You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory-b2c/identity-provider-azure-ad-single-tenant.md
+21-21Lines changed: 21 additions & 21 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -9,7 +9,7 @@ manager: CelesteDG
9
9
ms.service: active-directory
10
10
ms.workload: identity
11
11
ms.topic: how-to
12
-
ms.date: 10/11/2022
12
+
ms.date: 02/07/2023
13
13
ms.author: godonnell
14
14
ms.subservice: B2C
15
15
ms.custom: fasttrack-edit, project-no-code
@@ -67,26 +67,6 @@ To enable sign-in for users with an Azure AD account from a specific Azure AD or
67
67
1. Select **Certificates & secrets**, and then select **New client secret**.
68
68
1. Enter a **Description** for the secret, select an expiration, and then select **Add**. Record the **Value** of the secret for use in a later step.
69
69
70
-
### Configuring optional claims
71
-
72
-
If you want to get the `family_name` and `given_name` claims from Azure AD, you can configure optional claims for your application in the Azure portal UI or application manifest. For more information, see [How to provide optional claims to your Azure AD app](../active-directory/develop/active-directory-optional-claims.md).
73
-
74
-
1. Sign in to the [Azure portal](https://portal.azure.com) using your organizational Azure AD tenant. Or if you're already signed in, make sure you're using the directory that contains your organizational Azure AD tenant (for example, Contoso):
75
-
1. Select the **Directories + subscriptions** icon in the portal toolbar.
76
-
2. On the **Portal settings | Directories + subscriptions** page, find your Azure AD directory in the **Directory name** list, and then select **Switch**.
77
-
1. In the Azure portal, search for and select **Azure Active Directory**.
78
-
1. In the left menu, under **Manage**, select **App registrations**.
79
-
1. Select the application you want to configure optional claims for in the list, such as `Azure AD B2C App`.
80
-
1. From the **Manage** section, select **Token configuration**.
81
-
1. Select **Add optional claim**.
82
-
1. For the **Token type**, select **ID**.
83
-
1. Select the optional claims to add, `family_name` and `given_name`.
84
-
1. Select **Add**. If **Turn on the Microsoft Graph profile permission (required for claims to appear in token)** appears, enable it, and then select **Add** again.
85
-
86
-
## [Optional] Verify your app authenticity
87
-
88
-
[Publisher verification](../active-directory/develop/publisher-verification-overview.md) helps your users understand the authenticity of the app you [registered](#register-an-azure-ad-app). A verified app means that the publisher of the app has [verified](/partner-center/verification-responses) their identity using their Microsoft Partner Network (MPN). Learn how to [mark your app as publisher verified](../active-directory/develop/mark-app-as-publisher-verified.md).
89
-
90
70
::: zone pivot="b2c-user-flow"
91
71
92
72
## Configure Azure AD as an identity provider
@@ -254,6 +234,26 @@ If the sign-in process is successful, your browser is redirected to `https://jwt
254
234
255
235
::: zone-end
256
236
237
+
### [Optional] Configuring optional claims
238
+
239
+
If you want to get the `family_name` and `given_name` claims from Azure AD, you can configure optional claims for your application in the Azure portal UI or application manifest. For more information, see [How to provide optional claims to your Azure AD app](../active-directory/develop/active-directory-optional-claims.md).
240
+
241
+
1. Sign in to the [Azure portal](https://portal.azure.com) using your organizational Azure AD tenant. Or if you're already signed in, make sure you're using the directory that contains your organizational Azure AD tenant (for example, Contoso):
242
+
1. Select the **Directories + subscriptions** icon in the portal toolbar.
243
+
2. On the **Portal settings | Directories + subscriptions** page, find your Azure AD directory in the **Directory name** list, and then select **Switch**.
244
+
1. In the Azure portal, search for and select **Azure Active Directory**.
245
+
1. In the left menu, under **Manage**, select **App registrations**.
246
+
1. Select the application you want to configure optional claims for in the list, such as `Azure AD B2C App`.
247
+
1. From the **Manage** section, select **Token configuration**.
248
+
1. Select **Add optional claim**.
249
+
1. For the **Token type**, select **ID**.
250
+
1. Select the optional claims to add, `family_name` and `given_name`.
251
+
1. Select **Add**. If **Turn on the Microsoft Graph profile permission (required for claims to appear in token)** appears, enable it, and then select **Add** again.
252
+
253
+
## [Optional] Verify your app authenticity
254
+
255
+
[Publisher verification](../active-directory/develop/publisher-verification-overview.md) helps your users understand the authenticity of the app you [registered](#register-an-azure-ad-app). A verified app means that the publisher of the app has [verified](/partner-center/verification-responses) their identity using their Microsoft Partner Network (MPN). Learn how to [mark your app as publisher verified](../active-directory/develop/mark-app-as-publisher-verified.md).
256
+
257
257
## Next steps
258
258
259
259
Learn how to [pass the Azure AD token to your application](idp-pass-through-user-flow.md).
0 commit comments