Skip to content

Commit b6be813

Browse files
authored
Update partner-bindid.md
1 parent 2f34973 commit b6be813

File tree

1 file changed

+13
-13
lines changed

1 file changed

+13
-13
lines changed

articles/active-directory-b2c/partner-bindid.md

Lines changed: 13 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -59,7 +59,7 @@ To get started, you'll need:
5959

6060
::: zone-end
6161

62-
### Part 1 - Create an application registration in BindID
62+
### Step 1 - Create an application registration in BindID
6363

6464
From [Applications](https://admin.bindid-sandbox.io/console/#/applications) to configure your tenant application in BindID, the following information is needed
6565

@@ -75,7 +75,7 @@ From [Applications](https://admin.bindid-sandbox.io/console/#/applications) to c
7575
7676
::: zone pivot="b2c-user-flow"
7777

78-
### Part 2 - Add a new Identity provider in Azure AD B2C
78+
### Step 2 - Add a new Identity provider in Azure AD B2C
7979

8080
1. Sign-in to the [Azure portal](https://portal.azure.com/#home) as the global administrator of your Azure AD B2C tenant.
8181

@@ -91,7 +91,7 @@ From [Applications](https://admin.bindid-sandbox.io/console/#/applications) to c
9191

9292
7. Select **Add**.
9393

94-
### Part 3 - Configure an Identity provider
94+
### Step 3 - Configure an Identity provider
9595

9696
1. Select **Identity provider type > OpenID Connect**
9797

@@ -101,8 +101,8 @@ From [Applications](https://admin.bindid-sandbox.io/console/#/applications) to c
101101
|:---------|:---------|
102102
|Name |Enter BindID – Passwordless or a name of your choice|
103103
|Metadata URL| `https://signin.bindid-sandbox.io/.well-known/openid-configuration` |
104-
|Client ID|The application ID from the BindID admin UI captured in **Part 1**|
105-
|Client Secret|The application Secret from the BindID admin UI captured in **Part 1**|
104+
|Client ID|The application ID from the BindID admin UI captured in **Step 1**|
105+
|Client Secret|The application Secret from the BindID admin UI captured in **Step 1**|
106106
|Scope|OpenID email|
107107
|Response type|Code|
108108
|Response mode|form_post|
@@ -112,7 +112,7 @@ From [Applications](https://admin.bindid-sandbox.io/console/#/applications) to c
112112

113113
3. Select **Save** to complete the setup for your new OIDC Identity provider.
114114

115-
### Part 4 - Create a user flow policy
115+
### Step 4 - Create a user flow policy
116116

117117
You should now see BindID as a new OIDC Identity provider listed within your B2C identity providers.
118118

@@ -146,7 +146,7 @@ You should now see BindID as a new OIDC Identity provider listed within your B2C
146146

147147
::: zone pivot="b2c-custom-policy"
148148

149-
### Part 2 - Create a BindID policy key
149+
### Step 2 - Create a BindID policy key
150150

151151
Store the client secret that you previously recorded in your Azure AD B2C tenant.
152152

@@ -175,7 +175,7 @@ Store the client secret that you previously recorded in your Azure AD B2C tenant
175175
>[!NOTE]
176176
>In Azure Active Directory B2C, [**custom policies**](./user-flow-overview.md) are designed primarily to address complex scenarios. For most scenarios, we recommend that you use built-in [**user flows**](./user-flow-overview.md).
177177
178-
### Part 3- Configure BindID as an Identity provider
178+
### Step 3- Configure BindID as an Identity provider
179179

180180
To enable users to sign in using BindID, you need to define BindID as a claims provider that Azure AD B2C can communicate with through an endpoint. The endpoint provides a set of claims that are used by Azure AD B2C to verify a specific user has authenticated using digital identity available on their device, proving the user’s identity.
181181

@@ -232,7 +232,7 @@ You can define BindID as a claims provider by adding it to the **ClaimsProvider*
232232

233233
5. Save the file.
234234

235-
### Part 4 - Add a user journey
235+
### Step 4 - Add a user journey
236236

237237
At this point, the identity provider has been set up, but it's not yet available in any of the sign-in pages. If you don't have your own custom user journey, create a duplicate of an existing template user journey, otherwise continue to the next step.
238238

@@ -246,7 +246,7 @@ At this point, the identity provider has been set up, but it's not yet available
246246

247247
5. Rename the ID of the user journey. For example, `ID=CustomSignUpSignIn`
248248

249-
### Part 5 - Add the identity provider to a user journey
249+
### Step 5 - Add the identity provider to a user journey
250250

251251
Now that you have a user journey, add the new identity provider to the user journey.
252252

@@ -274,7 +274,7 @@ The following XML demonstrates orchestration steps of a user journey with the id
274274
</OrchestrationStep>
275275
```
276276

277-
### Part 6 - Configure the relying party policy
277+
### Step 6 - Configure the relying party policy
278278

279279
The relying party policy, for example [SignUpSignIn.xml](https://github.com/Azure-Samples/active-directory-b2c-custom-policy-starterpack/blob/master/SocialAccounts/SignUpOrSignin.xml), specifies the user journey which Azure AD B2C will execute. You can also control what claims are passed to your application by adjusting the **OutputClaims** element of the **PolicyProfile** TechnicalProfile element. In this sample, the application will receive the user attributes such as display name, given name, surname, email, objectId, identity provider, and tenantId.
280280

@@ -298,7 +298,7 @@ The relying party policy, for example [SignUpSignIn.xml](https://github.com/Azur
298298
</RelyingParty>
299299
```
300300

301-
### Part 7 - Upload the custom policy
301+
### Step 7 - Upload the custom policy
302302

303303
1. Sign in to the [Azure portal](https://portal.azure.com/#home).
304304

@@ -313,7 +313,7 @@ The relying party policy, for example [SignUpSignIn.xml](https://github.com/Azur
313313
6. Select **Upload Custom Policy**, and then upload the two policy files that you changed, in the following order: the extension policy, for example `TrustFrameworkExtensions.xml`, then the relying party policy, such as `SignUpSignIn.xml`.
314314

315315

316-
### Part 8 - Test your custom policy
316+
### Step 8 - Test your custom policy
317317

318318
1. Open the Azure AD B2C tenant and under Policies select **Identity Experience Framework**.
319319

0 commit comments

Comments
 (0)