Skip to content

Commit 0556871

Browse files
Merge branch 'master' of https://github.com/MicrosoftDocs/azure-docs-pr into us1679050z
2 parents 6097511 + a38d748 commit 0556871

File tree

1,188 files changed

+15334
-17236
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

1,188 files changed

+15334
-17236
lines changed

.openpublishing.redirection.json

Lines changed: 723 additions & 12 deletions
Large diffs are not rendered by default.

CODEOWNERS

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -9,12 +9,12 @@ articles/jenkins/ @TomArcherMsft
99
articles/terraform/ @TomArcherMsft
1010

1111
# Requires Internal Review
12-
articles/best-practices-availability-paired-regions.md @jpconnock @arob98 @syntaxc4 @tysonn @snoviking
12+
articles/best-practices-availability-paired-regions.md @jpconnock @martinekuan @syntaxc4 @tysonn @snoviking
1313

1414
# Governance
1515
articles/governance/ @DCtheGeek
1616

1717
# Configuration
18-
*.json @SyntaxC4 @snoviking @arob98
19-
.acrolinx-config.edn @MonicaRush @arob98
20-
articles/zone-pivot-groups.yml @SyntaxC4 @snoviking @arob98
18+
*.json @SyntaxC4 @snoviking @martinekuan
19+
.acrolinx-config.edn @MonicaRush @martinekuan
20+
articles/zone-pivot-groups.yml @SyntaxC4 @snoviking @martinekuan

