Skip to content

Commit 0f5bda0

Browse files
authored
Merge pull request #178384 from MicrosoftDocs/master
11/02 PM Publish
2 parents 664bfee + 8336e92 commit 0f5bda0

File tree

593 files changed

+6486
-3067
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

593 files changed

+6486
-3067
lines changed

.openpublishing.redirection.json

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -26176,6 +26176,11 @@
2617626176
"redirect_url": "/azure/sentinel/data-connectors-reference#salesforce-service-cloud-preview",
2617726177
"redirect_document_id": false
2617826178
},
26179+
{
26180+
"source_path_from_root": "/articles/sentinel/connect-security-events.md",
26181+
"redirect_url": "/azure/sentinel/data-connectors-reference#security-events-windows",
26182+
"redirect_document_id": false
26183+
},
2617926184
{
2618026185
"source_path_from_root": "/articles/sentinel/connect-sophos-cloud-optix.md",
2618126186
"redirect_url": "/azure/sentinel/data-connectors-reference#sophos-cloud-optix-preview",
@@ -26241,6 +26246,11 @@
2624126246
"redirect_url": "/azure/sentinel/data-connectors-reference#windows-firewall",
2624226247
"redirect_document_id": false
2624326248
},
26249+
{
26250+
"source_path_from_root": "/articles/sentinel/connect-windows-security-events.md",
26251+
"redirect_url": "/azure/sentinel/data-connectors-reference#windows-security-events-preview",
26252+
"redirect_document_id": false
26253+
},
2624426254
{
2624526255
"source_path_from_root": "/articles/sentinel/connect-wirex-systems.md",
2624626256
"redirect_url": "/azure/sentinel/data-connectors-reference#wirex-network-forensics-platform-preview",

CODEOWNERS

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -46,7 +46,7 @@ articles/service-health @rboucher
4646
/articles/synapse-analytics/synapse-link/ @Rodrigossz @SnehaGunda @jovanpop-msft
4747

4848
# Cognitive Services
49-
/articles/cognitive-services/ @aahill @patrickfarley @nitinme @mrbullwinkle @laujan
49+
/articles/cognitive-services/ @aahill @patrickfarley @nitinme @mrbullwinkle @laujan @eric-urban
5050

5151
# DevOps
5252
/articles/ansible/ @TomArcherMsft

articles/active-directory-b2c/TOC.yml

Lines changed: 6 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -7,6 +7,7 @@
77
href: overview.md
88
- name: Technical and feature overview
99
href: technical-overview.md
10+
displayName: Azure AD B2C architecture, SLA, Azure AD B2C high availability, Azure AD B2C SLA, HA
1011
- name: Supported Azure AD features
1112
href: supported-azure-ad-features.md
1213
- name: What's new in docs?
@@ -81,7 +82,7 @@
8182
href: custom-policy-overview.md
8283
- name: API Connectors
8384
href: api-connectors-overview.md
84-
displayName: REST API, web API, API connectors
85+
displayName: REST API, web API, API connectors, Dynamic data retrieval, external data sources, external identity data source, outbound webhooks, third-party integration
8586
- name: User accounts
8687
href: user-overview.md
8788
- name: User profile attributes
@@ -396,12 +397,13 @@
396397
items:
397398
- name: Modify sign-up experiences
398399
href: add-api-connector.md
399-
displayName: rest claims validation, validate
400+
displayName: rest claims validation, validate, third-party integration, outbound webhook, third-party integration
400401
- name: Enrich tokens with external claims
401402
href: add-api-connector-token-enrichment.md
402-
displayName: rest claims exchange
403+
displayName: rest claims exchange, API connectors, Dynamic data retrieval, external data sources, external identity data source, outbound webhooks, third-party integration
403404
- name: Secure an API connector
404405
href: secure-rest-api.md
406+
displayName: API connectors, Dynamic data retrieval, external data sources, external identity data source, outbound webhooks, third-party integration
405407
- name: Troubleshooting
406408
items:
407409
- name: Collect logs using Application Insights
@@ -607,6 +609,7 @@
607609
displayName: Page version
608610
- name: Region availability & data residency
609611
href: data-residency.md
612+
displayName: SLA, Azure AD B2C high availability, Azure AD B2C SLA, high availability, HA
610613
- name: Build for resilience
611614
items:
612615
- name: Azure AD B2C introduction to resilience

