Skip to content

Commit 02d0517

Browse files
authored
Merge pull request #288024 from MicrosoftDocs/main
10/8/2024 AM Publish
2 parents 903f00d + 9f933ce commit 02d0517

File tree

69 files changed

+469
-848
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

69 files changed

+469
-848
lines changed

articles/active-directory-b2c/add-web-api-application.md

Lines changed: 3 additions & 21 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ author: kengaderdus
66
manager: CelesteDG
77

88
ms.author: kengaderdus
9-
ms.date: 01/11/2024
9+
ms.date: 10/11/2024
1010
ms.custom: mvc
1111
ms.topic: how-to
1212
ms.service: azure-active-directory
@@ -21,9 +21,7 @@ ms.subservice: b2c
2121

2222
This article shows you how to register web API resources in your Azure Active Directory B2C (Azure AD B2C) tenant so that they can accept and respond to requests by client applications that present an access token.
2323

24-
To register an application in your Azure AD B2C tenant, you can use the Azure portal's new unified **App registrations** experience or the legacy **Applications (Legacy)** experience. [Learn more about the new experience](./app-registrations-training-guide.md).
25-
26-
#### [App registrations](#tab/app-reg-ga/)
24+
To register an application in your Azure AD B2C tenant, you can use the following steps:
2725

2826
1. Sign in to the [Azure portal](https://portal.azure.com).
2927
1. If you have access to multiple tenants, select the **Settings** icon in the top menu to switch to your Azure AD B2C tenant from the **Directories + subscriptions** menu.
@@ -34,22 +32,6 @@ To register an application in your Azure AD B2C tenant, you can use the Azure po
3432
1. Select **Register**.
3533
1. Record the **Application (client) ID** for use in your web API's code.
3634

37-
38-
#### [Applications (Legacy)](#tab/applications-legacy/)
39-
40-
1. Sign in to the [Azure portal](https://portal.azure.com).
41-
1. If you have access to multiple tenants, select the **Settings** icon in the top menu to switch to your Azure AD B2C tenant from the **Directories + subscriptions** menu.
42-
1. Choose **All services** in the top-left corner of the Azure portal, and then search for and select **Azure AD B2C**.
43-
1. Select **Applications (Legacy)**, and then select **Add**.
44-
1. Enter a name for the application. For example, *webapi1*.
45-
1. For **Include web app/ web API** and **Allow implicit flow**, select **Yes**.
46-
1. For **Reply URL**, enter an endpoint where Azure AD B2C should return any tokens that your application requests. In your production application, you might set the reply URL to a value such as `https://localhost:44332`. For testing purposes, set the reply URL to `https://jwt.ms`.
47-
1. For **App ID URI**, enter the identifier used for your web API. The full identifier URI including the domain is generated for you. For example, `https://contosotenant.onmicrosoft.com/api`.
48-
1. Select **Create**.
49-
1. On the properties page, record the application ID that you'll use when you configure the web application.
50-
51-
* * *
52-
5335
## Configure scopes
5436

5537
Scopes provide a way to govern access to protected resources. Scopes are used by the web API to implement scope-based access control. For example, users of the web API could have both read and write access, or users of the web API might have only read access. In this tutorial, you use scopes to define read and write permissions for the web API.
@@ -62,4 +44,4 @@ To call a protected web API from an application, you need to grant your applicat
6244

6345
[!INCLUDE [active-directory-b2c-permissions-api](../../includes/active-directory-b2c-permissions-api.md)]
6446

65-
Your application is registered to call the protected web API. A user authenticates with Azure AD B2C to use the application. The application obtains an authorization grant from Azure AD B2C to access the protected web API.
47+
Your application is registered to call the protected web API. A user authenticates with Azure AD B2C to use the application. The application obtains an authorization grant from Azure AD B2C to access the protected web API.

articles/active-directory-b2c/age-gating.md

Lines changed: 0 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,12 +1,9 @@
11
---
22
title: Enable age gating in Azure Active Directory B2C
33
description: Learn about how to identify minors using your application.
4-
54
author: kengaderdus
65
manager: CelesteDG
7-
86
ms.service: azure-active-directory
9-
107
ms.topic: how-to
118
ms.date: 01/11/2024
129
ms.author: kengaderdus

articles/active-directory-b2c/application-types.md

Lines changed: 6 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -2,19 +2,14 @@
22
title: Application types supported by Azure AD B2C
33
titleSuffix: Azure AD B2C
44
description: Learn about the types of applications you can use with Azure Active Directory B2C.
5-
65
author: kengaderdus
6+
ms.author: kengaderdus
77
manager: CelesteDG
8-
98
ms.service: azure-active-directory
10-
119
ms.topic: concept-article
12-
ms.date: 01/11/2024
13-
ms.author: kengaderdus
10+
ms.date: 10/11/2024
1411
ms.subservice: b2c
1512

16-
17-
1813
#Customer intent: As a developer building an application that requires user authentication, I want to understand the different types of applications that can be used with Azure Active Directory B2C, so that I can choose the appropriate authentication method for my application.
1914

