You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory-b2c/analytics-with-application-insights.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -9,7 +9,7 @@ manager: celestedg
9
9
ms.service: active-directory
10
10
ms.topic: conceptual
11
11
ms.workload: identity
12
-
ms.date: 10/12/2018
12
+
ms.date: 02/11/2020
13
13
ms.author: marsma
14
14
ms.subservice: B2C
15
15
@@ -154,7 +154,7 @@ Add the profiles to the *TrustFrameworkExtensions.xml* file from the starter pac
154
154
<InputClaims>
155
155
<!-- Properties of an event are added through the syntax {property:NAME}, where NAME is property being added to the event. DefaultValue can be either a static value or a value that's resolved by one of the supported DefaultClaimResolvers. -->
Copy file name to clipboardExpand all lines: articles/active-directory-b2c/contentdefinitions.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -73,7 +73,7 @@ The **ContentDefinition** element contains the following elements:
73
73
74
74
### DataUri
75
75
76
-
The **DataUri** element is used to specify the page identifier. Azure AD B2C uses the page identifier to load and initiate UI elements and client side JavaScript. The format of the value is `urn:com:microsoft:aad:b2c:elements:page-name:version`. The following table lists of the page identifiers you can use.
76
+
The **DataUri** element is used to specify the page identifier. Azure AD B2C uses the page identifier to load and initiate UI elements and client side JavaScript. The format of the value is `urn:com:microsoft:aad:b2c:elements:page-name:version`. The following table lists the values and descriptions of the page identifiers you can use.
Copy file name to clipboardExpand all lines: articles/active-directory-b2c/display-controls.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -86,7 +86,7 @@ Certain display claims are required for certain types of display control. For ex
86
86
87
87
The **output claims** of a display control are not sent to the next orchestration step. They are saved temporarily only for the current display control session. These temporary claims can be shared between the different actions of the same display control.
88
88
89
-
To bubble up the output the claims to the next orchestration step, use the **OutputClaims** of the actual self-asserted technical profile which references this display control.
89
+
To bubble up the output claims to the next orchestration step, use the **OutputClaims** of the actual self-asserted technical profile which references this display control.
Copy file name to clipboardExpand all lines: articles/active-directory-b2c/identity-provider-azure-ad-single-tenant-custom.md
+22-13Lines changed: 22 additions & 13 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -9,7 +9,7 @@ manager: celestedg
9
9
ms.service: active-directory
10
10
ms.workload: identity
11
11
ms.topic: conceptual
12
-
ms.date: 09/13/2019
12
+
ms.date: 02/11/2020
13
13
ms.author: marsma
14
14
ms.subservice: B2C
15
15
---
@@ -46,6 +46,19 @@ To enable sign-in for users from a specific Azure AD organization, you need to r
46
46
1. Select **Certificates & secrets**, and then select **New client secret**.
47
47
1. Enter a **Description** for the secret, select an expiration, and then select **Add**. Record the **Value** of the secret for use in a later step.
48
48
49
+
## Configuring optional claims
50
+
51
+
If you want to get the `family_name` and `given_name` claims from Azure AD, you can configure optional claims for your application in the Azure portal UI or application manifest. For more information, see [How to provide optional claims to your Azure AD app](../active-directory/develop/active-directory-optional-claims.md).
52
+
53
+
1. Sign in to the [Azure portal](https://portal.azure.com). Search for and select **Azure Active Directory**.
54
+
1. From the **Manage** section, select **App registrations**.
55
+
1. Select the application you want to configure optional claims for in the list.
56
+
1. From the **Manage** section, select **Token configuration (preview)**.
57
+
1. Select **Add optional claim**.
58
+
1. Select the token type you want to configure.
59
+
1. Select the optional claims to add.
60
+
1. Click **Add**.
61
+
49
62
## Create a policy key
50
63
51
64
You need to store the application key that you created in your Azure AD B2C tenant.
