Skip to content

Commit a1a489c

Browse files
committedJun 20, 2017
Merge branch 'master' of https://github.com/Microsoft/azure-docs-pr into file-naming
2 parents c2a034c + ff9d0e4 commit a1a489c

File tree

4,230 files changed

+61269
-37855
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

4,230 files changed

+61269
-37855
lines changed
 

‎articles/active-directory-b2c/active-directory-b2c-app-registration.md

+91-38
Original file line numberDiff line numberDiff line change
@@ -13,78 +13,120 @@ ms.workload: identity
1313
ms.tgt_pltfrm: na
1414
ms.devlang: na
1515
ms.topic: get-started-article
16-
ms.date: 3/13/2017
16+
ms.date: 6/13/2017
1717
ms.author: parakhj
1818

1919

2020
---
2121
# Azure Active Directory B2C: Register your application
2222

2323
> [!IMPORTANT]
24-
> Applications created from the Azure AD B2C blade in the Azure portal must be managed from the same location. If you edit the B2C applications using PowerShell or another portal, they become unsupported and will likely not work with Azure AD B2C.
25-
>
26-
>
24+
> Applications created from the Azure AD B2C blade in the Azure portal must be managed from the same location. If you edit the B2C applications using PowerShell or another portal, they become unsupported and will not work with Azure AD B2C. Read more [below](#faulted-apps).
25+
>
2726
2827
## Prerequisite
28+
2929
To build an application that accepts consumer sign-up and sign-in, you first need to register the application with an Azure Active Directory B2C tenant. Get your own tenant by using the steps outlined in [Create an Azure AD B2C tenant](active-directory-b2c-get-started.md). After you follow all the steps in that article, you will have the B2C features blade pinned to your Startboard.
3030

3131
[!INCLUDE [active-directory-b2c-devquickstarts-v2-apps](../../includes/active-directory-b2c-devquickstarts-v2-apps.md)]
3232

3333
## Navigate to the B2C features blade
34+
3435
If you have the B2C features blade pinned to your Startboard, you will see the blade as soon as you sign in to the [Azure portal](https://portal.azure.com/) as the Global Administrator of the B2C tenant.
3536

3637
You can also access the blade by clicking **More services** and then searching **Azure AD B2C** in the left navigation pane on the [Azure portal](https://portal.azure.com/).
3738

3839
> [!IMPORTANT]
3940
> You need to be a Global Administrator of the B2C tenant to be able to access the B2C features blade. A Global Administrator from any other tenant or a user from any tenant cannot access it. You can switch to your B2C tenant by using the tenant switcher in the top right corner of the Azure portal.
40-
>
41-
>
41+
>
42+
>
4243
4344
## Register a web application
45+
4446
1. On the B2C features blade on the Azure portal, click **Applications**.
45-
2. Click **+Add** at the top of the blade.
46-
3. Enter a **Name** for the application that will describe your application to consumers. For example, you could enter "Contoso B2C app".
47-
4. Toggle the **Include web app / web API** switch to **Yes**. The **Reply URLs** are endpoints where Azure AD B2C will return any tokens that your application requests. For example, enter `https://localhost:44316/`.
48-
5. Click **Create** to register your application.
49-
6. Click the application that you just created and copy down the globally unique **Application Client ID** that you'll use later in your code.
50-
7. If your web application will also be calling a web API secured by Azure AD B2C, you'll want to:
51-
1. Create an **Application Secret** by going to the **Keys** blade and clicking the **Generate Key** button.
52-
2. Click on **API Access**, click on **Add** and select your web API and scopes (permissions).
47+
1. Click **+Add** at the top of the blade.
48+
1. Enter a **Name** for the application that will describe your application to consumers. For example, you could enter "Contoso B2C app".
49+
1. Toggle the **Include web app / web API** switch to **Yes**.
50+
1. Enter [a proper](#choosing-a-web-app/api-reply-url) value for the **Reply URLs**, which are endpoints where Azure AD B2C will return any tokens that your application requests. For example, enter `https://localhost:44316/`.
51+
1. Click **Create** to register your application.
52+
1. Click the application that you just created and copy down the globally unique **Application Client ID** that you'll use later in your code.
53+
1. If your web application will also be calling a web API secured by Azure AD B2C, you'll want to:
54+
1. Create an **Application Secret** by going to the **Keys** blade and clicking the **Generate Key** button.
55+
1. Click on **API Access**, click on **Add** and select your web API and scopes (permissions).
5356

