Skip to content

Commit df66b8d

Browse files
authored
Merge pull request #191284 from yoelhor/patch-250
Link to live demo
2 parents 842955f + 7570914 commit df66b8d

File tree

5 files changed

+22
-13
lines changed

5 files changed

+22
-13
lines changed

articles/active-directory-b2c/identity-provider-azure-ad-multi-tenant.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: CelesteDG
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: how-to
12-
ms.date: 02/25/2022
12+
ms.date: 03/10/2022
1313
ms.custom: project-no-code
1414
ms.author: kengaderdus
1515
ms.subservice: B2C
@@ -205,6 +205,7 @@ If the sign-in process is successful, your browser is redirected to `https://jwt
205205

206206
## Next steps
207207

208-
Learn how to [pass the Azure AD token to your application](idp-pass-through-user-flow.md).
208+
- Learn how to [pass the Azure AD token to your application](idp-pass-through-user-flow.md).
209+
- Check out the Azure AD multi-tenant federation [Live demo](https://github.com/azure-ad-b2c/unit-tests/tree/main/Identity-providers#azure-active-directory), and how to pass Azure AD access token [Live demo](https://github.com/azure-ad-b2c/unit-tests/tree/main/Identity-providers#azure-active-directory-with-access-token)
209210

210211
::: zone-end

articles/active-directory-b2c/identity-provider-facebook.md

Lines changed: 5 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: CelesteDG
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: how-to
12-
ms.date: 09/16/2021
12+
ms.date: 03/10/2022
1313
ms.custom: project-no-code
1414
ms.author: kengaderdus
1515
ms.subservice: B2C
@@ -130,8 +130,9 @@ Update the relying party (RP) file that initiates the user journey that you crea
130130

131131
If the sign-in process is successful, your browser is redirected to `https://jwt.ms`, which displays the contents of the token returned by Azure AD B2C.
132132

133-
::: zone-end
134-
135133
## Next steps
136134

137-
Learn how to [pass Facebook token to your application](idp-pass-through-user-flow.md).
135+
- Learn how to [pass Facebook token to your application](idp-pass-through-user-flow.md).
136+
- Check out the Facebook federation [Live demo](https://github.com/azure-ad-b2c/unit-tests/tree/main/Identity-providers#facebook), and how to pass Facebook access token [Live demo](https://github.com/azure-ad-b2c/unit-tests/tree/main/Identity-providers#facebook-with-access-token)
137+
138+
::: zone-end

articles/active-directory-b2c/identity-provider-github.md

Lines changed: 6 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: CelesteDG
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: how-to
12-
ms.date: 09/16/2021
12+
ms.date: 03/10/2022
1313
ms.custom: project-no-code
1414
ms.author: kengaderdus
1515
ms.subservice: B2C
@@ -218,4 +218,9 @@ The GitHub technical profile requires the **CreateIssuerUserId** claim transform
218218

219219
If the sign-in process is successful, your browser is redirected to `https://jwt.ms`, which displays the contents of the token returned by Azure AD B2C.
220220

221+
## Next steps
222+
223+
- Learn how to [pass GitHub token to your application](idp-pass-through-user-flow.md).
224+
- Check out the GitHub federation [Live demo](https://github.com/azure-ad-b2c/unit-tests/tree/main/Identity-providers#github), and how to pass GitHub access token [Live demo](https://github.com/azure-ad-b2c/unit-tests/tree/main/Identity-providers#github-with-access-token)
225+
221226
::: zone-end

articles/active-directory-b2c/identity-provider-google.md

Lines changed: 6 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: CelesteDG
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: how-to
12-
ms.date: 09/16/2021
12+
ms.date: 03/10/2022
1313
ms.custom: project-no-code
1414
ms.author: kengaderdus
1515
ms.subservice: B2C
@@ -189,8 +189,10 @@ You can define a Google account as a claims provider by adding it to the **Claim
189189

190190
If the sign-in process is successful, your browser is redirected to `https://jwt.ms`, which displays the contents of the token returned by Azure AD B2C.
191191

192-
::: zone-end
193-
194192
## Next steps
195193

196-
Learn how to [pass a Google token to your application](idp-pass-through-user-flow.md).
194+
- Learn how to [pass Google token to your application](idp-pass-through-user-flow.md).
195+
- Check out the Google federation [Live demo](https://github.com/azure-ad-b2c/unit-tests/tree/main/Identity-providers#google), and how to pass Google access token [Live demo](https://github.com/azure-ad-b2c/unit-tests/tree/main/Identity-providers#google-with-access-token)
196+
197+
198+
::: zone-end

articles/active-directory-b2c/idp-pass-through-user-flow.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: CelesteDG
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: how-to
12-
ms.date: 09/16/2021
12+
ms.date: 03/10/2022
1313
ms.custom: project-no-code
1414
ms.author: kengaderdus
1515
ms.subservice: B2C
@@ -30,7 +30,7 @@ Azure AD B2C supports passing the access token of [OAuth 2.0](add-identity-provi
3030

3131
::: zone pivot="b2c-custom-policy"
3232

33-
Azure AD B2C supports passing the access token of [OAuth 2.0](authorization-code-flow.md) and [OpenID Connect](openid-connect.md) identity providers. For all other identity providers, the claim is returned blank.
33+
Azure AD B2C supports passing the access token of [OAuth 2.0](authorization-code-flow.md) and [OpenID Connect](openid-connect.md) identity providers. For all other identity providers, the claim is returned blank. For more details, check out the identity providers federation [Live demo](https://github.com/azure-ad-b2c/unit-tests/tree/main/Identity-providers).
3434

3535
::: zone-end
3636

0 commit comments

Comments
 (0)