You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory-b2c/active-directory-b2c-access-tokens.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -15,7 +15,7 @@ ms.subservice: B2C
15
15
---
16
16
# Request an access token in Azure Active Directory B2C
17
17
18
-
An *access token* contains claims that you can use in Azure Active Directory (Azure AD) B2C to identify the granted permissions to your APIs. When calling a resource server, an access token must be present in the HTTP request. An access token is denoted as **access_token** in the responses from Azure AD B2C.
18
+
An *access token* contains claims that you can use in Azure Active Directory B2C (Azure AD B2C) to identify the granted permissions to your APIs. When calling a resource server, an access token must be present in the HTTP request. An access token is denoted as **access_token** in the responses from Azure AD B2C.
19
19
20
20
This article shows you how to request an access token for a web application and web API. For more information about tokens in Azure AD B2C, see the [overview of tokens in Azure Active Directory B2C](active-directory-b2c-reference-tokens.md).
Copy file name to clipboardExpand all lines: articles/active-directory-b2c/active-directory-b2c-apps.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -15,7 +15,7 @@ ms.subservice: B2C
15
15
---
16
16
# Application types that can be used in Active Directory B2C
17
17
18
-
Azure Active Directory (Azure AD) B2C supports authentication for a variety of modern application architectures. All of them are based on the industry standard protocols [OAuth 2.0](active-directory-b2c-reference-protocols.md) or [OpenID Connect](active-directory-b2c-reference-protocols.md). This article describes the types of applications that you can build, independent of the language or platform you prefer. It also helps you understand the high-level scenarios before you start building applications.
18
+
Azure Active Directory B2C (Azure AD B2C) supports authentication for a variety of modern application architectures. All of them are based on the industry standard protocols [OAuth 2.0](active-directory-b2c-reference-protocols.md) or [OpenID Connect](active-directory-b2c-reference-protocols.md). This article describes the types of applications that you can build, independent of the language or platform you prefer. It also helps you understand the high-level scenarios before you start building applications.
19
19
20
20
Every application that uses Azure AD B2C must be registered in your [Azure AD B2C tenant](active-directory-b2c-get-started.md) by using the [Azure portal](https://portal.azure.com/). The application registration process collects and assigns values, such as:
In this article, you add a new user provided entry (a claim) to your sign-up user journey in Azure Active Directory (Azure AD) B2C. You configure the entry as a dropdown and define whether it's required.
19
+
In this article, you add a new user provided entry (a claim) to your sign-up user journey in Azure Active Directory B2C (Azure AD B2C). You configure the entry as a dropdown and define whether it's required.
20
20
21
21
## Prerequisites
22
22
@@ -256,7 +256,7 @@ The following elements are used to define the claim:
256
256
## Test the custom policy
257
257
258
258
1. Sign in to the [Azure portal](https://portal.azure.com).
259
-
2. Make sure you're using the directory that contains your Azure AD tenant by clicking the **Directory and subscription filter** in the top menu and choosing the directory that contains your Azure AD tenant.
259
+
2. Make sure you're using the directory that contains your Azure AD tenant by selecting the **Directory + subscription** filter in the top menu and choosing the directory that contains your Azure AD tenant.
260
260
3. Choose **All services** in the top-left corner of the Azure portal, and then search for and select **App registrations**.
In this article, you create a custom attribute in your Azure Active Directory (Azure AD) B2C directory. You'll use this new attribute as a custom claim in the profile edit user journey.
19
+
In this article, you create a custom attribute in your Azure Active Directory B2C (Azure AD B2C) directory. You'll use this new attribute as a custom claim in the profile edit user journey.
20
20
21
21
## Prerequisites
22
22
@@ -38,7 +38,7 @@ If the application is deleted, those extension properties along with any data co
38
38
Extension properties exist only in the context of a registered application in the tenant. The object ID of that application must be included in the **TechnicalProfile** that uses it.
39
39
40
40
>[!NOTE]
41
-
>The Azure AD B2C directory typically includes a web app named `b2c-extensions-app`. This application is primarily used by the B2C built-in policies for the custom claims created via the Azure portal. We recommend that only advanced users register extensions for B2C custom policies by using this application.
