Skip to content

Commit da5644d

Browse files
committed
@msmimart feadback
1 parent be14d35 commit da5644d

7 files changed

+19
-19
lines changed

articles/active-directory-b2c/configure-tokens-custom-policy.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: celestedg
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: conceptual
12-
ms.date: 05/04/2020
12+
ms.date: 05/07/2020
1313
ms.author: mimart
1414
ms.subservice: B2C
1515
---
@@ -87,5 +87,5 @@ The following values are set in the previous example:
8787
## Next steps
8888

8989
- Learn more about [Azure AD B2C session](session-overview.md).
90-
- Learn how to [configure session behavior in custom policy](session-behavior-custom-policy.md).
90+
- Learn how to [configure session behavior in custom policies](session-behavior-custom-policy.md).
9191
- Reference: [JwtIssuer](jwt-issuer-technical-profile.md).

articles/active-directory-b2c/configure-tokens.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ manager: celestedg
88
ms.service: active-directory
99
ms.workload: identity
1010
ms.topic: conceptual
11-
ms.date: 05/04/2020
11+
ms.date: 05/07/2020
1212
ms.author: mimart
1313
ms.subservice: B2C
1414
---

articles/active-directory-b2c/custom-policy-reference-sso.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: celestedg
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: reference
12-
ms.date: 05/04/2020
12+
ms.date: 05/07/2020
1313
ms.author: mimart
1414
ms.subservice: B2C
1515
---
@@ -18,7 +18,7 @@ ms.subservice: B2C
1818

1919
[!INCLUDE [active-directory-b2c-advanced-audience-warning](../../includes/active-directory-b2c-advanced-audience-warning.md)]
2020

21-
The [Single sign-on (SSO) session](session-overview.md) management uses the same semantics as any other technical profile in custom policies. When an orchestration step is executed, the technical profile associated with the step is queried for a `UseTechnicalProfileForSessionManagement` reference. If one exists, the referenced SSO session provider is then checked to see if the user is a session participant. If so, the SSO session provider is used to repopulate the session. Similarly, when the execution of an orchestration step is complete, the provider is used to store information in the session if an SSO session provider has been specified.
21+
[Single sign-on (SSO) session](session-overview.md) management uses the same semantics as any other technical profile in custom policies. When an orchestration step is executed, the technical profile associated with the step is queried for a `UseTechnicalProfileForSessionManagement` reference. If one exists, the referenced SSO session provider is then checked to see if the user is a session participant. If so, the SSO session provider is used to repopulate the session. Similarly, when the execution of an orchestration step is complete, the provider is used to store information in the session if an SSO session provider has been specified.
2222

2323
Azure AD B2C has defined a number of SSO session providers that can be used:
2424

@@ -168,4 +168,4 @@ The following `SM-Saml-issuer` technical profile is used by [SAML issuer technic
168168
## Next steps
169169

170170
- Learn more about [Azure AD B2C session](session-overview.md).
171-
- Learn how to [configure session behavior in custom policy](session-behavior-custom-policy.md).
171+
- Learn how to [configure session behavior in custom policies](session-behavior-custom-policy.md).

articles/active-directory-b2c/jwt-issuer-technical-profile.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: celestedg
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: reference
12-
ms.date: 04/28/2020
12+
ms.date: 05/07/2020
1313
ms.author: mimart
1414
ms.subservice: B2C
1515
---

articles/active-directory-b2c/session-behavior-custom-policy.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ manager: celestedg
88
ms.service: active-directory
99
ms.workload: identity
1010
ms.topic: conceptual
11-
ms.date: 05/04/2020
11+
ms.date: 05/07/2020
1212
ms.author: mimart
1313
ms.subservice: B2C
1414
---
@@ -30,7 +30,7 @@ You can use the following properties to manage web application sessions:
3030

