
For the Client ID, enter the Client ID of the LinkedIn application that you created earlier. Select Identity providers, then select LinkedIn. Choose All services in the top-left corner of the Azure portal, search for and select Azure AD B2C. On the Portal settings | Directories + subscriptions page, find your Azure AD B2C directory in the Directory name list, and then select Switch. Select the Directories + subscriptions icon in the portal toolbar. Make sure you're using the directory that contains your Azure AD B2C tenant. Sign in to the Azure portal as the global administrator of your Azure AD B2C tenant. When the review is complete, the required scopes will be added to your application.Ĭonfigure LinkedIn as an identity provider To request a review, select the Products tab, and then select Sign In with LinkedIn. By default, your LinkedIn app isn't approved for scopes related to sign in. You need to use all lowercase letters when entering your tenant name even if the tenant is defined with uppercase letters in Azure AD B2C. If you use a custom domain, enter Replace your-tenant-name with the name of your tenant, and your-domain-name with your custom domain. Select the edit pencil next to Authorized redirect URLs for your app, and then select Add redirect URL. Client Secret is an important security credential. You'll need both of them to configure LinkedIn as an identity provider in your tenant. Under Authentication Keys, copy the values for Client ID and Client Secret. Agree to the LinkedIn API Terms of Use and click Create app. Enter App name, LinkedIn Page, Privacy policy URL, and App logo. Select My Apps, and then click Create app. Sign in to the LinkedIn Developers website with your LinkedIn account credentials.
If you don't already have a LinkedIn account, you can sign up at.
For more information, see Authorization Code Flow. To enable sign-in for users with a LinkedIn account in Azure Active Directory B2C (Azure AD B2C), you need to create an application in LinkedIn Developers website.
Complete the steps in Get started with custom policies in Active Directory B2C.