Skip to content

Commit 0614402

Browse files
author
Tony Chen (DevDiv)
committed
Merge branch 'main' into chentony/service-connector-docs-for-fabric
2 parents 2232e67 + 328a110 commit 0614402

File tree

8,210 files changed

+139764
-137569
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

8,210 files changed

+139764
-137569
lines changed

.openpublishing.redirection.json

Lines changed: 704 additions & 5 deletions
Large diffs are not rendered by default.

ThirdPartyNotices.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -7,9 +7,9 @@ see the [LICENSE](LICENSE) file, and grant you a license to any code in the repo
77
Microsoft, Windows, Microsoft Azure and/or other Microsoft products and services referenced in the documentation
88
may be either trademarks or registered trademarks of Microsoft in the United States and/or other countries.
99
The licenses for this project do not grant you rights to use any Microsoft names, logos, or trademarks.
10-
Microsoft's general trademark guidelines can be found at http://go.microsoft.com/fwlink/?LinkID=254653.
10+
You can find Microsoft general trademark guidelines at [Microsoft Trademark and Brand Guidelines](https://www.microsoft.com/en-us/legal/intellectualproperty/trademarks).
1111

12-
Privacy information can be found at https://privacy.microsoft.com/en-us/
12+
For privacy information, see [privacy at Microsoft](https://privacy.microsoft.com/en-us/).
1313

1414
Microsoft and any contributors reserve all other rights, whether under their respective copyrights, patents,
1515
or trademarks, whether by implication, estoppel, or otherwise.

articles/active-directory-b2c/add-api-connector.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -629,7 +629,7 @@ Ensure that:
629629
* Your API explicitly checks for null values of received claims that it depends on.
630630
* Your API implements an authentication method outlined in [secure your API Connector](secure-rest-api.md).
631631
* Your API responds as quickly as possible to ensure a fluid user experience.
632-
* Azure AD B2C will wait for a maximum of *20 seconds* to receive a response. If none is received, it will make *one more attempt (retry)* at calling your API.
632+
* Azure AD B2C will wait for a maximum of *10 seconds* to receive a response. If none is received, it will make *one more attempt (retry)* at calling your API.
633633
* If using a serverless function or scalable web service, use a hosting plan that keeps the API "awake" or "warm" in production. For Azure Functions, it's recommended to use at minimum the [Premium plan](../azure-functions/functions-scale.md) in production.
634634
* Ensure high availability of your API.
635635
* Monitor and optimize performance of downstream APIs, databases, or other dependencies of your API.

articles/active-directory-b2c/analytics-with-application-insights.md

Lines changed: 10 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: CelesteDG
99
ms.service: azure-active-directory
1010
ms.topic: how-to
1111

12-
ms.date: 01/26/2024
12+
ms.date: 04/17/2025
1313
ms.author: kengaderdus
1414
ms.subservice: b2c
1515
zone_pivot_groups: b2c-policy-type
@@ -31,7 +31,7 @@ zone_pivot_groups: b2c-policy-type
3131

3232
::: zone pivot="b2c-custom-policy"
3333

34-
In Azure Active Directory B2C (Azure AD B2C), you can send event data directly to [Application Insights](/azure/azure-monitor/app/app-insights-overview) by using the instrumentation key provided to Azure AD B2C. With an Application Insights technical profile, you can get detailed and customized event logs for your user journeys to:
34+
In Azure Active Directory B2C (Azure AD B2C), you can send event data directly to [Application Insights](/azure/azure-monitor/app/app-insights-overview) by using the connection string provided to Azure AD B2C. With an Application Insights technical profile, you can get detailed and customized event logs for your user journeys to:
3535

3636
- Gain insights on user behavior.
3737
- Troubleshoot your own policies in development or in production.
@@ -42,7 +42,7 @@ In Azure Active Directory B2C (Azure AD B2C), you can send event data directly t
4242

4343
## Overview
4444

45-
To enable custom event logs, add an Application Insights technical profile. In the technical profile, you define the Application Insights instrumentation key, the event name, and the claims to record. To post an event, add the technical profile as an orchestration step in a [user journey](userjourneys.md).
45+
To enable custom event logs, add an Application Insights technical profile. In the technical profile, you define the Application Insights connection string, the event name, and the claims to record. To post an event, add the technical profile as an orchestration step in a [user journey](userjourneys.md).
4646

4747
When you use Application Insights, consider the following:
4848

@@ -57,7 +57,7 @@ When you use Application Insights, consider the following:
5757