articles/active-directory-b2c/TOC.yml

Lines changed: 18 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -311,13 +311,15 @@
311311
items:
312312
- name: About technical profiles
313313
href: technical-profiles-overview.md
314+
- name: About validation technical profiles
315+
href: validation-technical-profile.md
316+
- name: Application Insights
317+
href: application-insights-technical-profile.md
318+
- name: Azure Active Directory
319+
href: active-directory-technical-profile.md
314320
- name: Azure Multi-Factor Authentication
315321
href: multi-factor-auth-technical-profile.md
316322
displayName: mfa
317-
- name: Claim resolvers
318-
href: claim-resolver-overview.md
319-
- name: Azure Active Directory
320-
href: active-directory-technical-profile.md
321323
- name: Claims transformation
322324
href: claims-transformation-technical-profile.md
323325
- name: JWT token issuer
@@ -331,6 +333,8 @@
331333
displayName: otp
332334
- name: OpenID Connect
333335
href: openid-connect-technical-profile.md
336+
- name: Phone factor
337+
href: phone-factor-technical-profile.md
334338
- name: REST
335339
href: restful-technical-profile.md
336340
- name: SAML
@@ -342,12 +346,12 @@
342346
- name: SSO session
343347
href: custom-policy-reference-sso.md
344348
displayName: single sign-on
345-
- name: Validation
346-
href: validation-technical-profile.md
347349
- name: UserJourneys
348350
href: userjourneys.md
349351
- name: RelyingParty
350352
href: relyingparty.md
353+
- name: Claim resolvers
354+
href: claim-resolver-overview.md
351355
- name: Use b2clogin.com
352356
items:
353357
- name: b2clogin.com overview
@@ -391,28 +395,28 @@
391395
href: user-migration.md
392396
- name: Reference
393397
items:
394-
- name: Identity Experience Framework release notes
395-
href: custom-policy-developer-notes.md
398+
- name: Billing model
399+
href: billing.md
396400
- name: Code samples
397401
href: https://azure.microsoft.com/resources/samples/?service=active-directory-b2c
398-
- name: Page layout versions
399-
href: page-layout.md
400402
- name: Cookie definitions
401403
href: cookie-definitions.md
402404
displayName: cookies, SameSite
403405
- name: Error codes
404406
href: error-codes.md
407+
- name: Extensions app
408+
href: extensions-app.md
409+
- name: Identity Experience Framework release notes
410+
href: custom-policy-developer-notes.md
405411
- name: Microsoft Graph API operations
406412
href: microsoft-graph-operations.md
413+
- name: Page layout versions
414+
href: page-layout.md
407415
- name: Region availability & data residency
408416
href: data-residency.md
409-
- name: Billing model
410-
href: billing.md
411417
- name: Threat management
412418
href: threat-management.md
413419
displayName: security
414-
- name: Extensions app
415-
href: extensions-app.md
416420
- name: User flow versions
417421
href: user-flow-versions.md
418422
- name: Resources
Lines changed: 84 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,84 @@
1+
---
2+
title: Define an Application Insights technical profile in a custom policy
3+
titleSuffix: Azure AD B2C
4+
description: Define an Application Insights technical profile in a custom policy in Azure Active Directory B2C.
5+
services: active-directory-b2c
6+
author: msmimart
7+
manager: celestedg
8+
9+
ms.service: active-directory
10+
ms.workload: identity
11+
ms.topic: reference
12+
ms.date: 03/20/2020
13+
ms.author: mimart
14+
ms.subservice: B2C
15+
---
16+
17+
18+
# Define an Application Insights technical profile in an Azure AD B2C custom policy
19+
20+
[!INCLUDE [active-directory-b2c-advanced-audience-warning](../../includes/active-directory-b2c-advanced-audience-warning.md)]
21+
22+
Azure Active Directory B2C (Azure AD B2C) supports sending event data directly to [Application Insights](../azure-monitor/app/app-insights-overview.md) by using the instrumentation key provided to Azure AD B2C. With an Application Insights technical profile, you can get detailed and customized event logs for your user journeys to:
23+
24+
* Gain insights on user behavior.
25+
* Troubleshoot your own policies in development or in production.
26+
* Measure performance.
27+
* Create notifications from Application Insights.
28+
29+
30+
## Protocol
31+
32+
The **Name** attribute of the **Protocol** element needs to be set to `Proprietary`. The **handler** attribute must contain the fully qualified name of the protocol handler assembly that is used by Azure AD B2C for Application Insights:
33+
`Web.TPEngine.Providers.AzureApplicationInsightsProvider, Web.TPEngine, Version=1.0.0.0, Culture=neutral, PublicKeyToken=null`
34+
35+
The following example shows the common Application Insights technical profile. Other Application Insights technical profiles include the AzureInsights-Common to leverage its configuration.
36+
37+
```xml
38+
<TechnicalProfile Id="AzureInsights-Common">
39+
<DisplayName>Azure Insights Common</DisplayName>
40+
<Protocol Name="Proprietary" Handler="Web.TPEngine.Providers.Insights.AzureApplicationInsightsProvider, Web.TPEngine, Version=1.0.0.0, Culture=neutral, PublicKeyToken=null" />
41+
</TechnicalProfile>
42+
```
43+
44+
## Input claims
45+
46+
The **InputClaims** element contains a list of claims to send to Application Insights. You can also map the name of your claim to a name you prefer to appear in Application Insights. The following example shows how to send telemetries to Application Insights. Properties of an event are added through the syntax `{property:NAME}`, where NAME is property being added to the event. DefaultValue can be either a static value or a value that's resolved by one of the supported [claim resolvers](claim-resolver-overview.md).
47+
48+
```XML
49+
<InputClaims>
50+
<InputClaim ClaimTypeReferenceId="PolicyId" PartnerClaimType="{property:Policy}" DefaultValue="{Policy:PolicyId}" />
51+
<InputClaim ClaimTypeReferenceId="CorrelationId" PartnerClaimType="{property:JourneyId}" DefaultValue="{Context:CorrelationId}" />
52+
<InputClaim ClaimTypeReferenceId="Culture" PartnerClaimType="{property:Culture}" DefaultValue="{Culture:RFC5646}" />
53+
<InputClaim ClaimTypeReferenceId="objectId" PartnerClaimType="{property:objectId}" />
54+
</InputClaims>
55+
```
56+
57+
The **InputClaimsTransformations** element may contain a collection of **InputClaimsTransformation** elements that are used to modify the input claims or generate new ones before sending to Application Insights.
58+
59+
## Persist claims
60+
61+
The PersistedClaims element is not used.
62+
63+
## Output claims
64+
65+
The OutputClaims, and OutputClaimsTransformations elements are not used.
66+
67+
## Cryptographic keys
68+
69+
The CryptographicKeys element is not used.
70+
71+
72+
## Metadata
73+
74+
| Attribute | Required | Description |
75+
| --------- | -------- | ----------- |
76+
| InstrumentationKey| Yes | The Application Insights [instrumentation key](../azure-monitor/app/create-new-resource.md#copy-the-instrumentation-key), which will be used for logging the events. |
77+
| DeveloperMode| No | A Boolean that indicates whether developer mode is enabled. Possible values: `true` or `false` (default). This metadata controls how events are buffered. In a development environment with minimal event volume, enabling developer mode results in events being sent immediately to Application Insights.|
78+
|DisableTelemetry |No |A Boolean that indicates whether telemetry should be enabled or not. Possible values: `true` or `false` (default).|
79+
80+
81+
## Next steps
82+
83+
- [Create an Application Insights resource](../azure-monitor/app/create-new-resource.md)
84+
- Learn how to [track user behavior in Azure Active Directory B2C using Application Insights](analytics-with-application-insights.md)

