You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory-b2c/idp-pass-through-custom.md
+8-10Lines changed: 8 additions & 10 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,5 +1,5 @@
1
1
---
2
-
title: Pass an access token through a custom policy to your application in Azure Active Directory B2C | Microsoft Docs
2
+
title: Pass an access token through a custom policy to your application in Azure Active Directory B2C
3
3
description: Learn how you can pass an access token for OAuth2.0 identity providers as a claim through a custom policy to your application in Azure Active Directory B2C.
4
4
services: active-directory-b2c
5
5
author: mmacy
@@ -8,22 +8,20 @@ manager: celestedg
8
8
ms.service: active-directory
9
9
ms.workload: identity
10
10
ms.topic: conceptual
11
-
ms.date: 02/19/2019
11
+
ms.date: 08/17/2019
12
12
ms.author: marsma
13
13
ms.subservice: B2C
14
14
---
15
15
16
16
# Pass an access token through a custom policy to your application in Azure Active Directory B2C
A [custom policy](active-directory-b2c-get-started-custom.md) in Azure Active Directory (Azure AD) B2C provides users of your application an opportunity to sign up or sign in with an identity provider. When this happens, Azure AD B2C receives an [access token](active-directory-b2c-reference-tokens.md) from the identity provider. Azure AD B2C uses that token to retrieve information about the user. You add a claim type and output claim to your custom policy to pass the token through to the applications that you register in Azure AD B2C.
18
+
A [custom policy](active-directory-b2c-get-started-custom.md) in Azure Active Directory B2C (Azure AD B2C) provides users of your application an opportunity to sign up or sign in with an identity provider. When this happens, Azure AD B2C receives an [access token](active-directory-b2c-reference-tokens.md) from the identity provider. Azure AD B2C uses that token to retrieve information about the user. You add a claim type and output claim to your custom policy to pass the token through to the applications that you register in Azure AD B2C.
21
19
22
20
Azure AD B2C supports passing the access token of [OAuth 2.0](active-directory-b2c-reference-oauth-code.md) and [OpenID Connect](active-directory-b2c-reference-oidc.md) identity providers. For all other identity providers, the claim is returned blank.
23
21
24
22
## Prerequisites
25
23
26
-
- Your custom policy is configured with an OAuth 2.0 or OpenID Connect identity provider.
24
+
* Your custom policy is configured with an OAuth 2.0 or OpenID Connect identity provider.
27
25
28
26
## Add the claim elements
29
27
@@ -82,24 +80,24 @@ When testing your applications in Azure AD B2C, it can be useful to have the Azu
82
80
### Upload the files
83
81
84
82
1. Sign in to the [Azure portal](https://portal.azure.com/).
85
-
2. Make sure you're using the directory that contains your Azure AD B2C tenant by clicking the **Directory and subscription filter** in the top menu and choosing the directory that contains your tenant.
83
+
2. Make sure you're using the directory that contains your Azure AD B2C tenant by clicking the **Directory + subscription** filter in the top menu and choosing the directory that contains your tenant.
86
84
3. Choose **All services** in the top-left corner of the Azure portal, and then search for and select **Azure AD B2C**.
87
85
4. Select **Identity Experience Framework**.
88
86
5. On the Custom Policies page, click **Upload Policy**.
89
87
6. Select **Overwrite the policy if it exists**, and then search for and select the *TrustframeworkExtensions.xml* file.
90
-
7. Click **Upload**.
88
+
7. Select **Upload**.
91
89
8. Repeat steps 5 through 7 for the relying party file, such as *SignUpOrSignIn.xml*.
92
90
93
91
### Run the policy
94
92
95
93
1. Open the policy that you changed. For example, *B2C_1A_signup_signin*.
96
94
2. For **Application**, select your application that you previously registered. To see the token in the example below, the **Reply URL** should show `https://jwt.ms`.
97
-
3. Click **Run now**.
95
+
3. Select **Run now**.
98
96
99
97
You should see something similar to the following example:
100
98
101
99

102
100
103
101
## Next steps
104
102
105
-
Learn more about tokens in the [Azure Active Directory token reference](active-directory-b2c-reference-tokens.md).
103
+
Learn more about tokens in the [Azure Active Directory B2C token reference](active-directory-b2c-reference-tokens.md).
Copy file name to clipboardExpand all lines: articles/active-directory-b2c/idp-pass-through-user-flow.md
+6-9Lines changed: 6 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,31 +1,28 @@
1
1
---
2
-
title: Pass an access token through a user flow to your application - Azure Active Directory B2C | Microsoft Docs
3
-
description: Learn how you can pass through an access token for OAuth2.0 identity providers as a claim in a user flow in Azure Active Directory B2C.
2
+
title: Pass an access token through a user flow to your application - Azure Active Directory B2C
3
+
description: Learn how to pass an access token for OAuth 2.0 identity providers as a claim in a user flow in Azure Active Directory B2C.
4
4
services: active-directory-b2c
5
5
author: mmacy
6
6
manager: celestedg
7
7
8
8
ms.service: active-directory
9
9
ms.workload: identity
10
10
ms.topic: conceptual
11
-
ms.date: 04/16/2019
11
+
ms.date: 08/17/2019
12
12
ms.author: marsma
13
13
ms.subservice: B2C
14
14
---
15
15
16
16
# Pass an access token through a user flow to your application in Azure Active Directory B2C
17
17
18
-
> [!NOTE]
19
-
> This feature is currently in public preview.
20
-
21
-
A [user flow](active-directory-b2c-reference-policies.md) in Azure Active Directory (Azure AD) B2C provides users of your application an opportunity to sign up or sign in with an identity provider. When the journey starts, Azure AD B2C receives an [access token](active-directory-b2c-reference-tokens.md) from the identity provider. Azure AD B2C uses that token to retrieve information about the user. You enable a claim in your user flow to pass the token through to the applications that you register in Azure AD B2C.
18
+
A [user flow](active-directory-b2c-reference-policies.md) in Azure Active Directory B2C (Azure AD B2C) provides users of your application an opportunity to sign up or sign in with an identity provider. When the journey starts, Azure AD B2C receives an [access token](active-directory-b2c-reference-tokens.md) from the identity provider. Azure AD B2C uses that token to retrieve information about the user. You enable a claim in your user flow to pass the token through to the applications that you register in Azure AD B2C.
22
19
23
20
Azure AD B2C currently only supports passing the access token of [OAuth 2.0](active-directory-b2c-reference-oauth-code.md) identity providers, which include [Facebook](active-directory-b2c-setup-fb-app.md) and [Google](active-directory-b2c-setup-goog-app.md). For all other identity providers, the claim is returned blank.
24
21
25
22
## Prerequisites
26
23
27
-
- Your application must be using a [v2 user flow](user-flow-versions.md).
28
-
- Your user flow is configured with an OAuth 2.0 identity provider.
24
+
* Your application must be using a [v2 user flow](user-flow-versions.md).
25
+
* Your user flow is configured with an OAuth 2.0 identity provider.
0 commit comments