prefix `B2C_1A`_ might be added automatically.
49+
1. For **Key type**, select **RSA**.
50+
1. For **Key usage**, select **Encryption**.
51+
1. Select **Create**.
5152

5253
### Create the Facebook key
5354

54-
If you already have a [Facebook application secret](active-directory-b2c-setup-fb-app.md), add it as a policy key to your tenant. Otherwise, you must create the key with a placeholder value so that your policies pass validation.
55+
Add your Facebook application's [App Secret](active-directory-b2c-setup-fb-app.md) as a policy key. You can use the App Secret of the application you created as part of this article's prerequisites.
5556

5657
1. Select **Policy Keys** and then select **Add**.
57-
2. For **Options**, choose `Manual`.
58-
3. For **Name**, enter `FacebookSecret`. The prefix `B2C_1A_` might be added automatically.
59-
4. In **Secret**, enter your Facebook secret from developers.facebook.com or `0` as a placeholder. This value is the secret, not the application ID.
60-
5. For **Key usage**, select **Signature**.
61-
6. Click **Create**.
58+
1. For **Options**, choose `Manual`.
59+
1. For **Name**, enter `FacebookSecret`. The prefix `B2C_1A_` might be added automatically.
60+
1. In **Secret**, enter your Facebook application's *App Secret* from developers.facebook.com. This value is the secret, not the application ID.
61+
1. For **Key usage**, select **Signature**.
62+
1. Select **Create**.
6263

6364
## Register Identity Experience Framework applications
6465

@@ -74,19 +75,19 @@ Azure AD B2C requires you to register two applications that are used to sign up
7475
1. For **Name**, enter `IdentityExperienceFramework`.
7576
1. For **Application type**, choose **Web app/API**.
7677
1. For **Sign-on URL**, enter `https://your-tenant-name.b2clogin.com/your-tenant-name.onmicrosoft.com`, where `your-tenant-name` is your Azure AD B2C tenant domain name. All URLs should now be using [b2clogin.com](b2clogin.md).
77-
1. Click **Create**. After it's created, copy the application ID and save it to use later.
78+
1. Select **Create**. After it's created, copy the application ID and save it to use later.
7879

7980
### Register the ProxyIdentityExperienceFramework application
8081

8182
1. In **App registrations (Legacy)**, select **New application registration**.
82-
2. For **Name**, enter `ProxyIdentityExperienceFramework`.
83-
3. For **Application type**, choose **Native**.
84-
4. For **Redirect URI**, enter `https://your-tenant-name.b2clogin.com/your-tenant-name.onmicrosoft.com`, where `your-tenant-name` is your Azure AD B2C tenant.
85-
5. Click **Create**. After it's created, copy the application ID and save it to use later.
86-
6. On the Settings page, select **Required permissions**, and then select **Add**.
87-
7. Choose **Select an API**, search for and select **IdentityExperienceFramework**, and then click **Select**.
88-
9. Select the check box next to **Access IdentityExperienceFramework**, click **Select**, and then click **Done**.
89-
10. Select **Grant Permissions**, and then confirm by selecting **Yes**.
83+
1. For **Name**, enter `ProxyIdentityExperienceFramework`.
84+
1. For **Application type**, choose **Native**.
85+
1. For **Redirect URI**, enter `https://your-tenant-name.b2clogin.com/your-tenant-name.onmicrosoft.com`, where `your-tenant-name` is your Azure AD B2C tenant.
86+
1. Select **Create**. After it's created, copy the application ID and save it to use later.
87+
1. Select **Settings**, then select **Required permissions**, and then select **Add**.
88+
1. Choose **Select an API**, search for and select **IdentityExperienceFramework**, and then click **Select**.
89+
1. Select the check box next to **Access IdentityExperienceFramework**, click **Select**, and then click **Done**.
90+
1. Select **Grant permissions**, and then confirm by selecting **Yes**.
9091

9192
## Custom policy starter pack
9293

@@ -156,7 +157,6 @@ As you upload the files, Azure adds the prefix `B2C_1A_` to each.
156157

