You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory-b2c/identity-provider-azure-ad-single-tenant.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -76,7 +76,7 @@ If you want to get the `family_name` and `given_name` claims from Azure AD, you
76
76
1. Select **Add optional claim**.
77
77
1. For the **Token type**, select **ID**.
78
78
1. Select the optional claims to add, `family_name` and `given_name`.
79
-
1. Click **Add**.
79
+
1. Select **Add**. If **Turn on the Microsoft Graph email permission (required for claims to appear in token)** appears, enable it, and then select **Add** again.
80
80
81
81
## [Optional] Verify your app authenticity
82
82
@@ -97,8 +97,7 @@ If you want to get the `family_name` and `given_name` claims from Azure AD, you
For example, `https://login.microsoftonline.com/contoso.onmicrosoft.com/v2.0/.well-known/openid-configuration`.
101
-
For example, `https://login.microsoftonline.com/contoso.com/v2.0/.well-known/openid-configuration`.
100
+
For example, `https://login.microsoftonline.com/contoso.onmicrosoft.com/v2.0/.well-known/openid-configuration`. If you use a custom domain, replace `contoso.com` with your custom domain in `https://login.microsoftonline.com/contoso.com/v2.0/.well-known/openid-configuration`.
102
101
103
102
1. For **Client ID**, enter the application ID that you previously recorded.
104
103
1. For **Client secret**, enter the client secret that you previously recorded.
@@ -121,7 +120,8 @@ At this point, the Azure AD identity provider has been set up, but it's not yet
121
120
122
121
1. In your Azure AD B2C tenant, select **User flows**.
123
122
1. Click the user flow that you want to add the Azure AD identity provider.
124
-
1. Under the **Social identity providers**, select **Contoso Azure AD**.
123
+
1. Under **Settings**, select **Identity providers**
124
+
1. Under **Custom identity providers**, select **Contoso Azure AD**.
125
125
1. Select **Save**.
126
126
1. To test your policy, select **Run user flow**.
127
127
1. For **Application**, select a web application that you [previously registered](tutorial-register-applications.md). The **Reply URL** should show `https://jwt.ms`.
0 commit comments