@@ -69,23 +82,20 @@ You can define Azure AD as a claims provider by adding Azure AD to the **ClaimsP
69
82
1. Open the *TrustFrameworkExtensions.xml* file.
70
83
2. Find the **ClaimsProviders** element. If it does not exist, add it under the root element.
71
84
3. Add a new **ClaimsProvider** as follows:
72
-
73
-
```XML
85
+
```xml
74
86
<ClaimsProvider>
75
87
<Domain>Contoso</Domain>
76
88
<DisplayName>Login using Contoso</DisplayName>
77
89
<TechnicalProfiles>
78
-
<TechnicalProfile Id="ContosoProfile">
90
+
<TechnicalProfile Id="OIDC-Contoso">
79
91
<DisplayName>Contoso Employee</DisplayName>
80
92
<Description>Login with your Contoso account</Description>
@@ -121,12 +131,11 @@ You can define Azure AD as a claims provider by adding Azure AD to the **ClaimsP
121
131
122
132
To get a token from the Azure AD endpoint, you need to define the protocols that Azure AD B2C should use to communicate with Azure AD. This is done inside the **TechnicalProfile** element of **ClaimsProvider**.
123
133
124
-
1. Update the ID of the **TechnicalProfile** element. This ID is used to refer to this technical profile from other parts of the policy.
134
+
1. Update the ID of the **TechnicalProfile** element. This ID is used to refer to this technical profile from other parts of the policy, for example `OIDC-Contoso`.
125
135
1. Update the value for **DisplayName**. This value will be displayed on the sign-in button on your sign-in screen.
126
136
1. Update the value for **Description**.
127
137
1. Azure AD uses the OpenID Connect protocol, so make sure that the value for **Protocol** is `OpenIdConnect`.
128
-
1. Set value of the **METADATA** to `https://login.windows.net/your-AD-tenant-name.onmicrosoft.com/.well-known/openid-configuration`, where `your-AD-tenant-name` is your Azure AD tenant name. For example, `https://login.windows.net/fabrikam.onmicrosoft.com/.well-known/openid-configuration`
129
-
1. Open your browser and go to the **METADATA** URL that you just updated, look for the **issuer** object, and then copy and paste the value into the value for **ProviderName** in the XML file.
138
+
1. Set value of the **METADATA** to `https://login.microsoftonline.com/tenant-name.onmicrosoft.com/v2.0/.well-known/openid-configuration`, where `tenant-name` is your Azure AD tenant name. For example, `https://login.microsoftonline.com/contoso.onmicrosoft.com/v2.0/.well-known/openid-configuration`
130
139
1. Set **client_id** to the application ID from the application registration.
131
140
1. Under **CryptographicKeys**, update the value of **StorageReferenceId** to the name of the policy key that you created earlier. For example, `B2C_1A_ContosoAppSecret`.
132
141
@@ -167,10 +176,10 @@ Now that you have a button in place, you need to link it to an action. The actio
167
176
1. Add the following **ClaimsExchange** element making sure that you use the same value for **Id** that you used for **TargetClaimsExchangeId**:
Copy file name to clipboardExpand all lines: articles/active-directory-b2c/technical-profiles-overview.md
+17-26Lines changed: 17 additions & 26 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -9,7 +9,7 @@ manager: celestedg
9
9
ms.service: active-directory
10
10
ms.workload: identity
11
11
ms.topic: reference
12
-
ms.date: 03/02/2020
12
+
ms.date: 02/11/2020
13
13
ms.author: marsma
14
14
ms.subservice: B2C
15
15
---
@@ -35,30 +35,34 @@ A technical profile enables these types of scenarios:
35
35
-[SAML2](saml-technical-profile.md) - Federation with any SAML protocol identity provider.
36
36
-[Self-Asserted](self-asserted-technical-profile.md) - Interact with the user. For example, collect the user's credential to sign in, render the sign-up page, or password reset.
37
37
-[Session management](custom-policy-reference-sso.md) - Handle different types of sessions.
38
-
-**Application insights**
38
+
-**Application Insights**
39
39
-[One time password](one-time-password-technical-profile.md) - Provides support for managing the generation and verification of a one-time password.
