You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/app-provisioning/application-provisioning-quarantine-status.md
+10-10Lines changed: 10 additions & 10 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -75,16 +75,16 @@ A job can go into quarantine regardless of failure counts for issues such as adm
75
75
76
76
The logic documented here may be different for certain connectors to ensure best customer experience, but we generally have the below retry cycles after a failure:
77
77
78
-
After the first failure, the first retry happens within the next 2 hours (usually in the next sync cycle).
79
-
- The second retry happens 6 hours after the first failure.
80
-
- The third retry happens 12 hours after the first failure.
81
-
- The fourth retry happens 24 hours after the first failure.
82
-
- The fifth retry happens 48 hours after the first failure.
83
-
- The sixth retry happens 72 hours after the first failure.
84
-
- The seventh retry happens 96 hours after the first failure.
85
-
- The eighth retry happens 120 hours after the first failure.
86
-
87
-
This cycle is repeated every 24 hours until the 30th day when retries are stopped and the job is disabled.
78
+
After the failure, the first retry will happen in 6 hours.
79
+
- The second retry happens 12 hours after the first failure.
80
+
- The third retry happens 24 hours after the first failure.
81
+
- The fourth retry happens 48 hours after the first failure.
82
+
- The fifth retry happens 96 hours after the first failure.
83
+
- The sixth retry happens 192 hours after the first failure.
84
+
- The seventh retry happens 384 hours after the first failure.
85
+
- The eighth retry happens 768 hours after the first failure.
86
+
87
+
The retries are stopped after the 8th retry and the escrow entry is removed. The job will continue unless it hits the escrow thresholds from the section above
Copy file name to clipboardExpand all lines: articles/active-directory/conditional-access/resilience-defaults.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -54,7 +54,7 @@ If the required controls of a policy weren't previously satisfied, the policy is
54
54
- Country location (resolving new IP or GPS coordinates)
55
55
- Authentication strengths
56
56
57
-
When active, the Backup Authentication Service doesn't evaluate authentication methods required by [authentication strengths](../authentication/concept-authentication-strengths.md). If you used a non-phishing-resistant authentication method before an outage, during an outage you aren't be prompted for multifactor authentication even if accessing a resource protected by a Conditional Access policy with a phishing-resistant authentication strength.
57
+
When active, the Backup Authentication Service doesn't evaluate authentication methods required by [authentication strengths](../authentication/concept-authentication-strengths.md). If you used a non-phishing-resistant authentication method before an outage, during an outage you aren't prompted for multifactor authentication even if accessing a resource protected by a Conditional Access policy with a phishing-resistant authentication strength.
Copy file name to clipboardExpand all lines: articles/active-directory/develop/msal-net-aad-b2c-considerations.md
+15-17Lines changed: 15 additions & 17 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
9
9
ms.subservice: develop
10
10
ms.topic: conceptual
11
11
ms.workload: identity
12
-
ms.date: 05/07/2020
12
+
ms.date: 02/21/2023
13
13
ms.author: henrymbugua
14
14
ms.reviewer: saeeda, jeferrie
15
15
ms.custom: "devx-track-csharp, aaddev"
@@ -29,9 +29,9 @@ This article applies to MSAL.NET 3.x. For MSAL.NET 2.x, see [Azure AD B2C specif
29
29
30
30
The authority format for Azure AD B2C is: `https://{azureADB2CHostname}/tfp/{tenant}/{policyName}`
31
31
32
-
-`azureADB2CHostname` - The name of the Azure AD B2C tenant plus the host. For example, *contosob2c.b2clogin.com*.
33
-
-`tenant` - The domain name or the directory (tenant) ID of the Azure AD B2C tenant. For example, *contosob2c.onmicrosoft.com* or a GUID, respectively.
34
-
-`policyName` - The name of the user flow or custom policy to apply. For example, a sign-up/sign-in policy like *b2c_1_susi*.
32
+
-`azureADB2CHostname` - The name of the Azure AD B2C tenant plus the host. For example, _contosob2c.b2clogin.com_.
33
+
-`tenant` - The domain name or the directory (tenant) ID of the Azure AD B2C tenant. For example, _contosob2c.onmicrosoft.com_ or a GUID, respectively.