41
+
>The Azure AD B2C directory typically includes a web app named `b2c-extensions-app`. This application is primarily used by the B2C built-in policies for the custom claims created via the Azure portal. We recommend that only advanced users register extensions for B2C custom policies by using this application.
42
42
Instructions are included in the **Next steps** section in this article.
43
43
44
44
## Create a new application to store the extension properties
@@ -64,7 +64,7 @@ Instructions are included in the **Next steps** section in this article.
64
64
65
65
When you followed the steps in [Azure Active Directory B2C: Get started with custom policies](active-directory-b2c-get-started-custom.md), you downloaded and modified [sample files](https://github.com/Azure-Samples/active-directory-b2c-custom-policy-starterpack/archive/master.zip) named **TrustFrameworkBase.xml**, **TrustFrameworkExtensions.xml**, **SignUpOrSignin.xml**, **ProfileEdit.xml**, and **PasswordReset.xml**. In this step, you make more modifications to those files.
66
66
67
-
* Open the **TrustFrameworkBase.xml** file and add the `Metadata` section as shown in the following example. Insert the object ID that you previously recorded for the `ApplicationObjectId` value and the application ID that you recorded for the `ClientId` value:
67
+
* Open the **TrustFrameworkBase.xml** file and add the `Metadata` section as shown in the following example. Insert the object ID that you previously recorded for the `ApplicationObjectId` value and the application ID that you recorded for the `ClientId` value:
68
68
69
69
```xml
70
70
<ClaimsProviders>
@@ -98,7 +98,7 @@ When you followed the steps in [Azure Active Directory B2C: Get started with cus
98
98
99
99
1. Open the **ProfileEdit.xml** file.
100
100
2. Add a custom claim `loyaltyId`. By including the custom claim in the `<RelyingParty>` element, it's included in the token for the application.
101
-
101
+
102
102
```xml
103
103
<RelyingParty>
104
104
<DefaultUserJourneyReferenceId="ProfileEdit" />
@@ -263,10 +263,10 @@ The ID token sent back to your application includes the new extension property a
263
263
264
264
2. Use the same extension attributes between built-in and custom policies. When you add extension, or custom, attributes via the portal experience, those attributes are registered by using the **b2c-extensions-app** that exists in every B2C tenant. Take the following steps to use extension attributes in your custom policy:
265
265
266
-
a. Within your B2C tenant in portal.azure.com, navigate to **Azure Active Directory** and select **App registrations**.
267
-
b. Find your **b2c-extensions-app** and select it.
268
-
c. Under **Essentials**, enter the **Application ID** and the **Object ID**.
269
-
d. Include them in your **AAD-Common** TechnicalProfile metadata:
266
+
a. Within your B2C tenant in portal.azure.com, navigate to **Azure Active Directory** and select **App registrations**.
267
+
b. Find your **b2c-extensions-app** and select it.
268
+
c. Under **Essentials**, enter the **Application ID** and the **Object ID**.
269
+
d. Include them in your **AAD-Common** TechnicalProfile metadata:
270
270
271
271
```xml
272
272
<ClaimsProviders>
@@ -294,6 +294,6 @@ The ID token sent back to your application includes the new extension property a
294
294
For more information on extension properties, see the article [Directory schema extensions | Graph API concepts](/previous-versions/azure/ad/graph/howto/azure-ad-graph-api-directory-schema-extensions).
295
295
296
296
> [!NOTE]
297
-
> * A **TechnicalProfile** is an element type, or function, that defines an endpoint’s name, metadata, and protocol. The **TechnicalProfile** details the exchange of claims that the Identity Experience Framework performs. When this function is called in an orchestration step or from another **TechnicalProfile**, the **InputClaims** and **OutputClaims** are provided as parameters by the caller.
298
-
> * Extension attributes in the Graph API are named by using the convention `extension_ApplicationObjectID_attributename`.
297
+
> * A **TechnicalProfile** is an element type, or function, that defines an endpoint’s name, metadata, and protocol. The **TechnicalProfile** details the exchange of claims that the Identity Experience Framework performs. When this function is called in an orchestration step or from another **TechnicalProfile**, the **InputClaims** and **OutputClaims** are provided as parameters by the caller.
