You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory-b2c/customize-ui-with-html.md
+34-24Lines changed: 34 additions & 24 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,15 +3,15 @@ title: Customize the user interface with HTML templates
3
3
titleSuffix: Azure AD B2C
4
4
description: Learn how to customize the user interface with HTML templates for your applications that use Azure Active Directory B2C.
5
5
services: active-directory-b2c
6
-
author: msmimart
7
-
manager: celestedg
6
+
author: kengaderdus
7
+
manager: celesteDG
8
8
9
9
ms.service: active-directory
10
10
ms.workload: identity
11
11
ms.topic: how-to
12
-
ms.date: 09/15/2021
12
+
ms.date: 10/14/2021
13
13
ms.custom: project-no-code
14
-
ms.author: mimart
14
+
ms.author: kengaderdus
15
15
ms.subservice: B2C
16
16
zone_pivot_groups: b2c-policy-type
17
17
---
@@ -204,30 +204,34 @@ Create a custom page content with your product's brand name in the title.
204
204
205
205
In this article, we use Azure Blob storage to host our content. You can choose to host your content on a web server, but you must [enable CORS on your web server](https://enable-cors.org/server.html).
206
206
207
+
> [!NOTE]
208
+
> In an Azure AD B2C tenant, you can't provision Blob storage. You must create this resource in your Azure AD tenant.
209
+
207
210
To host your HTMLcontent in Blob storage, perform the following steps:
208
211
209
212
1. Sign in to the [Azure portal](https://portal.azure.com).
210
-
1. On the **Hub**menu, select**New**>**Storage**>**Storage account**.
213
+
1. Make sure you're using the directory that contains your Azure AD tenant, and which has a subscription:
214
+
1. Select the **Directories + subscriptions** icon in the portal toolbar.
215
+
1. On the **Portal settings | Directories + subscriptions** page, find your Azure AD directory in the Directory name list, and then select**Switch**.
216
+
1. In the Azure portal, search for and select**Storage accounts**
217
+
1. Select**+ Create**.
211
218
1. Selecta**Subscription** for your storage account.
212
219
1. Create a**Resource group** or select an existing one.
213
-
1. Enter a unique **Name** for your storage account.
214
-
1. Select the **Geographic location** for your storage account.
215
-
1. **Deployment model** can remain **Resource Manager**.
220
+
1. Enter a unique **Storage account name** for your storage account.
221
+
1. Select the geographical **Region** for your storage account.
216
222
1. **Performance** can remain **Standard**.
217
-
1. Change **Account Kind** to **Blob storage**.
218
-
1. **Replication** can remain **RA-GRS**.
219
-
1. **Access tier** can remain **Hot**.
220
-
1. Select**Review + create** to create the storage account.
221
-
After the deployment is completed, the **Storage account** page opens automatically.
222
-
223
+
1. **Redundancy** can remain **Geo-redundant storage (GRS)**
224
+
1. Select**Review + create** and wait a few seconds for Azure AD to run a validation.
225
+
1. Select**Create** to create the storage account. After the deployment is completed, the storage account page opens automatically or select**Go to resource**.
223
226
#### 2.1 Create a container
224
227
225
228
To create a public container in Blob storage, perform the following steps:
226
229
227
-
1. Under **Blob service** in the left-handmenu, select**Blobs**.
228
-
1. Select**+Container**.
230
+
1. Under **Data storage** in the left-handmenu, select**Containers**.
231
+
1. Select**+Container**.
229
232
1. For **Name**, enter *root*. The name can be a name of your choosing, for example *contoso*, but we use*root* in this example for simplicity.
230
-
1. For **Public access level**, select**Blob**, then **OK**.
233
+
1. For **Public access level**, select**Blob**.
234
+
1. Select**Create** to create the container.
231
235
1. Select**root** to open the new container.
232
236
233
237
#### 2.2 Upload your custom page content files
@@ -245,13 +249,14 @@ To create a public container in Blob storage, perform the following steps:
245
249
246
250
Configure Blob storage for Cross-Origin Resource Sharing by performing the following steps:
247
251
248
-
1. In the menu, select**CORS**.
252
+
1. Navigate to your storage account.
253
+
1. In the left-handmenu, under **Settings**, select**Resource sharing (CORS)**.
249
254
1. For **Allowed origins**, enter `https://your-tenant-name.b2clogin.com`. Replace `your-tenant-name` with the name of your Azure AD B2C tenant. For example, `https://fabrikam.b2clogin.com`. Use all lowercase letters when entering your tenant name.