34
+
-`policyName` - The name of the user flow or custom policy to apply. For example, a sign-up/sign-in policy like _b2c_1_susi_.
35
35
36
36
For more information about Azure AD B2C authorities, see [Set redirect URLs to b2clogin.com](../../active-directory-b2c/b2clogin.md).
For more information on the ROPC flow, see [Sign in with resource owner password credentials grant](v2-oauth-ropc.md).
118
118
119
-
The ROPC flow is **not recommended** because asking a user for their password in your application is not secure. For more information about this problem, see [What’s the solution to the growing problem of passwords?](https://news.microsoft.com/features/whats-solution-growing-problem-passwords-says-microsoft/).
119
+
The ROPC flow is **not recommended** because asking a user for their password in your application isn't secure. For more information about this problem, see [What’s the solution to the growing problem of passwords?](https://news.microsoft.com/features/whats-solution-growing-problem-passwords-says-microsoft/).
120
120
121
121
By using username/password in an ROPC flow, you sacrifice several things:
122
122
123
123
- Core tenets of modern identity: The password can be fished or replayed because the shared secret can be intercepted. By definition, ROPC is incompatible with passwordless flows.
124
-
- Users who need to do MFA won't be able to sign in (as there is no interaction).
124
+
- Users who use multi-factor authentication (MFA) won't be able to sign in as there's no interaction.
125
125
- Users won't be able to use single sign-on (SSO).
This`AcquireTokenByUsernamePassword` method takes the following parameters:
140
+
The`AcquireTokenByUsernamePassword` method takes the following parameters:
141
141
142
-
- The *scopes* for which to obtain an access token.
143
-
- A *username*.
144
-
- A SecureString *password* for the user.
142
+
- The _scopes_ for which to obtain an access token.
143
+
- A _username_.
144
+
- A SecureString _password_ for the user.
145
145
146
146
### Limitations of the ROPC flow
147
147
148
148
The ROPC flow **only works for local accounts**, where your users have registered with Azure AD B2C using an email address or username. This flow doesn't work when federating to an external identity provider supported by Azure AD B2C (Facebook, Google, etc.).
149
149
150
150
## Google auth and embedded webview
151
151
152
-
If you're using Google as an identity provider, we recommend you use the system browser as Google doesn't allow [authentication from embedded webviews](https://developers.googleblog.com/2016/08/modernizing-oauth-interactions-in-native-apps.html). Currently, `login.microsoftonline.com` is a trusted authority with Google and will work with embedded webview. However, `b2clogin.com` is not a trusted authority with Google, so users will not be able to authenticate.
153
-
154
-
We'll provide an update to this [issue](https://github.com/AzureAD/microsoft-authentication-library-for-dotnet/issues/688) if things change.
152
+
If you're using Google as an identity provider, we recommend you use the system browser as Google doesn't allow [authentication from embedded webviews](https://developers.googleblog.com/2016/08/modernizing-oauth-interactions-in-native-apps.html). Currently, `login.microsoftonline.com` is a trusted authority with Google and will work with embedded webview. However, `b2clogin.com` isn't a trusted authority with Google, so users won't be able to authenticate.
155
153
156
154
## Token caching in MSAL.NET
157
155
@@ -186,6 +184,6 @@ For more information about specifying which claims are returned by your user flo
186
184
187
185
More details about acquiring tokens interactively with MSAL.NET for Azure AD B2C applications are provided in the following sample.
188
186
189
-
| Sample | Platform | Description|
190
-
|------ | -------- | -----------|
191
-
|[active-directory-b2c-xamarin-native](https://github.com/Azure-Samples/active-directory-b2c-xamarin-native)| Xamarin iOS, Xamarin Android, UWP | A Xamarin Forms app that uses MSAL.NET to authenticate users via Azure AD B2C and then access a web API with the tokens returned.|
|[active-directory-b2c-xamarin-native](https://github.com/Azure-Samples/active-directory-b2c-xamarin-native)| Xamarin iOS, Xamarin Android, UWP | A Xamarin Forms app that uses MSAL.NET to authenticate users via Azure AD B2C and then access a web API with the tokens returned.|
0 commit comments