Skip to content

Commit a1e207a

Browse files
authored
Update partner-idemia.md
1 parent 1814915 commit a1e207a

File tree

1 file changed

+9
-9
lines changed

1 file changed

+9
-9
lines changed

articles/active-directory-b2c/partner-idemia.md

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -47,7 +47,7 @@ The following diagram illustrates the sign-up and sign-in user flows with Mobile
4747
1. User visits the Azure AD B2C sign-in page (the replying party), with their device and Mobile ID, to conduct a transaction.
4848
2. Azure AD B2C performs an ID check. It redirects the user to the IDEMIA router with an OIDC authorization code flow.
4949
3. The router sends a biometric challenge to the user’s mobile app with authentication and authorization request details.
50-
4. Depending on security, the user might be prompted provide additional details: input a PIN, take a live selfie, or both.
50+
4. Depending on security, the user might be prompted provide more details: input a PIN, take a live selfie, or both.
5151
5. The authentication response provides proof of possession, presence, and consent. The response returns to the router.
5252
6. The router verifies user information and replies to Azure AD B2C with the result.
5353
7. The user is granted or denied access.
@@ -69,8 +69,8 @@ To get started, you need:
6969
* An Azure AD subscription
7070
* If you don't have one, get an [Azure free account](https://azure.microsoft.com/free/)
7171
* An [Azure AD B2C tenant](tutorial-create-tenant.md) linked to the Azure subscription
72-
* Your business web application registered in Azure AD B2C tenant.
73-
* For testing, configure https://jwt.ms, a Microsoft-owned web application with decoded token contents.
72+
* Your business web application registered in an Azure AD B2C tenant
73+
* For testing, configure https://jwt.ms, a Microsoft web application with decoded token contents
7474

7575
>[!NOTE]
7676
>The token contents don't leave your browser.
@@ -81,12 +81,12 @@ During Mobile ID integration, the following information is provided.
8181

8282
| Property | Description |
8383
|:---------|:----------|
84-
| Application Name | Azure AD B2C, or your an application name |
84+
| Application Name | Azure AD B2C, or another application name |
8585
| Client_ID | The unique identifier from the identity provider (IdP) |
8686
| Client Secret | Password the relying party application uses to authenticate with the IDEMIA IdP |
8787
| Metadata endpoint | A URL pointing to a token issuer configuration document, also known as an OpenID well-known configuration endpoint |
8888
|Redirect URIs | `https://your-B2C-tenant-name.b2clogin.com/your-B2C-tenant-name.onmicrosoft.com/oauth2/authresp`<br>For example, `https://fabrikam.b2clogin.com/fabrikam.onmicrosoft.com/oauth2/authresp`<br><br>If you use a custom domain, enter `https://your-domain-name/your-tenant-name.onmicrosoft.com/oauth2/authresp`.|
89-
|Post log out redirect URIs | `https://your-B2C-tenant-name.b2clogin.com/your-B2C-tenant-name.onmicrosoft.com/{policy}/oauth2/v2.0/logout`<br>Send a sign-out request. |
89+
|Post sign out redirect URIs | `https://your-B2C-tenant-name.b2clogin.com/your-B2C-tenant-name.onmicrosoft.com/{policy}/oauth2/v2.0/logout`<br>Send a sign out request. |
9090

9191
>[!NOTE]
9292
>You need the Client ID and Client Secret later to configure the IdP in Azure AD B2C.
@@ -175,10 +175,10 @@ Select one of the following values:
175175
|Parameter value| Effect on user authentication process |
176176
|---|---|
177177
|`loa-2`| Crypto-based Azure AD Multi-Factor Authentication (MFA) only|
178-
|`loa-3`| Crypto-based MFA, plus an additional factor|
178+
|`loa-3`| Crypto-based MFA, plus another factor|
179179
|`loa-4`| Crypto-based MFA, plus the user performs PIN and biometric authentication |
180180

181-
The **/userinfo** endpoint provides the claims for the scope(s) requested in the authorization request. For the **<mt_scope>** this includes claims like First Name, Last Name, and Driver's License Number, among other items.
181+
The **/userinfo** endpoint provides the claims for the scope(s) requested in the authorization request. For the **<mt_scope>**, there are claims like First Name, Last Name, and Driver's License Number, among other items.
182182
The claims set for a scope are published in the **scope_to_claims_mapping** section of the discovery API.
183183
Azure AD B2C requests claims from the claims endpoint and returns them in the OutputClaims element. You might need to map the claim name in your policy to the name in the IdP. Define the claim type in the [ClaimSchema element](claimsschema.md):
184184

@@ -200,7 +200,7 @@ For these instructions, the IdP is set up, but it's not in any sign-in page. If
200200
1. From the starter pack, open the `TrustFrameworkBase.xml` file.
201201
2. Locate and copy the contents of the `UserJourneys` element, which includes `ID=SignUpOrSignIn`.
202202
3. Open the `TrustFrameworkExtensions.xml`.
203-
4. Locate the **UserJourneys** element. If there is no element, add one.
203+
4. Locate the **UserJourneys** element. If there's no element, add one.
204204
5. Paste the contents of the **UserJourney** element as a child of the UserJourneys element.
205205
6. Rename the user journey ID. For example, `ID=CustomSignUpSignIn`.
206206

@@ -236,7 +236,7 @@ The following XML demonstrates the first two orchestration steps of a user journ
236236

237237
### Configure the relying party policy
238238

239-
The relying party policy, for example [SignUpSignIn.xml](https://github.com/Azure-Samples/active-directory-b2c-custom-policy-starterpack/blob/master/SocialAndLocalAccounts/SignUpOrSignin.xml), specifies the user journey tkhe Azure AD B2C executes.
239+
The relying party policy, for example [SignUpSignIn.xml](https://github.com/Azure-Samples/active-directory-b2c-custom-policy-starterpack/blob/master/SocialAndLocalAccounts/SignUpOrSignin.xml), specifies the user journey the Azure AD B2C executes.
240240

241241
1. Find the **DefaultUserJourney** element in relying party.
242242
2. Update the **ReferenceId** to match the user journey ID, in which you added the IdP.

0 commit comments

Comments
 (0)