You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory-b2c/add-identity-provider.md
+5-5Lines changed: 5 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,11 +2,11 @@
2
2
title: Add an identity provider - Azure Active Directory B2C
3
3
description: Learn how to add an identity provider to your Active Directory B2C tenant.
4
4
services: active-directory-b2c
5
-
author: kengaderdus
5
+
author: garrodonnell
6
6
manager: CelesteDG
7
7
8
-
ms.author: kengaderdus
9
-
ms.date: 04/08/2022
8
+
ms.author: godonnell
9
+
ms.date: 01/19/2022
10
10
ms.custom: mvc
11
11
ms.topic: how-to
12
12
ms.service: active-directory
@@ -19,9 +19,9 @@ You can configure Azure AD B2C to allow users to sign in to your application wit
19
19
20
20
With external identity provider federation, you can offer your consumers the ability to sign in with their existing social or enterprise accounts, without having to create a new account just for your application.
21
21
22
-
On the sign-up or sign-in page, Azure AD B2C presents a list of external identity providers the user can choose for sign-in. Once they select one of the external identity providers, they're taken (redirected) to the selected provider's website to complete the signin process. After the user successfully signs in, they're returned to Azure AD B2C for authentication of the account in your application.
22
+
On the sign-up or sign-in page, Azure AD B2C presents a list of external identity providers the user can choose for sign-in. Once they select one of the external identity providers, they're taken (redirected) to the selected provider's website to complete the sign-in process. After the user successfully signs in, they're returned to Azure AD B2C for authentication of the account in your application.
23
23
24
-

24
+

25
25
26
26
You can add identity providers that are supported by Azure Active Directory B2C (Azure AD B2C) to your [user flows](user-flow-overview.md) using the Azure portal. You can also add identity providers to your [custom policies](user-flow-overview.md).
Copy file name to clipboardExpand all lines: articles/active-directory-b2c/sign-in-options.md
+21-8Lines changed: 21 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -9,7 +9,7 @@ manager: CelesteDG
9
9
ms.service: active-directory
10
10
ms.workload: identity
11
11
ms.topic: conceptual
12
-
ms.date: 11/03/2022
12
+
ms.date: 01/18/2022
13
13
ms.author: godonnell
14
14
ms.subservice: B2C
15
15
@@ -28,7 +28,7 @@ Email sign-up is enabled by default in your local account identity provider sett
28
28
-**Sign-up**: users are prompted for an email address, which is verified at sign-up (optional) and becomes their login ID. The user then enters any other information requested on the sign-up page, for example, display name, given name, and surname. Then they select **Continue** to create an account.
29
29
-**Password reset**: Users enter and verify their email, after which the user can reset the password
30
30
31
-

31
+

32
32
33
33
Learn how to configure email sign-in in your local account identity provider.
34
34
## Username sign-in
@@ -39,7 +39,7 @@ Your local account identity provider includes a Username option that lets users
39
39
-**Sign-up**: Users will be prompted for a username, which will become their login ID. Users will also be prompted for an email address, which will be verified at sign-up. The email address will be used during a password reset flow. The user enters any other information requested on the sign-up page, for example, Display Name, Given Name, and Surname. The user then selects Continue to create the account.
40
40
-**Password reset**: Users must enter their username and the associated email address. The email address must be verified, after which, the user can reset the password.
41
41
42
-

42
+

43
43
44
44
## Phone sign-in
45
45
@@ -53,7 +53,7 @@ Phone sign-in is a passwordless option in your local account identity provider s
53
53
1. Next, the user is asked to provide a **recovery email**. The user enters their email address, and then selects *Send verification code*. A code is sent to the user's email inbox, which they can retrieve and enter in the Verification code box. Then the user selects Verify code.
54
54
1. Once the code is verified, the user selects *Create* to create their account.
55
55
56
-

56
+

57
57
58
58
### Pricing for phone sign-in
59
59
@@ -66,22 +66,35 @@ One-time passwords are sent to your users by using SMS text messages. Depending
66
66
67
67
When you enable phone sign-up and sign-in for your user flows, it's also a good idea to enable the recovery email feature. With this feature, a user can provide an email address that can be used to recover their account when they don't have their phone. This email address is used for account recovery only. It can't be used for signing in.
68
68
69
-
- When the recovery email prompt is **On**, a user signing up for the first time is prompted to verify a backup email. A user who hasn't provided a recovery email before is asked to verify a backup email during next signin.
69
+
- When the recovery email prompt is **On**, a user signing up for the first time is prompted to verify a backup email. A user who hasn't provided a recovery email before is asked to verify a backup email during next sign-in.
70
70
71
71
- When recovery email is **Off**, a user signing up or signing in isn't shown the recovery email prompt.
72
72
73
73
The following screenshots demonstrate the phone recovery flow:
74
74
75
-

75
+

76
76
77
77
78
78
## Phone or email sign-in
79
79
80
80
You can choose to combine the [phone sign-in](#phone-sign-in), and the [email sign-in](#email-sign-in) in your local account identity provider settings. In the sign-up or sign-in page, user can type a phone number, or email address. Based on the user input, Azure AD B2C takes the user to the corresponding flow.
81
81
82
-

82
+

83
+
84
+
85
+
## Federated sign-in
86
+
87
+
You can configure Azure AD B2C to allow users to sign in to your application with credentials from external social or enterprise identity providers (IdPs). Azure AD B2C supports many [external identity providers](add-identity-provider.md) and any identity provider that supports OAuth 1.0, OAuth 2.0, OpenID Connect, and SAML protocols.
88
+
89
+
With external identity provider federation, you can offer your consumers the ability to sign in with their existing social or enterprise accounts, without having to create a new account just for your application.
90
+
91
+
On the sign-up or sign-in page, Azure AD B2C presents a list of external identity providers the user can choose for sign-in. Once they select one of the external identity providers, they're redirected to the selected provider's website to complete the sign-in process. After the user successfully signs in, they're returned to Azure AD B2C for authentication of the account in your application.
92
+
93
+

94
+
95
+
You can add identity providers that are supported by Azure Active Directory B2C (Azure AD B2C) to your [user flows](user-flow-overview.md) using the Azure portal. You can also add identity providers to your [custom policies](user-flow-overview.md).
83
96
84
97
## Next steps
85
98
86
99
- Find out more about the built-in policies provided by [User flows in Azure Active Directory B2C](user-flow-overview.md).
87
-
-[Configure your local account identity provider](identity-provider-local.md).
100
+
-[Configure your local account identity provider](identity-provider-local.md).
0 commit comments