articles/active-directory-b2c/multi-factor-auth-technical-profile.md

Lines changed: 7 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: celestedg
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: conceptual
12-
ms.date: 12/17/2019
12+
ms.date: 03/20/2020
1313
ms.author: mimart
1414
ms.subservice: B2C
1515
---
@@ -18,9 +18,13 @@ ms.subservice: B2C
1818

1919
[!INCLUDE [active-directory-b2c-advanced-audience-warning](../../includes/active-directory-b2c-advanced-audience-warning.md)]
2020

21-
Azure Active Directory B2C (Azure AD B2C) provides support for verifying a phone number by using Azure Multi-Factor Authentication (MFA). Use this technical profile to generate and send a code to a phone number, and then verify the code.
21+
Azure Active Directory B2C (Azure AD B2C) provides support for verifying a phone number by using Azure Multi-Factor Authentication (MFA). Use this technical profile to generate and send a code to a phone number, and then verify the code. The Azure MFA technical profile may also return an error message. The validation technical profile validates the user-provided data before the user journey continues. With the validation technical profile, an error message displays on a self-asserted page.
2222

23-
The Azure MFA technical profile may also return an error message. You can design the integration with Azure MFA by using a **Validation technical profile**. A validation technical profile calls the Azure MFA service. The validation technical profile validates the user-provided data before the user journey continues. With the validation technical profile, an error message is display on a self-asserted page.
23+
This technical profile:
24+
25+
- Doesn't provide an interface to interact with the user. Instead, the user interface is called from a [self-asserted](self-asserted-technical-profile.md) technical profile, or a [display control](display-controls.md) as a [validation technical profile](validation-technical-profile.md).
26+
- Uses the Azure MFA service to generate and send a code to a phone number, and then verifies the code.
27+
- Validates a phone number via text messages.
2428

2529
[!INCLUDE [b2c-public-preview-feature](../../includes/active-directory-b2c-public-preview.md)]
2630