298
+
> * Extension attributes in the Graph API are named by using the convention `extension_ApplicationObjectID_attributename`.
299
299
> * Custom policies refer to extension attributes as **extension_attributename**. This reference omits the **ApplicationObjectId** in XML.
When you use Azure Active Directory (Azure AD) B2C together with Azure Application Insights, you can get detailed and customized event logs for your user journeys. In this article, you learn how to:
20
+
When you use Azure Active Directory B2C (Azure AD B2C) together with Azure Application Insights, you can get detailed and customized event logs for your user journeys. In this article, you learn how to:
21
21
22
22
* Gain insights on user behavior.
23
23
* Troubleshoot your own policies in development or in production.
@@ -41,7 +41,7 @@ Complete the steps in [Get started with custom policies](active-directory-b2c-ge
41
41
When you're using Application Insights with Azure AD B2C, all you need to do is create a resource and get the instrumentation key.
42
42
43
43
1. Sign in to the [Azure portal](https://portal.azure.com/).
44
-
2. Make sure you're using the directory that contains your Azure subscription by clicking the **Directory and subscription filter** in the top menu and choosing the directory that contains your subscription. This tenant is not your Azure AD B2C tenant.
44
+
2. Make sure you're using the directory that contains your Azure subscription by selecting the **Directory + subscription** filter in the top menu and choosing the directory that contains your subscription. This tenant is not your Azure AD B2C tenant.
45
45
3. Choose **Create a resource** in the top-left corner of the Azure portal, and then search for and select **Application Insights**.
46
46
4. Click **Create**.
47
47
5. Enter a **Name** for the resource.
@@ -107,10 +107,10 @@ Technical profiles can be considered functions in the Identity Experience Framew
107
107
108
108
| Technical Profile | Task |
109
109
| ----------------- | -----|
110
-
| AzureInsights-Common | Creates a common set of parameters to be included in all AzureInsights technical profiles. |
111
-
| AzureInsights-SignInRequest | Creates a SignIn event with a set of claims when a sign-in request has been received. |
112
-
| AzureInsights-UserSignup | Creates a UserSignup event when the user triggers the sign-up option in a sign-up/sign-in journey. |
113
-
| AzureInsights-SignInComplete | Records the successful completion of an authentication when a token has been sent to the relying party application. |
110
+
| AzureInsights-Common | Creates a common set of parameters to be included in all AzureInsights technical profiles. |
111
+
| AzureInsights-SignInRequest | Creates a SignIn event with a set of claims when a sign-in request has been received. |
112
+
| AzureInsights-UserSignup | Creates a UserSignup event when the user triggers the sign-up option in a sign-up/sign-in journey. |
113
+
| AzureInsights-SignInComplete | Records the successful completion of an authentication when a token has been sent to the relying party application. |
114
114
115
115
Add the profiles to the *TrustFrameworkExtensions.xml* file from the starter pack. Add these elements to the **ClaimsProviders** element:
116
116
@@ -226,11 +226,11 @@ Save and upload the *TrustFrameworkExtensions.xml* file. Then, call the relying
226
226
227
227
## Next steps
228
228
229
-
Add claim types and events to your user journey to fit your needs. You can use [claim resolvers](claim-resolver-overview.md) or any string claim type, add the claims by adding an **Input Claim** element to the Application Insights event or to the AzureInsights-Common technical profile.
229
+
Add claim types and events to your user journey to fit your needs. You can use [claim resolvers](claim-resolver-overview.md) or any string claim type, add the claims by adding an **Input Claim** element to the Application Insights event or to the AzureInsights-Common technical profile.
230
230
231
231
-**ClaimTypeReferenceId** is the reference to a claim type.
232
-
-**PartnerClaimType** is the name of the property that appears in Azure Insights. Use the syntax of `{property:NAME}`, where `NAME` is property being added to the event.
233
-
-**DefaultValue** use any string value or the claim resolver.
232
+
-**PartnerClaimType** is the name of the property that appears in Azure Insights. Use the syntax of `{property:NAME}`, where `NAME` is property being added to the event.
233
+
-**DefaultValue** use any string value or the claim resolver.
0 commit comments