Skip to content

Commit eb31bc3

Browse files
authored
Update partner-eid-me.md
1 parent a0b19e4 commit eb31bc3

File tree

1 file changed

+9
-9
lines changed

1 file changed

+9
-9
lines changed

articles/active-directory-b2c/partner-eid-me.md

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -46,8 +46,8 @@ See also, [Tutorial: Create user flows and custom policies in Azure AD B2C](./tu
4646

4747
eID-Me integrates with Azure AD B2C as an OpenID Connect (OIDC) identity provider. The following components comprise the eID-Me solution with Azure AD B2C:
4848

49-
* **Azure AD B2C tenant** - configured as a relying party in eID-Me enables eID-Me to trust an Azure AD B2C tenant for sign up and sign in.
50-
* **Azure AD B2C tenant application** - because it's assumed tenants need an Azure AD B2C tenant application.
49+
* **Azure AD B2C tenant** - configured as a relying party in eID-Me enables eID-Me to trust an Azure AD B2C tenant for sign-up and sign-in
50+
* **Azure AD B2C tenant application** - the assumption is tenants need an Azure AD B2C tenant application
5151
* The application receives identity claims received by Azure AD B2C during transaction
5252
* **eID-Me smartphone apps** - Azure AD B2C tenant users need the app for iOS or Android
5353
* **Issued eID-Me digital identities** - from eID-Me identity proofing
@@ -68,7 +68,7 @@ The following diagram illustrates Azure AD B2C integration with eID-Me.
6868

6969
![Diagram of Azure AD B2C integration with eID-Me](./media/partner-eid-me/partner-eid-me-architecture-diagram.png)
7070

71-
1. User opens the Azure AD B2C sign in page and signs in or signs up with a username.
71+
1. User opens the Azure AD B2C sign-in page and signs in or signs up with a username.
7272
2. User forwarded to Azure AD B2C sign-in and sign-up policy.
7373
3. Azure AD B2C redirects the user to the eID-Me identity router using the OIDC authorization code flow.
7474
4. The router sends push notification to the user mobile app with authentication and authorization request details.
@@ -121,7 +121,7 @@ To configure an identity provider:
121121
4. For **Client Secret**, enter the Client Secret from eID-Me.
122122
5. For **Scope**, select **openid email profile**.
123123
6. For **Response type**, select **code**.
124-
7. For **Response mode**, selct **form post**.
124+
7. For **Response mode**, select **form post**.
125125
8. Select **OK**.
126126
9. Select **Map this identity provider’s claims**.
127127
10. For **User ID**, use **sub**.
@@ -137,14 +137,14 @@ eID-Me is a multi-factor authenticator, therefore user-flow multi-factor authent
137137

138138
## Create a user flow policy
139139

140-
For the following instructions eID-Me appears as a new OIDC identity provider in B2C identity providers.
140+
For the following instructions, eID-Me appears as a new OIDC identity provider in B2C identity providers.
141141

142142
1. In the Azure AD B2C tenant, under **Policies**, select **User flows**.
143143
2. Select **New user flow**.
144144
3. Select **Sign up and sign in** > **Version** > **Create**.
145145
4. Enter a policy **Name**.
146146
5. In **Identity providers**, select the created eID-Me identity provider.
147-
6. For **Local Accounts** elect **None**. This actions disables email and password authentication.
147+
6. For **Local Accounts**, select **None**. The selection disables email and password authentication.
148148
7. Select **Run user flow**.
149149
8. In the form, enter a **Replying URL**, such as `https://jwt.ms`.
150150
9. The browser redirects to the eID-Me sign-in page.
@@ -178,7 +178,7 @@ Store the Client Secret you recorded in your Azure AD B2C tenant. For the follow
178178

179179
## Configure eID-Me as an Identity provider
180180

181-
To enable user sign-in with eID-Me, define eID-Me as a claims provider. Azure AD B2C communicates with it, through an endpoint. The endpoint provides claims used by Azure AD B2C to verify user authentication with a digital ID on their device.
181+
To enable user sign in with eID-Me, define eID-Me as a claims provider. Azure AD B2C communicates with it, through an endpoint. The endpoint provides claims used by Azure AD B2C to verify user authentication with a digital ID on their device.
182182

183183
To define eID-Me as a claims provider, add it to the **ClaimsProvider** element in the policy extension file.
184184

@@ -241,7 +241,7 @@ To define eID-Me as a claims provider, add it to the **ClaimsProvider** element
241241

242242
### Supported identity claims
243243

244-
You can add additional identity claims that eID-Me supports.
244+
You can add more identity claims that eID-Me supports.
245245

246246
1. Open the `TrustFrameworksExtension.xml`.
247247
2. Find the `BuildingBlocks` element.
@@ -397,7 +397,7 @@ Add the new identity provider to the user journey.
397397
5. Set the **Id** to the target claims exchange ID value.
398398
6. Update the v**TechnicalProfileReferenceId** value to the technical profile ID you created.
399399

400-
The following XML demonstrates 7 user journey orchestration steps with the identity provider:
400+
The following XML demonstrates seven user journey orchestration steps with the identity provider:
401401

402402
```xml
403403
<UserJourney Id="eIDME-SignUpOrSignIn">

0 commit comments

Comments
 (0)