5457
> [!NOTE]
5558
> An **Application Secret** is an important security credential, and should be secured appropriately.
56-
>
57-
59+
>
5860
5961
## Register a web api
62+
6063
1. On the B2C features blade on the Azure portal, click **Applications**.
61-
2. Click **+Add** at the top of the blade.
62-
3. Enter a **Name** for the application that will describe your application to consumers. For example, you could enter "Contoso B2C api".
63-
4. Toggle the **Include web app / web API** switch to **Yes**. The **Reply URLs** are endpoints where Azure AD B2C will return any tokens that your application requests. For example, enter `https://localhost:44316/`.
64-
5. Enter an **App ID URI**. This is the identifier used for your web API. For example, enter 'notes'. It will generate the full identifier URI underneath.
65-
6. Click **Create** to register your application.
66-
7. Click the application that you just created and copy down the globally unique **Application Client ID** that you'll use later in your code.
67-
8. Click on **Published scopes**. This is where you define the permissions (scopes) that can be granted to other applications.
68-
9. Add more scopes as necessary. By default, the "user_impersonation" scope will be defined. This gives other applications the ability to access this api on behalf of the signed-in user. This can be removed if you wish.
69-
10. Click **Save**.
64+
1. Click **+Add** at the top of the blade.
65+
1. Enter a **Name** for the application that will describe your application to consumers. For example, you could enter "Contoso B2C api".
66+
1. Toggle the **Include web app / web API** switch to **Yes**.
67+
1. Enter [a proper](#choosing-a-web-app/api-reply-url) value for the **Reply URLs**, which are endpoints where Azure AD B2C will return any tokens that your application requests. For example, enter `https://localhost:44316/`.
68+
1. Enter an **App ID URI**. This is the identifier used for your web API. For example, enter 'notes'. It will generate the full identifier URI underneath.
69+
1. Click **Create** to register your application.
70+
1. Click the application that you just created and copy down the globally unique **Application Client ID** that you'll use later in your code.
71+
1. Click on **Published scopes**. This is where you define the permissions (scopes) that can be granted to other applications.
72+
1. Add more scopes as necessary. By default, the "user_impersonation" scope will be defined. This gives other applications the ability to access this api on behalf of the signed-in user. This can be removed if you wish.
73+
1. Click **Save**.
7074

7175
## Register a mobile/native application
76+
7277
1. On the B2C features blade on the Azure portal, click **Applications**.
73-
2. Click **+Add** at the top of the blade.
74-
3. Enter a **Name** for the application that will describe your application to consumers. For example, you could enter "Contoso B2C app".
75-
4. Toggle the **Include native client** switch to **Yes**.
76-
5. Enter a **Redirect URI** with a custom scheme. For example, com.onmicrosoft.contoso.appname://redirect/path. Make sure you choose a [good redirect URI](#choosing-a-redirect-uri) and do not include special characters such as underscores.
77-
6. Click **Save** to register your application.
78-
7. Click the application that you just created and copy down the globally unique **Application Client ID** that you'll use later in your code.
79-
8. If your native application will also be calling a web API secured by Azure AD B2C, you'll want to:
80-
1. Create an **Application Secret** by going to the **Keys** blade and clicking the **Generate Key** button.
81-
2. Click on **API Access**, click on **Add** and select your web API and scopes (permissions).
78+
1. Click **+Add** at the top of the blade.
79+
1. Enter a **Name** for the application that will describe your application to consumers. For example, you could enter "Contoso B2C app".
80+
1. Toggle the **Include native client** switch to **Yes**.
81+
1. Enter a **Redirect URI** with a custom scheme. For example, com.onmicrosoft.contoso.appname://redirect/path. Make sure you choose a [good redirect URI](#choosing-a-native-application-redirect-uri) and do not include special characters such as underscores.
82+
1. Click **Save** to register your application.
83+
1. Click the application that you just created and copy down the globally unique **Application Client ID** that you'll use later in your code.
84+
1. If your native application will also be calling a web API secured by Azure AD B2C, you'll want to:
85+
1. Create an **Application Secret** by going to the **Keys** blade and clicking the **Generate Key** button.
86+
1. Click on **API Access**, click on **Add** and select your web API and scopes (permissions).
8287

