diff --git a/.github/workflows/deployment.json b/.github/workflows/deployment.json index 89d0f77..49554c8 100644 --- a/.github/workflows/deployment.json +++ b/.github/workflows/deployment.json @@ -153,6 +153,15 @@ } ] }, + { + "path": "Identity-providers/Google/IDP_Google_SelectAccount.xml", + "replacements": [ + { + "find": "Your Google application ID", + "replace": "1038624651382-kj4eufts3hi7d1j4u51jt5h98edu2s35.apps.googleusercontent.com" + } + ] + }, { "path": "claims/Claim_Mask_Regex.xml" }, diff --git a/Identity-providers/Google/IDP_Google_SelectAccount.xml b/Identity-providers/Google/IDP_Google_SelectAccount.xml new file mode 100644 index 0000000..2295af3 --- /dev/null +++ b/Identity-providers/Google/IDP_Google_SelectAccount.xml @@ -0,0 +1,165 @@ + + + + yourtenant.onmicrosoft.com + B2C_1A_TrustFrameworkExtensions + + + + + + string + + + + + + + google.com + Google + + + Google + + + google + https://accounts.google.com/o/oauth2/auth + https://accounts.google.com/o/oauth2/token + https://www.googleapis.com/oauth2/v1/userinfo + email profile + POST + false + Your Google application ID + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + objectId + SkipThisOrchestrationStep + + + + + + + + + + + + authenticationSource + localAccountAuthentication + SkipThisOrchestrationStep + + + + + + + + + + + objectId + SkipThisOrchestrationStep + + + + + + + + + + + authenticationSource + socialIdpAuthentication + SkipThisOrchestrationStep + + + + + + + + + + + objectId + SkipThisOrchestrationStep + + + + + + + + + + + + + + + PolicyProfile + + + + + + + + + + + + + + \ No newline at end of file diff --git a/Identity-providers/readme.md b/Identity-providers/readme.md index 072102f..498408e 100644 --- a/Identity-providers/readme.md +++ b/Identity-providers/readme.md @@ -56,6 +56,13 @@ Demonstrates how to federate with Google identity provider, and get the access t ![live demo](../media/demo.png) [Live demo](https://b2clivedemo.b2clogin.com/b2clivedemo.onmicrosoft.com/B2C_1A_IDP_Google_AccessToken/oauth2/v2.0/authorize?client_id=cfaf887b-a9db-4b44-ac47-5efff4e2902c&nonce=defaultNonce&redirect_uri=https%3A%2F%2Fjwt.ms&scope=openid&response_type=id_token&prompt=login)   ![Quick deploy](../media/deploy.png) [Quick deploy](https://b2ciefsetupapp.azurewebsites.net/)   ![policy](../media/policy.png) [Policy](Google/IDP_Google_AccessToken.xml)   ![documentation](../media/doc.png) [Documentation](https://docs.microsoft.com/azure/active-directory-b2c/idp-pass-through-user-flow?pivots=b2c-custom-policy) + +## Google with select account + +Demonstrates how to federate with Google identity provider and [prompt the user to select an account](https://developers.google.com/identity/protocols/oauth2/web-server#creatingclient). With the access token you can call Graph API. + +![live demo](../media/demo.png) [Live demo](https://b2clivedemo.b2clogin.com/b2clivedemo.onmicrosoft.com/B2C_1A_IDP_Google_SelectAccount/oauth2/v2.0/authorize?client_id=cfaf887b-a9db-4b44-ac47-5efff4e2902c&nonce=defaultNonce&redirect_uri=https%3A%2F%2Fjwt.ms&scope=openid&response_type=id_token&prompt=login)   ![Quick deploy](../media/deploy.png) [Quick deploy](https://b2ciefsetupapp.azurewebsites.net/)   ![policy](../media/policy.png) [Policy](Google/IDP_Google_SelectAccount.xml)   ![documentation](../media/doc.png) [Documentation](https://docs.microsoft.com/azure/active-directory-b2c/idp-pass-through-user-flow?pivots=b2c-custom-policy) + ## Mobile ID Demonstrates how to federate with Mobile ID identity provider.