diff --git a/.github/workflows/deployment.json b/.github/workflows/deployment.json
index 89d0f77..49554c8 100644
--- a/.github/workflows/deployment.json
+++ b/.github/workflows/deployment.json
@@ -153,6 +153,15 @@
}
]
},
+ {
+ "path": "Identity-providers/Google/IDP_Google_SelectAccount.xml",
+ "replacements": [
+ {
+ "find": "- Your Google application ID
",
+ "replace": "- 1038624651382-kj4eufts3hi7d1j4u51jt5h98edu2s35.apps.googleusercontent.com
"
+ }
+ ]
+ },
{
"path": "claims/Claim_Mask_Regex.xml"
},
diff --git a/Identity-providers/Google/IDP_Google_SelectAccount.xml b/Identity-providers/Google/IDP_Google_SelectAccount.xml
new file mode 100644
index 0000000..2295af3
--- /dev/null
+++ b/Identity-providers/Google/IDP_Google_SelectAccount.xml
@@ -0,0 +1,165 @@
+
+
+
+ yourtenant.onmicrosoft.com
+ B2C_1A_TrustFrameworkExtensions
+
+
+
+
+
+ string
+
+
+
+
+
+
+ google.com
+ Google
+
+
+ Google
+
+
+ - google
+ - https://accounts.google.com/o/oauth2/auth
+ - https://accounts.google.com/o/oauth2/token
+ - https://www.googleapis.com/oauth2/v1/userinfo
+ - email profile
+ - POST
+ - false
+ - Your Google application ID
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ objectId
+ SkipThisOrchestrationStep
+
+
+
+
+
+
+
+
+
+
+
+ authenticationSource
+ localAccountAuthentication
+ SkipThisOrchestrationStep
+
+
+
+
+
+
+
+
+
+
+ objectId
+ SkipThisOrchestrationStep
+
+
+
+
+
+
+
+
+
+
+ authenticationSource
+ socialIdpAuthentication
+ SkipThisOrchestrationStep
+
+
+
+
+
+
+
+
+
+
+ objectId
+ SkipThisOrchestrationStep
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ PolicyProfile
+
+
+
+
+
+
+
+
+
+
+
+
+
+
\ No newline at end of file
diff --git a/Identity-providers/readme.md b/Identity-providers/readme.md
index 072102f..498408e 100644
--- a/Identity-providers/readme.md
+++ b/Identity-providers/readme.md
@@ -56,6 +56,13 @@ Demonstrates how to federate with Google identity provider, and get the access t
![live demo](../media/demo.png) [Live demo](https://b2clivedemo.b2clogin.com/b2clivedemo.onmicrosoft.com/B2C_1A_IDP_Google_AccessToken/oauth2/v2.0/authorize?client_id=cfaf887b-a9db-4b44-ac47-5efff4e2902c&nonce=defaultNonce&redirect_uri=https%3A%2F%2Fjwt.ms&scope=openid&response_type=id_token&prompt=login) ![Quick deploy](../media/deploy.png) [Quick deploy](https://b2ciefsetupapp.azurewebsites.net/) ![policy](../media/policy.png) [Policy](Google/IDP_Google_AccessToken.xml) ![documentation](../media/doc.png) [Documentation](https://docs.microsoft.com/azure/active-directory-b2c/idp-pass-through-user-flow?pivots=b2c-custom-policy)
+
+## Google with select account
+
+Demonstrates how to federate with Google identity provider and [prompt the user to select an account](https://developers.google.com/identity/protocols/oauth2/web-server#creatingclient). With the access token you can call Graph API.
+
+![live demo](../media/demo.png) [Live demo](https://b2clivedemo.b2clogin.com/b2clivedemo.onmicrosoft.com/B2C_1A_IDP_Google_SelectAccount/oauth2/v2.0/authorize?client_id=cfaf887b-a9db-4b44-ac47-5efff4e2902c&nonce=defaultNonce&redirect_uri=https%3A%2F%2Fjwt.ms&scope=openid&response_type=id_token&prompt=login) ![Quick deploy](../media/deploy.png) [Quick deploy](https://b2ciefsetupapp.azurewebsites.net/) ![policy](../media/policy.png) [Policy](Google/IDP_Google_SelectAccount.xml) ![documentation](../media/doc.png) [Documentation](https://docs.microsoft.com/azure/active-directory-b2c/idp-pass-through-user-flow?pivots=b2c-custom-policy)
+
## Mobile ID
Demonstrates how to federate with Mobile ID identity provider.