diff --git a/policies/disable-inactive-account/readme.md b/policies/disable-inactive-account/readme.md index ec9dc248..09ff7fe6 100644 --- a/policies/disable-inactive-account/readme.md +++ b/policies/disable-inactive-account/readme.md @@ -25,9 +25,12 @@ The user will be presented with a dummy page rendered by the `Self-Asserted-Acco For subsequent logons whilst the account is disabled, the user will be get treated by the native Azure AD B2C functionality for disabled accounts. This error message can also be customised. +### Note: +This sample requires custom attributes to be enabled in the policy by providing `ApplicationObjectId` in the `AAD-Common` technical profile metadata as mentioned [here](https://learn.microsoft.com/en-us/azure/active-directory-b2c/user-flow-custom-attributes?pivots=b2c-custom-policy#modify-your-custom-policy). + ## Unit Tests 1. Sign up with an account, check the value of exentsion_lastLogonTime using the unlock-account.ps1 script. 2. Sign in after sign up to make sure the account can login successfully. 3. After a few minutes, sign in again and verify the account is locked out. 4. Sign in again and you will see the native account disabled error from Azure AD B2C -5. Use the script to unlock the account and repeat these steps. \ No newline at end of file +5. Use the script to unlock the account and repeat these steps.