5858
## Create an Application Insights resource
5959

60-
When you use Application Insights with Azure AD B2C, all you need to do is create a resource and get the instrumentation key. For information, see [Create an Application Insights resource](/previous-versions/azure/azure-monitor/app/create-new-resource).
60+
When you use Application Insights with Azure AD B2C, all you need to do is create a resource and get the connection string. For information, see [Create an Application Insights resource](/previous-versions/azure/azure-monitor/app/create-new-resource).
6161

6262
1. Sign in to the [Azure portal](https://portal.azure.com/).
6363
1. If you have access to multiple tenants, select the **Settings** icon in the top menu to switch to your Microsoft Entra ID tenant from the **Directories + subscriptions** menu.
@@ -67,9 +67,9 @@ When you use Application Insights with Azure AD B2C, all you need to do is creat
6767
1. For **Application Type**, select **ASP.NET web application**.
6868
1. For **Resource Group**, select an existing group or enter a name for a new group.
6969
1. Select **Create**.
70-
1. Open the new Application Insights resource, expand **Essentials**, and copy the instrumentation key.
70+
1. Open the new Application Insights resource, expand **Essentials**, and copy the connection string.
7171

72-
![Screenshot that shows the Instrumentation Key on the Application Insights Overview tab.](./media/analytics-with-application-insights/app-insights.png)
72+
![Screenshot that shows the connection string on the Application Insights Overview tab.](./media/analytics-with-application-insights/app-insights.png)
7373

7474
## Define claims
7575

@@ -122,7 +122,7 @@ Technical profiles can be considered functions in the custom policy. These funct
122122

