Skip to content

Commit 9f9998f

Browse files
authored
Merge pull request #174785 from kengaderdus/address-GHI-80392
[identity][Azure AD][B2C] Addressing GitHub issues #80392
2 parents 91e1b60 + f40420c commit 9f9998f

File tree

2 files changed

+38
-7
lines changed

2 files changed

+38
-7
lines changed

articles/active-directory-b2c/microsoft-graph-operations.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: celestedg
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: how-to
12-
ms.date: 06/22/2021
12+
ms.date: 10/08/2021
1313
ms.custom: project-no-code
1414
ms.author: mimart
1515
ms.subservice: B2C
@@ -134,6 +134,7 @@ The top-level resource for policy keys in the Microsoft Graph API is the [Truste
134134
## Application extension properties
135135

136136
- [List extension properties](/graph/api/application-list-extensionproperty)
137+
- [Delete extension property](/graph/api/application-delete-extensionproperty)
137138

138139
Azure AD B2C provides a directory that can hold 100 custom attributes per user. For user flows, these extension properties are [managed by using the Azure portal](user-flow-custom-attributes.md). For custom policies, Azure AD B2C creates the property for you, the first time the policy writes a value to the extension property.
139140

articles/active-directory-b2c/user-flow-custom-attributes.md

Lines changed: 36 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ manager: celestedg
88
ms.service: active-directory
99
ms.workload: identity
1010
ms.topic: how-to
11-
ms.date: 09/20/2021
11+
ms.date: 10/08/2021
1212
ms.custom: project-no-code
1313
ms.author: mimart
1414
ms.subservice: B2C
@@ -44,7 +44,7 @@ Azure AD B2C allows you to extend the set of attributes stored on each user acco
4444
1. Provide a **Name** for the custom attribute (for example, "ShoeSize")
4545
1. Choose a **Data Type**. Only **String**, **Boolean**, and **Int** are available.
4646
1. Optionally, enter a **Description** for informational purposes.
47-
1. Click **Create**.
47+
1. Select **Create**.
4848

4949
The custom attribute is now available in the list of **User attributes** and for use in your user flows. A custom attribute is only created the first time it is used in any user flow, and not when you add it to the list of **User attributes**.
5050

@@ -54,9 +54,9 @@ The custom attribute is now available in the list of **User attributes** and for
5454

5555
1. In your Azure AD B2C tenant, select **User flows**.
5656
1. Select your policy (for example, "B2C_1_SignupSignin") to open it.
57-
1. Select **User attributes** and then select the custom attribute (for example, "ShoeSize"). Click **Save**.
57+
1. Select **User attributes** and then select the custom attribute (for example, "ShoeSize"). Select **Save**.
5858
1. Select **Application claims** and then select the custom attribute.
59-
1. Click **Save**.
59+
1. Select **Save**.
6060

6161
Once you've created a new user using a user flow, which uses the newly created custom attribute, the object can be queried in [Microsoft Graph Explorer](https://developer.microsoft.com/graph/graph-explorer). Alternatively you can use the [Run user flow](./tutorial-create-user-flows.md) feature on the user flow to verify the customer experience. You should now see **ShoeSize** in the list of attributes collected during the sign-up journey, and see it in the token sent back to your application.
6262

@@ -68,7 +68,7 @@ Extension attributes can only be registered on an application object, even thoug
6868

6969
::: zone pivot="b2c-user-flow"
7070

71-
To get the application ID:
71+
### Get extensions app's application ID
7272

7373
1. Sign in to the [Azure portal](https://portal.azure.com).
7474
1. Make sure you're using the directory that contains your Azure AD B2C tenant. Select the **Directories + subscriptions** icon in the portal toolbar.
@@ -82,7 +82,7 @@ To get the application ID:
8282

8383
::: zone pivot="b2c-custom-policy"
8484

85-
Get the application properties:
85+
### Get extensions app's application properties
8686

8787
1. Sign in to the [Azure portal](https://portal.azure.com).
8888
1. Make sure you're using the directory that contains your Azure AD B2C tenant. Select the **Directories + subscriptions** icon in the portal toolbar.
@@ -185,6 +185,36 @@ Microsoft Graph API supports creating and updating a user with extension attribu
185185
"extension_831374b3bd5041bfaa54263ec9e050fc_loyaltyId": "212342"
186186
```
187187

188+
## Remove extension attribute
189+
190+
Unlike built-in attributes, extension/custom attributes can be removed. The extension attributes' values can also be removed.
191+
192+
> [!Important]
193+
> Before you remove the extension/custom attribute, for each account in the directory, set the extension attribute value to null. In this way you explicitly remove the extension attributes’s values. Then continue to remove the extension attribute itself. Extension/custom attribute is queryable using MS Graph API.
194+
195+
::: zone pivot="b2c-user-flow"
196+
197+
Use the following steps to remove extension/custom attribute from a user flow:
198+
199+
1. Sign in to the [Azure portal](https://portal.azure.com/) as the global administrator of your Azure AD B2C tenant.
200+
2. Make sure you're using the directory that contains your Azure AD B2C tenant:
201+
1. Select the **Directories + subscriptions** icon in the portal toolbar.
202+
1. On the **Portal settings | Directories + subscriptions** page, find your Azure AD B2C directory in the Directory name list, and then select **Switch**
203+
1. Choose **All services** in the top-left corner of the Azure portal, search for and select **Azure AD B2C**.
204+
1. Select **User attributes**, and then select the attribute you want to delete.
205+
1. Select **Delete**
206+
207+
::: zone-end
208+
209+
::: zone pivot="b2c-custom-policy"
210+
211+
To remove a custom attribute, use [MS Graph API](microsoft-graph-operations.md), and use the [Delete](/graph/api/application-delete-extensionproperty) command.
212+
213+
::: zone-end
214+
215+
216+
217+
188218
## Next steps
189219

190220
Follow the guidance for how to [add claims and customize user input using custom policies](configure-user-input.md). This sample uses a built-in claim 'city'. To use a custom attribute, replace 'city' with your own custom attributes.

0 commit comments

Comments
 (0)