You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
title: Set up sign-up and sign-in with a Microsoft account - Azure Active Directory B2C | Microsoft Docs
2
+
title: Set up sign-up and sign-in with a Microsoft account - Azure Active Directory B2C
3
3
description: Provide sign-up and sign-in to customers with Microsoft accounts in your applications using Azure Active Directory B2C.
4
4
services: active-directory-b2c
5
5
author: mmacy
@@ -8,7 +8,7 @@ manager: celestedg
8
8
ms.service: active-directory
9
9
ms.workload: identity
10
10
ms.topic: conceptual
11
-
ms.date: 09/21/2018
11
+
ms.date: 06/11/2019
12
12
ms.author: marsma
13
13
ms.subservice: B2C
14
14
---
@@ -19,22 +19,28 @@ ms.subservice: B2C
19
19
20
20
To use a Microsoft account as an [identity provider](active-directory-b2c-reference-oidc.md) in Azure Active Directory (Azure AD) B2C, you need to create an application in your tenant that represents it. If you don’t already have a Microsoft account, you can get it at [https://www.live.com/](https://www.live.com/).
21
21
22
-
1. Sign in to the [Microsoft Application Registration Portal](https://apps.dev.microsoft.com/?referrer=https://azure.microsoft.com/documentation/articles&deeplink=/appList) with your Microsoft account credentials.
23
-
2. In the upper-right corner, select **Add an app**.
24
-
3. Enter a **Name** for your application. For example, *MSAapp1*.
25
-
4. Select **Generate New Password** and make sure that you copy the password to use when you configure the identity provider. Also copy the **Application Id**.
26
-
5. Select **Add platform**, and then and choose **Web**.
27
-
4. Enter `https://your-tenant-name.b2clogin.com/your-tenant-name.onmicrosoft.com/oauth2/authresp` in **Redirect URLs**. Replace `your-tenant-name` with the name of your tenant.
28
-
5. Select **Save**.
22
+
1. Sign in to the [Azure portal](https://portal.azure.com/).
23
+
1. Select **All services** in the top-left corner of the Azure portal, and then search for and select **App registrations**.
24
+
1. Select **New registration**
25
+
1. Enter a **Name** for your application. For example, *MSAapp1*.
26
+
1. Under **Supported account types**, select **Accounts in any organizational directory and personal Microsoft accounts (e.g. Skype, Xbox, Outlook.com)**. This option targets the widest set of Microsoft identities.
27
+
28
+
For more information on the different account type selections, see [Quickstart: Register an application with the Microsoft identity platform](../active-directory/develop/quickstart-register-app.md).
29
+
1. Under **Redirect URI (optional)**, select **Web** and enter `https://your-tenant-name.b2clogin.com/your-tenant-name.onmicrosoft.com/oauth2/authresp` in the text box. Replace `your-tenant-name` with your Azure AD B2C tenant name.
30
+
1. Select **Register**
31
+
1. Record the **Application (client) ID** shown on the application Overview page. You need this when you configure the identity provider in the next section.
32
+
1. Select **Certificates & secrets**
33
+
1. Click **New client secret**
34
+
1. Enter a **Description** for the secret, for example *Application password 1*, and then click **Add**.
35
+
1. Record the application password shown in the **VALUE** column. You need this when you configure the identity provider in the next section.
29
36
30
37
## Configure a Microsoft account as an identity provider
31
38
32
39
1. Sign in to the [Azure portal](https://portal.azure.com/) as the global administrator of your Azure AD B2C tenant.
33
-
2. Make sure you're using the directory that contains your Azure AD B2C tenant by clicking the **Directory and subscription filter** in the top menu and choosing the directory that contains your tenant.
34
-
3. Choose **All services** in the top-left corner of the Azure portal, search for and select **Azure AD B2C**.
35
-
4. Select **Identity providers**, and then select **Add**.
7. Select **Set up this identity provider** and enter the Application Id that you recorded earlier as the **Client ID** and enter the password that you recorded as the **Client secret** of the Microsoft account application that you created earlier.
39
-
8. Click **OK** and then click **Create** to save your Microsoft account configuration.
40
-
40
+
1. Make sure you're using the directory that contains your Azure AD B2C tenant by clicking the **Directory and subscription filter** in the top menu and choosing the directory that contains your tenant.
41
+
1. Choose **All services** in the top-left corner of the Azure portal, search for and select **Azure AD B2C**.
42
+
1. Select **Identity providers**, and then select **Add**.
1. Select **Set up this identity provider** and enter the Application (client) ID that you recorded earlier in the **Client ID** text box, and enter the client secret that you recorded in the **Client secret** text box.
46
+
1. Click **OK** and then click **Create** to save your Microsoft account configuration.
0 commit comments