You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory-b2c/session-behavior-custom-policy.md
+52-11Lines changed: 52 additions & 11 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -22,13 +22,12 @@ ms.subservice: B2C
22
22
You can use the following properties to manage web application sessions:
23
23
24
24
-**Web app session lifetime (minutes)** - The lifetime of Azure AD B2C's session cookie stored on the user's browser upon successful authentication.
25
-
- Default = 1440 minutes.
26
-
- Minimum (inclusive) = 15 minutes.
27
-
- Maximum (inclusive) = 1440 minutes.
25
+
- Default = 86400 seconds (1440 minutes).
26
+
- Minimum (inclusive) = 900 seconds (15 minutes).
27
+
- Maximum (inclusive) = 86400 seconds (1440 minutes).
28
28
-**Web app session timeout** - The [session expiry type](session-overview.md#session-expiry-type), *Rolling*, or *Absolute*.
29
29
-**Single sign-on configuration** - The [session scope](session-overview.md#session-scope) of the single sign-on (SSO) behavior across multiple apps and user flows in your Azure AD B2C tenant.
30
30
31
-
32
31
## Configure the properties
33
32
34
33
To change your session behavior and SSO configurations, you add a **UserJourneyBehaviors** element inside of the [RelyingParty](relyingparty.md) element. The **UserJourneyBehaviors** element must immediately follow the **DefaultUserJourney**. The inside of your **UserJourneyBehavors** element should look like this example:
@@ -41,21 +40,63 @@ To change your session behavior and SSO configurations, you add a **UserJourneyB
41
40
</UserJourneyBehaviors>
42
41
```
43
42
44
-
The following values are configured in the previous example:
45
-
46
-
-**Single sign on (SSO)** - Single sign-on is configured with the [SingleSignOn](relyingparty.md#singlesignon). The applicable values are `Tenant`, `Application`, `Policy`, and `Suppressed`. For more information, see [session scope](session-overview.md#session-scope).
47
-
-**Web app session time-out** - The web app session timeout is set with the **SessionExpiryType** element. The applicable values are `Absolute` and `Rolling`. For more information, see [session expiry type](session-overview.md#session-expiry-type).
48
-
-**Web app session lifetime** - The web app session lifetime is set with the **SessionExpiryInSeconds** element. The default value is 86400 seconds (1440 minutes).
43
+
## Single sign-out
49
44
50
-
## Configure the single sign-out
45
+
###Configure the applications
51
46
52
-
When you redirect the user to the Azure AD B2C sign-out endpoint (for both OAuth2 and SAML protocols), Azure AD B2C clears the user's session from the browser. To allow [Single sign-out](session-overview.d#single-sign-out), set the `LogoutUrl` of the application from the Azure portal:
47
+
When you redirect the user to the Azure AD B2C sign-out endpoint (for both OAuth2 and SAML protocols), Azure AD B2C clears the user's session from the browser. To allow [Single sign-out](session-overview.md#single-sign-out), set the `LogoutUrl` of the application from the Azure portal:
53
48
54
49
1. Navigate to the [Azure portal](https://portal.azure.com).
55
50
1. Choose your Active B2C directory by clicking your account in the top right corner of the page.
56
51
1. From the left hand navigation panel, choose **Azure AD B2C**, select **App registrations**, and then select your application.
57
52
1. Select **Settings**, select **Properties**, and then find the **Logout URL** text box.
58
53
54
+
### Configure the token issuer
55
+
56
+
To support sing-sign out, the token issuer technical profiles, for both JWT and SAML must specify:
57
+
58
+
1. The protocol name, such as `<Protocol Name="OpenIdConnect" />`
59
+
1. Reference to the session technical profile, such as `UseTechnicalProfileForSessionManagement ReferenceId="SM-jwt-issuer" />`.
60
+
61
+
The following example illustrates the JWT and SMAL token issuers with single sign-out:
0 commit comments