40
40
41
41
## Technical profile flow
42
42
43
-
All types of technical profiles share the same concept. You send input claims, run claims transformation, and communicate with the configured party, such as an identity provider, REST API, or Azure AD directory services. After the process finishes, the technical profile returns the output claims and may run output claims transformation. The following diagram shows how the transformations and mappings referenced in the technical profile are processed. Regardless of the party the technical profile interacts with, after any claims transformation is executed, the output claims from the technical profile are immediately stored in the claims bag.
43
+
All types of technical profiles share the same concept. You send input claims, run claims transformation, and communicate with the configured party, such as an identity provider, REST API, or Azure AD directory services. After the process is completed, the technical profile returns the output claims and may run output claims transformation. The following diagram shows how the transformations and mappings referenced in the technical profile are processed. Regardless of the party the technical profile interacts with, after any claims transformation is executed, the output claims from the technical profile are immediately stored in the claims bag.
44
44
45
45

46
46
47
-
1.**InputClaimsTransformation** - Input claims of every input [claims transformation](claimstransformations.md) are picked up from the claims bag, and after execution, the output claims are put back in the claims bag. The output claims of an input claims transformation can be input claims of a subsequent input claims transformation.
48
-
2.**InputClaims** - Claims are picked up from the claims bag and are used for the technical profile. For example, a [self-asserted technical profile](self-asserted-technical-profile.md) uses the input claims to prepopulate the output claims that the user provides. A REST API technical profile uses the input claims to send input parameters to the REST API endpoint. Azure Active Directory uses input claim as a unique identifier to read, update, or delete an account.
49
-
3.**Technical profile execution** - The technical profile exchanges the claims with the configured party. For example:
1.**Input claims transformation** - Input claims of every input [claims transformation](claimstransformations.md) are picked up from the claims bag. The output claims of an input claims transformation can be input claims of a subsequent input claims transformation.
49
+
1.**Input claims** - Claims are picked up from the claims bag and are used for the technical profile. For example, a [self-asserted technical profile](self-asserted-technical-profile.md) uses the input claims to prepopulate the output claims that the user provides. A REST API technical profile uses the input claims to send input parameters to the REST API endpoint. Azure Active Directory uses input claim as a unique identifier to read, update, or delete an account.
50
+
1.**Technical profile execution** - The technical profile exchanges the claims with the configured party. For example:
50
51
- Redirect the user to the identity provider to complete the sign-in. After successful sign-in, the user returns back and the technical profile execution continues.
51
52
- Call a REST API while sending parameters as InputClaims and getting information back as OutputClaims.
52
53
- Create or update the user account.
53
54
- Sends and verifies the MFA text message.
54
-
4.**ValidationTechnicalProfiles** - For a [selfasserted technical profile](self-asserted-technical-profile.md), you can call an input [validation technical profile](validation-technical-profile.md). The validation technical profile validates the data profiled by the user and returns an error message or Ok, with or without output claims. For example, before Azure AD B2C creates a new account, it checks whether the user already exists in the directory services. You can call a REST API technical profile to add your own business logic.<p>The scope of the output claims of a validation technical profile is limited to the technical profile that invokes the validation technical profile and other validation technical profiles under same technical profile. If you want to use the output claims in the next orchestration step, you need to add the output claims to the technical profile that invokes the validation technical profile.
55
-
5.**OutputClaims** - Claims are returned back to the claims bag. You can use those claims in the next orchestrations step, or output claims transformations.
56
-
6.**OutputClaimsTransformations** - Input claims of every output [claims transformation](claimstransformations.md) are picked up from the claims bag. The output claims of the technical profile from the previous steps can be input claims of an output claims transformation. After execution, the output claims are put back in the claims bag. The output claims of an output claims transformation can also be input claims of a subsequent output claims transformation.
57
-
7.**Single sign-on (SSO) session management** - [SSO session management](custom-policy-reference-sso.md) controls interaction with a user after the user has already authenticated. For example, the administrator can control whether the selection of identity providers is displayed, or whether local account details need to be entered again.