articles/active-directory-b2c/add-api-connector-token-enrichment.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
title: Token enrichment - Azure Active Directory B2C
3-
description: Enrich tokens with claims from external sources using APIs.
3+
description: Enrich tokens with claims from external identity data sources using APIs or outbound webhooks.
44
services: active-directory-b2c
55
author: kengaderdus
66
manager: CelesteDG
@@ -18,7 +18,7 @@ zone_pivot_groups: b2c-policy-type
1818

1919
[!INCLUDE [active-directory-b2c-choose-user-flow-or-custom-policy](../../includes/active-directory-b2c-choose-user-flow-or-custom-policy.md)]
2020

21-
Azure Active Directory B2C (Azure AD B2C) enables identity developers to integrate an interaction with a RESTful API into their user flow using [API connectors](api-connectors-overview.md). At the end of this walkthrough, you'll be able to create an Azure AD B2C user flow that interacts with APIs to enrich tokens with information from external sources.
21+
Azure Active Directory B2C (Azure AD B2C) enables identity developers to integrate an interaction with a RESTful API into their user flow using [API connectors](api-connectors-overview.md). It enables developers to dynamically retrieve data from external identity sources. At the end of this walkthrough, you'll be able to create an Azure AD B2C user flow that interacts with APIs to enrich tokens with information from external sources.
2222

2323
::: zone pivot="b2c-user-flow"
2424

articles/active-directory-b2c/api-connectors-overview.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -1,11 +1,11 @@
11
---
22
title: About API connectors in Azure AD B2C
3-
description: Use Azure Active Directory (Azure AD) API connectors to customize and extend your user flows by using REST APIs.
3+
description: Use Azure Active Directory (Azure AD) API connectors to customize and extend your user flows by using REST APIs or outbound webhooks to external identity data sources.
44
services: active-directory-b2c
55
ms.service: active-directory
66
ms.subservice: B2C
77
ms.topic: how-to
8-
ms.date: 07/05/2021
8+
ms.date: 11/02/2021
99

1010
ms.author: kengaderdus
1111
author: kengaderdus
@@ -14,7 +14,7 @@ ms.custom: "it-pro"
1414
zone_pivot_groups: b2c-policy-type
1515
---
1616

17-
# Use API connectors to customize and extend sign-up user flows
17+
# Use API connectors to customize and extend sign-up user flows with external identity data sources
1818

1919
[!INCLUDE [active-directory-b2c-choose-user-flow-or-custom-policy](../../includes/active-directory-b2c-choose-user-flow-or-custom-policy.md)]
2020

@@ -25,7 +25,7 @@ zone_pivot_groups: b2c-policy-type
2525
As a developer or IT administrator, you can use API connectors to integrate your sign-up user flows with REST APIs to customize the sign-up experience and integrate with external systems. For example, with API connectors, you can:
2626

2727
- **Validate user input data**. Validate against malformed or invalid user data. For example, you can validate user-provided data against existing data in an external data store or list of permitted values. If invalid, you can ask a user to provide valid data or block the user from continuing the sign-up flow.
28-
- **Verify user identity**. Use an identity verification service to add an extra level of security to account creation decisions.
28+
- **Verify user identity**. Use an identity verification service or external identity data sources to add an extra level of security to account creation decisions.
2929
- **Integrate with a custom approval workflow**. Connect to a custom approval system for managing and limiting account creation.
3030
- **Augment tokens with attributes from external sources**. Enrich tokens with attributes about the user from sources external to Azure AD B2C such as cloud systems, custom user stores, custom permission systems, legacy identity services, and more.
3131
- **Overwrite user attributes**. Reformat or assign a value to an attribute collected from the user. For example, if a user enters the first name in all lowercase or all uppercase letters, you can format the name with only the first letter capitalized.
@@ -74,9 +74,9 @@ The Identity Experience Framework, which underlies Azure Active Directory B2C (A
7474

