You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory-b2c/custom-policy-overview.md
+3-1Lines changed: 3 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -39,7 +39,9 @@ These three types of policy files are used:
39
39
-**Extensions file** - holds the unique configuration changes for your tenant.
40
40
-**Relying Party (RP) file** - The single task-focused file that is invoked directly by the application or service (also, known as a Relying Party). Each unique task requires its own RP and depending on branding requirements, the number might be "total of applications x total number of use cases."
41
41
42
-
User flows in Azure AD B2C follow the three-file pattern depicted above, but the developer only sees the RP file, while the Azure portal makes changes in the background to the extensions file.
42
+
User flows in Azure AD B2C follow the file pattern depicted above, but the developer only sees the RP file, while the Azure portal makes changes in the background to the extensions file.
43
+
44
+
Although there are three types of policy files, you aren't restricted to only three files. You may have multiple files of each file type. For example, if you don't want to make changes to your Extensions file, you can create an Extensions2 file to further extend the Extensions file.
Copy file name to clipboardExpand all lines: articles/active-directory-b2c/identity-provider-azure-ad-single-tenant-custom.md
+2-34Lines changed: 2 additions & 34 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -9,7 +9,7 @@ manager: celestedg
9
9
ms.service: active-directory
10
10
ms.workload: identity
11
11
ms.topic: conceptual
12
-
ms.date: 02/11/2020
12
+
ms.date: 04/20/2020
13
13
ms.author: mimart
14
14
ms.subservice: B2C
15
15
---
@@ -24,40 +24,8 @@ This article shows you how to enable sign-in for users from an Azure Active Dire
24
24
25
25
Complete the steps in [Get started with custom policies in Azure Active Directory B2C](custom-policy-get-started.md).
26
26
27
-
## Register an application
28
27
29
-
To enable sign-in for users from a specific Azure AD organization, you need to register an application within the organizational Azure AD tenant.
30
-
31
-
1. Sign in to the [Azure portal](https://portal.azure.com).
32
-
1. Make sure you're using the directory that contains your organizational Azure AD tenant (for example, contoso.com). Select the **Directory + subscription filter** in the top menu, and then choose the directory that contains your Azure AD tenant.
33
-
1. Choose **All services** in the top-left corner of the Azure portal, and then search for and select **App registrations**.
34
-
1. Select **New registration**.
35
-
1. Enter a **Name** for your application. For example, `Azure AD B2C App`.
36
-
1. Accept the default selection of **Accounts in this organizational directory only** for this application.
37
-
1. For the **Redirect URI**, accept the value of **Web**, and enter the following URL in all lowercase letters, where `your-B2C-tenant-name` is replaced with the name of your Azure AD B2C tenant.
For example, `https://contoso.b2clogin.com/contoso.onmicrosoft.com/oauth2/authresp`.
44
-
45
-
1. Select **Register**. Record the **Application (client) ID** for use in a later step.
46
-
1. Select **Certificates & secrets**, and then select **New client secret**.
47
-
1. Enter a **Description** for the secret, select an expiration, and then select **Add**. Record the **Value** of the secret for use in a later step.
48
-
49
-
## Configuring optional claims
50
-
51
-
If you want to get the `family_name` and `given_name` claims from Azure AD, you can configure optional claims for your application in the Azure portal UI or application manifest. For more information, see [How to provide optional claims to your Azure AD app](../active-directory/develop/active-directory-optional-claims.md).
52
-
53
-
1. Sign in to the [Azure portal](https://portal.azure.com). Search for and select **Azure Active Directory**.
54
-
1. From the **Manage** section, select **App registrations**.
55
-
1. Select the application you want to configure optional claims for in the list.
56
-
1. From the **Manage** section, select **Token configuration (preview)**.
Copy file name to clipboardExpand all lines: articles/active-directory-b2c/identity-provider-azure-ad-single-tenant.md
+9-32Lines changed: 9 additions & 32 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -9,7 +9,7 @@ manager: celestedg
9
9
ms.service: active-directory
10
10
ms.workload: identity
11
11
ms.topic: conceptual
12
-
ms.date: 08/08/2019
12
+
ms.date: 04/20/2020
13
13
ms.author: mimart
14
14
ms.subservice: B2C
15
15
ms.custom: fasttrack-edit
@@ -19,51 +19,28 @@ ms.custom: fasttrack-edit
19
19
20
20
To use an Azure Active Directory (Azure AD) as an [identity provider](authorization-code-flow.md) in Azure AD B2C, you need to create an application that represents it. This article shows you how to enable sign-in for users from a specific Azure AD organization using a user flow in Azure AD B2C.