55
+
1.**Validation technical profiles** - A [self-asserted technical profile](self-asserted-technical-profile.md)can call [validation technical profiles](validation-technical-profile.md). The validation technical profile validates the data profiled by the user and returns an error message or Ok, with or without output claims. For example, before Azure AD B2C creates a new account, it checks whether the user already exists in the directory services. You can call a REST API technical profile to add your own business logic.<p>The scope of the output claims of a validation technical profile is limited to the technical profile that invokes the validation technical profile. and other validation technical profiles under same technical profile. If you want to use the output claims in the next orchestration step, you need to add the output claims to the technical profile that invokes the validation technical profile.
56
+
1.**Output claims** - Claims are returned back to the claims bag. You can use those claims in the next orchestrations step, or output claims transformations.
57
+
1.**Output claims transformations** - Input claims of every output [claims transformation](claimstransformations.md) are picked up from the claims bag. The output claims of the technical profile from the previous steps can be input claims of an output claims transformation. After execution, the output claims are put back in the claims bag. The output claims of an output claims transformation can also be input claims of a subsequent output claims transformation.
58
+
1.**Single sign-on (SSO) session management** - Persists technical profile's data to the session, using [SSO session management](custom-policy-reference-sso.md).
58
59
59
-
A technical profile can inherit from another technical profile to change settings or add new functionality. The **IncludeTechnicalProfile** element is a reference to the base technical profile from which a technical profile is derived.
60
60
61
-
For example, the **AAD-UserReadUsingAlternativeSecurityId-NoError** technical profile includes the **AAD-UserReadUsingAlternativeSecurityId**. This technical profile sets the **RaiseErrorIfClaimsPrincipalDoesNotExist** metadata item to `true`, and raises an error if a social account does not exist in the directory. **AAD-UserReadUsingAlternativeSecurityId-NoError** overrides this behavior and disables the error message if the user has not existed.
61
+
## Technical profile inclusion
62
+
63
+
A technical profile can include another technical profile to change settings or add new functionality. The `IncludeTechnicalProfile` element is a reference to the base technical profile from which a technical profile is derived. There is no limit on the number of levels.
64
+
65
+
For example, the **AAD-UserReadUsingAlternativeSecurityId-NoError** technical profile includes the **AAD-UserReadUsingAlternativeSecurityId**. This technical profile sets the `RaiseErrorIfClaimsPrincipalDoesNotExist` metadata item to `true`, and raises an error if a social account does not exist in the directory. **AAD-UserReadUsingAlternativeSecurityId-NoError** overrides this behavior, and disables that error message.
@@ -93,7 +97,7 @@ For example, the **AAD-UserReadUsingAlternativeSecurityId-NoError** technical pr
93
97
</TechnicalProfile>
94
98
```
95
99
96
-
Both **AAD-UserReadUsingAlternativeSecurityId-NoError** and **AAD-UserReadUsingAlternativeSecurityId** don't specify the required **Protocol** element because it's specified in the **AAD-Common** technical profile.
100
+
Both **AAD-UserReadUsingAlternativeSecurityId-NoError** and **AAD-UserReadUsingAlternativeSecurityId** don't specify the required **Protocol** element, because it's specified in the **AAD-Common** technical profile.
97
101
98
102
```XML
99
103
<TechnicalProfileId="AAD-Common">
@@ -102,16 +106,3 @@ Both **AAD-UserReadUsingAlternativeSecurityId-NoError** and **AAD-UserReadUsing
102
106
...
103
107
</TechnicalProfile>
104
108
```
105
-
106
-
A technical profile may include or inherit another technical profile, which may include another one. There is no limit on the number of levels. Depending on the business requirements, your user journey may call **AAD-UserReadUsingAlternativeSecurityId** that raises an error if a user social account doesn't exist, or **AAD-UserReadUsingAlternativeSecurityId-NoError** which doesn't raise an error.
0 commit comments