7575
Using Azure AD B2C, you can add your own business logic to a user journey by calling your own RESTful service. The Identity Experience Framework can send and receive data from your RESTful service to exchange claims. For example, you can:
7676

77-
- **Validate user input data**. For example, you can verify that the email address provided by the user exists in your customer's database, and if not, present an error.
78-
- **Process claims**. If a user enters their first name in all lowercase or all uppercase letters, your REST API can format the name with only the first letter capitalized and return it to Azure AD B2C.
79-
- **Enrich user data by further integrating with corporate line-of-business applications**. Your RESTful service can receive the user's email address, query the customer's database, and return the user's loyalty number to Azure AD B2C. Then return claims can be stored in the user's Azure AD account, evaluated in the next orchestration steps, or included in the access token.
77+
- **Use external identity data source to validate user input data**. For example, you can verify that the email address provided by the user exists in your customer's database, and if not, present an error. You can as well think of API connectors as a way of supporting outbound webhooks because the call is made when an event occurs e.g. a sign up.
78+
- **Process claims**. If a user enters their first name in all lowercase or all uppercase letters, your REST API can format the name with only the first letter capitalized and return it to Azure AD B2C. However, when using a custom policy, [ClaimsTransformations](claimstransformations.md) is preferred over calling a RESTful API.
79+
- **Dynamically enrich user data by further integrating with corporate line-of-business applications**. Your RESTful service can receive the user's email address, query the customer's database, and return the user's loyalty number to Azure AD B2C. Then return claims can be stored in the user's Azure AD account, evaluated in the next orchestration steps, or included in the access token.
8080
- **Run custom business logic**. You can send push notifications, update corporate databases, run a user migration process, manage permissions, audit databases, and perform any other workflows.
8181

8282
![Diagram of a RESTful service claims exchange](media/api-connectors-overview/restful-service-claims-exchange.png)

articles/active-directory-b2c/azure-sentinel.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -104,8 +104,7 @@ In the following example, you receive a notification if someone tries to force a
104104

105105
6. Select **Next: Incident settings (Preview)**. You'll configure and add the automated response later.
106106

107-
7. Go to the **Review and create** tab to review all the
108-
settings for your new alert rule. When the **Validation passed** message appears, select **Create** to initialize your alert rule.
107+
7. Go to the **Review and create** tab to review all the settings for your new alert rule. When the **Validation passed** message appears, select **Create** to initialize your alert rule.
109108

110109
![Screenshot that shows the tab for reviewing and creating an rule.](./media/azure-sentinel/review-create.png)
111110

