|
1 | 1 | ---
|
2 |
| -title: Facebook configuration in Azure Active Directory B2C | Microsoft Docs |
3 |
| -description: Provide sign-up and sign-in to consumers with Facebook accounts in your applications that are secured by Azure Active Directory B2C. |
| 2 | +title: Set up sign-up and sign-in with a Facebook account using Azure Active Directory B2C | Microsoft Docs |
| 3 | +description: Provide sign-up and sign-in to customers with Facebook accounts in your applications using Azure Active Directory B2C. |
4 | 4 | services: active-directory-b2c
|
5 | 5 | author: davidmu1
|
6 | 6 | manager: mtillman
|
7 | 7 |
|
8 | 8 | ms.service: active-directory
|
9 | 9 | ms.workload: identity
|
10 | 10 | ms.topic: conceptual
|
11 |
| -ms.date: 8/7/2017 |
| 11 | +ms.date: 07/06/2018 |
12 | 12 | ms.author: davidmu
|
13 | 13 | ms.component: B2C
|
14 | 14 | ---
|
15 | 15 |
|
16 |
| -# Azure Active Directory B2C: Provide sign-up and sign-in to consumers with Facebook accounts |
| 16 | +# Set up sign-up and sign-in with a Facebook account using Azure Active Directory B2C |
| 17 | + |
17 | 18 | ## Create a Facebook application
|
18 |
| -To use Facebook as an identity provider in Azure Active Directory (Azure AD) B2C, you need to create a Facebook application and supply it with the right parameters. You need a Facebook account to do this. If you don’t have one, you can get it at [https://www.facebook.com/](https://www.facebook.com/). |
19 | 19 |
|
20 |
| -1. Go to the [Facebook for developers](https://developers.facebook.com/) website and sign in with your Facebook account credentials. |
21 |
| -2. If you have not already done so, you need to register as a Facebook developer. To do this, click **Register** (on the upper-right corner of the page), accept Facebook's policies, and complete the registration steps. |
22 |
| -3. Click **My Apps** and then click **Add a New App**. |
23 |
| -4. In the form, provide a **Display Name** and a valid **Contact Email**. |
| 20 | +To use a Facebook account as an identity provider in Azure Active Directory (Azure AD) B2C, you need to create an application in your tenant that represents it. If you don’t already have a Facebook account, you can get it at [https://www.facebook.com/](https://www.facebook.com/). |
| 21 | + |
| 22 | +1. Sign in to [Facebook for developers](https://developers.facebook.com/) with your Facebook account credentials. |
| 23 | +2. If you have not already done so, you need to register as a Facebook developer. To do this, select **Register** on the upper-right corner of the page, accept Facebook's policies, and complete the registration steps. |
| 24 | +3. Select **My Apps** and then click **Add New App**. |
| 25 | +4. Enter a **Display Name** and a valid **Contact Email**. |
24 | 26 | 5. Click **Create App ID**. This may require you to accept Facebook platform policies and complete an online security check.
