Skip to content

Commit abfc532

Browse files
committed
more copy edit
1 parent 74a74ad commit abfc532

File tree

1 file changed

+8
-6
lines changed

1 file changed

+8
-6
lines changed

articles/active-directory/develop/msal-net-aad-b2c-considerations.md

Lines changed: 8 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -93,9 +93,11 @@ In the preceding code snippet:
9393

9494
Applying a user flow or custom policy (for example, letting the user edit their profile or reset their password) is currently done by calling `AcquireTokenInteractive`. For these two policies, you don't use the returned token/authentication result.
9595

96-
## Special case of EditProfile and ResetPassword policies
96+
## Profile edit policies
9797

98-
When you want to provide an experience where your users sign in with a social identity and then edit their profile, apply the Azure AD B2C edit profile policy. Do so by calling `AcquireTokenInteractive` with the authority for that policy. Set Prompt to `Prompt.NoPrompt` to prevent the account selection dialog from being displayed as the user is already signed-in and has an active cookie session.
98+
To enable your users to sign in with a social identity and then edit their profile, apply the Azure AD B2C edit profile policy.
99+
100+
Do so by calling `AcquireTokenInteractive` with the authority for that policy. Because the user is already signed in and has an active cookie session, use `Prompt.NoPrompt` to prevent the account selection dialog from being displayed.
99101

100102
```csharp
101103
private async void EditProfileButton_Click(object sender, RoutedEventArgs e)
@@ -116,7 +118,7 @@ private async void EditProfileButton_Click(object sender, RoutedEventArgs e)
116118
}
117119
```
118120

119-
## Resource owner password credentials (ROPC) with Azure AD B2C
121+
## Resource owner password credentials (ROPC)
120122

121123
For more information on the ROPC flow, see [Sign in with resource owner password credentials grant](v2-oauth-ropc.md).
122124

@@ -157,7 +159,7 @@ If you're using Google as an identity provider, we recommend you use the system
157159

158160
We'll provide an update to this [issue](https://github.com/AzureAD/microsoft-authentication-library-for-dotnet/issues/688) if things change.
159161

160-
## Caching with Azure AD B2C in MSAL.NET
162+
## Token caching in MSAL.NET
161163

162164
### Known issue with Azure AD B2C
163165

@@ -182,9 +184,9 @@ Alternatively, you can use the `tid` claim if you're using [custom policies](../
182184

183185
#### Mitigation for "Missing from the token response"
184186

185-
One option is to use the `name` claim instead of `preferred_username`. To include the `name` claim in the ID tokens issued by Azure AD B2C, select **Display Name** when you configure your user flow.
187+
One option is to use the `name` claim instead of `preferred_username`. To include the `name` claim in ID tokens issued by Azure AD B2C, select **Display Name** when you configure your user flow.
186188

187-
For more information about specifying the claims returned by your user flows, see [Tutorial: Create user flows in Azure AD B2C](../../active-directory-b2c/tutorial-create-user-flows.md).
189+
For more information about specifying which claims are returned by your user flows, see [Tutorial: Create user flows in Azure AD B2C](../../active-directory-b2c/tutorial-create-user-flows.md).
188190

189191
## Next steps
190192

0 commit comments

Comments
 (0)