Skip to content

Commit 1bfaeaa

Browse files
author
Tiago Brenck
committed
Renaming policy to userFlow
1 parent 97bd750 commit 1bfaeaa

File tree

4 files changed

+19
-19
lines changed

4 files changed

+19
-19
lines changed

Microsoft.Identity.Web/AuthorityHelpers.cs

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -29,11 +29,11 @@ internal static string BuildAuthority(MicrosoftIdentityOptions options)
2929
var pathBase = baseUri.PathAndQuery.TrimEnd('/');
3030
var domain = options.Domain;
3131

32-
// If there are policies, then it must build a B2C authority
33-
if (!string.IsNullOrWhiteSpace(options.DefaultPolicy))
32+
// If there are user flows, then it must build a B2C authority
33+
if (!string.IsNullOrWhiteSpace(options.DefaultUserFlow))
3434
{
35-
var policy = options.DefaultPolicy;
36-
return new Uri(baseUri, new PathString($"{pathBase}/{domain}/{policy}/v2.0")).ToString();
35+
var userFlow = options.DefaultUserFlow;
36+
return new Uri(baseUri, new PathString($"{pathBase}/{domain}/{userFlow}/v2.0")).ToString();
3737
}
3838

3939
else

Microsoft.Identity.Web/AzureADB2COpenIDConnectEventHandlers.cs

Lines changed: 10 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -27,29 +27,29 @@ public AzureADB2COpenIDConnectEventHandlers(string schemeName, MicrosoftIdentity
2727

2828
public Task OnRedirectToIdentityProvider(RedirectContext context)
2929
{
30-
var defaultPolicy = Options.DefaultPolicy;
30+
var defaultUserFlow = Options.DefaultUserFlow;
3131
if (context.Properties.Items.TryGetValue(OidcConstants.PolicyKey, out var policy) &&
3232
!string.IsNullOrEmpty(policy) &&
33-
!string.Equals(policy, defaultPolicy, StringComparison.OrdinalIgnoreCase))
33+
!string.Equals(policy, defaultUserFlow, StringComparison.OrdinalIgnoreCase))
3434
{
3535
context.ProtocolMessage.Scope = OpenIdConnectScope.OpenIdProfile;
3636
context.ProtocolMessage.ResponseType = OpenIdConnectResponseType.IdToken;
37-
context.ProtocolMessage.IssuerAddress = BuildIssuerAddress(context, defaultPolicy, policy);
37+
context.ProtocolMessage.IssuerAddress = BuildIssuerAddress(context, defaultUserFlow, policy);
3838
context.Properties.Items.Remove(OidcConstants.PolicyKey);
3939
}
4040

4141
return Task.CompletedTask;
4242
}
4343

44-
private string BuildIssuerAddress(RedirectContext context, string defaultPolicy, string policy)
44+
private string BuildIssuerAddress(RedirectContext context, string defaultUserFlow, string userFlow)
4545
{
46-
if (!_policyToIssuerAddress.TryGetValue(policy, out var issuerAddress))
46+
if (!_policyToIssuerAddress.TryGetValue(userFlow, out var issuerAddress))
4747
{
48-
_policyToIssuerAddress[policy] = context.ProtocolMessage.IssuerAddress.ToLowerInvariant()
49-
.Replace($"/{defaultPolicy.ToLowerInvariant()}/", $"/{policy.ToLowerInvariant()}/");
48+
_policyToIssuerAddress[userFlow] = context.ProtocolMessage.IssuerAddress.ToLowerInvariant()
49+
.Replace($"/{defaultUserFlow.ToLowerInvariant()}/", $"/{userFlow.ToLowerInvariant()}/");
5050
}
5151

52-
return _policyToIssuerAddress[policy];
52+
return _policyToIssuerAddress[userFlow];
5353
}
5454

5555
public Task OnRemoteFailure(RemoteFailureContext context)
@@ -65,7 +65,7 @@ public Task OnRemoteFailure(RemoteFailureContext context)
6565
if (context.Failure is OpenIdConnectProtocolException && context.Failure.Message.Contains("AADB2C90118"))
6666
{
6767
// If the user clicked the reset password link, redirect to the reset password route
68-
context.Response.Redirect($"{context.Request.PathBase}/AzureADB2C/Account/ResetPassword/{SchemeName}");
68+
context.Response.Redirect($"{context.Request.PathBase}/MicrosoftIdentity/Account/ResetPassword/{SchemeName}");
6969
}
7070
// Access denied errors happen when a user cancels an action on the Azure Active Directory B2C UI. We just redirect back to
7171
// the main page in that case.
@@ -79,7 +79,7 @@ public Task OnRemoteFailure(RemoteFailureContext context)
7979
}
8080
else
8181
{
82-
context.Response.Redirect($"{context.Request.PathBase}/AzureADB2C/Account/Error");
82+
context.Response.Redirect($"{context.Request.PathBase}/MicrosoftIdentity/Account/Error");
8383
}
8484

8585
return Task.CompletedTask;

Microsoft.Identity.Web/MicrosoftIdentityOptions.cs

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -38,10 +38,10 @@ public class MicrosoftIdentityOptions : OpenIdConnectOptions
3838
public string ResetPasswordPolicyId { get; set; }
3939

4040
/// <summary>
41-
/// Gets or sets the default policy.
41+
/// Gets the default user flow (which is signUpsignIn).
4242
/// </summary>
43-
public string DefaultPolicy => SignUpSignInPolicyId;
43+
public string DefaultUserFlow => SignUpSignInPolicyId;
4444

45-
internal bool IsB2C { get { return !string.IsNullOrWhiteSpace(DefaultPolicy); } }
45+
internal bool IsB2C { get { return !string.IsNullOrWhiteSpace(DefaultUserFlow); } }
4646
}
4747
}

Microsoft.Identity.Web/TokenAcquisition.cs

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -314,7 +314,7 @@ private IConfidentialClientApplication BuildConfidentialClientApplication()
314314

315315
if (microsoftIdentityOptions.IsB2C)
316316
{
317-
authority = $"{applicationOptions.Instance.TrimEnd('/')}/tfp/{microsoftIdentityOptions.Domain}/{microsoftIdentityOptions.DefaultPolicy}";
317+
authority = $"{applicationOptions.Instance.TrimEnd('/')}/tfp/{microsoftIdentityOptions.Domain}/{microsoftIdentityOptions.DefaultUserFlow}";
318318
app = ConfidentialClientApplicationBuilder
319319
.CreateWithApplicationOptions(applicationOptions)
320320
.WithRedirectUri(currentUri)
@@ -418,7 +418,7 @@ private async Task<string> GetAccessTokenOnBehalfOfUserFromCacheAsync(
418418
// Acquire an access token as another B2C authority
419419
if (_microsoftIdentityOptions.IsB2C)
420420
{
421-
string authority = application.Authority.Replace(new Uri(application.Authority).PathAndQuery, $"/tfp/{tenant}/{_microsoftIdentityOptions.DefaultPolicy}");
421+
string authority = application.Authority.Replace(new Uri(application.Authority).PathAndQuery, $"/tfp/{tenant}/{_microsoftIdentityOptions.DefaultUserFlow}");
422422
result = await application
423423
.AcquireTokenSilent(scopes.Except(_scopesRequestedByMsal), account)
424424
.WithB2CAuthority(authority)

0 commit comments

Comments
 (0)