|
25 |
| -6. In the left column, click **Settings** and then select **Basic** if not selected already. |
26 |
| -7. Select a **Category**. |
27 |
| -8. Click **+ Add Platform** and select **Website**. |
28 |
| - |
29 |
| -  |
30 |
| - |
31 |
| -  |
32 |
| -9. Enter `https://login.microsoftonline.com/` in the **Site URL** field and then click **Save Changes** at the bottom of the page. |
33 |
| - |
34 |
| -  |
35 |
| - |
36 |
| -10. Copy the value of **App ID**. Click **Show** and copy the value of **App Secret**. You will need both of them to configure Facebook as an identity provider in your tenant. **App Secret** is an important security credential. |
37 |
| - |
38 |
| -  |
39 |
| -11. Click **+ Add Product** on the left navigation and then the **Set Up** button for **Facebook Login**. |
40 |
| - |
41 |
| -  |
42 |
| -12. Click **Settings** on the right nav under **Facebook Login** |
43 |
| - |
44 |
| -  |
45 |
| -13. Enter `https://login.microsoftonline.com/te/{tenant}/oauth2/authresp` in the **Valid OAuth redirect URIs** field in the **Client OAuth Settings** section. Replace **{tenant}** with your tenant's name (for example, contosob2c.onmicrosoft.com). Click **Save Changes** at the bottom of the page. |
46 |
| - |
47 |
| -  |
48 |
| -14. To make your Facebook application usable by Azure AD B2C, you need to make it publicly available. You can do this by clicking **App Review** on the left navigation and by turning the switch at the top of the page to **YES** and clicking **Confirm**. |
49 |
| - |
50 |
| -  |
51 |
| - |
52 |
| -## Configure Facebook as an identity provider in your tenant |
53 |
| -1. Follow these steps to [navigate to the B2C features blade](active-directory-b2c-app-registration.md#navigate-to-b2c-settings) on the Azure portal. |
54 |
| -2. On the B2C features blade, click **Identity providers**. |
55 |
| -3. Click **+Add** at the top of the blade. |
56 |
| -4. Provide a friendly **Name** for the identity provider configuration. For example, enter "Facebook". |
57 |
| -5. Click **Identity provider type**, select **Facebook**, and click **OK**. |
58 |
| -6. Click **Set up this identity provider** and enter the app ID and app secret (of the Facebook application that you created earlier) in the **Client ID** and **Client secret** fields respectively. |
59 |
| -7. Click **OK**, and then click **Create** to save your Facebook configuration. |
60 |
| - |
61 |
| -> [!NOTE] |
62 |
| -> Adding an **Identity provider** to your tenant does not modify your existing policies. Remember to update your policies by including the identity provider you just created. |
63 |
| -> |
| 27 | +6. Select **Settings** > **Basic**. |
| 28 | +7. At the bottom of the page, select **Add Platform**, and then select **Website**. |
| 29 | +8. Enter `https://login.microsoftonline.com/` in **Site URL**. Enter a URL for the **Privacy Policy URL**, for example `http://www.contoso.com`. |
| 30 | +9. Select **Save Changes**. |
| 31 | +11. At the top of the page, copy the value of **App ID**. |
| 32 | +12. Click **Show** and copy the value of **App Secret**. You use both of them to configure Facebook as an identity provider in your tenant. **App Secret** is an important security credential. |
| 33 | +13. Select **Products**, and then select **Set up** under **Facebook Login**. |
| 34 | +14. Select **Settings** under **Facebook Login**. |
| 35 | +15. Enter `https://login.microsoftonline.com/te/{tenant}/oauth2/authresp` in **Valid OAuth redirect URIs** . Replace **{tenant}** with your tenant's name (for example, contosob2c.onmicrosoft.com). Click **Save Changes** at the bottom of the page. |
| 36 | +16. To make your Facebook application available to Azure AD B2C, select **App Review**, set **Make My Application public?** to **YES**, choose a category, for example `Business and Pages` and then click **Confirm**. |
| 37 | + |
| 38 | +## Configure a Facebook account as an identity provider |
| 39 | + |
| 40 | +1. Sign in to the [Azure portal](https://portal.azure.com/) as the global administrator of your Azure AD B2C tenant. |
| 41 | +2. Make sure you're using the directory that contains your Azure AD B2C tenant by switching to it in the top-right corner of the Azure portal. Select your subscription information, and then select **Switch Directory**. |
| 42 | + |
| 43 | +  |
| 44 | + |
| 45 | + Choose the directory that contains your tenant. |
| 46 | + |
| 47 | +  |
| 48 | + |
| 49 | +3. Choose **All services** in the top-left corner of the Azure portal, search for and select **Azure AD B2C**. |
| 50 | +4. Select **Identity providers**, and then select **Add**. |
| 51 | +5. Enter a **Name**. For example, enter *Facebook*. |
| 52 | +6. Select **Identity provider type**, select **Facebook**, and click **OK**. |
| 53 | +7. Select **Set up this identity provider** and enter the App ID that you recorded earlier as the **Client ID** and enter the App Secret that you recorded as the **Client secret** of the Facebook application that you created earlier). |
| 54 | +8. Click **OK** and then click **Create** to save your Facebook configuration. |
0 commit comments