157158
## Add Facebook as an identity provider
158159

159-
1. Complete the steps in [Set up sign-up and sign-in with a Facebook account](active-directory-b2c-setup-fb-app.md) to configure a Facebook application.
160160
1. In the `SocialAndLocalAccounts/`**`TrustFrameworkExtensions.xml`** file, replace the value of `client_id` with the Facebook application ID:
161161

162162
```xml
@@ -168,7 +168,7 @@ As you upload the files, Azure adds the prefix `B2C_1A_` to each.
168168

169169
1. Upload the *TrustFrameworkExtensions.xml* file to your tenant.
170170
1. Under **Custom policies**, select **B2C_1A_signup_signin**.
171-
1. Select **Run now** and select Facebook to sign in with Facebook and test the custom policy. Or, invoke the policy directly from your registered application.
171+
1. Select **Run now** and select Facebook to sign in with Facebook and test the custom policy.
172172

173173
## Next steps
174174

articles/active-directory-b2c/active-directory-b2c-setup-fb-app.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ manager: celestedg
88
ms.service: active-directory
99
ms.workload: identity
1010
ms.topic: conceptual
11-
ms.date: 08/08/2019
11+
ms.date: 09/26/2019
1212
ms.author: marsma
1313
ms.subservice: B2C
1414
---
@@ -21,20 +21,20 @@ To use a Facebook account as an [identity provider](active-directory-b2c-referen
2121

2222
1. Sign in to [Facebook for developers](https://developers.facebook.com/) with your Facebook account credentials.
2323
1. If you have not already done so, you need to register as a Facebook developer. To do this, select **Get Started** on the upper-right corner of the page, accept Facebook's policies, and complete the registration steps.
24-
1. Select **My Apps** and then **Add New App**.
24+
1. Select **My Apps** and then **Create App**.
2525
1. Enter a **Display Name** and a valid **Contact Email**.
26-
1. Click **Create App ID**. This may require you to accept Facebook platform policies and complete an online security check.
26+
1. Select **Create App ID**. This may require you to accept Facebook platform policies and complete an online security check.
2727
1. Select **Settings** > **Basic**.
2828
1. Choose a **Category**, for example `Business and Pages`. This value is required by Facebook, but not used for Azure AD B2C.
2929
1. At the bottom of the page, select **Add Platform**, and then select **Website**.
3030
1. In **Site URL**, enter `https://your-tenant-name.b2clogin.com/` replacing `your-tenant-name` with the name of your tenant. Enter a URL for the **Privacy Policy URL**, for example `http://www.contoso.com`. The policy URL is a page you maintain to provide privacy information for your application.
3131
1. Select **Save Changes**.
3232
1. At the top of the page, copy the value of **App ID**.
33-
1. Click **Show** and copy the value of **App Secret**. You use both of them to configure Facebook as an identity provider in your tenant. **App Secret** is an important security credential.
33+
1. Select **Show** and copy the value of **App Secret**. You use both of them to configure Facebook as an identity provider in your tenant. **App Secret** is an important security credential.
3434
1. Select the plus sign next to **PRODUCTS**, and then select **Set up** under **Facebook Login**.
3535
1. Under **Facebook Login**, select **Settings**.
36-
1. In **Valid OAuth redirect URIs**, enter `https://your-tenant-name.b2clogin.com/your-tenant-name.onmicrosoft.com/oauth2/authresp`. Replace `your-tenant-name` with the name of your tenant. Click **Save Changes** at the bottom of the page.
37-
1. To make your Facebook application available to Azure AD B2C, click the Status selector at the top right of the page and turn it **On** to make the Application public, and then click **Confirm**. At this point the Status should change from **Development** to **Live**.
36+
1. In **Valid OAuth redirect URIs**, enter `https://your-tenant-name.b2clogin.com/your-tenant-name.onmicrosoft.com/oauth2/authresp`. Replace `your-tenant-name` with the name of your tenant. Select **Save Changes** at the bottom of the page.
37+
1. To make your Facebook application available to Azure AD B2C, select the Status selector at the top right of the page and turn it **On** to make the Application public, and then select **Switch Mode**. At this point the Status should change from **Development** to **Live**.
3838

3939
## Configure a Facebook account as an identity provider
4040

0 commit comments

Comments
 (0)