21
21
22
-
## Create an Azure AD app
23
-
24
-
To enable sign-in for users from a specific Azure AD organization, you need to register an application within the organizational Azure AD tenant, which is not the same as your Azure AD B2C tenant.
25
-
26
-
1. Sign in to the [Azure portal](https://portal.azure.com).
27
-
2. Make sure you're using the directory that contains your Azure AD tenant. Select the **Directory + subscription** filter in the top menu and choose the directory that contains your Azure AD tenant. This is not the same tenant as your Azure AD B2C tenant.
28
-
3. Choose **All services** in the top-left corner of the Azure portal, and then search for and select **App registrations**.
29
-
4. Select **New registration**.
30
-
5. Enter a name for your application. For example, `Azure AD B2C App`.
31
-
6. Accept the selection of **Accounts in this organizational directory only** for this application.
32
-
7. For the **Redirect URI**, accept the value of **Web**, and enter the following URL in all lowercase letters, where `your-B2C-tenant-name` is replaced with the name of your Azure AD B2C tenant. For example, `https://fabrikam.b2clogin.com/fabrikam.onmicrosoft.com/oauth2/authresp`:
1. Make sure you're using the directory that contains Azure AD B2C tenant. Select the **Directory + subscription** filter in the top menu and choose the directory that contains your Azure AD B2C tenant.
49
27
1. Choose **All services** in the top-left corner of the Azure portal, and then search for and select **Azure AD B2C**.
50
28
1. Select **Identity providers**, and then select **New OpenID Connect provider**.
51
29
1. Enter a **Name**. For example, enter *Contoso Azure AD*.
52
-
1. For **Metadata url**, enter the following URL replacing `your-AD-tenant-domain` with the domain name of your Azure AD tenant:
30
+
1. For **Metadata url**, enter the following URL replacing `{tenant}` with the domain name of your Azure AD tenant:
For example, `https://login.microsoftonline.com/contoso.onmicrosoft.com/.well-known/openid-configuration`.
59
-
60
-
**Do not** use the Azure AD v2.0 metadata endpoint, for example `https://login.microsoftonline.com/contoso.onmicrosoft.com/v2.0/.well-known/openid-configuration`. Doing so results in an error similar to `AADB2C: A claim with id 'UserId' was not found, which is required by ClaimsTransformation 'CreateAlternativeSecurityId' with id 'CreateAlternativeSecurityId' in policy 'B2C_1_SignUpOrIn' of tenant 'contoso.onmicrosoft.com'` when attempting to sign in.
36
+
For example, `https://login.microsoftonline.com/contoso.onmicrosoft.com/v2.0/.well-known/openid-configuration`.
61
37
62
38
1. For **Client ID**, enter the application ID that you previously recorded.
63
39
1. For **Client secret**, enter the client secret that you previously recorded.
64
-
1. Leave the default values for **Scope**, **Response type**, and **Response mode**.
65
-
1. (Optional) Enter a value for **Domain_hint**. For example, *ContosoAD*. This is the value to use when referring to this identity provider using *domain_hint* in the request.
66
-
1. Under **Identity provider claims mapping**, enter the following claims mapping values:
40
+
1. For the **Scope**, enter the `openid profile`.
41
+
1. Leave the default values for **Response type**, and **Response mode**.
42
+
1. (Optional) For the **Domain hint**, enter `contoso.com`. For more information, see [Set up direct sign-in using Azure Active Directory B2C](direct-signin.md#redirect-sign-in-to-a-social-provider).
43
+
1. Under **Identity provider claims mapping**, select the following claims:
0 commit comments