You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
In this article, you add a new user provided entry (a claim) to your sign-up user journey in Azure Active Directory (Azure AD) B2C. You configure the entry as a dropdown, and define whether it's required.
19
+
In this article, you add a new user provided entry (a claim) to your sign-up user journey in Azure Active Directory (Azure AD) B2C. You configure the entry as a dropdown and define whether it's required.
20
20
21
21
## Prerequisites
22
22
23
23
Complete the steps in the article [Getting Started with Custom Policies](active-directory-b2c-get-started-custom.md). Test the sign-up or sign-in user journey to sign up a new local account before proceeding.
24
24
25
25
## Add claims
26
26
27
-
Gathering initial data from your users is achieved using the sign-up or sign-in user journey. Additional claims can be gathered later by using a profile edit user journey. Anytime Azure AD B2C gathers information directly from the user interactively, the Identity Experience Framework uses its selfasserted provider.
27
+
Gathering initial data from your users is achieved using the sign-up or sign-in user journey. Additional claims can be gathered later by using a profile edit user journey. Anytime Azure AD B2C gathers information directly from the user interactively, the Identity Experience Framework uses its self-asserted provider.
28
28
29
29
30
30
### Define the claim
31
31
32
-
Lets ask the user for their city. Add the following element to the **ClaimsSchema** element in the TrustFrameworkBase policy file:
32
+
Let's ask the user for their city. Add the following element to the **ClaimsSchema** element in the TrustFrameworkBase policy file:
Copy file name to clipboardExpand all lines: articles/active-directory-b2c/active-directory-b2c-custom-setup-adfs2016-idp.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -31,7 +31,7 @@ You need to store your certificate in your Azure AD B2C tenant.
31
31
1. Sign in to the [Azure portal](https://portal.azure.com/).
32
32
2. Make sure you're using the directory that contains your Azure AD B2C tenant. Select the **Directory and subscription filter** in the top menu and choose the directory that contains your tenant.
33
33
3. Choose **All services** in the top-left corner of the Azure portal, and then search for and select **Azure AD B2C**.
34
-
4. On the Overview page, select **Identity Experience Framework - PREVIEW**.
34
+
4. On the Overview page, select **Identity Experience Framework**.
35
35
5. Select **Policy Keys** and then select **Add**.
36
36
6. For **Options**, choose `Upload`.
37
37
7. Enter a **Name** for the policy key. For example, `SamlCert`. The prefix `B2C_1A_` is added automatically to the name of your key.
Copy file name to clipboardExpand all lines: articles/active-directory-b2c/active-directory-b2c-get-started-custom.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -29,7 +29,7 @@ ms.subservice: B2C
29
29
1. Sign in to the [Azure portal](https://portal.azure.com/) as the global administrator of your Azure AD B2C tenant.
30
30
2. Make sure you're using the directory that contains your Azure AD B2C tenant. Click the **Directory and subscription filter** in the top menu and choosing the directory that contains your tenant.
31
31
3. Choose **All services** in the top-left corner of the Azure portal, search for and select **Azure AD B2C**.
32
-
4. On the Overview page, select **Identity Experience Framework - PREVIEW**.
32
+
4. On the Overview page, select **Identity Experience Framework**.
Copy file name to clipboardExpand all lines: articles/active-directory-b2c/active-directory-b2c-setup-aad-custom.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -51,7 +51,7 @@ You need to store the application key that you created in your Azure AD B2C tena
51
51
52
52
1. Make sure you're using the directory that contains your Azure AD B2C tenant by clicking the **Directory and subscription filter** in the top menu and choosing the directory that contains your tenant.
53
53
2. Choose **All services** in the top-left corner of the Azure portal, and then search for and select **Azure AD B2C**.
54
-
3. On the Overview page, select **Identity Experience Framework - PREVIEW**.
54
+
3. On the Overview page, select **Identity Experience Framework**.
55
55
4. Select **Policy Keys** and then select **Add**.
56
56
5. For **Options**, choose `Manual`.
57
57
6. Enter a **Name** for the policy key. For example, `ContosoAppSecret`. The prefix `B2C_1A_` is added automatically to the name of your key.
Copy file name to clipboardExpand all lines: articles/active-directory-b2c/trustframeworkpolicy.md
+2-3Lines changed: 2 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -112,7 +112,7 @@ The following example shows how to specify a base policy. This **B2C_1A_TrustFra
112
112
113
113
## Policy execution
114
114
115
-
A relying party application, such as a web, mobile, or desktop application, calls the [relying party (RP) policy](relyingparty.md). The RP policy file executes a specific task, such as signing in, resetting a password, or editing a profile. The RP policy configures the list of claims the relying party application receives as part of the token that is issued. Multiple applications can use the same policy. All applications receive the same token with claims and the user goes through the same user journey. A single application can use multiple policies.
115
+
A relying party application, such as a web, mobile, or desktop application, calls the [relying party (RP) policy](relyingparty.md). The RP policy file executes a specific task, such as signing in, resetting a password, or editing a profile. The RP policy configures the list of claims the relying party application receives as part of the token that is issued. Multiple applications can use the same policy. All applications receive the same token with claims, and the user goes through the same user journey. A single application can use multiple policies.
