You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory-b2c/partner-eid-me.md
+9-9Lines changed: 9 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -46,8 +46,8 @@ See also, [Tutorial: Create user flows and custom policies in Azure AD B2C](./tu
46
46
47
47
eID-Me integrates with Azure AD B2C as an OpenID Connect (OIDC) identity provider. The following components comprise the eID-Me solution with Azure AD B2C:
48
48
49
-
***Azure AD B2C tenant** - configured as a relying party in eID-Me enables eID-Me to trust an Azure AD B2C tenant for signup and sign in.
50
-
***Azure AD B2C tenant application** - because it's assumed tenants need an Azure AD B2C tenant application.
49
+
***Azure AD B2C tenant** - configured as a relying party in eID-Me enables eID-Me to trust an Azure AD B2C tenant for sign-up and sign-in
50
+
***Azure AD B2C tenant application** - the assumption is tenants need an Azure AD B2C tenant application
51
51
* The application receives identity claims received by Azure AD B2C during transaction
52
52
***eID-Me smartphone apps** - Azure AD B2C tenant users need the app for iOS or Android
53
53
***Issued eID-Me digital identities** - from eID-Me identity proofing
@@ -68,7 +68,7 @@ The following diagram illustrates Azure AD B2C integration with eID-Me.
68
68
69
69

70
70
71
-
1. User opens the Azure AD B2C signin page and signs in or signs up with a username.
71
+
1. User opens the Azure AD B2C sign-in page and signs in or signs up with a username.
72
72
2. User forwarded to Azure AD B2C sign-in and sign-up policy.
73
73
3. Azure AD B2C redirects the user to the eID-Me identity router using the OIDC authorization code flow.
74
74
4. The router sends push notification to the user mobile app with authentication and authorization request details.
@@ -121,7 +121,7 @@ To configure an identity provider:
121
121
4. For **Client Secret**, enter the Client Secret from eID-Me.
122
122
5. For **Scope**, select **openid email profile**.
123
123
6. For **Response type**, select **code**.
124
-
7. For **Response mode**, selct**form post**.
124
+
7. For **Response mode**, select**form post**.
125
125
8. Select **OK**.
126
126
9. Select **Map this identity provider’s claims**.
127
127
10. For **User ID**, use **sub**.
@@ -137,14 +137,14 @@ eID-Me is a multi-factor authenticator, therefore user-flow multi-factor authent
137
137
138
138
## Create a user flow policy
139
139
140
-
For the following instructions eID-Me appears as a new OIDC identity provider in B2C identity providers.
140
+
For the following instructions, eID-Me appears as a new OIDC identity provider in B2C identity providers.
141
141
142
142
1. In the Azure AD B2C tenant, under **Policies**, select **User flows**.
143
143
2. Select **New user flow**.
144
144
3. Select **Sign up and sign in** > **Version** > **Create**.
145
145
4. Enter a policy **Name**.
146
146
5. In **Identity providers**, select the created eID-Me identity provider.
147
-
6. For **Local Accounts** elect**None**. This actions disables email and password authentication.
147
+
6. For **Local Accounts**, select**None**. The selection disables email and password authentication.
148
148
7. Select **Run user flow**.
149
149
8. In the form, enter a **Replying URL**, such as `https://jwt.ms`.
150
150
9. The browser redirects to the eID-Me sign-in page.
@@ -178,7 +178,7 @@ Store the Client Secret you recorded in your Azure AD B2C tenant. For the follow
178
178
179
179
## Configure eID-Me as an Identity provider
180
180
181
-
To enable user sign-in with eID-Me, define eID-Me as a claims provider. Azure AD B2C communicates with it, through an endpoint. The endpoint provides claims used by Azure AD B2C to verify user authentication with a digital ID on their device.
181
+
To enable user signin with eID-Me, define eID-Me as a claims provider. Azure AD B2C communicates with it, through an endpoint. The endpoint provides claims used by Azure AD B2C to verify user authentication with a digital ID on their device.
182
182
183
183
To define eID-Me as a claims provider, add it to the **ClaimsProvider** element in the policy extension file.
184
184
@@ -241,7 +241,7 @@ To define eID-Me as a claims provider, add it to the **ClaimsProvider** element
241
241
242
242
### Supported identity claims
243
243
244
-
You can add additional identity claims that eID-Me supports.
244
+
You can add more identity claims that eID-Me supports.
245
245
246
246
1. Open the `TrustFrameworksExtension.xml`.
247
247
2. Find the `BuildingBlocks` element.
@@ -397,7 +397,7 @@ Add the new identity provider to the user journey.
397
397
5. Set the **Id** to the target claims exchange ID value.
398
398
6. Update the v**TechnicalProfileReferenceId** value to the technical profile ID you created.
399
399
400
-
The following XML demonstrates 7 user journey orchestration steps with the identity provider:
400
+
The following XML demonstrates seven user journey orchestration steps with the identity provider:
0 commit comments