Skip to content

Commit 98d45d4

Browse files
Merge pull request #230396 from yoelhor/patch-332
[Azure AD] Custom claims provider videos
2 parents 61b67c2 + 7026882 commit 98d45d4

File tree

2 files changed

+10
-5
lines changed

2 files changed

+10
-5
lines changed

articles/active-directory/develop/custom-claims-provider-overview.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ ms.service: active-directory
1010
ms.subservice: develop
1111
ms.workload: identity
1212
ms.topic: conceptual
13-
ms.date: 03/06/2023
13+
ms.date: 03/13/2023
1414
ms.author: davidmu
1515
ms.reviewer: JasSuri
1616
ms.custom: aaddev
@@ -24,6 +24,9 @@ When a user authenticates to an application, a custom claims provider can be use
2424

2525
Key data about a user is often stored in systems external to Azure AD. For example, secondary email, billing tier, or sensitive information. Some applications may rely on these attributes for the application to function as designed. For example, the application may block access to certain features based on a claim in the token.
2626

27+
The following short video provides an excellent overview of the Azure AD custom extensions and custom claims providers:
28+
> [!VIDEO https://www.youtube.com/embed/BYOMshjlwbc]
29+
2730
Use a custom claims provider for the following scenarios:
2831

2932
- **Migration of legacy systems** - You may have legacy identity systems such as Active Directory Federation Services (AD FS) or data stores (such as LDAP directory) that hold information about users. You'd like to migrate these applications, but can't fully migrate the identity data into Azure AD. Your apps may depend on certain information on the token, and can't be rearchitected.

articles/active-directory/develop/custom-extension-get-started.md

Lines changed: 6 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ ms.service: active-directory
1010
ms.subservice: develop
1111
ms.topic: how-to
1212
ms.workload: identity
13-
ms.date: 03/06/2023
13+
ms.date: 03/13/2023
1414
ms.author: davidmu
1515
ms.custom: aaddev
1616
ms.reviewer: JasSuri
@@ -21,7 +21,9 @@ ms.reviewer: JasSuri
2121

2222
This article describes how to configure and setup a custom claims provider with the [token issuance start event](custom-claims-provider-overview.md#token-issuance-start-event-listener) type. This event is triggered right before the token is issued, and allows you to call a REST API to add claims to the token.
2323

24-
This how-to guide demonstrates the token issuance start event with a REST API running in Azure Functions and a sample OpenID Connect application.
24+
This how-to guide demonstrates the token issuance start event with a REST API running in Azure Functions and a sample OpenID Connect application. Before you start, take a look at following video, which demonstrates how to configure Azure AD custom claims provider with Function App:
25+
26+
> [!VIDEO https://www.youtube.com/embed/r-JEsMBJ7GE]
2527
2628
## Prerequisites
2729

@@ -488,7 +490,7 @@ To protect your Azure function, follow these steps to integrate Azure AD authent
488490
> [!NOTE]
489491
> If the Azure function app is hosted in a different Azure tenant than the tenant in which your custom extension is registered, skip to [using OpenID Connect identity provider](#51-using-openid-connect-identity-provider) step.
490492

491-
1. In the [Azure portal](https://poral.azure.com), navigate and select the function app you previously published.
493+
1. In the [Azure portal](https://portal.azure.com), navigate and select the function app you previously published.
492494
1. Select **Authentication** in the menu on the left.
493495
1. Select **Add Identity provider**.
494496
1. Select **Microsoft** as the identity provider.
@@ -503,7 +505,7 @@ To protect your Azure function, follow these steps to integrate Azure AD authent
503505

504506
If you configured the [Microsoft identity provider](#step-5-protect-your-azure-function), skip this step. Otherwise, if the Azure Function is hosted under a different tenant than the tenant in which your custom extension is registered, follow these steps to protect your function:
505507

506-
1. In the [Azure portal](https://poral.azure.com), navigate and select the function app you previously published.
508+
1. In the [Azure portal](https://portal.azure.com), navigate and select the function app you previously published.
507509
1. Select **Authentication** in the menu on the left.
508510
1. Select **Add Identity provider**.
509511
1. Select **OpenID Connect** as the identity provider.

0 commit comments

Comments
 (0)