articles/active-directory-b2c/custom-email-mailjet.md

Lines changed: 2 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -406,13 +406,6 @@ For more information, see [Self-asserted technical profile](restful-technical-pr
406406
<DisplayName>Local Account</DisplayName>
407407
<TechnicalProfiles>
408408
<TechnicalProfile Id="LocalAccountSignUpWithLogonEmail">
409-
<Metadata>
410-
<!--OTP validation error messages-->
411-
<Item Key="UserMessageIfSessionDoesNotExist">You have exceeded the maximum time allowed.</Item>
412-
<Item Key="UserMessageIfMaxRetryAttempted">You have exceeded the number of retries allowed.</Item>
413-
<Item Key="UserMessageIfInvalidCode">You have entered the wrong code.</Item>
414-
<Item Key="UserMessageIfSessionConflict">Cannot verify the code, please try again later.</Item>
415-
</Metadata>
416409
<DisplayClaims>
417410
<DisplayClaim DisplayControlReferenceId="emailVerificationControl" />
418411
<DisplayClaim ClaimTypeReferenceId="displayName" Required="true" />
@@ -423,13 +416,6 @@ For more information, see [Self-asserted technical profile](restful-technical-pr
423416
</DisplayClaims>
424417
</TechnicalProfile>
425418
<TechnicalProfile Id="LocalAccountDiscoveryUsingEmailAddress">
426-
<Metadata>
427-
<!--OTP validation error messages-->
428-
<Item Key="UserMessageIfSessionDoesNotExist">You have exceeded the maximum time allowed.</Item>
429-
<Item Key="UserMessageIfMaxRetryAttempted">You have exceeded the number of retries allowed.</Item>
430-
<Item Key="UserMessageIfInvalidCode">You have entered the wrong code.</Item>
431-
<Item Key="UserMessageIfSessionConflict">Cannot verify the code, please try again later.</Item>
432-
</Metadata>
433419
<DisplayClaims>
434420
<DisplayClaim DisplayControlReferenceId="emailVerificationControl" />
435421
</DisplayClaims>
@@ -566,18 +552,18 @@ The Localization element allows you to support multiple locales or languages in
566552
<LocalizedString ElementType="ClaimType" ElementId="emailVerificationCode" StringId="DisplayName">Verification Code</LocalizedString>
567553
<LocalizedString ElementType="ClaimType" ElementId="emailVerificationCode" StringId="UserHelpText">Verification code received in the email.</LocalizedString>
568554
<LocalizedString ElementType="ClaimType" ElementId="emailVerificationCode" StringId="AdminHelpText">Verification code received in the email.</LocalizedString>
569-
<LocalizedString ElementType="ClaimType" ElementId="email" StringId="DisplayName">Eamil</LocalizedString>
555+
<LocalizedString ElementType="ClaimType" ElementId="email" StringId="DisplayName">Email</LocalizedString>
570556
<!-- Email validation error messages-->
571557
<LocalizedString ElementType="ErrorMessage" StringId="UserMessageIfSessionDoesNotExist">You have exceeded the maximum time allowed.</LocalizedString>
572558
<LocalizedString ElementType="ErrorMessage" StringId="UserMessageIfMaxRetryAttempted">You have exceeded the number of retries allowed.</LocalizedString>
559+
<LocalizedString ElementType="ErrorMessage" StringId="UserMessageIfMaxNumberOfCodeGenerated">You have exceeded the number of code generation attempts allowed.</LocalizedString>
573560
<LocalizedString ElementType="ErrorMessage" StringId="UserMessageIfInvalidCode">You have entered the wrong code.</LocalizedString>
574561
<LocalizedString ElementType="ErrorMessage" StringId="UserMessageIfSessionConflict">Cannot verify the code, please try again later.</LocalizedString>
575562
<LocalizedString ElementType="ErrorMessage" StringId="UserMessageIfVerificationFailedRetryAllowed">The verification has failed, please try again.</LocalizedString>
576563
</LocalizedStrings>
577564
</LocalizedResources>
578565
```
579566

580-
After you add the localized strings, remove the OTP validation error messages metadata from the LocalAccountSignUpWithLogonEmail and LocalAccountDiscoveryUsingEmailAddress technical profiles.
581567

582568
## Next steps
583569

articles/active-directory-b2c/custom-email-sendgrid.md

Lines changed: 2 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -392,13 +392,6 @@ For more information, see [Self-asserted technical profile](restful-technical-pr
392392
<DisplayName>Local Account</DisplayName>
393393
<TechnicalProfiles>
394394
<TechnicalProfile Id="LocalAccountSignUpWithLogonEmail">
395-
<Metadata>
396-
<!--OTP validation error messages-->
397-
<Item Key="UserMessageIfSessionDoesNotExist">You have exceeded the maximum time allowed.</Item>
398-
<Item Key="UserMessageIfMaxRetryAttempted">You have exceeded the number of retries allowed.</Item>
399-
<Item Key="UserMessageIfInvalidCode">You have entered the wrong code.</Item>
400-
<Item Key="UserMessageIfSessionConflict">Cannot verify the code, please try again later.</Item>
401-
</Metadata>
402395
<DisplayClaims>
403396
<DisplayClaim DisplayControlReferenceId="emailVerificationControl" />
404397
<DisplayClaim ClaimTypeReferenceId="displayName" Required="true" />
@@ -409,13 +402,6 @@ For more information, see [Self-asserted technical profile](restful-technical-pr
409402
</DisplayClaims>
410403
</TechnicalProfile>
411404
<TechnicalProfile Id="LocalAccountDiscoveryUsingEmailAddress">
412-
<Metadata>
413-
<!--OTP validation error messages-->
414-
<Item Key="UserMessageIfSessionDoesNotExist">You have exceeded the maximum time allowed.</Item>
415-
<Item Key="UserMessageIfMaxRetryAttempted">You have exceeded the number of retries allowed.</Item>
416-
<Item Key="UserMessageIfInvalidCode">You have entered the wrong code.</Item>
417-
<Item Key="UserMessageIfSessionConflict">Cannot verify the code, please try again later.</Item>
418-
</Metadata>
419405
<DisplayClaims>
420406
<DisplayClaim DisplayControlReferenceId="emailVerificationControl" />
421407
</DisplayClaims>
@@ -550,18 +536,18 @@ The Localization element allows you to support multiple locales or languages in
550536
<LocalizedString ElementType="ClaimType" ElementId="emailVerificationCode" StringId="DisplayName">Verification Code</LocalizedString>
551537
<LocalizedString ElementType="ClaimType" ElementId="emailVerificationCode" StringId="UserHelpText">Verification code received in the email.</LocalizedString>
552538
<LocalizedString ElementType="ClaimType" ElementId="emailVerificationCode" StringId="AdminHelpText">Verification code received in the email.</LocalizedString>
553-
<LocalizedString ElementType="ClaimType" ElementId="email" StringId="DisplayName">Eamil</LocalizedString>
539+
<LocalizedString ElementType="ClaimType" ElementId="email" StringId="DisplayName">Email</LocalizedString>
554540
<!-- Email validation error messages-->
555541
<LocalizedString ElementType="ErrorMessage" StringId="UserMessageIfSessionDoesNotExist">You have exceeded the maximum time allowed.</LocalizedString>
556542
<LocalizedString ElementType="ErrorMessage" StringId="UserMessageIfMaxRetryAttempted">You have exceeded the number of retries allowed.</LocalizedString>
543+
<LocalizedString ElementType="ErrorMessage" StringId="UserMessageIfMaxNumberOfCodeGenerated">You have exceeded the number of code generation attempts allowed.</LocalizedString>
557544
<LocalizedString ElementType="ErrorMessage" StringId="UserMessageIfInvalidCode">You have entered the wrong code.</LocalizedString>
558545
<LocalizedString ElementType="ErrorMessage" StringId="UserMessageIfSessionConflict">Cannot verify the code, please try again later.</LocalizedString>
559546
<LocalizedString ElementType="ErrorMessage" StringId="UserMessageIfVerificationFailedRetryAllowed">The verification has failed, please try again.</LocalizedString>
560547
</LocalizedStrings>
561548
</LocalizedResources>
562549
```
563550

