diff --git a/samples/OnFido-Combined/Policies/TrustFrameworkBase.xml b/samples/OnFido-Combined/Policies/TrustFrameworkBase.xml
index ab3a8b7..fbc395a 100644
--- a/samples/OnFido-Combined/Policies/TrustFrameworkBase.xml
+++ b/samples/OnFido-Combined/Policies/TrustFrameworkBase.xml
@@ -450,8 +450,8 @@
- Looks like you used an old password
- https://sts.windows.net/
- - https://login.microsoftonline.com/{tenant}/.well-known/openid-configuration
- - https://login.microsoftonline.com/{tenant}/oauth2/token
+ - https://login.microsoftonline.com/{your_tenantId}/.well-known/openid-configuration
+ - https://login.microsoftonline.com/{your_tenantId}/oauth2/token
- id_token
- query
- email openid
diff --git a/samples/OnFido-Combined/ReadMe.md b/samples/OnFido-Combined/ReadMe.md
index c00c4f7..08a61bb 100644
--- a/samples/OnFido-Combined/ReadMe.md
+++ b/samples/OnFido-Combined/ReadMe.md
@@ -50,6 +50,8 @@ Deploy the provided API code to an Azure service. The code can be
published from Visual Studio, following
these [instructions](https://docs.microsoft.com/visualstudio/deployment/quickstart-deploy-to-azure?view=vs-2019).
+Set-up CORS, add Allowed Origin `https://{your_tenant_name}.b2clogin.com`
+
Note the URL of the deployed service. We will need this later to
configure this later to configure Azure AD with the required settings.
@@ -72,6 +74,11 @@ account](https://docs.microsoft.com/en-us/azure/storage/blobs/storage-quickstart
Find the UI files from the **UI** folder and store them into your blob
container.
+Set-up CORS
+
+- Allowed Origin: `https://{your_tenant_name}.b2clogin.com`
+- Allowed Methods: `GET` and `PUT`
+
#### Update UI Files
In the UI Files, go to the folder **ocean\_blue**
@@ -86,7 +93,13 @@ intermediate API app service.
### Azure AD B2C Configuration
-#### Replace the configuration values
+#### Register Identity Experience Framework applications
+Follow [this documentation](https://docs.microsoft.com/en-us/azure/active-directory-b2c/custom-policy-get-started?tabs=applications#register-identity-experience-framework-applications) to create the 2 App Registrations `IdentityExperienceFramework` and `ProxyIdentityExperienceFramework`.
+
+Note down the Application IDs of both app registrations.
+
+
+#### Update the Policy files, replace the configuration values
In the provided custom policies, find the following placeholders and
replace with the corresponding values from your instance
@@ -97,8 +110,8 @@ Placeholder| Replace with | Example
-----------|--------------|--------------
{your_tenant_name}|Your tenant short name|“yourtenant” from yourtenant.onmicrosoft.com
{your_tenantId}|Tenant Id of your B2C tenant|01234567-89ab-cdef-0123-456789abcdef
-{your_tenant_IdentityExperienceFramework_appid}|App Id of the IdentityExperienceFramework app configured in your B2C tenant|01234567-89ab-cdef-0123-456789abcdef
-{your_tenant_ ProxyIdentityExperienceFramework _appid}|App Id of the ProxyIdentityExperienceFramework app configured in your B2C tenant|01234567-89ab-cdef-0123-456789abcdef
+{your_tenant_IdentityExperienceFramework_appid}|App Id of the IdentityExperienceFramework app configured in your B2C tenant, created in the previous step|01234567-89ab-cdef-0123-456789abcdef
+{your_tenant_ ProxyIdentityExperienceFramework _appid}|App Id of the ProxyIdentityExperienceFramework app configured in your B2C tenant, created in the previous step|01234567-89ab-cdef-0123-456789abcdef
{your_tenant_extensions_appid}|App Id of your tenant’s storage application|01234567-89ab-cdef-0123-456789abcdef
{your_tenant_extensions_app_objectid}|Object Id of your tenant’s storage application|01234567-89ab-cdef-0123-456789abcdef
{your_app_insights_instrumentation_key}|Instrumentation key of your app insights instance*|01234567-89ab-cdef-0123-456789abcdef
@@ -106,17 +119,15 @@ Placeholder| Replace with | Example
{your_app_service_url}|URL of your app service|https://yourapp.azurewebsites.net
\*App insights can be in a different tenant. This step is optional.
-Remove the corresponding TechnicalProfiles and OrechestrationSteps if
+Remove the corresponding TechnicalProfiles and OrchestrationSteps if
not needed
-#### Configure the B2C Policy
+#### Upload and test the custom B2C policies
-Follow [this
-documentation](https://docs.microsoft.com/en-us/azure/active-directory-b2c/custom-policy-get-started?tabs=applications#custom-policy-starter-pack) to
-configure the policy for the B2C tenant. The provided policies will need
-to be updated to relate to your specific tenant.
+Upload and test the policies according to the instructions in [this
+documentation.](https://docs.microsoft.com/en-us/azure/active-directory-b2c/custom-policy-get-started?tabs=applications#custom-policy-starter-pack) Use the policy files in this package instead of the ones mentioned in the documentation.
### Notes
This sample policy is based on [LocalAccounts starter
-pack](https://github.com/Azure-Samples/active-directory-b2c-custom-policy-starterpack/tree/master/LocalAccounts)
+pack](https://github.com/Azure-Samples/active-directory-b2c-custom-policy-starterpack/tree/master/LocalAccounts)
\ No newline at end of file