123123
| Technical profile | Task |
124124
| ----------------- | -----|
125-
| AppInsights-Common | The common technical profile with typical configuration. It includes the Application Insights instrumentation key, a collection of claims to record, and developer mode. The other technical profiles include the common technical profile and add more claims, such as the event name. |
125+
| AppInsights-Common | The common technical profile with typical configuration. It includes the Application Insights connection string, a collection of claims to record, and developer mode. The other technical profiles include the common technical profile and add more claims, such as the event name. |
126126
| AppInsights-SignInRequest | Records a **SignInRequest** event with a set of claims when a sign-in request has been received. |
127127
| AppInsights-UserSignUp | Records a **UserSignUp** event when the user triggers the sign-up option in a sign-up or sign-in journey. |
128128
| AppInsights-SignInComplete | Records a **SignInComplete** event upon successful authentication, when a token has been sent to the relying party application. |
@@ -137,8 +137,8 @@ Open the *TrustFrameworkExtensions.xml* file from the starter pack. Add the tech
137137
<DisplayName>Application Insights</DisplayName>
138138
<Protocol Name="Proprietary" Handler="Web.TPEngine.Providers.Insights.AzureApplicationInsightsProvider, Web.TPEngine, Version=1.0.0.0, Culture=neutral, PublicKeyToken=null" />
139139
<Metadata>
140-
<!-- The ApplicationInsights instrumentation key, which you use for logging the events -->
141-
<Item Key="InstrumentationKey">xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx</Item>
140+
<!-- The ApplicationInsights connection string, which you use for logging the events -->
141+
<Item Key="ConnectionString">xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx</Item>
142142
<Item Key="DeveloperMode">false</Item>
143143
<Item Key="DisableTelemetry ">false</Item>
144144
</Metadata>
@@ -181,7 +181,7 @@ Open the *TrustFrameworkExtensions.xml* file from the starter pack. Add the tech
181181
```
182182

183183
> [!IMPORTANT]
184-
> Change the instrumentation key in the `AppInsights-Common` technical profile to the GUID that your Application Insights resource provides.
184+
> Change the connection string in the `AppInsights-Common` technical profile to the GUID that your Application Insights resource provides.
185185
186186
## Add the technical profiles as orchestration steps
187187

articles/active-directory-b2c/api-connectors-overview.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -85,7 +85,7 @@ Using Azure AD B2C, you can add your own business logic to a user journey by cal
8585
![Diagram of a RESTful service claims exchange](media/api-connectors-overview/restful-service-claims-exchange.png)
8686

8787
> [!NOTE]
88-
> If there is slow or no response from the RESTful service to Azure AD B2C, the timeout is 30 seconds and the retry count is two times (meaning there are 3 tries in total). Currently, you can't configure the timeout and retry count settings.
88+
> HTTP requests may be cancelled if there is a slow or no response from the RESTful service to Azure AD B2C. The default timeout is 10 seconds and the default retry count is one (meaning there are 2 tries in total).
8989
9090
## Calling a RESTful service
9191

@@ -165,7 +165,7 @@ A null value in a database is used when the value in a column is unknown or miss
165165
When an element is null, either:
166166

167167
- Omit the key-value pair from the JSON.
168-
- Return a value that corresponds to the Azure AD B2C claim data type. For example, for a `string` data type, return empty string `""`. For an `integer` data type, return a zero value `0`. For a `dateTime` data type, return a minimum value `1970-00-00T00:00:00.0000000Z`.
168+
- Return a value that corresponds to the Azure AD B2C claim data type. For example, for a `string` data type, return empty string `""`. For an `integer` data type, return a zero value `0`. For a `dateTime` data type, return a minimum value `0001-01-01T00:00:00.0000000Z`.
169169

170170
The following example demonstrates how to handle a null value. The email is omitted from the JSON:
171171

articles/active-directory-b2c/billing.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ author: kengaderdus
55
manager: CelesteDG
66
ms.service: azure-active-directory
77
ms.topic: reference
8-
ms.date: 09/11/2024
8+
ms.date: 03/10/2025
99
ms.author: kengaderdus
1010
ms.subservice: b2c
1111
ms.custom: fasttrack-edit
@@ -29,7 +29,7 @@ A monthly active user (MAU) is a unique user that performs an authentication wit
2929

3030
If Azure AD B2C [Go-Local add-on](data-residency.md#go-local-add-on) is available in your country/region, and you enable it, you'll be charged per MAU, which is an added charge to your Azure AD B2C [Premium P1 or P2 pricing](https://azure.microsoft.com/pricing/details/active-directory-b2c/) license. Learn more [About Local Data Residency add-on](#about-go-local-add-on)
3131

32-
Also, if you choose to provide higher levels of assurance by using multifactor authentication (MFA) for Voice and SMS, you'll be charged a worldwide flat fee for each MFA attempt that month, whether the sign in is successful or unsuccessful.
32+
Also, if you choose to provide higher levels of assurance by using multifactor authentication (MFA) for Voice and SMS, you'll be charged a fee for each MFA attempt that month, whether the sign in is successful or unsuccessful.
3333

3434

3535
> [!IMPORTANT]
@@ -85,7 +85,7 @@ A subscription linked to an Azure AD B2C tenant can be used for the billing of A
8585
### Create the link
8686

8787
1. Sign in to the [Azure portal](https://portal.azure.com).
88-
1. If you have access to multiple tenants, select the **Settings** icon in the top menu to switch to your Azure AD B2C tenant from the **Directories + subscriptions** menu.
88+
1. If you have access to multiple tenants, select the **Settings** icon in the top menu to switch to your Microsoft Entra tenant from the **Directories + subscriptions** menu.
8989
1. Select **Create a resource**, and then, in the **Search services and Marketplace** field, search for and select **Azure Active Directory B2C**.
9090
