Skip to content

Commit fd67143

Browse files
authored
Merge pull request #85112 from mmacy/b2c-ga-idp-pass-through
[b2c] remove Preview for IdP pass-through
2 parents 51c5dbc + 3bcb4c4 commit fd67143

File tree

2 files changed

+14
-19
lines changed

2 files changed

+14
-19
lines changed

articles/active-directory-b2c/idp-pass-through-custom.md

Lines changed: 8 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: Pass an access token through a custom policy to your application in Azure Active Directory B2C | Microsoft Docs
2+
title: Pass an access token through a custom policy to your application in Azure Active Directory B2C
33
description: Learn how you can pass an access token for OAuth2.0 identity providers as a claim through a custom policy to your application in Azure Active Directory B2C.
44
services: active-directory-b2c
55
author: mmacy
@@ -8,22 +8,20 @@ manager: celestedg
88
ms.service: active-directory
99
ms.workload: identity
1010
ms.topic: conceptual
11-
ms.date: 02/19/2019
11+
ms.date: 08/17/2019
1212
ms.author: marsma
1313
ms.subservice: B2C
1414
---
1515

1616
# Pass an access token through a custom policy to your application in Azure Active Directory B2C
1717

18-
[!INCLUDE [active-directory-b2c-public-preview](../../includes/active-directory-b2c-public-preview.md)]
19-
20-
A [custom policy](active-directory-b2c-get-started-custom.md) in Azure Active Directory (Azure AD) B2C provides users of your application an opportunity to sign up or sign in with an identity provider. When this happens, Azure AD B2C receives an [access token](active-directory-b2c-reference-tokens.md) from the identity provider. Azure AD B2C uses that token to retrieve information about the user. You add a claim type and output claim to your custom policy to pass the token through to the applications that you register in Azure AD B2C.
18+
A [custom policy](active-directory-b2c-get-started-custom.md) in Azure Active Directory B2C (Azure AD B2C) provides users of your application an opportunity to sign up or sign in with an identity provider. When this happens, Azure AD B2C receives an [access token](active-directory-b2c-reference-tokens.md) from the identity provider. Azure AD B2C uses that token to retrieve information about the user. You add a claim type and output claim to your custom policy to pass the token through to the applications that you register in Azure AD B2C.
2119

2220
Azure AD B2C supports passing the access token of [OAuth 2.0](active-directory-b2c-reference-oauth-code.md) and [OpenID Connect](active-directory-b2c-reference-oidc.md) identity providers. For all other identity providers, the claim is returned blank.
2321

2422
## Prerequisites
2523

26-
- Your custom policy is configured with an OAuth 2.0 or OpenID Connect identity provider.
24+
* Your custom policy is configured with an OAuth 2.0 or OpenID Connect identity provider.
2725

2826
## Add the claim elements
2927

@@ -82,24 +80,24 @@ When testing your applications in Azure AD B2C, it can be useful to have the Azu
8280
### Upload the files
8381

8482
1. Sign in to the [Azure portal](https://portal.azure.com/).
85-
2. Make sure you're using the directory that contains your Azure AD B2C tenant by clicking the **Directory and subscription filter** in the top menu and choosing the directory that contains your tenant.
83+
2. Make sure you're using the directory that contains your Azure AD B2C tenant by clicking the **Directory + subscription** filter in the top menu and choosing the directory that contains your tenant.
8684
3. Choose **All services** in the top-left corner of the Azure portal, and then search for and select **Azure AD B2C**.
8785
4. Select **Identity Experience Framework**.
8886
5. On the Custom Policies page, click **Upload Policy**.
8987
6. Select **Overwrite the policy if it exists**, and then search for and select the *TrustframeworkExtensions.xml* file.
90-
7. Click **Upload**.
88+
7. Select **Upload**.
9189
8. Repeat steps 5 through 7 for the relying party file, such as *SignUpOrSignIn.xml*.
9290

9391
### Run the policy
9492

9593
1. Open the policy that you changed. For example, *B2C_1A_signup_signin*.
9694
2. For **Application**, select your application that you previously registered. To see the token in the example below, the **Reply URL** should show `https://jwt.ms`.
97-
3. Click **Run now**.
95+
3. Select **Run now**.
9896

9997
You should see something similar to the following example:
10098

10199
![Decoded token in jwt.ms with idp_access_token block highlighted](./media/idp-pass-through-custom/idp-pass-through-custom-token.PNG)
102100

103101
## Next steps
104102

105-
Learn more about tokens in the [Azure Active Directory token reference](active-directory-b2c-reference-tokens.md).
103+
Learn more about tokens in the [Azure Active Directory B2C token reference](active-directory-b2c-reference-tokens.md).

articles/active-directory-b2c/idp-pass-through-user-flow.md

Lines changed: 6 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -1,31 +1,28 @@
11
---
2-
title: Pass an access token through a user flow to your application - Azure Active Directory B2C | Microsoft Docs
3-
description: Learn how you can pass through an access token for OAuth2.0 identity providers as a claim in a user flow in Azure Active Directory B2C.
2+
title: Pass an access token through a user flow to your application - Azure Active Directory B2C
3+
description: Learn how to pass an access token for OAuth 2.0 identity providers as a claim in a user flow in Azure Active Directory B2C.
44
services: active-directory-b2c
55
author: mmacy
66
manager: celestedg
77

88
ms.service: active-directory
99
ms.workload: identity
1010
ms.topic: conceptual
11-
ms.date: 04/16/2019
11+
ms.date: 08/17/2019
1212
ms.author: marsma
1313
ms.subservice: B2C
1414
---
1515

1616
# Pass an access token through a user flow to your application in Azure Active Directory B2C
1717

18-
> [!NOTE]
19-
> This feature is currently in public preview.
20-
21-
A [user flow](active-directory-b2c-reference-policies.md) in Azure Active Directory (Azure AD) B2C provides users of your application an opportunity to sign up or sign in with an identity provider. When the journey starts, Azure AD B2C receives an [access token](active-directory-b2c-reference-tokens.md) from the identity provider. Azure AD B2C uses that token to retrieve information about the user. You enable a claim in your user flow to pass the token through to the applications that you register in Azure AD B2C.
18+
A [user flow](active-directory-b2c-reference-policies.md) in Azure Active Directory B2C (Azure AD B2C) provides users of your application an opportunity to sign up or sign in with an identity provider. When the journey starts, Azure AD B2C receives an [access token](active-directory-b2c-reference-tokens.md) from the identity provider. Azure AD B2C uses that token to retrieve information about the user. You enable a claim in your user flow to pass the token through to the applications that you register in Azure AD B2C.
2219

2320
Azure AD B2C currently only supports passing the access token of [OAuth 2.0](active-directory-b2c-reference-oauth-code.md) identity providers, which include [Facebook](active-directory-b2c-setup-fb-app.md) and [Google](active-directory-b2c-setup-goog-app.md). For all other identity providers, the claim is returned blank.
2421

2522
## Prerequisites
2623

27-
- Your application must be using a [v2 user flow](user-flow-versions.md).
28-
- Your user flow is configured with an OAuth 2.0 identity provider.
24+
* Your application must be using a [v2 user flow](user-flow-versions.md).
25+
* Your user flow is configured with an OAuth 2.0 identity provider.
2926

3027
## Enable the claim
3128

0 commit comments

Comments
 (0)