Skip to content

Commit a74c8a2

Browse files
committed
intro + typo fixes
1 parent 9c264fa commit a74c8a2

File tree

1 file changed

+7
-6
lines changed

1 file changed

+7
-6
lines changed

articles/active-directory-b2c/secure-api-management.md

Lines changed: 7 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.subservice: B2C
1515

1616
# Secure an Azure API Management API with Azure AD B2C
1717

18-
Ensure only authenticated callers can access your API by creating an inbound policy in Azure API Management (APIM) that restricts access to requests that include a valid Azure AD B2C-issued access token.
18+
Learn how to restrict access your Azure API Management (APIM) API to clients that have authenticated with Azure Active Directory B2C (Azure AD B2C). Follow the steps in this article to create and test an inbound policy in APIM that restricts access to only those requests that include a valid Azure AD B2C-issued access token.
1919

2020
## Prerequisites
2121

@@ -25,6 +25,7 @@ You need the following resources in place before continuing with the steps in th
2525
* [Application registered](tutorial-register-applications.md) in your tenant
2626
* [User flows created](tutorial-create-user-flows.md) in your tenant
2727
* [Published API](../api-management/import-and-publish.md) in Azure API Management
28+
* [Postman](https://www.getpostman.com/) to test secured access (optional)
2829

2930
## Get Azure AD B2C application ID
3031

@@ -38,7 +39,7 @@ When you secure an API in Azure API Management with Azure AD B2C, you need sever
3839

3940
## Get token issuer endpoint
4041

41-
Next, get the well-known config URL for one of your Azure AD B2C user flows. You also need the token issuer endpoint URI for the issuer you want to support in Azure API Management.
42+
Next, get the well-known config URL for one of your Azure AD B2C user flows. You also need the token issuer endpoint URI you want to support in Azure API Management.
4243

4344
1. Browse to your Azure AD B2C tenant in the [Azure portal](https://portal.azure.com)
4445
1. Under **Policies**, select **User flows (policies)**
@@ -100,7 +101,7 @@ You're now ready to add the inbound policy in Azure API Management that validate
100101

101102
To ensure only authenticated callers can access your API, you can validate your Azure API Management configuration by calling the API with [Postman](https://www.getpostman.com/).
102103

103-
To call the API, you need an access token issued by Azure AD B2C and an APIM subscription key.
104+
To call the API, you need both an access token issued by Azure AD B2C, and an APIM subscription key.
104105

105106
### Get an access token
106107

@@ -116,7 +117,7 @@ You first need a token issued by Azure AD B2C to use in the `Authorization` head
116117
![Run user flow page for sign up sign in user flow in Azure portal](media/secure-apim-with-b2c-token/portal-03-user-flow.png)
117118

118119
1. Complete the sign-in process. You should be redirected to `https://jwt.ms`.
119-
1. Record encoded token value displayed in your browser. You use this token value for the Authorization header in Postman.
120+
1. Record the encoded token value displayed in your browser. You use this token value for the Authorization header in Postman.
120121

121122
![Encoded token value displayed on jwt.ms](media/secure-apim-with-b2c-token/jwt-ms-01-token.png)
122123

@@ -194,7 +195,7 @@ Now that you've made a successful request, test the failure case to ensure that
194195
}
195196
```
196197

197-
Congratulations! You've verified that only callers with a valid access token issued by Azure AD B2C can make successful requests to your Azure API Management API.
198+
If you see the `401` status code, you've verified that only callers with a valid access token issued by Azure AD B2C can make successful requests to your Azure API Management API.
198199

199200
## Support multiple applications and issuers
200201

@@ -228,7 +229,7 @@ You can follow this general process to perform a staged migration:
228229
1. Update your applications one at a time to obtain tokens from the b2clogin.com endpoint.
229230
1. Once all of your applications are correctly obtaining tokens from b2clogin.com, remove support for login.microsoftonline.com-issued tokens from the API.
230231

231-
The following example APIM inbound policy illustrates how to accept tokens issued by both b2clogin.com login.microsoftonline.com. Additionally, it supports API requests from two applications.
232+
The following example APIM inbound policy illustrates how to accept tokens issued by both b2clogin.com and login.microsoftonline.com. Additionally, it supports API requests from two applications.
232233

233234
```XML
234235
<policies>

0 commit comments

Comments
 (0)