Use Stack Overflow to get support from the community. Ask your questions on Stack Overflow first and browse existing issues to see if someone has asked your question before. Make sure that your questions or comments are tagged with [azure-ad-b2c]. If you find a bug in the sample, please raise the issue on GitHub Issues. To provide product feedback, visit the Azure Active Directory B2C Feedback page.
This policy utilises passthrough authentication to B2C. The user wil NOT be stored within the B2C directory. Each authentication will call AAD retrieve the provided claims and then call a REST API to augment additional claims to send to the target Applications. This policy is based on the Azure AD Single tenant implementation as well as the "Integrate REST API claims" documentation.
To implement this use case follow the following steps;
- Ensure you have followed the "Get Started with custom policies" steps within the Microsoft documentation site.
- Change the refernces in the Policy from "yourtenant.onmicrosoft.com" to the name of your B2C Tenant.
- Update the OIDC-Contoso technical profile to reflect your azureAd tenant details as per the Microsoft dcumentation.
- Update the REST-GetCRMData technical profile to represent your API as per the Microsoft docmentation.
- Uplaod and run your policy.
This sample policy is based on SocialAndLocalAccountsWithMFA starter pack However any of the starter pack policies should work for this. All changes are marked with Sample: comment inside the policy XML files. Make the necessary changes in the Sample action required sections.