3131
## Configure the properties
3232

33-
To change your session behavior and SSO configurations, you add a **UserJourneyBehaviors** element inside of the [RelyingParty](relyingparty.md) element. The **UserJourneyBehaviors** element must immediately follow the **DefaultUserJourney**. The inside of your **UserJourneyBehavors** element should look like this example:
33+
To change your session behavior and SSO configurations, you add a **UserJourneyBehaviors** element inside of the [RelyingParty](relyingparty.md) element. The **UserJourneyBehaviors** element must immediately follow the **DefaultUserJourney**. Your **UserJourneyBehavors** element should look like this example:
3434

3535
```XML
3636
<UserJourneyBehaviors>
@@ -47,18 +47,18 @@ To change your session behavior and SSO configurations, you add a **UserJourneyB
4747
When you redirect the user to the Azure AD B2C sign-out endpoint (for both OAuth2 and SAML protocols), Azure AD B2C clears the user's session from the browser. To allow [Single sign-out](session-overview.md#single-sign-out), set the `LogoutUrl` of the application from the Azure portal:
4848

4949
1. Navigate to the [Azure portal](https://portal.azure.com).
50-
1. Choose your Active B2C directory by clicking your account in the top right corner of the page.
51-
1. From the left hand navigation panel, choose **Azure AD B2C**, select **App registrations**, and then select your application.
50+
1. Choose your Azure AD B2C directory by clicking your account in the top right corner of the page.
51+
1. In the left menu, choose **Azure AD B2C**, select **App registrations**, and then select your application.
5252
1. Select **Settings**, select **Properties**, and then find the **Logout URL** text box.
5353

5454
### Configure the token issuer
5555

56-
To support sing-sign out, the token issuer technical profiles, for both JWT and SAML must specify:
56+
To support single sign-out, the token issuer technical profiles for both JWT and SAML must specify:
5757

58-
1. The protocol name, such as `<Protocol Name="OpenIdConnect" />`
59-
1. Reference to the session technical profile, such as `UseTechnicalProfileForSessionManagement ReferenceId="SM-jwt-issuer" />`.
58+
- The protocol name, such as `<Protocol Name="OpenIdConnect" />`
59+
- The reference to the session technical profile, such as `UseTechnicalProfileForSessionManagement ReferenceId="SM-jwt-issuer" />`.
6060

61-
The following example illustrates the JWT and SMAL token issuers with single sign-out:
61+
The following example illustrates the JWT and SAML token issuers with single sign-out:
6262

6363
```xml
6464
<ClaimsProvider>

articles/active-directory-b2c/session-behavior.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ manager: celestedg
88
ms.service: active-directory
99
ms.workload: identity
1010
ms.topic: conceptual
11-
ms.date: 05/04/2020
11+
ms.date: 05/07/2020
1212
ms.author: mimart
1313
ms.subservice: B2C
1414
---

articles/active-directory-b2c/session-overview.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ manager: celestedg
88
ms.service: active-directory
99
ms.workload: identity
1010
ms.topic: conceptual
11-
ms.date: 05/04/2020
11+
ms.date: 05/07/2020
1212
ms.author: mimart
1313
ms.subservice: B2C
1414
---
@@ -101,7 +101,7 @@ The sign-out clears the user's single sign-on state with Azure AD B2C, but it mi
101101

102102

103103
> [!NOTE]
104-
> This feature is limited to [custom policy](custom-policy-overview.md).
104+
> This feature is limited to [custom policies](custom-policy-overview.md).
105105
106106
When you redirect the user to the Azure AD B2C sign-out endpoint (for both OAuth2 and SAML protocols), Azure AD B2C clears the user's session from the browser. However, the user might still be signed in to other applications that use Azure AD B2C for authentication. To enable those applications to sign the user out simultaneously, Azure AD B2C sends an HTTP GET request to the registered `LogoutUrl` of all the applications that the user is currently signed in to.
107107

@@ -111,4 +111,4 @@ Applications must respond to this request by clearing any session that identifie
111111
## Next steps
112112

113113
- Learn how to [configure session behavior in user flow](session-behavior.md).
114-
- Learn how to [configure session behavior in custom policy](session-behavior-custom-policy.md).
114+
- Learn how to [configure session behavior in custom policies](session-behavior-custom-policy.md).

0 commit comments

Comments
 (0)