2015
---
@@ -94,12 +89,13 @@ To take advantage of this flow, your application can use an authentication libra
9489

9590
### Implicit grant flow
9691

97-
Some libraries, like [MSAL.js 1.x](https://github.com/AzureAD/microsoft-authentication-library-for-js/tree/dev/lib), only support the [implicit grant flow](implicit-flow-single-page-application.md) or your application is implemented to use implicit flow. In these cases, Azure AD B2C supports the [OAuth 2.0 implicit flow](implicit-flow-single-page-application.md). The implicit grant flow allows the application to get **ID** and **Access** tokens. Unlike the authorization code flow, implicit grant flow doesn't return a **Refresh token**.
98-
99-
We **don't recommended** this approach.
92+
Some libraries, like [MSAL.js 1.x](https://github.com/AzureAD/microsoft-authentication-library-for-js/tree/dev/lib), only support the [implicit grant flow](implicit-flow-single-page-application.md) or your application is implemented to use implicit flow. In these cases, Azure AD B2C supports the [OAuth 2.0 implicit flow](implicit-flow-single-page-application.md). The implicit grant flow allows the application to get **ID** and **Access** tokens. Unlike the authorization code flow, implicit grant flow doesn't return a **Refresh token**.
10093

10194
This authentication flow doesn't include application scenarios that use cross-platform JavaScript frameworks such as Electron and React-Native. Those scenarios require further capabilities for interaction with the native platforms.
10295

96+
> [!WARNING]
97+
> Microsoft recommends you do *not* use the implicit grant flow. The recommended way of supporting SPAs is [OAuth 2.0 Authorization code flow (with PKCE)](./authorization-code-flow.md). Certain configurations of this flow requires a very high degree of trust in the application, and carries risks that are not present in other flows. You should only use this flow when other more secure flows aren't viable. For more information, see the [security concerns with implicit grant flow](/entra/identity-platform/v2-oauth2-implicit-grant-flow#security-concerns-with-implicit-grant-flow).
98+
10399
## Web APIs
104100

105101
You can use Azure AD B2C to secure web services such as your application's RESTful web API. Web APIs can use OAuth 2.0 to secure their data, by authenticating incoming HTTP requests using tokens. The caller of a web API appends a token in the authorization header of an HTTP request:

articles/active-directory-b2c/client-credentials-grant-flow.md

Lines changed: 2 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ author: kengaderdus
66
manager: CelesteDG
77
ms.service: azure-active-directory
88
ms.topic: how-to
9-
ms.date: 01/11/2024
9+
ms.date: 10/11/2024
1010
ms.author: kengaderdus
1111
ms.subservice: b2c
1212
zone_pivot_groups: b2c-policy-type
@@ -263,9 +263,4 @@ The following example shows a client credentials user journey. The first and the
263263
```
264264

265265

266-
::: zone-end
267-
268-
269-
## Next steps
270-
271-
Learn how to [set up a resource owner password credentials flow in Azure AD B2C](add-ropc-policy.md)
266+
::: zone-end

articles/active-directory-b2c/configure-authentication-sample-spa-app.md

Lines changed: 9 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ manager: CelesteDG
77
ms.service: azure-active-directory
88

99
ms.topic: reference
10-
ms.date: 01/11/2024
10+
ms.date: 10/11/2024
1111
ms.author: kengaderdus
1212
ms.subservice: b2c
1313
ms.custom: "b2c-support"
@@ -100,15 +100,20 @@ Record the **Application (client) ID** to use later, when you configure the web
100100

101101
### Step 2.4: Enable the implicit grant flow
102102

103-
In your own environment, if your SPA app uses MSAL.js 1.3 or earlier and the implicit grant flow or you configure [https://jwt.ms/](https://jwt.ms/) app for testing a user flow or custom policy, you need to enable the implicit grant flow in the app registration:
103+
You can enable implicit grant flow for two reasons, when you’re using MSAL.js version 1.3 or earlier version or when you use an app registration to [test a user flow for testing purposes](add-sign-up-and-sign-in-policy.md?pivots=b2c-user-flow#test-the-user-flow).
104104

105-
1. In the left menu, under **Manage**, select **Authentication**.
105+
Use these steps to enable implicit grant flow for your app:
106+
107+
1. Select the app registration you created.
108+
109+
1. Under **Manage**, select **Authentication**.
106110

107111
1. Under **Implicit grant and hybrid flows**, select both the **Access tokens (used for implicit flows)** and **ID tokens (used for implicit and hybrid flows)** check boxes.
108112

109113
1. Select **Save**.
110114

111-
If your app uses MSAL.js 2.0 or later, don't enable implicit flow grant as MSAL.js 2.0+ supports the authorization code flow with PKCE. The SPA app in this article uses PKCE flow, and so you don't need to enable implicit grant flow.
115+
> [!NOTE]
116+
> If your app uses MSAL.js 2.0 or later, don't enable implicit grant flow as MSAL.js 2.0+ supports the [OAuth 2.0 Authorization code flow (with PKCE)](./authorization-code-flow.md). If you enable implicit grant to test a user flow, make sure you disable the implicit grant flow settings before you deploy your app to production.
112117
113118
### Step 2.5: Grant permissions
114119

articles/active-directory-b2c/custom-policies-series-branch-user-journey.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ ms.service: azure-active-directory
1010

1111
ms.topic: how-to
1212
ms.custom: b2c-docs-improvements
13-
ms.date: 01/11/2024
13+
ms.date: 10/11/2024
1414
ms.author: kengaderdus
1515
ms.reviewer: yoelh
1616
ms.subservice: b2c
@@ -37,7 +37,7 @@ In this article, you learn how to use `EnabledForUserJourneys` element inside a
3737

3838
- If you don't have one already, [create an Azure AD B2C tenant](tutorial-create-tenant.md) that is linked to your Azure subscription.
3939

40-
- [Register a web application](tutorial-register-applications.md), and [enable ID token implicit grant](tutorial-register-applications.md#enable-id-token-implicit-grant). For the Redirect URI, use https://jwt.ms.
40+
- [Register a web application](tutorial-register-applications.md).
4141

4242
- You must have [Visual Studio Code (VS Code)](https://code.visualstudio.com/) installed in your computer.
4343

articles/active-directory-b2c/custom-policies-series-call-rest-api.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ ms.service: azure-active-directory
1010

1111
ms.topic: how-to
1212
ms.custom: b2c-docs-improvements, devx-track-js
13-
ms.date: 01/22/2024
13+
ms.date: 10/11/2024
1414
ms.author: kengaderdus
1515
ms.reviewer: yoelh
1616
ms.subservice: b2c
@@ -43,7 +43,7 @@ In [Create branching in user journey by using Azure AD B2C custom policies](cust
4343

4444
- If you don't have one already, [create an Azure AD B2C tenant](tutorial-create-tenant.md) that is linked to your Azure subscription.
4545

46-
- [Register a web application](tutorial-register-applications.md), and [enable ID token implicit grant](tutorial-register-applications.md#enable-id-token-implicit-grant). For the Redirect URI, use https://jwt.ms.
46+
- [Register a web application](tutorial-register-applications.md).
4747

4848
- You must have [Node.js](https://nodejs.org) installed in your computer.
4949

articles/active-directory-b2c/custom-policies-series-collect-user-input.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ ms.service: azure-active-directory
1010

1111
ms.topic: how-to
1212
ms.custom: b2c-docs-improvements
13-
ms.date: 01/11/2024
13+
ms.date: 10/11/2024
1414
ms.author: kengaderdus
1515
ms.reviewer: yoelh
1616
ms.subservice: b2c
@@ -42,7 +42,8 @@ In this article, you learn how to write a custom policy that collects user input
4242

4343
- If you don't have one already, [create an Azure AD B2C tenant](tutorial-create-tenant.md) that is linked to your Azure subscription.
4444

45-
- [Register a web application](tutorial-register-applications.md), and [enable ID token implicit grant](tutorial-register-applications.md#enable-id-token-implicit-grant). For the Redirect URI, use https://jwt.ms.
45+
- [Register a web application](tutorial-register-applications.md).
46+
4647
- You must have [Visual Studio Code (VS Code)](https://code.visualstudio.com/) installed in your computer.
4748

4849
- Complete the steps in [Write your first Azure AD B2C custom policy - Hello World!](custom-policies-series-hello-world.md). This article is a part of [Create and run your own custom policies how-to guide series](custom-policies-series-overview.md).

articles/active-directory-b2c/custom-policies-series-hello-world.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ ms.service: azure-active-directory
1010

1111
ms.topic: how-to
1212
ms.custom: b2c-docs-improvements
13-
ms.date: 01/11/2024
13+
ms.date: 10/11/2024
1414
ms.author: kengaderdus
1515
ms.reviewer: yoelh
1616
ms.subservice: b2c
@@ -30,7 +30,7 @@ While you can use pre-made custom policy [starter pack](https://github.com/Azure
3030

3131
- If you don't have one already, [create an Azure AD B2C tenant](tutorial-create-tenant.md) that is linked to your Azure subscription.
3232

33-
- [Register a web application](tutorial-register-applications.md), and [enable ID token implicit grant](tutorial-register-applications.md#enable-id-token-implicit-grant). For the Redirect URI, use https://jwt.ms.
33+
- [Register a web application](tutorial-register-applications.md).
3434

3535
- You must have [Visual Studio Code (VS Code)](https://code.visualstudio.com/) installed in your computer.
3636

articles/active-directory-b2c/custom-policies-series-overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ ms.service: azure-active-directory
1010

1111
ms.topic: how-to
1212
ms.custom: b2c-docs-improvements
13-
ms.date: 01/11/2024
13+
ms.date: 10/11/2024
1414
ms.author: kengaderdus
1515
ms.reviewer: yoelh
1616
ms.subservice: b2c

0 commit comments

Comments
 (0)