Skip to content

Commit 90693f6

Browse files
committed
File name and redirection
1 parent 8c491cc commit 90693f6

File tree

6 files changed

+61
-15
lines changed

6 files changed

+61
-15
lines changed

.openpublishing.redirection.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -6467,6 +6467,11 @@
64676467
"redirect_url": "/azure/active-directory-b2c/saml-identity-provider-technical-profile",
64686468
"redirect_document_id": false
64696469
},
6470+
{
6471+
"source_path": "articles/active-directory-b2c/custom-policy-manage-sso-and-token-config.md",
6472+
"redirect_url": "/azure/active-directory-b2c/configure-tokens-custom-policy.md",
6473+
"redirect_document_id": false
6474+
},
64706475
{
64716476
"source_path": "articles/active-directory-ds/active-directory-ds-synchronization.md",
64726477
"redirect_url": "/azure/active-directory-domain-services/synchronization",

articles/active-directory-b2c/TOC.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -228,7 +228,7 @@
228228
- name: Customize tokens
229229
href: configure-tokens-custom-policy.md
230230
- name: Configure session behavior
231-
href: session-behavior-custom.md
231+
href: session-behavior-custom-policy.md
232232
- name: Pass through external IdP token
233233
href: idp-pass-through-custom.md
234234
- name: Adaptive experience

articles/active-directory-b2c/configure-tokens-custom-policy.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -87,5 +87,5 @@ The following values are set in the previous example:
8787
## Next steps
8888

8989
- Learn more about [Azure AD B2C session](session-overview.md).
90-
- Learn how to [configure session behavior in custom policy](session-behavior-custom.md).
90+
- Learn how to [configure session behavior in custom policy](session-behavior-custom-policy.md).
9191
- Reference: [JwtIssuer](jwt-issuer-technical-profile.md).

articles/active-directory-b2c/custom-policy-reference-sso.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -168,4 +168,4 @@ The following `SM-Saml-issuer` technical profile is used by [SAML issuer technic
168168
## Next steps
169169

170170
- Learn more about [Azure AD B2C session](session-overview.md).
171-
- Learn how to [configure session behavior in custom policy](session-behavior-custom.md).
171+
- Learn how to [configure session behavior in custom policy](session-behavior-custom-policy.md).

articles/active-directory-b2c/jwt-issuer-technical-profile.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -29,7 +29,7 @@ The following example shows a technical profile for `JwtIssuer`:
2929
```XML
3030
<TechnicalProfile Id="JwtIssuer">
3131
<DisplayName>JWT Issuer</DisplayName>
32-
<Protocol Name="None" />
32+
<Protocol Name="OpenIdConnect" />
3333
<OutputTokenFormat>JWT</OutputTokenFormat>
3434
<Metadata>
3535
<Item Key="client_id">{service:te}</Item>

articles/active-directory-b2c/session-behavior-custom.md renamed to articles/active-directory-b2c/session-behavior-custom-policy.md

Lines changed: 52 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -22,13 +22,12 @@ ms.subservice: B2C
2222
You can use the following properties to manage web application sessions:
2323

2424
- **Web app session lifetime (minutes)** - The lifetime of Azure AD B2C's session cookie stored on the user's browser upon successful authentication.
25-
- Default = 1440 minutes.
26-
- Minimum (inclusive) = 15 minutes.
27-
- Maximum (inclusive) = 1440 minutes.
25+
- Default = 86400 seconds (1440 minutes).
26+
- Minimum (inclusive) = 900 seconds (15 minutes).
27+
- Maximum (inclusive) = 86400 seconds (1440 minutes).
2828
- **Web app session timeout** - The [session expiry type](session-overview.md#session-expiry-type), *Rolling*, or *Absolute*.
2929
- **Single sign-on configuration** - The [session scope](session-overview.md#session-scope) of the single sign-on (SSO) behavior across multiple apps and user flows in your Azure AD B2C tenant.
3030

31-
3231
## Configure the properties
3332

3433
To change your session behavior and SSO configurations, you add a **UserJourneyBehaviors** element inside of the [RelyingParty](relyingparty.md) element. The **UserJourneyBehaviors** element must immediately follow the **DefaultUserJourney**. The inside of your **UserJourneyBehavors** element should look like this example:
@@ -41,21 +40,63 @@ To change your session behavior and SSO configurations, you add a **UserJourneyB
4140
</UserJourneyBehaviors>
4241
```
4342

