You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Azure Active Directory B2C (Azure AD B2C) emits several types of security tokens as it processes each [authentication flow](application-types.md). This article describes the format, security characteristics, and contents of each type of token.
21
+
Azure Active Directory B2C (Azure AD B2C) emits different types of security tokens as it processes each [authentication flow](application-types.md). This article describes the format, security characteristics, and contents of each type of token.
22
22
23
23
## Token types
24
24
@@ -60,10 +60,10 @@ The following table lists the claims that you can expect in ID tokens and access
60
60
| Code hash |`c_hash`|`SGCPtt01wxwfgnYZy2VJtQ`| A code hash included in an ID token only when the token is issued together with an OAuth 2.0 authorization code. A code hash can be used to validate the authenticity of an authorization code. For more information about how to perform this validation, see the [OpenID Connect specification](https://openid.net/specs/openid-connect-core-1_0.html). |
61
61
| Access token hash |`at_hash`|`SGCPtt01wxwfgnYZy2VJtQ`| An access token hash included in an ID token only when the token is issued together with an OAuth 2.0 access token. An access token hash can be used to validate the authenticity of an access token. For more information about how to perform this validation, see the [OpenID Connect specification](https://openid.net/specs/openid-connect-core-1_0.html)|
62
62
| Nonce |`nonce`|`12345`| A nonce is a strategy used to mitigate token replay attacks. Your application can specify a nonce in an authorization request by using the `nonce` query parameter. The value you provide in the request is emitted unmodified in the `nonce` claim of an ID token only. This claim allows your application to verify the value against the value specified on the request. Your application should perform this validation during the ID token validation process. |
63
-
| Subject |`sub`|`884408e1-2918-4cz0-b12d-3aa027d7563b`| The principal about which the token asserts information, such as the user of an application. This value is immutable and cannot be reassigned or reused. It can be used to perform authorization checks safely, such as when the token is used to access a resource. By default, the subject claim is populated with the object ID of the user in the directory. |
63
+
| Subject |`sub`|`884408e1-2918-4cz0-b12d-3aa027d7563b`| The principal about which the token asserts information, such as the user of an application. This value is immutable and can't be reassigned or reused. It can be used to perform authorization checks safely, such as when the token is used to access a resource. By default, the subject claim is populated with the object ID of the user in the directory. |
64
64
| Authentication context class reference |`acr`| Not applicable | Used only with older policies. |
65
65
| Trust framework policy |`tfp`|`b2c_1_signupsignin1`| The name of the policy that was used to acquire the ID token. |
66
-
| Authentication time |`auth_time`|`1438535543`| The time at which a user last entered credentials, represented in epoch time. There is no discrimination between that authentication being a fresh sign-in, a single sign-on (SSO) session, or another sign-in type. The `auth_time` is the last time the application (or user) initiated an authentication attempt against Azure AD B2C. The method used to authenticate is not differentiated. |
66
+
| Authentication time |`auth_time`|`1438535543`| The time at which a user last entered credentials, represented in epoch time. There is no discrimination between that authentication being a fresh sign-in, a single sign-on (SSO) session, or another sign-in type. The `auth_time` is the last time the application (or user) initiated an authentication attempt against Azure AD B2C. The method used to authenticate isn't differentiated. |
67
67
| Scope |`scp`|`Read`| The permissions granted to the resource for an access token. Multiple granted permissions are separated by a space. |
68
68
| Authorized Party |`azp`|`975251ed-e4f5-4efd-abcb-5f1a8f566ab7`| The **application ID** of the client application that initiated the request. |
69
69
@@ -82,15 +82,15 @@ The following use cases are enabled using these properties:
82
82
- Allow a user to stay signed in to a mobile application indefinitely, as long as the user is continually active on the application. You can set **Refresh token sliding window lifetime (days)** to **No expiry** in your sign-in user flow.
83
83
- Meet your industry's security and compliance requirements by setting the appropriate access token lifetimes.
84
84
85
-
These settings are not available for password reset user flows.
85
+
These settings aren't available for password reset user flows.
86
86
87
87
## Compatibility
88
88
89
89
The following properties are used to [manage token compatibility](configure-tokens.md):
90
90
91
91
-**Issuer (iss) claim** - This property identifies the Azure AD B2C tenant that issued the token. The default value is `https://<domain>/{B2C tenant GUID}/v2.0/`. The value of `https://<domain>/tfp/{B2C tenant GUID}/{Policy ID}/v2.0/` includes IDs for both the Azure AD B2C tenant and the user flow that was used in the token request. If your application or library needs Azure AD B2C to be compliant with the [OpenID Connect Discovery 1.0 spec](https://openid.net/specs/openid-connect-discovery-1_0.html), use this value.
92
92
93
-
-**Subject (sub) claim** - This property identifies the entity for which the token asserts information. The default value is **ObjectID**, which populates the `sub` claim in the token with the object ID of the user. The value of **Not supported** is only provided for backward-compatibility. It's recommended that you switch to **ObjectID** as soon as you are able to.
93
+
-**Subject (sub) claim** - This property identifies the entity for which the token asserts information. The default value is **ObjectID**, which populates the `sub` claim in the token with the object ID of the user. The value of **Not supported** is only provided for backward-compatibility. It's recommended that you switch to **ObjectID** as soon as you're able to.
94
94
95
95
-**Claim representing policy ID** - This property identifies the claim type into which the policy name used in the token request is populated. The default value is `tfp`. The value of `acr` is only provided for backward-compatibility.
Copy file name to clipboardExpand all lines: articles/active-directory/app-proxy/application-proxy-deployment-plan.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -88,7 +88,7 @@ Compile an inventory of all in-scope applications that are being published via A
88
88
| Domain membership| Web server’s fully qualified domain name (FQDN) |
89
89
| Application location | Where the web server or farm is located in your infrastructure |
90
90
| Internal access | The exact URL used when accessing the application internally. <br> If a farm, what type of load balancing is in use? <br> Whether the application draws content from sources other than itself.<br> Determine if the application operates over WebSockets. |
91
-
| External access | The vendor solution that the application is already exposed to externally. <br> The URL you want to use for external access. If SharePoint, ensure Alternate Access Mappings are configured per [this guidance](/SharePoint/administration/configure-alternate-access-mappings). If not, you will need to define external URLs. |
91
+
| External access | The vendor solution that the application may already be exposed throught, externally. <br> The URL you want to use for external access. If SharePoint, ensure Alternate Access Mappings are configured per [this guidance](/SharePoint/administration/configure-alternate-access-mappings). If not, you will need to define external URLs. |
92
92
| Public certificate | If using a custom domain, procure a certificate with a corresponding subject name. if a certificate exists note the serial number and location from where it can be obtained. |
93
93
| Authentication type| The type of authentication supported by the application support such as Basic, Windows Integration Authentication, forms-based, header-based, and claims. <br>If the application is configured to run under a specific domain account, note the Fully Qualified Domain Name (FQDN) of the service account.<br> If SAML-based, the identifier and reply URLs. <br> If header-based, the vendor solution and specific requirement for handling authentication type. |
94
94
| Connector group name | The logical name for the group of connectors that will be designated to provide the conduit and SSO to this backend application. |
0 commit comments