You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory-b2c/active-directory-b2c-get-started-custom.md
+33-33Lines changed: 33 additions & 33 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,7 +8,7 @@ manager: celestedg
8
8
ms.service: active-directory
9
9
ms.workload: identity
10
10
ms.topic: conceptual
11
-
ms.date: 07/16/2019
11
+
ms.date: 09/26/2019
12
12
ms.author: marsma
13
13
ms.subservice: B2C
14
14
---
@@ -21,44 +21,45 @@ ms.subservice: B2C
21
21
22
22
## Prerequisites
23
23
24
-
- If you don't have one already, you need to [create an Azure AD B2C tenant](tutorial-create-tenant.md) that is linked to your Azure subscription.
24
+
- If you don't have one already, [create an Azure AD B2C tenant](tutorial-create-tenant.md) that is linked to your Azure subscription.
25
25
-[Register your application](tutorial-register-applications.md) in the tenant that you created so that it can communicate with Azure AD B2C.
26
+
- Complete the steps in [Set up sign-up and sign-in with a Facebook account](active-directory-b2c-setup-fb-app.md) to configure a Facebook application.
26
27
27
28
## Add signing and encryption keys
28
29
29
-
1. Sign in to the [Azure portal](https://portal.azure.com/) as the global administrator of your Azure AD B2C tenant.
30
-
2. Make sure you're using the directory that contains your Azure AD B2C tenant. Select the **Directory + subscription** filter in the top menu and choose the directory that contains your tenant.
31
-
3. Choose **All services** in the top-left corner of the Azure portal, search for and select **Azure AD B2C**.
32
-
4. On the Overview page, select **Identity Experience Framework**.
30
+
1. Sign in to the [Azure portal](https://portal.azure.com)
31
+
1. Use the **Directory + subscription** filter in the top menu to select the directory that contains your Azure AD B2C tenant.
32
+
1. In the left menu, select **Azure AD B2C**. Or, select **All services** and search for and select **Azure AD B2C**.
33
+
1. On the Overview page, select **Identity Experience Framework**.
33
34
34
35
### Create the signing key
35
36
36
37
1. Select **Policy Keys** and then select **Add**.
37
-
2. For **Options**, choose `Generate`.
38
-
3. In **Name**, enter `TokenSigningKeyContainer`. The prefix `B2C_1A_` might be added automatically.
39
-
4. For **Key type**, select **RSA**.
40
-
5. For **Key usage**, select **Signature**.
41
-
6. Click**Create**.
38
+
1. For **Options**, choose `Generate`.
39
+
1. In **Name**, enter `TokenSigningKeyContainer`. The prefix `B2C_1A_` might be added automatically.
40
+
1. For **Key type**, select **RSA**.
41
+
1. For **Key usage**, select **Signature**.
42
+
1. Select**Create**.
42
43
43
44
### Create the encryption key
44
45
45
46
1. Select **Policy Keys** and then select **Add**.
46
-
2. For **Options**, choose `Generate`.
47
-
3. In **Name**, enter `TokenEncryptionKeyContainer`. The prefix `B2C_1A`_ might be added automatically.
48
-
4. For **Key type**, select **RSA**.
49
-
5. For **Key usage**, select **Encryption**.
50
-
6. Click**Create**.
47
+
1. For **Options**, choose `Generate`.
48
+
1. In **Name**, enter `TokenEncryptionKeyContainer`. The prefix `B2C_1A`_ might be added automatically.
49
+
1. For **Key type**, select **RSA**.
50
+
1. For **Key usage**, select **Encryption**.
51
+
1. Select**Create**.
51
52
52
53
### Create the Facebook key
53
54
54
-
If you already have a [Facebook application secret](active-directory-b2c-setup-fb-app.md), add it as a policy key to your tenant. Otherwise, you must create the key with a placeholder value so that your policies pass validation.
55
+
Add your Facebook application's [App Secret](active-directory-b2c-setup-fb-app.md)as a policy key. You can use the App Secret of the application you created as part of this article's prerequisites.
