Skip to content

Commit a67b8f9

Browse files
authored
Merge pull request #175806 from kengaderdus/corrections-here-and-there
[identity][Azure AD][B2C] update steps for adding blob storage account to match new portal UI
2 parents 51eeb70 + 55bf0c3 commit a67b8f9

File tree

3 files changed

+36
-26
lines changed

3 files changed

+36
-26
lines changed

articles/active-directory-b2c/customize-ui-with-html.md

Lines changed: 34 additions & 24 deletions
Original file line numberDiff line numberDiff line change
@@ -3,15 +3,15 @@ title: Customize the user interface with HTML templates
33
titleSuffix: Azure AD B2C
44
description: Learn how to customize the user interface with HTML templates for your applications that use Azure Active Directory B2C.
55
services: active-directory-b2c
6-
author: msmimart
7-
manager: celestedg
6+
author: kengaderdus
7+
manager: celesteDG
88

99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: how-to
12-
ms.date: 09/15/2021
12+
ms.date: 10/14/2021
1313
ms.custom: project-no-code
14-
ms.author: mimart
14+
ms.author: kengaderdus
1515
ms.subservice: B2C
1616
zone_pivot_groups: b2c-policy-type
1717
---
@@ -204,30 +204,34 @@ Create a custom page content with your product's brand name in the title.
204204

205205
In this article, we use Azure Blob storage to host our content. You can choose to host your content on a web server, but you must [enable CORS on your web server](https://enable-cors.org/server.html).
206206

207+
> [!NOTE]
208+
> In an Azure AD B2C tenant, you can't provision Blob storage. You must create this resource in your Azure AD tenant.
209+
207210
To host your HTML content in Blob storage, perform the following steps:
208211

209212
1. Sign in to the [Azure portal](https://portal.azure.com).
210-
1. On the **Hub** menu, select **New** > **Storage** > **Storage account**.
213+
1. Make sure you're using the directory that contains your Azure AD tenant, and which has a subscription:
214+
1. Select the **Directories + subscriptions** icon in the portal toolbar.
215+
1. On the **Portal settings | Directories + subscriptions** page, find your Azure AD directory in the Directory name list, and then select **Switch**.
216+
1. In the Azure portal, search for and select **Storage accounts**
217+
1. Select **+ Create**.
211218
1. Select a **Subscription** for your storage account.
212219
1. Create a **Resource group** or select an existing one.
213-
1. Enter a unique **Name** for your storage account.
214-
1. Select the **Geographic location** for your storage account.
215-
1. **Deployment model** can remain **Resource Manager**.
220+
1. Enter a unique **Storage account name** for your storage account.
221+
1. Select the geographical **Region** for your storage account.
216222
1. **Performance** can remain **Standard**.
217-
1. Change **Account Kind** to **Blob storage**.
218-
1. **Replication** can remain **RA-GRS**.
219-
1. **Access tier** can remain **Hot**.
220-
1. Select **Review + create** to create the storage account.
221-
After the deployment is completed, the **Storage account** page opens automatically.
222-
223+
1. **Redundancy** can remain **Geo-redundant storage (GRS)**
224+
1. Select **Review + create** and wait a few seconds for Azure AD to run a validation.
225+
1. Select **Create** to create the storage account. After the deployment is completed, the storage account page opens automatically or select **Go to resource**.
223226
#### 2.1 Create a container
224227

225228
To create a public container in Blob storage, perform the following steps:
226229

227-
1. Under **Blob service** in the left-hand menu, select **Blobs**.
228-
1. Select **+Container**.
230+
1. Under **Data storage** in the left-hand menu, select **Containers**.
231+
1. Select **+ Container**.
229232
1. For **Name**, enter *root*. The name can be a name of your choosing, for example *contoso*, but we use *root* in this example for simplicity.
230-
1. For **Public access level**, select **Blob**, then **OK**.
233+
1. For **Public access level**, select **Blob**.
234+
1. Select **Create** to create the container.
231235
1. Select **root** to open the new container.
232236

233237
#### 2.2 Upload your custom page content files
@@ -245,13 +249,14 @@ To create a public container in Blob storage, perform the following steps:
245249

