Skip to content

Commit e4026b0

Browse files
2 parents 7551c06 + 26a6c06 commit e4026b0

File tree

3,277 files changed

+48753
-45669
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

3,277 files changed

+48753
-45669
lines changed

.openpublishing.redirection.json

Lines changed: 551 additions & 41 deletions
Large diffs are not rendered by default.

articles/active-directory-b2c/active-directory-b2c-configure-signup-self-asserted-custom.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -16,20 +16,20 @@ ms.subservice: B2C
1616

1717
[!INCLUDE [active-directory-b2c-advanced-audience-warning](../../includes/active-directory-b2c-advanced-audience-warning.md)]
1818

19-
In this article, you add a new user provided entry (a claim) to your sign-up user journey in Azure Active Directory (Azure AD) B2C. You configure the entry as a dropdown, and define whether it's required.
19+
In this article, you add a new user provided entry (a claim) to your sign-up user journey in Azure Active Directory (Azure AD) B2C. You configure the entry as a dropdown and define whether it's required.
2020

2121
## Prerequisites
2222

2323
Complete the steps in the article [Getting Started with Custom Policies](active-directory-b2c-get-started-custom.md). Test the sign-up or sign-in user journey to sign up a new local account before proceeding.
2424

2525
## Add claims
2626

27-
Gathering initial data from your users is achieved using the sign-up or sign-in user journey. Additional claims can be gathered later by using a profile edit user journey. Anytime Azure AD B2C gathers information directly from the user interactively, the Identity Experience Framework uses its selfasserted provider.
27+
Gathering initial data from your users is achieved using the sign-up or sign-in user journey. Additional claims can be gathered later by using a profile edit user journey. Anytime Azure AD B2C gathers information directly from the user interactively, the Identity Experience Framework uses its self-asserted provider.
2828

2929

3030
### Define the claim
3131

32-
Lets ask the user for their city. Add the following element to the **ClaimsSchema** element in the TrustFrameworkBase policy file:
32+
Let's ask the user for their city. Add the following element to the **ClaimsSchema** element in the TrustFrameworkBase policy file:
3333