Lines changed: 99 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,99 @@
1+
---
2+
title: Define a phone factor technical profile in a custom policy
3+
titleSuffix: Azure AD B2C
4+
description: Define a phone factor technical profile in a custom policy in Azure Active Directory B2C.
5+
services: active-directory-b2c
6+
author: msmimart
7+
manager: celestedg
8+
9+
ms.service: active-directory
10+
ms.workload: identity
11+
ms.topic: reference
12+
ms.date: 03/20/2020
13+
ms.author: mimart
14+
ms.subservice: B2C
15+
---
16+
17+
# Define a phone factor technical profile in an Azure Active Directory B2C custom policy
18+
19+
[!INCLUDE [active-directory-b2c-advanced-audience-warning](../../includes/active-directory-b2c-advanced-audience-warning.md)]
20+
21+
Azure Active Directory B2C (Azure AD B2C) provides support for enrolling and verifying phone numbers. This technical profile:
22+
23+
- Provides a user interface to interact with the user.
24+
- Uses content definition to control the look and feel.
25+
- Supports both phone calls and text messages to validate the phone number.
26+
- Supports multiple phone numbers. The user can select one of the phone numbers to verify.
27+
- If a phone number is provided, the phone factor user interface asks the user to verify the phone number. If not provided, it asks the user to enroll a new phone number.
28+
- Returns a claim indicating whether the user provided a new phone number. You can use this claim to decide whether the phone number should be persisted to the Azure AD user profile.
29+
30+
## Protocol
31+
32+
The **Name** attribute of the **Protocol** element needs to be set to `Proprietary`. The **handler** attribute must contain the fully qualified name of the protocol handler assembly that is used by Azure AD B2C for phone factor:
33+
`Web.TPEngine.Providers.PhoneFactorProtocolProvider, Web.TPEngine, Version=1.0.0.0, Culture=neutral, PublicKeyToken=null`
34+
35+
The following example shows a phone factor technical profile for enrollment and validation:
36+
37+
```XML
38+
<TechnicalProfile Id="PhoneFactor-InputOrVerify">
39+
<DisplayName>PhoneFactor</DisplayName>
40+
<Protocol Name="Proprietary" Handler="Web.TPEngine.Providers.PhoneFactorProtocolProvider, Web.TPEngine, Version=1.0.0.0, Culture=neutral, PublicKeyToken=null" />
41+
</TechnicalProfile>
42+
```
43+
44+
## Input claims
45+
46+
The InputClaims element must contain following claims. You can also map the name of your claim to the name defined in the phone factor technical profile.
47+
48+
```XML
49+
<InputClaims>
50+
<!--A unique identifier of the user. The partner claim type must be set to `UserId`. -->
51+
<InputClaim ClaimTypeReferenceId="userIdForMFA" PartnerClaimType="UserId" />
52+
<!--A claim that contains the phone number. If the claim is empty, Azure AD B2C asks the user to enroll a new phone number. Otherwise, it asks the user to verify the phone number. -->
53+
<InputClaim ClaimTypeReferenceId="strongAuthenticationPhoneNumber" />
54+
</InputClaims>
55+
```
56+
57+
The following example demonstrates using multiple phone numbers. For more information, see [sample policy](https://github.com/azure-ad-b2c/samples/tree/master/policies/mfa-add-secondarymfa).
58+
59+
```XML
60+
<InputClaims>
61+
<InputClaim ClaimTypeReferenceId="userIdForMFA" PartnerClaimType="UserId" />
62+
<InputClaim ClaimTypeReferenceId="strongAuthenticationPhoneNumber" />
63+
<InputClaim ClaimTypeReferenceId="secondaryStrongAuthenticationPhoneNumber" />
64+
</InputClaims>
65+
```
66+
67+
The InputClaimsTransformations element may contain a collection of InputClaimsTransformation elements that are used to modify the input claims or generate new ones before presenting them to the phone factor page.
68+
69+
## Output claims
70+
71+
The OutputClaims element contains a list of claims returned by the phone factor technical profile.
72+
73+
```xml
74+
<OutputClaims>
75+
<!-- The verified phone number. The partner claim type must be set to `Verified.OfficePhone`. -->
76+
<OutputClaim ClaimTypeReferenceId="Verified.strongAuthenticationPhoneNumber" PartnerClaimType="Verified.OfficePhone" />
77+
<!-- Indicates whether the new phone number has been entered by the user. The partner claim type must be set to `newPhoneNumberEntered`. -->
78+
<OutputClaim ClaimTypeReferenceId="newPhoneNumberEntered" PartnerClaimType="newPhoneNumberEntered" />
79+
</OutputClaims>
80+
```
81+
82+
The OutputClaimsTransformations element may contain a collection of OutputClaimsTransformation elements that are used to modify the output claims or generate new ones.
83+
84+
## Cryptographic keys
85+
86+
The **CryptographicKeys** element is not used.
87+
88+
89+
## Metadata
90+
91+
| Attribute | Required | Description |
92+
| --------- | -------- | ----------- |
93+
| ContentDefinitionReferenceId | Yes | The identifier of the [content definition](contentdefinitions.md) associated with this technical profile. |
94+
| ManualPhoneNumberEntryAllowed| No | Specify whether or not a user is allowed to manually enter a phone number. Possible values: `true` or `false` (default).|
95+
96+
## Next steps
97+
98+
- Check the [social and local accounts with MFA](https://github.com/Azure-Samples/active-directory-b2c-custom-policy-starterpack/tree/master/SocialAndLocalAccountsWithMfa) starter pack.
99+

