You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory-b2c/partner-idemia.md
+9-9Lines changed: 9 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -47,7 +47,7 @@ The following diagram illustrates the sign-up and sign-in user flows with Mobile
47
47
1. User visits the Azure AD B2C sign-in page (the replying party), with their device and Mobile ID, to conduct a transaction.
48
48
2. Azure AD B2C performs an ID check. It redirects the user to the IDEMIA router with an OIDC authorization code flow.
49
49
3. The router sends a biometric challenge to the user’s mobile app with authentication and authorization request details.
50
-
4. Depending on security, the user might be prompted provide additional details: input a PIN, take a live selfie, or both.
50
+
4. Depending on security, the user might be prompted provide more details: input a PIN, take a live selfie, or both.
51
51
5. The authentication response provides proof of possession, presence, and consent. The response returns to the router.
52
52
6. The router verifies user information and replies to Azure AD B2C with the result.
53
53
7. The user is granted or denied access.
@@ -69,8 +69,8 @@ To get started, you need:
69
69
* An Azure AD subscription
70
70
* If you don't have one, get an [Azure free account](https://azure.microsoft.com/free/)
71
71
* An [Azure AD B2C tenant](tutorial-create-tenant.md) linked to the Azure subscription
72
-
* Your business web application registered in Azure AD B2C tenant.
73
-
* For testing, configure https://jwt.ms, a Microsoft-owned web application with decoded token contents.
72
+
* Your business web application registered in an Azure AD B2C tenant
73
+
* For testing, configure https://jwt.ms, a Microsoft web application with decoded token contents
74
74
75
75
>[!NOTE]
76
76
>The token contents don't leave your browser.
@@ -81,12 +81,12 @@ During Mobile ID integration, the following information is provided.
81
81
82
82
| Property | Description |
83
83
|:---------|:----------|
84
-
| Application Name | Azure AD B2C, or your an application name |
84
+
| Application Name | Azure AD B2C, or another application name |
85
85
| Client_ID | The unique identifier from the identity provider (IdP) |
86
86
| Client Secret | Password the relying party application uses to authenticate with the IDEMIA IdP |
87
87
| Metadata endpoint | A URL pointing to a token issuer configuration document, also known as an OpenID well-known configuration endpoint |
88
88
|Redirect URIs |`https://your-B2C-tenant-name.b2clogin.com/your-B2C-tenant-name.onmicrosoft.com/oauth2/authresp`<br>For example, `https://fabrikam.b2clogin.com/fabrikam.onmicrosoft.com/oauth2/authresp`<br><br>If you use a custom domain, enter `https://your-domain-name/your-tenant-name.onmicrosoft.com/oauth2/authresp`.|
89
-
|Post log out redirect URIs |`https://your-B2C-tenant-name.b2clogin.com/your-B2C-tenant-name.onmicrosoft.com/{policy}/oauth2/v2.0/logout`<br>Send a sign-out request. |
89
+
|Post sign out redirect URIs |`https://your-B2C-tenant-name.b2clogin.com/your-B2C-tenant-name.onmicrosoft.com/{policy}/oauth2/v2.0/logout`<br>Send a signout request. |
90
90
91
91
>[!NOTE]
92
92
>You need the Client ID and Client Secret later to configure the IdP in Azure AD B2C.
@@ -175,10 +175,10 @@ Select one of the following values:
175
175
|Parameter value| Effect on user authentication process |
176
176
|---|---|
177
177
|`loa-2`| Crypto-based Azure AD Multi-Factor Authentication (MFA) only|
178
-
|`loa-3`| Crypto-based MFA, plus an additional factor|
178
+
|`loa-3`| Crypto-based MFA, plus another factor|
179
179
|`loa-4`| Crypto-based MFA, plus the user performs PIN and biometric authentication |
180
180
181
-
The **/userinfo** endpoint provides the claims for the scope(s) requested in the authorization request. For the **<mt_scope>** this includes claims like First Name, Last Name, and Driver's License Number, among other items.
181
+
The **/userinfo** endpoint provides the claims for the scope(s) requested in the authorization request. For the **<mt_scope>**, there are claims like First Name, Last Name, and Driver's License Number, among other items.
182
182
The claims set for a scope are published in the **scope_to_claims_mapping** section of the discovery API.
183
183
Azure AD B2C requests claims from the claims endpoint and returns them in the OutputClaims element. You might need to map the claim name in your policy to the name in the IdP. Define the claim type in the [ClaimSchema element](claimsschema.md):
184
184
@@ -200,7 +200,7 @@ For these instructions, the IdP is set up, but it's not in any sign-in page. If
200
200
1. From the starter pack, open the `TrustFrameworkBase.xml` file.
201
201
2. Locate and copy the contents of the `UserJourneys` element, which includes `ID=SignUpOrSignIn`.
202
202
3. Open the `TrustFrameworkExtensions.xml`.
203
-
4. Locate the **UserJourneys** element. If there is no element, add one.
203
+
4. Locate the **UserJourneys** element. If there's no element, add one.
204
204
5. Paste the contents of the **UserJourney** element as a child of the UserJourneys element.
205
205
6. Rename the user journey ID. For example, `ID=CustomSignUpSignIn`.
206
206
@@ -236,7 +236,7 @@ The following XML demonstrates the first two orchestration steps of a user journ
236
236
237
237
### Configure the relying party policy
238
238
239
-
The relying party policy, for example [SignUpSignIn.xml](https://github.com/Azure-Samples/active-directory-b2c-custom-policy-starterpack/blob/master/SocialAndLocalAccounts/SignUpOrSignin.xml), specifies the user journey tkhe Azure AD B2C executes.
239
+
The relying party policy, for example [SignUpSignIn.xml](https://github.com/Azure-Samples/active-directory-b2c-custom-policy-starterpack/blob/master/SocialAndLocalAccounts/SignUpOrSignin.xml), specifies the user journey the Azure AD B2C executes.
240
240
241
241
1. Find the **DefaultUserJourney** element in relying party.
242
242
2. Update the **ReferenceId** to match the user journey ID, in which you added the IdP.
0 commit comments