55
56
56
57
1. Select **Policy Keys** and then select **Add**.
57
-
2. For **Options**, choose `Manual`.
58
-
3. For **Name**, enter `FacebookSecret`. The prefix `B2C_1A_` might be added automatically.
59
-
4. In **Secret**, enter your Facebook secret from developers.facebook.com or `0` as a placeholder. This value is the secret, not the application ID.
60
-
5. For **Key usage**, select **Signature**.
61
-
6. Click**Create**.
58
+
1. For **Options**, choose `Manual`.
59
+
1. For **Name**, enter `FacebookSecret`. The prefix `B2C_1A_` might be added automatically.
60
+
1. In **Secret**, enter your Facebook application's *App Secret*from developers.facebook.com. This value is the secret, not the application ID.
@@ -74,19 +75,19 @@ Azure AD B2C requires you to register two applications that are used to sign up
74
75
1. For **Name**, enter `IdentityExperienceFramework`.
75
76
1. For **Application type**, choose **Web app/API**.
76
77
1. For **Sign-on URL**, enter `https://your-tenant-name.b2clogin.com/your-tenant-name.onmicrosoft.com`, where `your-tenant-name` is your Azure AD B2C tenant domain name. All URLs should now be using [b2clogin.com](b2clogin.md).
77
-
1.Click**Create**. After it's created, copy the application ID and save it to use later.
78
+
1.Select**Create**. After it's created, copy the application ID and save it to use later.
78
79
79
80
### Register the ProxyIdentityExperienceFramework application
80
81
81
82
1. In **App registrations (Legacy)**, select **New application registration**.
82
-
2. For **Name**, enter `ProxyIdentityExperienceFramework`.
83
-
3. For **Application type**, choose **Native**.
84
-
4. For **Redirect URI**, enter `https://your-tenant-name.b2clogin.com/your-tenant-name.onmicrosoft.com`, where `your-tenant-name` is your Azure AD B2C tenant.
85
-
5. Click**Create**. After it's created, copy the application ID and save it to use later.
86
-
6. On the Settings page, select **Required permissions**, and then select **Add**.
87
-
7. Choose **Select an API**, search for and select **IdentityExperienceFramework**, and then click **Select**.
88
-
9. Select the check box next to **Access IdentityExperienceFramework**, click **Select**, and then click **Done**.
89
-
10. Select **Grant Permissions**, and then confirm by selecting **Yes**.
83
+
1. For **Name**, enter `ProxyIdentityExperienceFramework`.
84
+
1. For **Application type**, choose **Native**.
85
+
1. For **Redirect URI**, enter `https://your-tenant-name.b2clogin.com/your-tenant-name.onmicrosoft.com`, where `your-tenant-name` is your Azure AD B2C tenant.
86
+
1. Select**Create**. After it's created, copy the application ID and save it to use later.
87
+
1. Select **Settings**, then select **Required permissions**, and then select **Add**.
88
+
1. Choose **Select an API**, search for and select **IdentityExperienceFramework**, and then click **Select**.
89
+
1. Select the check box next to **Access IdentityExperienceFramework**, click **Select**, and then click **Done**.
90
+
1. Select **Grant permissions**, and then confirm by selecting **Yes**.
90
91
91
92
## Custom policy starter pack
92
93
@@ -156,7 +157,6 @@ As you upload the files, Azure adds the prefix `B2C_1A_` to each.
156
157
157
158
## Add Facebook as an identity provider
158
159
159
-
1. Complete the steps in [Set up sign-up and sign-in with a Facebook account](active-directory-b2c-setup-fb-app.md) to configure a Facebook application.
160
160
1. In the `SocialAndLocalAccounts/`**`TrustFrameworkExtensions.xml`** file, replace the value of `client_id` with the Facebook application ID:
161
161
162
162
```xml
@@ -168,7 +168,7 @@ As you upload the files, Azure adds the prefix `B2C_1A_` to each.