8388
> [!NOTE]
8489
> An **Application Secret** is an important security credential, and should be secured appropriately.
85-
>
90+
>
91+
92+
## Limitations
93+
94+
### Choosing a web app/api reply URL
95+
96+
Currently, apps that are registered with Azure AD B2C are restricted to a limited set of reply URL values. The reply URL for web apps and services must begin with the scheme `https`, and all reply URL values must share a single DNS domain. For example, you cannot register a web app that has one of these reply URLs:
97+
98+
`https://login-east.contoso.com`
99+
100+
`https://login-west.contoso.com`
101+
102+
The registration system compares the whole DNS name of the existing reply URL to the DNS name of the reply URL that you are adding. The request to add the DNS name will fail if either of the following conditions is true:
103+
104+
* The whole DNS name of the new reply URL does not match the DNS name of the existing reply URL.
105+
* The whole DNS name of the new reply URL is not a subdomain of the existing reply URL.
106+
107+
For example, if the app has this reply URL:
108+
109+
`https://login.contoso.com`
86110

87-
### Choosing a redirect URI
111+
You can add to it, like this:
112+
113+
`https://login.contoso.com/new`
114+
115+
In this case, the DNS name matches exactly. Or, you can do this:
116+
117+
`https://new.login.contoso.com`
118+
119+
In this case, you're referring to a DNS subdomain of login.contoso.com. If you want to have an app that has login-east.contoso.com and login-west.contoso.com as reply URLs, you must add those reply URLs in this order:
120+
121+
`https://contoso.com`
122+
123+
`https://login-east.contoso.com`
124+
125+
`https://login-west.contoso.com`
126+
127+
You can add the latter two because they are subdomains of the first reply URL, contoso.com.
128+
129+
### Choosing a native application redirect URI
88130

89131
There are two important considerations when choosing a redirect URI for mobile/native applications:
90132

@@ -93,6 +135,17 @@ There are two important considerations when choosing a redirect URI for mobile/n
93135

94136
Ensure there are no special characters like underscores in the redirect uri.
95137

96-
## Build an application
97-
Now that you have an application registered with Azure AD B2C, you can complete one of [our quick-start tutorials](active-directory-b2c-overview.md#get-started) to get up and running.
138+
### Faulted apps
139+
140+
B2C applications should NOT be edited:
141+
142+
* On other application management portals such as the [Azure classic portal](https://manage.windowsazure.com/) & the [Application Registration Portal](https://apps.dev.microsoft.com/).
143+
* Using Graph API or PowerShell
144+
145+
If you edit the B2C application as described above and try to edit it again in the Azure AD B2C features blade on the Azure portal, it will become a faulted app, and your application will no longer be usable with Azure AD B2C. You will have to delete the application and create it again.
146+
147+
To delete the app, go to the [Application Registration Portal](https://apps.dev.microsoft.com/) and delete the application there. In order for the application to be visible, you need to be the owner of the application (and not just an admin of the tenant).
148+
149+
## Next steps
98150

151+
Now that you have an application registered with Azure AD B2C, you can complete one of [our quick-start tutorials](active-directory-b2c-overview.md#get-started) to get up and running.

‎articles/active-directory-b2c/active-directory-b2c-devquickstarts-api-node.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: 'Azure AD B2C: Secure a web API by using Node.js | Microsoft Docs'
33
description: How to build a Node.js web API that accepts tokens from a B2C tenant
44
services: active-directory-b2c
55
documentationcenter: ''
6-
author: xerners
6+
author: dstrockis
77
manager: mbaldwin
88
editor: ''
99

0 commit comments

Comments
 (0)
Please sign in to comment.