ocano.net
PREFACE
This post kicks off a series, where I will be working on Azure Active Directory B2C (AADB2C) between the Azure Portal, custom policies configuration files and a .NET core application with read/write permissions to AADB2C users.
More Posts
EXTENSIONS FILE
Overall, the post shows how to extend custom policies with claim types, claims transformations, content definitions, localization, claims providers and user journeys.
STARTER PACK RELYING PARTY FILES
The post shows how to configure Relying party files such as SignUpOrSignin.xml and PasswordReset.xml with output claims that you have added to the Extensions file. It also shows how to configure AADB2C for testing resulting user flows.
SAML2 SIGN-IN ONLY
The post shows additions I made to the Extensions file to support sign-in only via SAML service providers. It also shows the corresponding changes I had to make to a Relying party file in order for it to work with a new user journey and the email claim as a unique identifier.
BASIC USER OPERATIONS WITH MICROSOFT GRAPH API
The post shows how to configure AADB2C for an application with read/write permissions to perform operations on users. The post also shows how to perform create, read, update, delete (CRUD) operations on a user in C#, using the Microsoft.Graph package.