You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory-b2c/partner-bloksec.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -88,7 +88,7 @@ In the account registration email from BlokSec, find the link to the BlokSec adm
88
88
8. Select the created Azure AD B2C application to open the application configuration.
89
89
9. Select **Generate App Secret**.
90
90
91
-
Learn more: [Send a sign-out request](./openid-connect.md#send-a-sign-out-request).
91
+
Learn more: [Send a signout request](./openid-connect.md#send-a-sign-out-request).
92
92
93
93
>[!NOTE]
94
94
>You need application ID and application secret to configure the identity provider (IdP) in Azure AD B2C.
@@ -146,7 +146,7 @@ For the following instructions, ensure BlokSec is a new OIDC identity provider (
146
146
3. Select **Sign up and sign in** > **Version** > **Create**.
147
147
4. Enter a policy **Name**.
148
148
5. In the identity providers section, select the created BlokSec identity provider.
149
-
6. For Local Account, select **None**. This disables email and password-based authentication.
149
+
6. For Local Account, select **None**. This action disables email and password-based authentication.
150
150
7. Select **Run user flow**
151
151
8. In the form, enter the Replying URL, such as `https://jwt.ms`.
152
152
9. The browser is redirected to the BlokSec sign-in page.
@@ -179,7 +179,7 @@ Store the client secret you noted in your Azure AD B2C tenant. For the following
179
179
180
180
### Configure BlokSec as an identity provider
181
181
182
-
To enable users to sign in using BlokSec decentralized identity, define BlokSec as a claims provider. This action ensure Azure AD B2C communicates with it through an endpoint. Azure AD B2C uses endpoint claims to verify users authenticate identity by using biometry, such as fingerprint or facial scan.
182
+
To enable users to sign in using BlokSec decentralized identity, define BlokSec as a claims provider. This action ensures Azure AD B2C communicates with it through an endpoint. Azure AD B2C uses endpoint claims to verify users authenticate identity by using biometry, such as fingerprint or facial scan.
183
183
184
184
To define BlokSec as a claims provider, add it to the **ClaimsProvider** element in the policy extension file.
0 commit comments