Skip to content

Commit c57ca02

Browse files
committed
Merge branch 'amshenou/identityproviders-custompidc' of https://github.com/microsoftgraph/microsoft-graph-docs into amshenou/identityproviders-custompidc
2 parents e1f4162 + c45ccba commit c57ca02

File tree

2 files changed

+8
-8
lines changed

2 files changed

+8
-8
lines changed

api-reference/beta/resources/openidconnectidentityprovider.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -32,15 +32,15 @@ For the list of API operations for managing OpenID Connect identity providers in
3232
|Property|Type|Description|
3333
|:---------------|:--------|:----------|
3434
|clientId|String|The client identifier for the application obtained when registering the application with the identity provider. Required.|
35-
|clientSecret|String|The client secret for the application obtained when registering the application with the identity provider. The clientSecret has a dependency on **responseType**. <ul><li>When **responseType** is `code`, a secret is required for the auth code exchange.</li><li>When **responseType** is `id_token` the secret is not required because there is no code exchange. The id_token is returned directly from the authorization response.</li></ul> This is write-only. A read operation returns `****`.|
35+
|clientSecret|String|The client secret for the application obtained when registering the application with the identity provider. The clientSecret has a dependency on **responseType**. <ul><li>When **responseType** is `code`, a secret is required for the auth code exchange.</li><li>When **responseType** is `id_token`, the secret isn't required because there's no code exchange. The id_token is returned directly from the authorization response.</li></ul> This is write-only. A read operation returns `****`.|
3636
|id|String|The identifier of the identity provider.Required. Inherited from [identityProviderBase](../resources/identityproviderbase.md). Read-only.|
3737
|displayName|String|The display name of the identity provider. |
3838
|claimsMapping|[claimsMapping](claimsmapping.md)|After the OIDC provider sends an ID token back to Microsoft Entra ID, Microsoft Entra ID needs to be able to map the claims from the received token to the claims that Microsoft Entra ID recognizes and uses. This complex type captures that mapping. Required.|
39-
|domainHint|String|The domain hint can be used to skip directly to the sign-in page of the specified identity provider, instead of having the user make a selection among the list of available identity providers.|
39+
|domainHint|String|The domain hint can be used to skip directly to the sign-in page of the specified identity provider instead of having the user make a selection among the list of available identity providers.|
4040
|metadataUrl|String|The URL for the metadata document of the OpenID Connect identity provider. Every OpenID Connect identity provider describes a metadata document that contains most of the information required to perform sign-in. This includes information such as the URLs to use and the location of the service's public signing keys. The OpenID Connect metadata document is always located at an endpoint that ends in `.well-known/openid-configuration`. Provide the metadata URL for the OpenID Connect identity provider you add. Read-only. Required.|
4141
|responseMode|[openIdConnectResponseMode](#openidconnectresponsemode-values)|The response mode defines the method used to send data back from the custom identity provider to Azure AD B2C. Possible values: `form_post`, `query`. Required.|
42-
|responseType|[openIdConnectResponseTypes](#openidconnectresponsetypes-values)|The response type describes the type of information sent back in the initial call to the authorization_endpoint of the custom identity provider. Possible values: `code` , `id_token` , `token`. Required.|
43-
|scope|String|Scope defines the information and permissions you are looking to gather from your custom identity provider. OpenID Connect requests must contain the openid scope value in order to receive the ID token from the identity provider. Without the ID token, users are not able to sign in to Azure AD B2C using the custom identity provider. Other scopes can be appended, separated by a space. For more details about the scope limitations, see [RFC6749 Section 3.3](https://tools.ietf.org/html/rfc6749#section-3.3). Required.|
42+
|responseType|[openIdConnectResponseTypes](#openidconnectresponsetypes-values)|The response type describes the type of information sent back in the initial call to the authorization_endpoint of the custom identity provider. Possible values: `code` , `id_token` , `token`. Required.|
43+
|scope|String|Scope defines the information and permissions you're looking to gather from your custom identity provider. OpenID Connect requests must contain the openid scope value in order to receive the ID token from the identity provider. Without the ID token, users aren't able to sign in to Azure AD B2C using the custom identity provider. Other scopes can be appended, separated by a space. For more information about the scope limitations, see [RFC6749 Section 3.3](https://tools.ietf.org/html/rfc6749#section-3.3). Required.|
4444

4545
### openIdConnectResponseMode values
4646
|Member|Description|
@@ -54,7 +54,7 @@ For the list of API operations for managing OpenID Connect identity providers in
5454
:--------|:----------|
5555
|code|As per the authorization code flow, a code is returned back to Azure AD B2C. Azure AD B2C proceeds to call the token_endpoint to exchange the code for the token.|
5656
|id_token|An ID token is returned back to Azure AD B2C from the custom identity provider.|
57-
|token|An access token is returned back to Azure AD B2C from the custom identity provider. (This value is not supported by Azure AD B2C at the moment)|
57+
|token|An access token is returned back to Azure AD B2C from the custom identity provider. (This value isn't supported by Azure AD B2C at the moment)|
5858

5959
## JSON representation
6060

api-reference/beta/toc/identity-and-access/toc.yml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -2565,9 +2565,9 @@ items:
25652565
href: ../../resources/socialidentityprovider.md
25662566
- name: Apple managed identity provider
25672567
href: ../../resources/applemanagedidentityprovider.md
2568-
- name: Oidc identity provider
2569-
href: ../../resources/oidcIdentityProvider.md
2570-
- name: Open id connect identity provider
2568+
- name: OIDC identity provider
2569+
href: ../../resources/oidcidentityprovider.md
2570+
- name: OpenID Connect identity provider
25712571
href: ../../resources/openidconnectidentityprovider.md
25722572
- name: Domain-based external identities
25732573
items:

0 commit comments

Comments
 (0)