250
255
1. For **Allowed Methods**, select both `GET` and `OPTIONS`.
251
256
1. For **Allowed Headers**, enter an asterisk (*).
252
257
1. For **Exposed Headers**, enter an asterisk (*).
253
258
1. For **Max age**, enter 200.
254
-
1. Select**Save**.
259
+
1. At the top of the page, select**Save**.
255
260
256
261
#### 3.1 Test CORS
257
262
@@ -264,21 +269,26 @@ Validate that you're ready by performing the following steps:
264
269
The result should be `XHR status: 200`.
265
270
If you receive an error, make sure that your CORS settings are correct. You might also need to clear your browser cache or open an in-private browsing session by pressing Ctrl+Shift+P.
266
271
272
+
Learn more about [how to create and manage Azure storage accounts](/azure/storage/common/storage-account-create).
273
+
267
274
::: zone pivot="b2c-user-flow"
268
275
269
276
### 4. Update the user flow
270
277
271
-
1. Choose **All services** in the top-left corner of the Azure portal, and then search for and select**Azure AD B2C**.
272
-
1. Select**User flows**, and then select the *B2C_1_signupsignin1* user flow.
273
-
1. Select**Page layouts**, and then under **Unified sign-up or sign-in page**, click **Yes** for **Use custom page content**.
278
+
1. Make sure you're using the directory that contains your Azure AD B2C tenant:
279
+
1. Select the **Directories + subscriptions** icon in the portal toolbar.
280
+
1. On the **Portal settings | Directories + subscriptions** page, find your Azure AD B2C directory in the directory name list, and then select**Switch**.
281
+
1. In the Azure portal, search for and select**Azure AD B2C**.
282
+
1. In the left-handmenu, select**User flows**, and then select the *B2C_1_signupsignin1* user flow.
283
+
1. Select**Page layouts**, and then under **Unified sign-up or sign-in page**, select**Yes** for **Use custom page content**.
274
284
1. In **Custom page URI**, enter the URI for the *custom-ui.html* file that you recorded earlier.
275
285
1. At the top of the page, select**Save**.
276
286
277
287
### 5. Test the user flow
278
288
279
289
1. In your Azure AD B2C tenant, select**User flows** and select the *B2C_1_signupsignin1* user flow.
280
-
1. At the top of the page, click**Run user flow**.
281
-
1. Click the **Run user flow**button.
290
+
1. At the top of the page, select**Run user flow**.
291
+
1. At the pane on right side, select the **Run user flow**button.
282
292
283
293
You should see a page similar to the following example with the elements centered based on the CSS file that you created:
Copy file name to clipboardExpand all lines: articles/active-directory-b2c/identity-provider-generic-openid-connect.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -14,7 +14,7 @@ ms.author: mimart
14
14
ms.subservice: B2C
15
15
---
16
16
17
-
# Set up sign-up and sign-in with OpenID Connect using Azure Active Directory B2C
17
+
# Set up sign-up and sign-in with generic OpenID Connect using Azure Active Directory B2C
18
18
19
19
[OpenID Connect](openid-connect.md) is an authentication protocol built on top of OAuth 2.0 that can be used for secure user sign-in. Most identity providers that use this protocol are supported in Azure AD B2C.
Copy file name to clipboardExpand all lines: articles/active-directory-b2c/troubleshoot.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -36,7 +36,7 @@ Azure AD B2C service can also return an error to your application when a user ca
36
36
- A user policy uses the recommended [self service password resect (SSPR) experience](add-password-reset-policy.md#self-service-password-reset-recommended) with a consumer local account. The user selects the **Forgot your password?** link , and then selects **Cancel** button before the user flow experience completes. In this case, Azure AD B2C service returns error code `AADB2C90091` to your application.
37
37
- A user chooses to authenticate with an external identity provider such as [LinkedIn](identity-provider-linkedin.md). The user select **Cancel** button before authenticating to the identity provider itself. In this case, Azure AD B2C service returns error code `AADB2C90273` to your application. Learn more about [error codes Azure Active Directory B2C service return](error-codes.md).
38
38
39
-
To handle this error, fetch the **error description** for the user and respond back with a new authentication request with the same user flow.
39
+
To handle this error, fetch the **error description** for the user and respond back with a new authentication request using the same user flow.
0 commit comments