44-
The following values are configured in the previous example:
45-
46-
- **Single sign on (SSO)** - Single sign-on is configured with the [SingleSignOn](relyingparty.md#singlesignon). The applicable values are `Tenant`, `Application`, `Policy`, and `Suppressed`. For more information, see [session scope](session-overview.md#session-scope).
47-
- **Web app session time-out** - The web app session timeout is set with the **SessionExpiryType** element. The applicable values are `Absolute` and `Rolling`. For more information, see [session expiry type](session-overview.md#session-expiry-type).
48-
- **Web app session lifetime** - The web app session lifetime is set with the **SessionExpiryInSeconds** element. The default value is 86400 seconds (1440 minutes).
43+
## Single sign-out
4944

50-
## Configure the single sign-out
45+
### Configure the applications
5146

52-
When you redirect the user to the Azure AD B2C sign-out endpoint (for both OAuth2 and SAML protocols), Azure AD B2C clears the user's session from the browser. To allow [Single sign-out](session-overview.d#single-sign-out), set the `LogoutUrl` of the application from the Azure portal:
47+
When you redirect the user to the Azure AD B2C sign-out endpoint (for both OAuth2 and SAML protocols), Azure AD B2C clears the user's session from the browser. To allow [Single sign-out](session-overview.md#single-sign-out), set the `LogoutUrl` of the application from the Azure portal:
5348

5449
1. Navigate to the [Azure portal](https://portal.azure.com).
5550
1. Choose your Active B2C directory by clicking your account in the top right corner of the page.
5651
1. From the left hand navigation panel, choose **Azure AD B2C**, select **App registrations**, and then select your application.
5752
1. Select **Settings**, select **Properties**, and then find the **Logout URL** text box.
5853

54+
### Configure the token issuer
55+
56+
To support sing-sign out, the token issuer technical profiles, for both JWT and SAML must specify:
57+
58+
1. The protocol name, such as `<Protocol Name="OpenIdConnect" />`
59+
1. Reference to the session technical profile, such as `UseTechnicalProfileForSessionManagement ReferenceId="SM-jwt-issuer" />`.
60+
61+
The following example illustrates the JWT and SMAL token issuers with single sign-out:
62+
63+
```xml
64+
<ClaimsProvider>
65+
<DisplayName>Local Account SignIn</DisplayName>
66+
<TechnicalProfiles>
67+
<!-- JWT Token Issuer -->
68+
<TechnicalProfile Id="JwtIssuer">
69+
<DisplayName>JWT token Issuer</DisplayName>
70+
<Protocol Name="OpenIdConnect" />
71+
<OutputTokenFormat>JWT</OutputTokenFormat>
72+
...
73+
<UseTechnicalProfileForSessionManagement ReferenceId="SM-jwt-issuer" />
74+
</TechnicalProfile>
75+
76+
<!-- Session management technical profile for OIDC based tokens -->
77+
<TechnicalProfile Id="SM-OAuth-issuer">
78+
<DisplayName>Session Management Provider</DisplayName>
79+
<Protocol Name="Proprietary" Handler="Web.TPEngine.SSO.OAuthSSOSessionProvider, Web.TPEngine, Version=1.0.0.0, Culture=neutral, PublicKeyToken=null" />
80+
</TechnicalProfile>
81+
82+
<!--SAML token issuer-->
83+
<TechnicalProfile Id="Saml2AssertionIssuer">
84+
<DisplayName>SAML token issuer</DisplayName>
85+
<Protocol Name="SAML2" />
86+
<OutputTokenFormat>SAML2</OutputTokenFormat>
87+
...
88+
<UseTechnicalProfileForSessionManagement ReferenceId="SM-Saml-issuer" />
89+
</TechnicalProfile>
90+
91+
<!-- Session management technical profile for SAML based tokens -->
92+
<TechnicalProfile Id="SM-Saml-issuer">
93+
<DisplayName>Session Management Provider</DisplayName>
94+
<Protocol Name="Proprietary" Handler="Web.TPEngine.SSO.SamlSSOSessionProvider, Web.TPEngine, Version=1.0.0.0, Culture=neutral, PublicKeyToken=null" />
95+
</TechnicalProfile>
96+
</TechnicalProfiles>
97+
</ClaimsProvider>
98+
```
99+
59100
## Next steps
60101

61102
- Learn more about [Azure AD B2C session](session-overview.md).

0 commit comments

Comments
 (0)