168
168
169
169
1. Upload the *TrustFrameworkExtensions.xml* file to your tenant.
170
170
1. Under **Custom policies**, select **B2C_1A_signup_signin**.
171
-
1. Select **Run now** and select Facebook to sign in with Facebook and test the custom policy. Or, invoke the policy directly from your registered application.
171
+
1. Select **Run now** and select Facebook to sign in with Facebook and test the custom policy.
Copy file name to clipboardExpand all lines: articles/active-directory-b2c/active-directory-b2c-setup-fb-app.md
+6-6Lines changed: 6 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,7 +8,7 @@ manager: celestedg
8
8
ms.service: active-directory
9
9
ms.workload: identity
10
10
ms.topic: conceptual
11
-
ms.date: 08/08/2019
11
+
ms.date: 09/26/2019
12
12
ms.author: marsma
13
13
ms.subservice: B2C
14
14
---
@@ -21,20 +21,20 @@ To use a Facebook account as an [identity provider](active-directory-b2c-referen
21
21
22
22
1. Sign in to [Facebook for developers](https://developers.facebook.com/) with your Facebook account credentials.
23
23
1. If you have not already done so, you need to register as a Facebook developer. To do this, select **Get Started** on the upper-right corner of the page, accept Facebook's policies, and complete the registration steps.
24
-
1. Select **My Apps** and then **Add New App**.
24
+
1. Select **My Apps** and then **Create App**.
25
25
1. Enter a **Display Name** and a valid **Contact Email**.
26
-
1.Click**Create App ID**. This may require you to accept Facebook platform policies and complete an online security check.
26
+
1.Select**Create App ID**. This may require you to accept Facebook platform policies and complete an online security check.
27
27
1. Select **Settings** > **Basic**.
28
28
1. Choose a **Category**, for example `Business and Pages`. This value is required by Facebook, but not used for Azure AD B2C.
29
29
1. At the bottom of the page, select **Add Platform**, and then select **Website**.
30
30
1. In **Site URL**, enter `https://your-tenant-name.b2clogin.com/` replacing `your-tenant-name` with the name of your tenant. Enter a URL for the **Privacy Policy URL**, for example `http://www.contoso.com`. The policy URL is a page you maintain to provide privacy information for your application.
31
31
1. Select **Save Changes**.
32
32
1. At the top of the page, copy the value of **App ID**.
33
-
1.Click**Show** and copy the value of **App Secret**. You use both of them to configure Facebook as an identity provider in your tenant. **App Secret** is an important security credential.
33
+
1.Select**Show** and copy the value of **App Secret**. You use both of them to configure Facebook as an identity provider in your tenant. **App Secret** is an important security credential.
34
34
1. Select the plus sign next to **PRODUCTS**, and then select **Set up** under **Facebook Login**.
35
35
1. Under **Facebook Login**, select **Settings**.
36
-
1. In **Valid OAuth redirect URIs**, enter `https://your-tenant-name.b2clogin.com/your-tenant-name.onmicrosoft.com/oauth2/authresp`. Replace `your-tenant-name` with the name of your tenant. Click**Save Changes** at the bottom of the page.
37
-
1. To make your Facebook application available to Azure AD B2C, click the Status selector at the top right of the page and turn it **On** to make the Application public, and then click**Confirm**. At this point the Status should change from **Development** to **Live**.
36
+
1. In **Valid OAuth redirect URIs**, enter `https://your-tenant-name.b2clogin.com/your-tenant-name.onmicrosoft.com/oauth2/authresp`. Replace `your-tenant-name` with the name of your tenant. Select**Save Changes** at the bottom of the page.
37
+
1. To make your Facebook application available to Azure AD B2C, select the Status selector at the top right of the page and turn it **On** to make the Application public, and then select**Switch Mode**. At this point the Status should change from **Development** to **Live**.
38
38
39
39
## Configure a Facebook account as an identity provider
0 commit comments