Skip to content

Commit e39b359

Browse files
authored
Merge pull request #188748 from yoelhor/patch-240
Links to live demo
2 parents 28e8a56 + 1fce537 commit e39b359

File tree

2 files changed

+17
-3
lines changed

2 files changed

+17
-3
lines changed

articles/active-directory-b2c/claim-resolver-overview.md

Lines changed: 14 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: CelesteDG
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: reference
12-
ms.date: 1/11/2022
12+
ms.date: 02/16/2022
1313
ms.author: kengaderdus
1414
ms.subservice: B2C
1515
---
@@ -47,6 +47,8 @@ The following table lists the claim resolvers with information about the languag
4747
| {Culture:RegionName} | The two letter ISO code for the region. | US |
4848
| {Culture:RFC5646} | The RFC5646 language code. | en-US |
4949

50+
Check out the [Live demo](https://github.com/azure-ad-b2c/unit-tests/tree/main/claims-resolver#culture) of the culture claim resolvers.
51+
5052
## Policy
5153

5254
The following table lists the claim resolvers with information about the policy used in the authorization request:
@@ -58,6 +60,7 @@ The following table lists the claim resolvers with information about the policy
5860
| {Policy:TenantObjectId} | The tenant object ID of the relying party policy. | 00000000-0000-0000-0000-000000000000 |
5961
| {Policy:TrustFrameworkTenantId} | The tenant ID of the trust framework. | your-tenant.onmicrosoft.com |
6062

63+
Check out the [Live demo](https://github.com/azure-ad-b2c/unit-tests/tree/main/claims-resolver#policy) of the policy claim resolvers.
6164

6265
## Context
6366

@@ -73,6 +76,8 @@ The following table lists the contextual claim resolvers of the authorization re
7376
| {Context:IPAddress} | The user IP address. | 11.111.111.11 |
7477
| {Context:KMSI} | Indicates whether [Keep me signed in](session-behavior.md?pivots=b2c-custom-policy#enable-keep-me-signed-in-kmsi) checkbox is selected. | true |
7578

79+
Check out the [Live demo](https://github.com/azure-ad-b2c/unit-tests/tree/main/claims-resolver#context) of the context claim resolvers.
80+
7681
## Claims
7782

7883
This section describes how to get a claim value as a claim resolver.
@@ -100,6 +105,8 @@ The following table lists the claim resolvers with information about the OpenID
100105
| {OIDC:Scope} |The `scope` query string parameter. | openid |
101106
| {OIDC:Username}| The [resource owner password credentials flow](add-ropc-policy.md) user's username.| [email protected]|
102107

108+
Check out the [Live demo](https://github.com/azure-ad-b2c/unit-tests/tree/main/claims-resolver#openid-connect-relying-party-application) of the OpenID Connect claim resolvers.
109+
103110
## OAuth2 key-value parameters
104111

105112
Any parameter name included as part of an OIDC or OAuth2 request can be mapped to a claim in the user journey. For example, the request from the application might include a query string parameter with a name of `app_session`, `loyalty_number`, or any custom query string.
@@ -127,6 +134,8 @@ The following table lists the claim resolvers with information about the SAML a
127134
| {SAML:Subject} | The `Subject` from the NameId element of the SAML AuthN request.|
128135
| {SAML:Binding} | The `ProtocolBinding` attribute value, from the `AuthnRequest` element of the SAML request. | urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST |
129136

137+
Check out the [Live demo](https://github.com/azure-ad-b2c/unit-tests/tree/main/claims-resolver#saml-service-provider) of the SAML claim resolvers.
138+
130139
## OAuth2 identity provider
131140

132141
The following table lists the [OAuth2 identity provider](oauth2-technical-profile.md) claim resolvers:
@@ -157,7 +166,6 @@ To use the OAuth2 identity provider claim resolvers, set the output claim's `Par
157166
</ClaimsProvider>
158167
```
159168

160-
161169
## Using claim resolvers
162170

163171
You can use claims resolvers with the following elements:
@@ -287,3 +295,7 @@ In a [Relying party](relyingparty.md) policy technical profile, you may want to
287295
</TechnicalProfile>
288296
</RelyingParty>
289297
```
298+
299+
## Next steps
300+
301+
- Find more [claims resolvers samples](https://github.com/azure-ad-b2c/unit-tests/tree/main/claims-resolver) on the Azure AD B2C community GitHub repo

articles/active-directory-b2c/claimsschema.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ manager: CelesteDG
88
ms.service: active-directory
99
ms.workload: identity
1010
ms.topic: reference
11-
ms.date: 03/05/2020
11+
ms.date: 02/16/2022
1212
ms.author: kengaderdus
1313
ms.subservice: B2C
1414
ms.custom: "b2c-support"
@@ -238,6 +238,8 @@ The Identity Experience Framework renders the email address claim with email for
238238

239239
Azure AD B2C supports a variety of user input types, such as a textbox, password, and dropdown list that can be used when manually entering claim data for the claim type. You must specify the **UserInputType** when you collect information from the user by using a [self-asserted technical profile](self-asserted-technical-profile.md) and [display controls](display-controls.md).
240240

241+
Check out the [Live demo](https://github.com/azure-ad-b2c/unit-tests/tree/main/claims#user-input-types) of the user input type.
242+
241243
The **UserInputType** element available user input types:
242244

243245
| UserInputType | Supported ClaimType | Description |

0 commit comments

Comments
 (0)