You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory-b2c/partner-bindid.md
+13-13Lines changed: 13 additions & 13 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -59,7 +59,7 @@ To get started, you'll need:
59
59
60
60
::: zone-end
61
61
62
-
### Part 1 - Create an application registration in BindID
62
+
### Step 1 - Create an application registration in BindID
63
63
64
64
From [Applications](https://admin.bindid-sandbox.io/console/#/applications) to configure your tenant application in BindID, the following information is needed
65
65
@@ -75,7 +75,7 @@ From [Applications](https://admin.bindid-sandbox.io/console/#/applications) to c
75
75
76
76
::: zone pivot="b2c-user-flow"
77
77
78
-
### Part 2 - Add a new Identity provider in Azure AD B2C
78
+
### Step 2 - Add a new Identity provider in Azure AD B2C
79
79
80
80
1. Sign-in to the [Azure portal](https://portal.azure.com/#home) as the global administrator of your Azure AD B2C tenant.
81
81
@@ -91,7 +91,7 @@ From [Applications](https://admin.bindid-sandbox.io/console/#/applications) to c
91
91
92
92
7. Select **Add**.
93
93
94
-
### Part 3 - Configure an Identity provider
94
+
### Step 3 - Configure an Identity provider
95
95
96
96
1. Select **Identity provider type > OpenID Connect**
97
97
@@ -101,8 +101,8 @@ From [Applications](https://admin.bindid-sandbox.io/console/#/applications) to c
101
101
|:---------|:---------|
102
102
|Name |Enter BindID – Passwordless or a name of your choice|
|Client ID|The application ID from the BindID admin UI captured in **Part 1**|
105
-
|Client Secret|The application Secret from the BindID admin UI captured in **Part 1**|
104
+
|Client ID|The application ID from the BindID admin UI captured in **Step 1**|
105
+
|Client Secret|The application Secret from the BindID admin UI captured in **Step 1**|
106
106
|Scope|OpenID email|
107
107
|Response type|Code|
108
108
|Response mode|form_post|
@@ -112,7 +112,7 @@ From [Applications](https://admin.bindid-sandbox.io/console/#/applications) to c
112
112
113
113
3. Select **Save** to complete the setup for your new OIDC Identity provider.
114
114
115
-
### Part 4 - Create a user flow policy
115
+
### Step 4 - Create a user flow policy
116
116
117
117
You should now see BindID as a new OIDC Identity provider listed within your B2C identity providers.
118
118
@@ -146,7 +146,7 @@ You should now see BindID as a new OIDC Identity provider listed within your B2C
146
146
147
147
::: zone pivot="b2c-custom-policy"
148
148
149
-
### Part 2 - Create a BindID policy key
149
+
### Step 2 - Create a BindID policy key
150
150
151
151
Store the client secret that you previously recorded in your Azure AD B2C tenant.
152
152
@@ -175,7 +175,7 @@ Store the client secret that you previously recorded in your Azure AD B2C tenant
175
175
>[!NOTE]
176
176
>In Azure Active Directory B2C, [**custom policies**](./user-flow-overview.md) are designed primarily to address complex scenarios. For most scenarios, we recommend that you use built-in [**user flows**](./user-flow-overview.md).
177
177
178
-
### Part 3- Configure BindID as an Identity provider
178
+
### Step 3- Configure BindID as an Identity provider
179
179
180
180
To enable users to sign in using BindID, you need to define BindID as a claims provider that Azure AD B2C can communicate with through an endpoint. The endpoint provides a set of claims that are used by Azure AD B2C to verify a specific user has authenticated using digital identity available on their device, proving the user’s identity.
181
181
@@ -232,7 +232,7 @@ You can define BindID as a claims provider by adding it to the **ClaimsProvider*
232
232
233
233
5. Save the file.
234
234
235
-
### Part 4 - Add a user journey
235
+
### Step 4 - Add a user journey
236
236
237
237
At this point, the identity provider has been set up, but it's not yet available in any of the sign-in pages. If you don't have your own custom user journey, create a duplicate of an existing template user journey, otherwise continue to the next step.
238
238
@@ -246,7 +246,7 @@ At this point, the identity provider has been set up, but it's not yet available
246
246
247
247
5. Rename the ID of the user journey. For example, `ID=CustomSignUpSignIn`
248
248
249
-
### Part 5 - Add the identity provider to a user journey
249
+
### Step 5 - Add the identity provider to a user journey
250
250
251
251
Now that you have a user journey, add the new identity provider to the user journey.
252
252
@@ -274,7 +274,7 @@ The following XML demonstrates orchestration steps of a user journey with the id
274
274
</OrchestrationStep>
275
275
```
276
276
277
-
### Part 6 - Configure the relying party policy
277
+
### Step 6 - Configure the relying party policy
278
278
279
279
The relying party policy, for example [SignUpSignIn.xml](https://github.com/Azure-Samples/active-directory-b2c-custom-policy-starterpack/blob/master/SocialAccounts/SignUpOrSignin.xml), specifies the user journey which Azure AD B2C will execute. You can also control what claims are passed to your application by adjusting the **OutputClaims** element of the **PolicyProfile** TechnicalProfile element. In this sample, the application will receive the user attributes such as display name, given name, surname, email, objectId, identity provider, and tenantId.
280
280
@@ -298,7 +298,7 @@ The relying party policy, for example [SignUpSignIn.xml](https://github.com/Azur
298
298
</RelyingParty>
299
299
```
300
300
301
-
### Part 7 - Upload the custom policy
301
+
### Step 7 - Upload the custom policy
302
302
303
303
1. Sign in to the [Azure portal](https://portal.azure.com/#home).
304
304
@@ -313,7 +313,7 @@ The relying party policy, for example [SignUpSignIn.xml](https://github.com/Azur
313
313
6. Select **Upload Custom Policy**, and then upload the two policy files that you changed, in the following order: the extension policy, for example `TrustFrameworkExtensions.xml`, then the relying party policy, such as `SignUpSignIn.xml`.
314
314
315
315
316
-
### Part 8 - Test your custom policy
316
+
### Step 8 - Test your custom policy
317
317
318
318
1. Open the Azure AD B2C tenant and under Policies select **Identity Experience Framework**.
0 commit comments