116
116
117
117
Inside the RP policy file, you specify the **DefaultUserJourney** element, which points to the [UserJourney](userjourneys.md). The user journey usually is defined in the Base or Extensions policy.
118
118
@@ -134,7 +134,7 @@ B2C_1A_TrustFrameWorkBase or B2C_1A_TrustFrameworkExtensionPolicy:
134
134
135
135
A user journey defines the business logic of what a user goes through. Each user journey is a set of orchestration steps that performs a series of actions, in sequence in terms of authentication and information collection.
136
136
137
-
The **SocialAndLocalAccounts** policy file in the [starter pack](https://docs.microsoft.com/azure/active-directory-b2c/active-directory-b2c-get-started-custom#download-starter-pack-and-modify-policies) contains the SignUpOrSignIn, ProfileEdit, PasswordReset user journeys. You can add more user journeys for another scenarios, such as changing an email address, link and unlink a social account, or resetting a password.
137
+
The **SocialAndLocalAccounts** policy file in the [starter pack](https://docs.microsoft.com/azure/active-directory-b2c/active-directory-b2c-get-started-custom#download-starter-pack-and-modify-policies) contains the SignUpOrSignIn, ProfileEdit, PasswordReset user journeys. You can add more user journeys for other scenarios, such as changing an email address or linking and unlinking a social account.
138
138
139
139
The orchestration steps may call a [Technical Profile](technicalprofiles.md). A technical profile provides a framework with a built-in mechanism to communicate with different types of parties. For example, a technical profile can perform these actions among others:
140
140
@@ -153,4 +153,3 @@ The orchestration steps may call a [Technical Profile](technicalprofiles.md). A
Copy file name to clipboardExpand all lines: articles/active-directory-b2c/userjourneys.md
+7-7Lines changed: 7 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -19,7 +19,7 @@ ms.subservice: B2C
19
19
20
20
User journeys specify explicit paths through which a policy allows a relying party application to obtain the desired claims for a user. The user is taken through these paths to retrieve the claims that are to be presented to the relying party. In other words, user journeys define the business logic of what an end user goes through as the Azure AD B2C Identity Experience Framework processes the request.
21
21
22
-
These user journeys can be considered as templates available to satisfy the core need of the various replying parties of the community of interest. User journeys facilitate the definition the relying party part of a policy. A policy can define multiple user journeys. Each user journey is a sequence of orchestration steps.
22
+
These user journeys can be considered as templates available to satisfy the core need of the various relying parties of the community of interest. User journeys facilitate the definition of the relying party part of a policy. A policy can define multiple user journeys. Each user journey is a sequence of orchestration steps.
23
23
24
24
To define the user journeys supported by the policy, a **UserJourneys** element is added under the top-level element of the policy file.
25
25
@@ -45,7 +45,7 @@ The **UserJourney** element contains the following elements:
45
45
46
46
A user journey is represented as an orchestration sequence that must be followed through for a successful transaction. If any step fails, the transaction fails. These orchestration steps reference both the building blocks and the claims providers allowed in the policy file. Any orchestration step that is responsible to show or render a user experience also has a reference to the corresponding content definition identifier.
47
47
48
-
Orchestration steps can be conditionally executed, based on preconditions defined in the orchestration step element. For example you can check to perform an orchestration step only if a specific claims exists, or if a claim is equal or not to the specified value.
48
+
Orchestration steps can be conditionally executed based on preconditions defined in the orchestration step element. For example, you can check to perform an orchestration step only if a specific claims exists, or if a claim is equal or not to the specified value.
49
49
50
50
To specify the ordered list of orchestration steps, an **OrchestrationSteps** element is added as part of the policy. This element is required.
51
51
@@ -61,7 +61,7 @@ The **OrchestrationStep** element contains the following attributes:
61
61
| --------- | -------- | ----------- |
62
62
|`Order`| Yes | The order of the orchestration steps. |
63
63
|`Type`| Yes | The type of the orchestration step. Possible values: <ul><li>**ClaimsProviderSelection** - Indicates that the orchestration step presents various claims providers to the user to select one.</li><li>**CombinedSignInAndSignUp** - Indicates that the orchestration step presents a combined social provider sign-in and local account sign-up page.</li><li>**ClaimsExchange** - Indicates that the orchestration step exchanges claims with a claims provider.</li><li>**SendClaims** - Indicates that the orchestration step sends the claims to the relying party with a token issued by a claims issuer.</li></ul> |
64
-
| ContentDefinitionReferenceId | No | The identifier of the [content definition](contentdefinitions.md) associated with this orchestration step. Usually the content definition reference identifier is defined in the self-asserted technical profile. But, there are some cases when Azure AD B2C needs to display something without a technical profile. There are two examples, if the type of the orchestration step is one of following: `ClaimsProviderSelection` or `CombinedSignInAndSignUp`. Azure AD B2C needs to display the identity provider selection without having a technical profile. |
64
+
| ContentDefinitionReferenceId | No | The identifier of the [content definition](contentdefinitions.md) associated with this orchestration step. Usually the content definition reference identifier is defined in the self-asserted technical profile. But, there are some cases when Azure AD B2C needs to display something without a technical profile. There are two examples - if the type of the orchestration step is one of following: `ClaimsProviderSelection` or `CombinedSignInAndSignUp`, Azure AD B2C needs to display the identity provider selection without having a technical profile. |
65
65
| CpimIssuerTechnicalProfileReferenceId | No | The type of the orchestration step is `SendClaims`. This property defines the technical profile identifier of the claims provider that issues the token for the relying party. If absent, no relying party token is created. |
66
66
67
67
@@ -84,7 +84,7 @@ The **Preconditions** element contains the following element:
84
84
85
85
#### Precondition
86
86
87
-
The **Precondition** element contains the following attribute:
87
+
The **Precondition** element contains the following attributes:
88
88
89
89
| Attribute | Required | Description |
90
90
| --------- | -------- | ----------- |
@@ -117,7 +117,7 @@ The following preconditions checks whether the user's objectId exists. In the us
117
117
</OrchestrationStep>
118
118
```
119
119
120
-
The following preconditions checks whether the user signed in with a social account. An attempt is made to find the user account in the directory. If the user signs in or signs up with a local account skip, this orchestration step.
