You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/develop/msal-net-aad-b2c-considerations.md
+8-6Lines changed: 8 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -93,9 +93,11 @@ In the preceding code snippet:
93
93
94
94
Applying a user flow or custom policy (for example, letting the user edit their profile or reset their password) is currently done by calling `AcquireTokenInteractive`. For these two policies, you don't use the returned token/authentication result.
95
95
96
-
## Special case of EditProfile and ResetPassword policies
96
+
## Profile edit policies
97
97
98
-
When you want to provide an experience where your users sign in with a social identity and then edit their profile, apply the Azure AD B2C edit profile policy. Do so by calling `AcquireTokenInteractive` with the authority for that policy. Set Prompt to `Prompt.NoPrompt` to prevent the account selection dialog from being displayed as the user is already signed-in and has an active cookie session.
98
+
To enable your users to sign in with a social identity and then edit their profile, apply the Azure AD B2C edit profile policy.
99
+
100
+
Do so by calling `AcquireTokenInteractive` with the authority for that policy. Because the user is already signed in and has an active cookie session, use `Prompt.NoPrompt` to prevent the account selection dialog from being displayed.
## Resource owner password credentials (ROPC) with Azure AD B2C
121
+
## Resource owner password credentials (ROPC)
120
122
121
123
For more information on the ROPC flow, see [Sign in with resource owner password credentials grant](v2-oauth-ropc.md).
122
124
@@ -157,7 +159,7 @@ If you're using Google as an identity provider, we recommend you use the system
157
159
158
160
We'll provide an update to this [issue](https://github.com/AzureAD/microsoft-authentication-library-for-dotnet/issues/688) if things change.
159
161
160
-
## Caching with Azure AD B2C in MSAL.NET
162
+
## Token caching in MSAL.NET
161
163
162
164
### Known issue with Azure AD B2C
163
165
@@ -182,9 +184,9 @@ Alternatively, you can use the `tid` claim if you're using [custom policies](../
182
184
183
185
#### Mitigation for "Missing from the token response"
184
186
185
-
One option is to use the `name` claim instead of `preferred_username`. To include the `name` claim in the ID tokens issued by Azure AD B2C, select **Display Name** when you configure your user flow.
187
+
One option is to use the `name` claim instead of `preferred_username`. To include the `name` claim in ID tokens issued by Azure AD B2C, select **Display Name** when you configure your user flow.
186
188
187
-
For more information about specifying the claims returned by your user flows, see [Tutorial: Create user flows in Azure AD B2C](../../active-directory-b2c/tutorial-create-user-flows.md).
189
+
For more information about specifying which claims are returned by your user flows, see [Tutorial: Create user flows in Azure AD B2C](../../active-directory-b2c/tutorial-create-user-flows.md).
0 commit comments