Skip to content

Commit 9f73348

Browse files
committed
msmimart feedback
1 parent 5eaf025 commit 9f73348

File tree

3 files changed

+21
-6
lines changed

3 files changed

+21
-6
lines changed

articles/active-directory-b2c/identity-provider-amazon-custom.md

Lines changed: 10 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,16 @@ This article shows you how to enable sign-in for users from an Amazon account by
2525
- Complete the steps in [Get started with custom policies](custom-policy-get-started.md).
2626
- If you don't already have an Amazon account, create one at [https://www.amazon.com/](https://www.amazon.com/).
2727

28-
[!INCLUDE [active-directory-b2c-identity-provider-amazon](../../includes/active-directory-b2c-identity-provider-amazon.md)]
28+
## Create an app in the Amazon developer console
29+
30+
To use an Amazon account as a federated identity provider in Azure Active Directory B2C (Azure AD B2C), you need to create an application in your [Amazon Developer Services and Technologies](https://developer.amazon.com). If you don't already have an Amazon account, you can sign up at [https://www.amazon.com/](https://www.amazon.com/).
31+
32+
> [!NOTE]
33+
> Use the following URLs in **step 8** below, replacing `your-tenant-name` with the name of your tenant. When entering your tenant name, use all lowercase letters, even if the tenant is defined with uppercase letters in Azure AD B2C.
34+
> - For **Allowed Origins**, enter `https://your-tenant-name.b2clogin.com`
35+
> - For **Allowed Return URLs**, enter `https://your-tenant-name.b2clogin.com/your-tenant-name.onmicrosoft.com/oauth2/authresp`
36+
37+
[!INCLUDE [identity-provider-amazon-idp-register.md](../../includes/identity-provider-amazon-idp-register.md)]
2938

3039
## Create a policy key
3140

articles/active-directory-b2c/identity-provider-amazon.md

Lines changed: 10 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,16 @@ ms.subservice: B2C
1616

1717
# Set up sign-up and sign-in with an Amazon account using Azure Active Directory B2C
1818

19-
[!INCLUDE [active-directory-b2c-identity-provider-amazon](../../includes/active-directory-b2c-identity-provider-amazon.md)]
19+
## Create an app in the Amazon developer console
20+
21+
To use an Amazon account as a federated identity provider in Azure Active Directory B2C (Azure AD B2C), you need to create an application in your [Amazon Developer Services and Technologies](https://developer.amazon.com). If you don't already have an Amazon account, you can sign up at [https://www.amazon.com/](https://www.amazon.com/).
22+
23+
> [!NOTE]
24+
> Use the following URLs in **step 8** below, replacing `your-tenant-name` with the name of your tenant. When entering your tenant name, use all lowercase letters, even if the tenant is defined with uppercase letters in Azure AD B2C.
25+
> - For **Allowed Origins**, enter `https://your-tenant-name.b2clogin.com`
26+
> - For **Allowed Return URLs**, enter `https://your-tenant-name.b2clogin.com/your-tenant-name.onmicrosoft.com/oauth2/authresp`
27+
28+
[!INCLUDE [identity-provider-amazon-idp-register.md](../../includes/identity-provider-amazon-idp-register.md)]
2029

2130
## Configure an Amazon account as an identity provider
2231

includes/active-directory-b2c-identity-provider-amazon.md renamed to includes/identity-provider-amazon-idp-register.md

Lines changed: 1 addition & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -6,9 +6,6 @@ ms.topic: include
66
ms.date: 05/04/2020
77
ms.author: mimart
88
---
9-
## Create an Amazon application
10-
11-
To use an Amazon account as a federated identity provider in Azure Active Directory B2C (Azure AD B2C), you need to create an application in your [Amazon Developer Services and Technologies](https://developer.amazon.com). If you don't already have an Amazon account, you can sign up at [https://www.amazon.com/](https://www.amazon.com/).
129

1310
1. Sign in to the [Amazon Developer Console](https://developer.amazon.com/dashboard) with your Amazon account credentials.
1411
1. If you have not already done so, click **Sign Up**, follow the developer registration steps, and accept the policy.
@@ -17,5 +14,5 @@ To use an Amazon account as a federated identity provider in Azure Active Direct
1714
1. Enter a **Security Profile Name**, **Security Profile Description**, and **Consent Privacy Notice URL**, for example `https://www.contoso.com/privacy` The privacy notice URL is a page that you manage that provides privacy information to users. Then click **Save**.
1815
1. In the **Login with Amazon Configurations** section, select the **Security Profile Name** you created, click on the **Manage** icon and select **Web Settings**.
1916
1. In the **Web Settings** section, copy the values of **Client ID**. Select **Show Secret** to get the client secret and then copy it. You need both of them to configure an Amazon account as an identity provider in your tenant. **Client Secret** is an important security credential.
20-
1. In the **Web Settings** section, select **Edit**, and then enter `https://your-tenant-name.b2clogin.com` in **Allowed Origins** and `https://your-tenant-name.b2clogin.com/your-tenant-name.onmicrosoft.com/oauth2/authresp` in **Allowed Return URLs**. Replace `your-tenant-name` with the name of your tenant. When entering your tenant name, use all lowercase letters, even if the tenant is defined with uppercase letters in Azure AD B2C.
17+
1. In the **Web Settings** section, select **Edit**. In **Allowed Origins** and **Allowed Return URLs**, enter the appropriate URLs (noted above).
2118
1. Click **Save**.

0 commit comments

Comments
 (0)