azure-ad-b2c

http 400: size of header request is too long when signing in user using Multifactor authentication

对着背影说爱祢 提交于 2019-12-01 19:37:40
I am trying out the Azure AD-B2C. The user signup/sign in is fine when the MFA is turned off. But when I turn it on, and the user tries to sign in and provides the phone number, and requests a text message by clicking "send code", I get the Http 400 error: size of request headers is too long. Anybody else have this issue? The error HTTP 400: Size of header request is too long generally happens because there's too many cookies. Azure AD B2C's login goes through login.microsoftonline.com, as does almost every Microsoft service (O365, Azure, etc). So if you've got several accounts that you've

http 400: size of header request is too long when signing in user using Multifactor authentication

允我心安 提交于 2019-12-01 17:42:01
问题 I am trying out the Azure AD-B2C. The user signup/sign in is fine when the MFA is turned off. But when I turn it on, and the user tries to sign in and provides the phone number, and requests a text message by clicking "send code", I get the Http 400 error: size of request headers is too long. Anybody else have this issue? 回答1: The error HTTP 400: Size of header request is too long generally happens because there's too many cookies. Azure AD B2C's login goes through login.microsoftonline.com,

Azure B2C client credentials grant

孤人 提交于 2019-12-01 15:56:11
I’ve implemented Azure B2C for user login/logout and can get the id_token and pass it to my web API for authorization, all works well. Now, I have some Web API methods that should be only accessed by the client web application (ASP.NET 4.6) which means OAuth 2.0 "client credentials grant". I’ve done a lot of research and the closest I could find is this quick-start which uses ADAL in a B2C application to call Graph API. I followed along and got to the point where I’m trying to get the client access token as in the below code. However, no matter what I pass to the AcquireToken method as the

Get the Azure AD B2C Application client id in the custom policy

扶醉桌前 提交于 2019-12-01 13:52:53
Hi the custom policy gets called with the client id of the B2C app https://login.microsoftonline.com/TENANT/oauth2/v2.0/authorize?p=B2C_1A_POLICY&client_id=THE-CLIENT-ID-I-WANT How can I access this in the policy, i thought this would be hard coded to the client_id claim but I dont think it is Its only returned as default as the aud claim but again I dont see that in the custom policy Thanks Ok its a bit of a work around but I tried with a standard UserJourneyContextProvider technical profile and this didnt work so to get the client id as a claim I did the following Create an orchestration

Authentication vs Authorization?

浪尽此生 提交于 2019-12-01 13:37:46
问题 I'm new to Azure ADB2C, and am confused by some of the terminology. I am building a motorcycle ride monitoring website that I would like users to be able to log in to by verifying a social media identity (Google & Microsoft Account, for now). But I only want users who are members of the site to be able to use certain features. For example, I'd like everyone who authenticates to be able to apply for membership, read about the benefits of membership, etc., but I only want members to be able to

Azure B2C - Single App with multiple login for different user types setup in Azure

别等时光非礼了梦想. 提交于 2019-12-01 09:57:46
问题 I'm building an ASP.Net core app. I have two types of users, the Consumers and the Vendors. How can I in Azure AD B2C setup TWO different Signup/Signin for my two different types of users? So in my ASP I can have a page for consumers to signup using third party providers and a page for vendors to signup with email/password and other data. In this case, will azure keep these users separately? How will I know when I get a Token what type of user has logged in? Thank you in advance! ..Ben 回答1:

Azure Graph API, Angular, Get users Groups

对着背影说爱祢 提交于 2019-12-01 07:31:18
I want to query Azure AD Graph API to retrieve the groups claim for the logged in user from a registered Azure B2C app. The app I'm calling from is an Angular 5 SPA. After experimenting with Azure Active Directory and adal-angular4, I was successful retrieving a user's custom roles claim . To do this, I registered an Azure AD app, set required permission scopes, added custom roles to the application's manifest, added the user to the application, and set the custom role for the user. Then, I used my new registered app's application id and tenant for the adal-angular4 config. When I query the

How do I view the claims returned from B2C? | B2C JWT Viewer

我们两清 提交于 2019-12-01 07:28:28
问题 How can I easily view the id token and access tokens returned from B2C? I know there are tools like https://jwt.io/ but I have manually copy and paste tokens from the URL. Surely, there has to be an easier way, no? 回答1: Setup Create a B2C Web App called Token Viewer set the reply url to https://jwt.ms Give it access any published scopes Execute a Policy Open one of your policies Change the app Token View Clicking run now will get you an id token Sample ID Token Expand ACCESS TOKENS to obtain

Azure AD B2C with custom policies: Unable to authenticate user with temporary password

眉间皱痕 提交于 2019-12-01 05:12:56
I have configured Azure AD B2C with custom policies but I am unable to authenticate with a new user created in the Azure portal. The user has a temporary password. Azure AD B2C returns the error text Invalid username or password , even though the username and password is correct. I have confirmed that it is possible to login with the new user and temporary password in Azure AD B2C using non custom policies. After logging in, the user gets prompted to change their password. The problem can be reproduced using the custom policies described in this guide: Get started with custom policies .

Azure Graph API, Angular, Get users Groups

喜欢而已 提交于 2019-12-01 05:04:20
问题 I want to query Azure AD Graph API to retrieve the groups claim for the logged in user from a registered Azure B2C app. The app I'm calling from is an Angular 5 SPA. After experimenting with Azure Active Directory and adal-angular4, I was successful retrieving a user's custom roles claim . To do this, I registered an Azure AD app, set required permission scopes, added custom roles to the application's manifest, added the user to the application, and set the custom role for the user. Then, I