articles/active-directory-b2c/technical-profiles-overview.md

Lines changed: 7 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: celestedg
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: reference
12-
ms.date: 02/11/2020
12+
ms.date: 03/20/2020
1313
ms.author: mimart
1414
ms.subservice: B2C
1515
---
@@ -24,19 +24,21 @@ A technical profile provides a framework with a built-in mechanism to communicat
2424

2525
A technical profile enables these types of scenarios:
2626

27+
- [Application Insights](application-insights-technical-profile.md) - Sending event data to [Application Insights](../azure-monitor/app/app-insights-overview.md).
2728
- [Azure Active Directory](active-directory-technical-profile.md) - Provides support for the Azure Active Directory B2C user management.
29+
- [Azure Multi-Factor Authentication](multi-factor-auth-technical-profile.md) - provides support for verifying a phone number by using Azure Multi-Factor Authentication (MFA).
30+
- [Claims transformation](claims-transformation-technical-profile.md) - Call output claims transformations to manipulate claims values, validate claims, or set default values for a set of output claims.
2831
- [JWT token issuer](jwt-issuer-technical-profile.md) - Emits a JWT token that is returned back to the relying party application.
29-
- **Phone factor provider** - Multi-factor authentication.
3032
- [OAuth1](oauth1-technical-profile.md) - Federation with any OAuth 1.0 protocol identity provider.
3133
- [OAuth2](oauth2-technical-profile.md) - Federation with any OAuth 2.0 protocol identity provider.
34+
- [One time password](one-time-password-technical-profile.md) - Provides support for managing the generation and verification of a one-time password.
3235
- [OpenID Connect](openid-connect-technical-profile.md) - Federation with any OpenID Connect protocol identity provider.
33-
- [Claims transformation](claims-transformation-technical-profile.md) - Call output claims transformations to manipulate claims values, validate claims, or set default values for a set of output claims.
36+
- [Phone factor](phone-factor-technical-profile.md) - Support for enrolling and verifying phone numbers.
3437
- [RESTful provider](restful-technical-profile.md) - Call to REST API services, such as validate user input, enrich user data, or integrate with line-of-business applications.
3538
- [SAML2](saml-technical-profile.md) - Federation with any SAML protocol identity provider.
39+
- [SAML token issuer](saml-issuer-technical-profile.md) - Emits a SAML token that is returned back to the relying party application.
3640
- [Self-Asserted](self-asserted-technical-profile.md) - Interact with the user. For example, collect the user's credential to sign in, render the sign-up page, or password reset.
3741
- [Session management](custom-policy-reference-sso.md) - Handle different types of sessions.
38-
- [Application Insights](../azure-monitor/app/usage-overview.md)
39-
- [One time password](one-time-password-technical-profile.md) - Provides support for managing the generation and verification of a one-time password.
4042

4143
## Technical profile flow
4244

0 commit comments

Comments
 (0)