Skip to content

Commit d89cb9f

Browse files
authored
Merge pull request #178994 from kengaderdus/derdus-patch-1
[Azure AD B2C] Update procedure - Azure AD as a identity provider to B2C app.
2 parents f208d60 + e93313b commit d89cb9f

File tree

1 file changed

+4
-4
lines changed

1 file changed

+4
-4
lines changed

articles/active-directory-b2c/identity-provider-azure-ad-single-tenant.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -76,7 +76,7 @@ If you want to get the `family_name` and `given_name` claims from Azure AD, you
7676
1. Select **Add optional claim**.
7777
1. For the **Token type**, select **ID**.
7878
1. Select the optional claims to add, `family_name` and `given_name`.
79-
1. Click **Add**.
79+
1. Select **Add**. If **Turn on the Microsoft Graph email permission (required for claims to appear in token)** appears, enable it, and then select **Add** again.
8080
8181
## [Optional] Verify your app authenticity
8282
@@ -97,8 +97,7 @@ If you want to get the `family_name` and `given_name` claims from Azure AD, you
9797
https://login.microsoftonline.com/{tenant}/v2.0/.well-known/openid-configuration
9898
```
9999
100-
For example, `https://login.microsoftonline.com/contoso.onmicrosoft.com/v2.0/.well-known/openid-configuration`.
101-
For example, `https://login.microsoftonline.com/contoso.com/v2.0/.well-known/openid-configuration`.
100+
For example, `https://login.microsoftonline.com/contoso.onmicrosoft.com/v2.0/.well-known/openid-configuration`. If you use a custom domain, replace `contoso.com` with your custom domain in `https://login.microsoftonline.com/contoso.com/v2.0/.well-known/openid-configuration`.
102101
103102
1. For **Client ID**, enter the application ID that you previously recorded.
104103
1. For **Client secret**, enter the client secret that you previously recorded.
@@ -121,7 +120,8 @@ At this point, the Azure AD identity provider has been set up, but it's not yet
121120
122121
1. In your Azure AD B2C tenant, select **User flows**.
123122
1. Click the user flow that you want to add the Azure AD identity provider.
124-
1. Under the **Social identity providers**, select **Contoso Azure AD**.
123+
1. Under **Settings**, select **Identity providers**
124+
1. Under **Custom identity providers**, select **Contoso Azure AD**.
125125
1. Select **Save**.
126126
1. To test your policy, select **Run user flow**.
127127
1. For **Application**, select a web application that you [previously registered](tutorial-register-applications.md). The **Reply URL** should show `https://jwt.ms`.

0 commit comments

Comments
 (0)