You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory-b2c/identity-provider-adfs.md
+9-7Lines changed: 9 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -40,8 +40,8 @@ To create an Application Group, follow theses steps:
40
40
1. Select **Next**.
41
41
1. On the Application Group Wizard **Native Application** screen:
42
42
1. Copy the **Client Identifier** value. The client identifier is your AD FS **Application ID**. You will need the application ID later in this article.
43
-
1. In **Redirect URI**, enter `https://your-tenant-name.b2clogin.com/your-tenant-name.onmicrosoft.com/oauth2/authresp`. If you use a [custom domain](custom-domain.md), enter `https://your-domain-name/your-tenant-name.onmicrosoft.com/oauth2/authresp`. Replace `your-tenant-name` with the name of your tenant, and `your-domain-name` with your custom domain.
44
-
1. Select **Next**, and then **Next** to complete the app registration wizard.
43
+
1. In **Redirect URI**, enter `https://your-tenant-name.b2clogin.com/your-tenant-name.onmicrosoft.com/oauth2/authresp`, and then **Add**. If you use a [custom domain](custom-domain.md), enter `https://your-domain-name/your-tenant-name.onmicrosoft.com/oauth2/authresp`. Replace `your-tenant-name` with the name of your tenant, and `your-domain-name` with your custom domain.
44
+
1. Select **Next**, and then **Next**, and then **Next** again to complete the app registration wizard.
45
45
1. Select **Close**.
46
46
47
47
@@ -53,8 +53,8 @@ In this step, configure the claims AD FS application returns to Azure AD B2C.
53
53
1. In the application properties window, under the **Applications**, select the **Web Application**. Then select **Edit**.
54
54
:::image type="content" source="./media/identity-provider-adfs/ad-fs-edit-app.png" alt-text="Screenshot that shows how to edit a web application.":::
55
55
1. Select the **Issuance Transformation Rules** tab. Then select **Add Rule**.
56
-
1. In **Claim rule template**, select **Send LDAP attributes as claims**.
57
-
1. Provide a **Claim rule name**. For the **Attribute store**, select **Select Active Directory**, add the following claims.
56
+
1. In **Claim rule template**, select **Send LDAP attributes as claims**, and then **Next**.
57
+
1. Provide a **Claim rule name**. For the **Attribute store**, select **Active Directory**, add the following claims.
58
58
59
59
| LDAP attribute | Outgoing claim type |
60
60
| -------------- | ------------------- |
@@ -63,9 +63,11 @@ In this step, configure the claims AD FS application returns to Azure AD B2C.
63
63
| Given-Name | given_name |
64
64
| Display-Name | name |
65
65
66
-
Note some of the names will not display in the outgoing claim type dropdown. You need to manually type them in. (The dropdown is editable).
66
+
Note some of the names will not display in the outgoing claim type dropdown. You need to manually type them in (the dropdown is editable).
67
67
68
-
1. Select **Finish**, then select **Close**.
68
+
1. Select **Finish**.
69
+
1. Select **Apply**, and then **OK**.
70
+
1. Select **OK** again to finish.
69
71
70
72
71
73
::: zone pivot="b2c-user-flow"
@@ -86,7 +88,7 @@ In this step, configure the claims AD FS application returns to Azure AD B2C.
86
88
87
89
1. For **Client ID**, enter the application ID that you previously recorded.
88
90
1. For the **Scope**, enter the `openid`.
89
-
1. For **Response type**, select **id_token**.
91
+
1. For **Response type**, select **id_token**, which makes the **Client secret** optional. Learn more about use of [Client ID and secret](identity-provider-generic-openid-connect.md#client-id-and-secret) when adding a generic OpenID Connect identity provider.
90
92
1. (Optional) For the **Domain hint**, enter `contoso.com`. For more information, see [Set up direct sign-in using Azure Active Directory B2C](direct-signin.md#redirect-sign-in-to-a-social-provider).
91
93
1. Under **Identity provider claims mapping**, select the following claims:
0 commit comments