Skip to content

Commit 7858851

Browse files
Correct Label of Supported Account Type Option (#20293)
1 parent f6bfcb3 commit 7858851

File tree

1 file changed

+3
-3
lines changed

1 file changed

+3
-3
lines changed

aspnetcore/blazor/security/webassembly/hosted-with-azure-active-directory-b2c.md

+3-3
Original file line numberDiff line numberDiff line change
@@ -29,7 +29,7 @@ Follow the guidance in [Tutorial: Register an application in Azure Active Direct
2929

3030
1. In **Azure Active Directory** > **App registrations**, select **New registration**.
3131
1. Provide a **Name** for the app (for example, **Blazor Server AAD B2C**).
32-
1. For **Supported account types**, select the multi-tenant option: **Accounts in any organizational directory or any identity provider. For authenticating users with Azure AD B2C.**
32+
1. For **Supported account types**, select the multi-tenant option: **Accounts in any identity provider or organizational directory (for authenticating users with user flows)**
3333
1. The *Server API app* doesn't require a **Redirect URI** in this scenario, so leave the drop down set to **Web** and don't enter a redirect URI.
3434
1. Confirm that **Permissions** > **Grant admin consent to openid and offline_access permissions** is selected.
3535
1. Select **Register**.
@@ -62,7 +62,7 @@ Follow the guidance in [Tutorial: Register an application in Azure Active Direct
6262

6363
1. In **Azure Active Directory** > **App registrations**, select **New registration**.
6464
1. Provide a **Name** for the app (for example, **Blazor Client AAD B2C**).
65-
1. For **Supported account types**, select the multi-tenant option: **Accounts in any organizational directory or any identity provider. For authenticating users with Azure AD B2C.**
65+
1. For **Supported account types**, select the multi-tenant option: **Accounts in any identity provider or organizational directory (for authenticating users with user flows)**
6666
1. Set the **Redirect URI** drop down to **Single-page application (SPA)** and provide the following redirect URI: `https://localhost:{PORT}/authentication/login-callback`. The default port for an app running on Kestrel is 5001. If the app is run on a different Kestrel port, use the app's port. For IIS Express, the randomly generated port for the app can be found in the *`Server`* app's properties in the **Debug** panel. Since the app doesn't exist at this point and the IIS Express port isn't known, return to this step after the app is created and update the redirect URI. A remark appears in the [Create the app](#create-the-app) section to remind IIS Express users to update the redirect URI.
6767
1. Confirm that **Permissions** > **Grant admin consent to openid and offline_access permissions** is selected.
6868
1. Select **Register**.
@@ -82,7 +82,7 @@ In **Authentication** > **Platform configurations** > **Single-page application
8282

8383
1. In **Azure Active Directory** > **App registrations**, select **New registration**.
8484
1. Provide a **Name** for the app (for example, **Blazor Client AAD B2C**).
85-
1. For **Supported account types**, select the multi-tenant option: **Accounts in any organizational directory or any identity provider. For authenticating users with Azure AD B2C.**
85+
1. For **Supported account types**, select the multi-tenant option: **Accounts in any identity provider or organizational directory (for authenticating users with user flows)**
8686
1. Leave the **Redirect URI** drop down set to **Web** and provide the following redirect URI: `https://localhost:{PORT}/authentication/login-callback`. The default port for an app running on Kestrel is 5001. If the app is run on a different Kestrel port, use the app's port. For IIS Express, the randomly generated port for the app can be found in the *`Server`* app's properties in the **Debug** panel. Since the app doesn't exist at this point and the IIS Express port isn't known, return to this step after the app is created and update the redirect URI. A remark appears in the [Create the app](#create-the-app) section to remind IIS Express users to update the redirect URI.
8787
1. Confirm that **Permissions** > **Grant admin consent to openid and offline_access permissions** is selected.
8888
1. Select **Register**.

0 commit comments

Comments
 (0)