You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
@@ -436,21 +436,21 @@ In the orchestration, we've used make reference to technical profiles that enabl
436
436
437
437
When the custom policy runs:
438
438
439
-
-**Orchestration Step 1** - This step includes a *ClaimsProviderSelections* element, which lists the available sign-in options a user can choose from. In this case, we've one option only, *FacebookExchange*.
439
+
-**Orchestration Step 1** - This step includes a *ClaimsProviderSelections* element, which lists the available sign-in options a user can choose from. In this case, we've only have one option, *FacebookExchange*, so when the policy runs, users are taken directly to Facebook.com in step 2 as shown by the `TargetClaimsExchangeId` attribute.
440
440
441
-
-**Orchestration Step 2** - The *Facebook-OAUTH*Technical Profile executes, so the user is redirected to Facebook to sign in.
441
+
-**Orchestration Step 2** - The *Facebook-OAUTH*technical profile executes, so the user is redirected to Facebook to sign in.
442
442
443
-
-**Orchestration Step 3** - In step 3, the *AAD-UserReadUsingAlternativeSecurityId*Technical Profile executes to try to read the user social account from Azure AD. If the social account is found, `objectId` is returned as an output claim.
443
+
-**Orchestration Step 3** - In step 3, the *AAD-UserReadUsingAlternativeSecurityId*technical profile executes to try to read the user social account from Azure AD storage. If the social account is found, `objectId` is returned as an output claim.
444
444
445
445
-**Orchestration Step 4** - This step runs if the user doesn't already exist (`objectId` doesn't exist). It shows the form that collects more information from the user or updates similar information obtained from the social account.
446
446
447
447
-**Orchestration Step 5** - This step runs if the user doesn't already exist (`objectId` doesn't exist), so the *AAD-UserWriteUsingAlternativeSecurityId* Technical Profile executes to write the social account into Azure AD.
448
448
449
449
-**Orchestration Step 6** - Finally, step 6 assembles and returns the JWT token at the end of the policy’s execution.
450
450
451
-
## Step 5 - Update Relying Party Output Claims
451
+
## Step 5 - Update relying party output claims
452
452
453
-
In the `ContosoCustomPolicy.XML` file, locate the *RelyingParty* element, and then replace all the output claims with the following code:
453
+
In the `ContosoCustomPolicy.XML` file, locate the *RelyingParty* element, and then replace all the output claims collection with the following code:
454
454
455
455
```xml
456
456
<OutputClaimClaimTypeReferenceId="displayName" />
@@ -460,7 +460,7 @@ In the `ContosoCustomPolicy.XML` file, locate the *RelyingParty* element, and th
We've included the identity provider (*identityProvider*) as an output claim, so it will be available in the JWT token returned to the relying party application.
463
+
We've added the identity provider (*identityProvider*) as an output claim, so it will be included in the JWT token returned to the relying party application.
464
464
465
465
## Step 6 - Upload policy
466
466
@@ -473,7 +473,7 @@ Follow the steps in [Test the custom policy](custom-policies-series-validate-use
473
473
You're redirected to a Facebook sign-in page. Enter your Facebook credentials, and then select **Log In**.
474
474
You're directly redirected to Facebook as we set it so in our orchestration steps since we don't have multiple sign-in options to choose from. Typically, in an app, you'd add a button like **Sign in with Facebook**, which when selected, runs the policy.
475
475
476
-
If it's the first time running this policy (social account doesn't already exist), you see a screen such as the one shown below. You won't see this screen in subsequent policy execution (social account already exist).
476
+
If it's the first time running this policy (social account doesn't already exist in Azure AD storage), you see a screenshot such as the one shown below. You won't see this screen in subsequent policy executions as the social account already exist in Azure AD storage.
477
477
478
478
:::image type="content" source="media/custom-policies-series-sign-up-or-sign-in-federation/screenshot-of-sign-in-social-account.png" alt-text="Screenshot of sign-in flow with social account.":::
479
479
@@ -518,12 +518,12 @@ Use the following steps to add a combined local and social account:
518
518
</ClaimType>
519
519
<!--</ClaimsSchema>-->
520
520
```
521
-
1. In the `UserJourneys` section, add a new user journey, *CombinedSignInSignUp* by using the following code:
521
+
1. In the `UserJourneys` section, add a new user journey, *LocalAndSocialSignInAndSignUp* by using the following code:
522
522
523
523
```xml
524
524
<!--<UserJourneys>-->
525
525
...
526
-
<UserJourneyId="CombinedSignInSignUp">
526
+
<UserJourneyId="LocalAndSocialSignInAndSignUp">
527
527
<OrchestrationSteps>
528
528
<!--Orchestration steps will be added here-->
529
529
</OrchestrationSteps>
@@ -532,7 +532,7 @@ Use the following steps to add a combined local and social account:
532
532
```
533
533
1. Add the orchestration steps
534
534
535
-
1. In the RelyingParty section, change *DefaultUserJourney's* `ReferenceId` to `CombinedSignInSignUp`
535
+
1. In the RelyingParty section, change *DefaultUserJourney's* `ReferenceId` to `LocalAndSocialSignInAndSignUp`
Copy file name to clipboardExpand all lines: articles/active-directory-b2c/custom-policies-series-sign-up-or-sign-in.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -219,7 +219,7 @@ We've configured a content definition for our self-asserted technical profile, `
219
219
220
220
## Step 3 - Update the User Journey Orchestration Steps
221
221
222
-
In the `ContosoCustomPolicy.XML` file, locate the *HelloWorldJourney* user journey and replace all its orchestration steps with the following code:
222
+
In the `ContosoCustomPolicy.XML` file, locate the *HelloWorldJourney* user journey and replace all its orchestration steps collection with the following code:
223
223
224
224
```xml
225
225
<!--<OrchestrationSteps>-->
@@ -303,11 +303,11 @@ When the custom policy runs:
303
303
-**Orchestration Step 4** - This step runs if the user signs up (objectId doesn't exist), so we display the sign-up form by invoking the
304
304
*UserInformationCollector* self-asserted technical profile. This step runs whether a user signs up or signs in.
305
305
306
-
-**Orchestration Steps 5** - This step reads account information from Azure AD (we invoke *AAD-UserRead* Azure AD technical profile), so it runs whether a user signs up or signs in.
306
+
-**Orchestration Step 5** - This step reads account information from Azure AD (we invoke *AAD-UserRead* Azure AD technical profile), so it runs whether a user signs up or signs in.
307
307
308
308
-**Orchestration Step 6** - This step invokes the *UserInputMessageClaimGenerator* technical profile to assemble the user’s greeting message.
309
309
310
-
-**Orchestration Step 7** - Finally, step 8 assembles and returns the JWT token at the end of the policy’s execution
310
+
-**Orchestration Step 7** - Finally, step 8 assembles and returns the JWT token at the end of the policy’s execution.
0 commit comments