1. Select **Create**.
9191
1. Select **Link an existing Azure AD B2C Tenant to my Azure subscription**.

articles/active-directory-b2c/claimsschema.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,14 +1,14 @@
11
---
22
title: "ClaimsSchema: Azure Active Directory B2C"
3-
description: Specify the ClaimsSchema element of a custom policy in Azure Active Directory B2C.
3+
description: Specify the ClaimsSchema element of a custom policy in Azure AD B2C. Define and manage claim types for user attributes and input controls.
44

55
author: kengaderdus
66
manager: CelesteDG
77

88
ms.service: azure-active-directory
99

1010
ms.topic: reference
11-
ms.date: 01/11/2024
11+
ms.date: 03/21/2025
1212
ms.author: kengaderdus
1313
ms.subservice: b2c
1414
ms.custom: "b2c-support"

articles/active-directory-b2c/custom-policies-series-branch-user-journey.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Create branching in user journey by using Azure AD B2C custom policy
33
titleSuffix: Azure AD B2C
4-
description: Learn how to enable or disable Technical Profiles based on claims values. Learn how to branch in user journeys by enabling and disabling Azure AD B2C custom policy technical profiles.
4+
description: Learn how to create branching in user journeys using Azure AD B2C custom policies. Enable or disable technical profiles based on claim values.
55

66
author: kengaderdus
77
manager: CelesteDG
@@ -10,7 +10,7 @@ ms.service: azure-active-directory
1010

1111
ms.topic: how-to
1212
ms.custom: b2c-docs-improvements
13-
ms.date: 10/11/2024
13+
ms.date: 03/21/2025
1414
ms.author: kengaderdus
1515
ms.reviewer: yoelh
1616
ms.subservice: b2c
@@ -233,12 +233,12 @@ Follow the steps in [Test the custom policy](custom-policies-series-validate-use
233233
1. Repeat step 5, but this time, select **Account Type**, select **Contoso Employee Account**, and then follow the prompts.
234234

235235

236-
## Next steps
236+
## Related content
237237

238238
In [step 3](#step-3---configure-or-update-technical-profiles), we enable or disable the technical profile by using the `EnabledForUserJourneys` element. Alternatively, you can use [Preconditions](userjourneys.md#preconditions) inside the user journey orchestration steps to execute or skip an orchestration step as we learn later in this series.
239239

240240
Next, learn:
241241

242242
- About [User Journey Orchestration Steps Preconditions](userjourneys.md#preconditions).
243243

244-
- How to [Use the TrustFrameworkPolicy schema file to validate Azure AD B2C policy files](custom-policies-series-install-xml-extensions.md).
244+
- How to [Use the TrustFrameworkPolicy schema file to validate Azure AD B2C policy files](custom-policies-series-install-xml-extensions.md).

articles/active-directory-b2c/custom-policies-series-call-rest-api.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
2-
title: Call a REST API by using Azure Active Directory B2C custom policy
2+
title: Call a REST API by using Azure AD B2C custom policy
33
titleSuffix: Azure AD B2C
4-
description: Learn how to make an HTTP call to external API by using Azure Active Directory B2C custom policy.
4+
description: Learn how to call a REST API using Azure AD B2C custom policy. Make HTTP calls to external APIs to send and receive data from external services.
55

66
author: kengaderdus
77
manager: CelesteDG
@@ -10,7 +10,7 @@ ms.service: azure-active-directory
1010

1111
ms.topic: how-to
1212
ms.custom: b2c-docs-improvements, devx-track-js
13-
ms.date: 10/11/2024
13+
ms.date: 03/21/2025
1414
ms.author: kengaderdus
1515
ms.reviewer: yoelh
1616
ms.subservice: b2c
@@ -93,7 +93,7 @@ You need to deploy an app, which serves as your external app. Your custom policy
9393
"requestId": "requestId",
9494
"userMessage" : "The access code you entered is incorrect. Please try again.",
9595
"developerMessage" : `The provided code ${req.body.accessCode} does not match the expected code for user.`,
96-
"moreInfo" :"https://docs.microsoft.com/en-us/azure/active-directory-b2c/string-transformations"
96+
"moreInfo" :"https://learn.microsoft.com/en-us/azure/active-directory-b2c/string-transformations"
9797
};
9898
res.status(409).send(errorResponse);
9999
}
@@ -138,7 +138,7 @@ You need to deploy an app, which serves as your external app. Your custom policy
138138
"requestId": "requestId",
139139
"userMessage": "The access code you entered is incorrect. Please try again.",
140140
"developerMessage": "The provided code 54321 does not match the expected code for user.",
141-
"moreInfo": "https://docs.microsoft.com/en-us/azure/active-directory-b2c/string-transformations"
141+
"moreInfo": "https://learn.microsoft.com/en-us/azure/active-directory-b2c/string-transformations"
142142
}
143143
```
144144
Your REST service can return HTTP 4xx status code, but the value of `status` in the JSON response must be `409`.
@@ -313,7 +313,7 @@ If your REST API returns data, which you want to include as claims in your polic
313313
314314
Use the steps in [Receiving data](api-connectors-overview.md?pivots=b2c-custom-policy#receiving-data) to learn how to format the data the custom policy expects, how to handle nulls values, and how to parse REST the API's nested JSON body.
315315

316-
## Next steps
316+
## Related content
317317

318318
Next, learn:
319319

articles/active-directory-b2c/custom-policies-series-collect-user-input.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ ms.service: azure-active-directory
1010

1111
ms.topic: how-to
1212
ms.custom: b2c-docs-improvements
13-
ms.date: 10/11/2024
13+
ms.date: 03/21/2025
1414
ms.author: kengaderdus
1515
ms.reviewer: yoelh
1616
ms.subservice: b2c
@@ -504,10 +504,10 @@ After the policy finishes execution, you're redirected to `https://jwt.ms`, and
504504
}.[Signature]
505505
```
506506

507-
## Next steps
507+
## Related content
508508

509509
Next, learn:
510510

511511
- About the [types of Technical Profiles](technicalprofiles.md#types-of-technical-profiles) in Azure AD B2C's custom policies.
512512

513-
- How to [Validate user inputs by using custom policy](custom-policies-series-validate-user-input.md).
513+
- How to [Validate user inputs by using custom policy](custom-policies-series-validate-user-input.md).

0 commit comments

Comments
 (0)