diff --git a/samples/OnFido-Combined/Policies/TrustFrameworkBase.xml b/samples/OnFido-Combined/Policies/TrustFrameworkBase.xml index ab3a8b7..fbc395a 100644 --- a/samples/OnFido-Combined/Policies/TrustFrameworkBase.xml +++ b/samples/OnFido-Combined/Policies/TrustFrameworkBase.xml @@ -450,8 +450,8 @@ Looks like you used an old password https://sts.windows.net/ - https://login.microsoftonline.com/{tenant}/.well-known/openid-configuration - https://login.microsoftonline.com/{tenant}/oauth2/token + https://login.microsoftonline.com/{your_tenantId}/.well-known/openid-configuration + https://login.microsoftonline.com/{your_tenantId}/oauth2/token id_token query email openid diff --git a/samples/OnFido-Combined/ReadMe.md b/samples/OnFido-Combined/ReadMe.md index c00c4f7..08a61bb 100644 --- a/samples/OnFido-Combined/ReadMe.md +++ b/samples/OnFido-Combined/ReadMe.md @@ -50,6 +50,8 @@ Deploy the provided API code to an Azure service. The code can be published from Visual Studio, following these [instructions](https://docs.microsoft.com/visualstudio/deployment/quickstart-deploy-to-azure?view=vs-2019). +Set-up CORS, add Allowed Origin `https://{your_tenant_name}.b2clogin.com` + Note the URL of the deployed service. We will need this later to configure this later to configure Azure AD with the required settings. @@ -72,6 +74,11 @@ account](https://docs.microsoft.com/en-us/azure/storage/blobs/storage-quickstart Find the UI files from the **UI** folder and store them into your blob container. +Set-up CORS + +- Allowed Origin: `https://{your_tenant_name}.b2clogin.com` +- Allowed Methods: `GET` and `PUT` + #### Update UI Files In the UI Files, go to the folder **ocean\_blue** @@ -86,7 +93,13 @@ intermediate API app service. ### Azure AD B2C Configuration -#### Replace the configuration values +#### Register Identity Experience Framework applications +Follow [this documentation](https://docs.microsoft.com/en-us/azure/active-directory-b2c/custom-policy-get-started?tabs=applications#register-identity-experience-framework-applications) to create the 2 App Registrations `IdentityExperienceFramework` and `ProxyIdentityExperienceFramework`. + +Note down the Application IDs of both app registrations. + + +#### Update the Policy files, replace the configuration values In the provided custom policies, find the following placeholders and replace with the corresponding values from your instance @@ -97,8 +110,8 @@ Placeholder| Replace with | Example -----------|--------------|-------------- {your_tenant_name}|Your tenant short name|“yourtenant” from yourtenant.onmicrosoft.com {your_tenantId}|Tenant Id of your B2C tenant|01234567-89ab-cdef-0123-456789abcdef -{your_tenant_IdentityExperienceFramework_appid}|App Id of the IdentityExperienceFramework app configured in your B2C tenant|01234567-89ab-cdef-0123-456789abcdef -{your_tenant_ ProxyIdentityExperienceFramework _appid}|App Id of the ProxyIdentityExperienceFramework app configured in your B2C tenant|01234567-89ab-cdef-0123-456789abcdef +{your_tenant_IdentityExperienceFramework_appid}|App Id of the IdentityExperienceFramework app configured in your B2C tenant, created in the previous step|01234567-89ab-cdef-0123-456789abcdef +{your_tenant_ ProxyIdentityExperienceFramework _appid}|App Id of the ProxyIdentityExperienceFramework app configured in your B2C tenant, created in the previous step|01234567-89ab-cdef-0123-456789abcdef {your_tenant_extensions_appid}|App Id of your tenant’s storage application|01234567-89ab-cdef-0123-456789abcdef {your_tenant_extensions_app_objectid}|Object Id of your tenant’s storage application|01234567-89ab-cdef-0123-456789abcdef {your_app_insights_instrumentation_key}|Instrumentation key of your app insights instance*|01234567-89ab-cdef-0123-456789abcdef @@ -106,17 +119,15 @@ Placeholder| Replace with | Example {your_app_service_url}|URL of your app service|https://yourapp.azurewebsites.net \*App insights can be in a different tenant. This step is optional. -Remove the corresponding TechnicalProfiles and OrechestrationSteps if +Remove the corresponding TechnicalProfiles and OrchestrationSteps if not needed -#### Configure the B2C Policy +#### Upload and test the custom B2C policies -Follow [this -documentation](https://docs.microsoft.com/en-us/azure/active-directory-b2c/custom-policy-get-started?tabs=applications#custom-policy-starter-pack)  to -configure the policy for the B2C tenant. The provided policies will need -to be updated to relate to your specific tenant. +Upload and test the policies according to the instructions in [this +documentation.](https://docs.microsoft.com/en-us/azure/active-directory-b2c/custom-policy-get-started?tabs=applications#custom-policy-starter-pack)  Use the policy files in this package instead of the ones mentioned in the documentation. ### Notes This sample policy is based on [LocalAccounts starter -pack](https://github.com/Azure-Samples/active-directory-b2c-custom-policy-starterpack/tree/master/LocalAccounts) +pack](https://github.com/Azure-Samples/active-directory-b2c-custom-policy-starterpack/tree/master/LocalAccounts) \ No newline at end of file