120
+
The following preconditions checks whether the user signed in with a social account. An attempt is made to find the user account in the directory. If the user signs in or signs up with a local account, skip this orchestration step.
121
121
122
122
```XML
123
123
<OrchestrationStepOrder="3"Type="ClaimsExchange">
@@ -134,7 +134,7 @@ The following preconditions checks whether the user signed in with a social acco
134
134
</OrchestrationStep>
135
135
```
136
136
137
-
Preconditions can check multiple preconditions. The following example checks whether 'objectId' or 'email' exists. If the first condition is true, The journey skips to the next orchestration step.
137
+
Preconditions can check multiple preconditions. The following example checks whether 'objectId' or 'email' exists. If the first condition is true, the journey skips to the next orchestration step.
138
138
139
139
```XML
140
140
<OrchestrationStepOrder="4"Type="ClaimsExchange">
@@ -173,7 +173,7 @@ The **ClaimsProviderSelection** element contains the following attributes:
173
173
174
174
### ClaimsProviderSelection example
175
175
176
-
In the following orchestration step, the user can choose to sign in with, Facebook, LinkedIn, Twitter, Google, or a local account. If the user selects one of the social identity providers, the second orchestration step executes with the selected claim exchange specified in the `TargetClaimsExchangeId` attribute. The second orchestration step redirects the user to the social identity provider to complete the sign-in process. If the user chooses to sign in with the local account, Azure AD B2C stays on the same orchestration step (the same sign-up page or sign-in page) and skips the second orchestration step.
176
+
In the following orchestration step, the user can choose to sign in with Facebook, LinkedIn, Twitter, Google, or a local account. If the user selects one of the social identity providers, the second orchestration step executes with the selected claim exchange specified in the `TargetClaimsExchangeId` attribute. The second orchestration step redirects the user to the social identity provider to complete the sign-in process. If the user chooses to sign in with the local account, Azure AD B2C stays on the same orchestration step (the same sign-up page or sign-in page) and skips the second orchestration step.
Copy file name to clipboardExpand all lines: articles/active-directory/develop/active-directory-saml-claims-customization.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -117,7 +117,7 @@ You can also use the claims transformations functions.
117
117
|**Extract() - Before matching**| Returns the substring until it matches the specified value.<br/>For example, if the input's value is "BSimon_US", the matching value is "_US", then the claim's output is "BSimon". |
118
118
|**Extract() - Between matching**| Returns the substring until it matches the specified value.<br/>For example, if the input's value is "Finance_BSimon_US", the first matching value is "Finance_", the second matching value is "_US", then the claim's output is "BSimon". |
119
119
|**ExtractAlpha() - Prefix**| Returns the prefix alphabetical part of the string.<br/>For example, if the input's value is "BSimon_123", then it returns "BSimon". |
120
-
|**ExtractAlpha() - Suffix**| Returns the suffix alphabetical part of the string.<br/>For example, if the input's value is "123_Simon", then it returns "BSimon". |
120
+
|**ExtractAlpha() - Suffix**| Returns the suffix alphabetical part of the string.<br/>For example, if the input's value is "123_Simon", then it returns "Simon". |
121
121
|**ExtractNumeric() - Prefix**| Returns the prefix numerical part of the string.<br/>For example, if the input's value is "123_BSimon", then it returns "123". |
122
122
|**ExtractNumeric() - Suffix**| Returns the suffix numerical part of the string.<br/>For example, if the input's value is "BSimon_123", then it returns "123". |
123
123
|**IfEmpty()**| Outputs an attribute or constant if the input is null or empty.<br/>For example, if you want to output an attribute stored in an extensionattribute if the employeeid for a given user is empty. To do this, you would configure the following values:<br/>Parameter 1(input): user.employeeid<br/>Parameter 2 (output): user.extensionattribute1<br/>Parameter 3 (output if there's no match): user.employeeid |
0 commit comments