3434
```xml
3535
<ClaimType Id="city">

articles/active-directory-b2c/active-directory-b2c-custom-setup-adfs2016-idp.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -31,7 +31,7 @@ You need to store your certificate in your Azure AD B2C tenant.
3131
1. Sign in to the [Azure portal](https://portal.azure.com/).
3232
2. Make sure you're using the directory that contains your Azure AD B2C tenant. Select the **Directory and subscription filter** in the top menu and choose the directory that contains your tenant.
3333
3. Choose **All services** in the top-left corner of the Azure portal, and then search for and select **Azure AD B2C**.
34-
4. On the Overview page, select **Identity Experience Framework - PREVIEW**.
34+
4. On the Overview page, select **Identity Experience Framework**.
3535
5. Select **Policy Keys** and then select **Add**.
3636
6. For **Options**, choose `Upload`.
3737
7. Enter a **Name** for the policy key. For example, `SamlCert`. The prefix `B2C_1A_` is added automatically to the name of your key.

articles/active-directory-b2c/active-directory-b2c-get-started-custom.md

Lines changed: 11 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ manager: celestedg
88
ms.service: active-directory
99
ms.workload: identity
1010
ms.topic: conceptual
11-
ms.date: 04/03/2019
11+
ms.date: 05/16/2019
1212
ms.author: davidmu
1313
ms.subservice: B2C
1414
---
@@ -27,9 +27,9 @@ ms.subservice: B2C
2727
## Add signing and encryption keys
2828

2929
1. Sign in to the [Azure portal](https://portal.azure.com/) as the global administrator of your Azure AD B2C tenant.
30-
2. Make sure you're using the directory that contains your Azure AD B2C tenant. Click the **Directory and subscription filter** in the top menu and choosing the directory that contains your tenant.
30+
2. Make sure you're using the directory that contains your Azure AD B2C tenant. Click the **Directory and subscription filter** in the top menu and choose the directory that contains your tenant.
3131
3. Choose **All services** in the top-left corner of the Azure portal, search for and select **Azure AD B2C**.
32-
4. On the Overview page, select **Identity Experience Framework - PREVIEW**.
32+
4. On the Overview page, select **Identity Experience Framework**.
3333

3434
### Create the signing key
3535

@@ -66,17 +66,17 @@ Azure AD B2C requires you to register two applications that are used to sign up
6666

6767
### Register the IdentityExperienceFramework application
6868

69-
1. Choose **All services** in the top-left corner of the Azure portal, search for and select **App registrations**.
70-
2. Select **New application registration**.
71-
3. For **Name**, enter `IdentityExperienceFramework`.
72-
4. For **Application type**, choose **Web app/API**.
73-
5. For **Sign-on URL**, enter `https://your-tenant-name.b2clogin.com/your-tenant-name.onmicrosoft.com`, where `your-tenant-name` is your Azure AD B2C tenant domain name.
74-
6. Click **Create**.
75-
7. After it's created, copy the application ID and save it to use later.
69+
1. Choose **All services** in the top-left corner of the Azure portal, search for and select **Azure Active Directory**.
70+
2. In the menu, select **App registrations (Legacy)**.
71+
3. Select **New application registration**.
72+
4. For **Name**, enter `IdentityExperienceFramework`.
73+
5. For **Application type**, choose **Web app/API**.
74+
6. For **Sign-on URL**, enter `https://your-tenant-name.b2clogin.com/your-tenant-name.onmicrosoft.com`, where `your-tenant-name` is your Azure AD B2C tenant domain name. All URLs should now be using [b2clogin.com](b2clogin.md).
75+
7. Click **Create**. After it's created, copy the application ID and save it to use later.
7676

7777
### Register the ProxyIdentityExperienceFramework application
7878

79-
1. Select **App registrations**, and then select **New application registration**.
79+
1. In **App registrations (Legacy)**, select **New application registration**.
8080
2. For **Name**, enter `ProxyIdentityExperienceFramework`.
8181
3. For **Application type**, choose **Native**.
8282
4. For **Redirect URI**, enter `https://your-tenant-name.b2clogin.com/your-tenant-name.onmicrosoft.com`, where `yourtenant` is your Azure AD B2C tenant.

articles/active-directory-b2c/active-directory-b2c-reference-custom-attr.md

Lines changed: 8 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,11 @@ ms.subservice: B2C
1717

1818
Every customer-facing application has unique requirements for the information that needs to be collected. Your Azure Active Directory (Azure AD) B2C tenant comes with a built-in set of information stored in attributes, such as Given Name, Surname, City, and Postal Code. With Azure AD B2C, you can extend the set of attributes stored on each customer account.
1919

20-
You can create custom attributes in the [Azure portal](https://portal.azure.com/) and use them in your sign-up user flows, sign-up or sign-in user flows, or profile editing user flows. You can also read and write these attributes by using the [Azure AD Graph API](active-directory-b2c-devquickstarts-graph-dotnet.md). Custom attributes in Azure AD B2C use [Azure AD Graph API Directory Schema Extensions](/previous-versions/azure/ad/graph/howto/azure-ad-graph-api-directory-schema-extensions).
20+
You can create custom attributes in the [Azure portal](https://portal.azure.com/) and use them in your sign-up user flows, sign-up or sign-in user flows, or profile editing user flows. You can also read and write these attributes by using the [Azure AD Graph API](active-directory-b2c-devquickstarts-graph-dotnet.md). Custom attributes in Azure AD B2C use [Azure AD Graph API Directory Schema Extensions](/previous-versions/azure/ad/graph/howto/azure-ad-graph-api-directory-schema-extensions).
21+
22+
> [!NOTE]
23+
> Support for newer [Microsoft Graph API](https://docs.microsoft.com/graph/overview?view=graph-rest-1.0) for querying Azure AD B2C tenant is still under development.
24+
>
2125
2226
## Create a custom attribute
2327

@@ -37,7 +41,8 @@ ms.subservice: B2C
3741
7. Optionally, enter a **Description** for informational purposes.
3842
8. Click **Create**.
3943

40-
The custom attribute is now available in the list of **User attributes** and for use in your user flows. A custom attribute is only created the first time it is used in any user flow, and not when you add it to the list of **User attributes**.
44+
The custom attribute is now available in the list of **User attributes** and for use in your user flows. A custom attribute is only created the first time it is used in any user flow, and not when you add it to the list of **User attributes**.
45+
4146

4247
## Use a custom attribute in your user flow
4348

@@ -47,5 +52,5 @@ The custom attribute is now available in the list of **User attributes** and for
4752
5. Select **Application claims** and then select the custom attribute.
4853
6. Click **Save**.
4954

50-
You can use the **Run user flow** feature on the user flow to verify the customer experience. You should now see **ShoeSize** in the list of attributes collected during the sign-up journey, and see it in the token sent back to your application.
55+
Once you have created a new user using a user flow which uses the newly created custom attribute, the object can be queried in [Azure AD Graph Explorer](https://docs.microsoft.com/azure/active-directory/develop/active-directory-graph-api-quickstart). Alternatively you can use the [**Run user flow**](https://docs.microsoft.com/azure/active-directory-b2c/tutorial-create-user-flows) feature on the user flow to verify the customer experience. You should now see **ShoeSize** in the list of attributes collected during the sign-up journey, and see it in the token sent back to your application.
5156

0 commit comments

Comments
 (0)