Skip to content

Commit c4333b9

Browse files
authored
Merge pull request #84071 from mmacy/b2c-oidc-idp-ga
[b2c] remove Preview for custom OIDC IdP
2 parents 053e762 + 7fc8a8e commit c4333b9

File tree

3 files changed

+7
-14
lines changed

3 files changed

+7
-14
lines changed

articles/active-directory-b2c/active-directory-b2c-setup-oidc-azure-active-directory.md

Lines changed: 2 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -8,16 +8,13 @@ manager: celestedg
88
ms.service: active-directory
99
ms.workload: identity
1010
ms.topic: conceptual
11-
ms.date: 07/08/2019
11+
ms.date: 08/06/2019
1212
ms.author: marsma
1313
ms.subservice: B2C
1414
---
1515

1616
# Set up sign-in for a specific Azure Active Directory organization in Azure Active Directory B2C
1717

18-
>[!NOTE]
19-
> This feature is in public preview. Do not use the feature in production environments.
20-
2118
To use an Azure Active Directory (Azure AD) as an [identity provider](active-directory-b2c-reference-oauth-code.md) in Azure AD B2C, you need to create an application that represents it. This article shows you how to enable sign-in for users from a specific Azure AD organization using a user flow in Azure AD B2C.
2219

2320
## Create an Azure AD app
@@ -50,7 +47,7 @@ To enable sign-in for users from a specific Azure AD organization, you need to r
5047
2. Choose **All services** in the top-left corner of the Azure portal, and then search for and select **Azure AD B2C**.
5148
3. Select **Identity providers**, and then select **Add**.
5249
4. Enter a **Name**. For example, enter `Contoso Azure AD`.
53-
5. Select **Identity provider type**, select **OpenID Connect (Preview)**, and then click **OK**.
50+
5. Select **Identity provider type**, select **OpenID Connect**, and then click **OK**.
5451
6. Select **Set up this identity provider**
5552
7. For **Metadata url**, enter the following URL replacing `your-AD-tenant-domain` with the domain name of your Azure AD tenant. For example `https://login.microsoftonline.com/contoso.onmicrosoft.com/.well-known/openid-configuration`:
5653

articles/active-directory-b2c/active-directory-b2c-setup-oidc-idp.md

Lines changed: 4 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: Set up sign-up and sign-in with OpenID Connect - Azure Active Directory B2C | Microsoft Docs
2+
title: Set up sign-up and sign-in with OpenID Connect - Azure Active Directory B2C
33
description: Set up sign-up and sign-in with OpenID Connect using Azure Active Directory B2C.
44
services: active-directory-b2c
55
author: mmacy
@@ -8,26 +8,22 @@ manager: celestedg
88
ms.service: active-directory
99
ms.workload: identity
1010
ms.topic: conceptual
11-
ms.date: 11/30/2018
11+
ms.date: 08/06/2019
1212
ms.author: marsma
1313
ms.subservice: B2C
1414
---
1515

1616
# Set up sign-up and sign-in with OpenID Connect using Azure Active Directory B2C
1717

18-
>[!NOTE]
19-
> This feature is in public preview. Do not use the feature in production environments.
20-
21-
22-
[OpenID Connect](active-directory-b2c-reference-oidc.md) is an authentication protocol, built on top of OAuth 2.0, that can be used to securely sign users in. Most identity providers that use this protocol, are supported in Azure AD B2C. This article explains how you can add custom OpenID Connect identity providers into your user flows.
18+
[OpenID Connect](active-directory-b2c-reference-oidc.md) is an authentication protocol built on top of OAuth 2.0 that can be used for secure user sign-in. Most identity providers that use this protocol are supported in Azure AD B2C. This article explains how you can add custom OpenID Connect identity providers into your user flows.
2319

2420
## Add the identity provider
2521

2622
1. Sign in to the [Azure portal](https://portal.azure.com/) as the global administrator of your Azure AD B2C tenant.
2723
2. Make sure you're using the directory that contains your Azure AD B2C tenant by clicking the **Directory and subscription filter** in the top menu and choosing the directory that contains your tenant.
2824
3. Choose **All services** in the top-left corner of the Azure portal, search for and select **Azure AD B2C**.
2925
4. Select **Identity Providers**, and then click **Add**.
30-
5. For the **Identity provider type**, select **OpenID Connect (Preview)**.
26+
5. For the **Identity provider type**, select **OpenID Connect**.
3127

3228
## Configure the identity provider
3329

articles/active-directory-b2c/tutorial-add-identity-providers.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -94,7 +94,7 @@ After you create the application for the identity provider that you want to add,
9494
1. Choose **All services** in the top-left corner of the Azure portal, and then search for and select **Azure AD B2C**.
9595
1. Select **Identity providers**, and then select **Add**.
9696
1. Enter a **Name**. For example, enter *Contoso Azure AD*.
97-
1. Select **Identity provider type**, select **OpenID Connect (Preview)**, and then click **OK**.
97+
1. Select **Identity provider type**, select **OpenID Connect**, and then click **OK**.
9898
1. Click **Set up this identity provider**
9999
1. For **Metadata url**, enter the following URL, replacing `your-AD-tenant-domain` with the domain name of your Azure AD tenant.
100100

0 commit comments

Comments
 (0)