You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: aspnetcore/blazor/security/webassembly/hosted-with-azure-active-directory-b2c.md
+3-3
Original file line number
Diff line number
Diff line change
@@ -29,7 +29,7 @@ Follow the guidance in [Tutorial: Register an application in Azure Active Direct
29
29
30
30
1. In **Azure Active Directory** > **App registrations**, select **New registration**.
31
31
1. Provide a **Name** for the app (for example, **Blazor Server AAD B2C**).
32
-
1. For **Supported account types**, select the multi-tenant option: **Accounts in any organizational directory or any identity provider. For authenticating users with Azure AD B2C.**
32
+
1. For **Supported account types**, select the multi-tenant option: **Accounts in any identity provider or organizational directory (for authenticating users with user flows)**
33
33
1. The *Server API app* doesn't require a **Redirect URI** in this scenario, so leave the drop down set to **Web** and don't enter a redirect URI.
34
34
1. Confirm that **Permissions** > **Grant admin consent to openid and offline_access permissions** is selected.
35
35
1. Select **Register**.
@@ -62,7 +62,7 @@ Follow the guidance in [Tutorial: Register an application in Azure Active Direct
62
62
63
63
1. In **Azure Active Directory** > **App registrations**, select **New registration**.
64
64
1. Provide a **Name** for the app (for example, **Blazor Client AAD B2C**).
65
-
1. For **Supported account types**, select the multi-tenant option: **Accounts in any organizational directory or any identity provider. For authenticating users with Azure AD B2C.**
65
+
1. For **Supported account types**, select the multi-tenant option: **Accounts in any identity provider or organizational directory (for authenticating users with user flows)**
66
66
1. Set the **Redirect URI** drop down to **Single-page application (SPA)** and provide the following redirect URI: `https://localhost:{PORT}/authentication/login-callback`. The default port for an app running on Kestrel is 5001. If the app is run on a different Kestrel port, use the app's port. For IIS Express, the randomly generated port for the app can be found in the *`Server`* app's properties in the **Debug** panel. Since the app doesn't exist at this point and the IIS Express port isn't known, return to this step after the app is created and update the redirect URI. A remark appears in the [Create the app](#create-the-app) section to remind IIS Express users to update the redirect URI.
67
67
1. Confirm that **Permissions** > **Grant admin consent to openid and offline_access permissions** is selected.
1. In **Azure Active Directory** > **App registrations**, select **New registration**.
84
84
1. Provide a **Name** for the app (for example, **Blazor Client AAD B2C**).
85
-
1. For **Supported account types**, select the multi-tenant option: **Accounts in any organizational directory or any identity provider. For authenticating users with Azure AD B2C.**
85
+
1. For **Supported account types**, select the multi-tenant option: **Accounts in any identity provider or organizational directory (for authenticating users with user flows)**
86
86
1. Leave the **Redirect URI** drop down set to **Web** and provide the following redirect URI: `https://localhost:{PORT}/authentication/login-callback`. The default port for an app running on Kestrel is 5001. If the app is run on a different Kestrel port, use the app's port. For IIS Express, the randomly generated port for the app can be found in the *`Server`* app's properties in the **Debug** panel. Since the app doesn't exist at this point and the IIS Express port isn't known, return to this step after the app is created and update the redirect URI. A remark appears in the [Create the app](#create-the-app) section to remind IIS Express users to update the redirect URI.
87
87
1. Confirm that **Permissions** > **Grant admin consent to openid and offline_access permissions** is selected.
0 commit comments