246250
Configure Blob storage for Cross-Origin Resource Sharing by performing the following steps:
247251

248-
1. In the menu, select **CORS**.
252+
1. Navigate to your storage account.
253+
1. In the left-hand menu, under **Settings**, select **Resource sharing (CORS)**.
249254
1. For **Allowed origins**, enter `https://your-tenant-name.b2clogin.com`. Replace `your-tenant-name` with the name of your Azure AD B2C tenant. For example, `https://fabrikam.b2clogin.com`. Use all lowercase letters when entering your tenant name.
250255
1. For **Allowed Methods**, select both `GET` and `OPTIONS`.
251256
1. For **Allowed Headers**, enter an asterisk (*).
252257
1. For **Exposed Headers**, enter an asterisk (*).
253258
1. For **Max age**, enter 200.
254-
1. Select **Save**.
259+
1. At the top of the page, select **Save**.
255260

256261
#### 3.1 Test CORS
257262

@@ -264,21 +269,26 @@ Validate that you're ready by performing the following steps:
264269
The result should be `XHR status: 200`.
265270
If you receive an error, make sure that your CORS settings are correct. You might also need to clear your browser cache or open an in-private browsing session by pressing Ctrl+Shift+P.
266271

272+
Learn more about [how to create and manage Azure storage accounts](/azure/storage/common/storage-account-create).
273+
267274
::: zone pivot="b2c-user-flow"
268275

269276
### 4. Update the user flow
270277

271-
1. Choose **All services** in the top-left corner of the Azure portal, and then search for and select **Azure AD B2C**.
272-
1. Select **User flows**, and then select the *B2C_1_signupsignin1* user flow.
273-
1. Select **Page layouts**, and then under **Unified sign-up or sign-in page**, click **Yes** for **Use custom page content**.
278+
1. Make sure you're using the directory that contains your Azure AD B2C tenant:
279+
1. Select the **Directories + subscriptions** icon in the portal toolbar.
280+
1. On the **Portal settings | Directories + subscriptions** page, find your Azure AD B2C directory in the directory name list, and then select **Switch**.
281+
1. In the Azure portal, search for and select **Azure AD B2C**.
282+
1. In the left-hand menu, select **User flows**, and then select the *B2C_1_signupsignin1* user flow.
283+
1. Select **Page layouts**, and then under **Unified sign-up or sign-in page**, select **Yes** for **Use custom page content**.
274284
1. In **Custom page URI**, enter the URI for the *custom-ui.html* file that you recorded earlier.
275285
1. At the top of the page, select **Save**.
276286

277287
### 5. Test the user flow
278288

279289
1. In your Azure AD B2C tenant, select **User flows** and select the *B2C_1_signupsignin1* user flow.
280-
1. At the top of the page, click **Run user flow**.
281-
1. Click the **Run user flow** button.
290+
1. At the top of the page, select **Run user flow**.
291+
1. At the pane on right side, select the **Run user flow** button.
282292

283293
You should see a page similar to the following example with the elements centered based on the CSS file that you created:
284294

articles/active-directory-b2c/identity-provider-generic-openid-connect.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.author: mimart
1414
ms.subservice: B2C
1515
---
1616

17-
# Set up sign-up and sign-in with OpenID Connect using Azure Active Directory B2C
17+
# Set up sign-up and sign-in with generic OpenID Connect using Azure Active Directory B2C
1818

1919
[OpenID Connect](openid-connect.md) is an authentication protocol built on top of OAuth 2.0 that can be used for secure user sign-in. Most identity providers that use this protocol are supported in Azure AD B2C.
2020

articles/active-directory-b2c/troubleshoot.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -36,7 +36,7 @@ Azure AD B2C service can also return an error to your application when a user ca
3636
- A user policy uses the recommended [self service password resect (SSPR) experience](add-password-reset-policy.md#self-service-password-reset-recommended) with a consumer local account. The user selects the **Forgot your password?** link , and then selects **Cancel** button before the user flow experience completes. In this case, Azure AD B2C service returns error code `AADB2C90091` to your application.
3737
- A user chooses to authenticate with an external identity provider such as [LinkedIn](identity-provider-linkedin.md). The user select **Cancel** button before authenticating to the identity provider itself. In this case, Azure AD B2C service returns error code `AADB2C90273` to your application. Learn more about [error codes Azure Active Directory B2C service return](error-codes.md).
3838

39-
To handle this error, fetch the **error description** for the user and respond back with a new authentication request with the same user flow.
39+
To handle this error, fetch the **error description** for the user and respond back with a new authentication request using the same user flow.
4040

4141
::: zone-end
4242

0 commit comments

Comments
 (0)