564-
After you add the localized strings, remove the OTP validation error messages metadata from the LocalAccountSignUpWithLogonEmail and LocalAccountDiscoveryUsingEmailAddress technical profiles.
565551

566552
## Next steps
567553

articles/active-directory-b2c/data-residency.md

Lines changed: 2 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Region availability and data residency
33
titleSuffix: Azure AD B2C
4-
description: Region availability, data residency, and information about Azure Active Directory B2C preview tenants.
4+
description: Region availability, data residency, high availability, SLA, and information about Azure Active Directory B2C preview tenants.
55
services: active-directory-b2c
66
author: kengaderdus
77
manager: CelesteDG
@@ -29,8 +29,7 @@ Azure AD B2C is **generally available worldwide** with the option for **data res
2929

3030
## Region availability
3131

32-
Azure AD B2C is available worldwide via the Azure public cloud. You can see examples of this feature in both Azure's [Products Available By Region](https://azure.microsoft.com/regions/services/) page and the [Active Directory B2C pricing calculator](https://azure.microsoft.com/pricing/details/active-directory-b2c/).
33-
32+
Azure AD B2C is available worldwide via the Azure public cloud. You can see availability of this service in both Azure's [Products Available By Region](https://azure.microsoft.com/regions/services/) page and the [Active Directory B2C pricing calculator](https://azure.microsoft.com/pricing/details/active-directory-b2c/). Also, Azure AD B2C service is highly available. Learn more about [Service Level Agreement (SLA) for Azure Active Directory B2C](https://azure.microsoft.com/support/legal/sla/active-directory-b2c/v1_1).
3433
## Data residency
3534

3635
Azure AD B2C stores user data in the United States, Europe, the Asia Pacific region, or Australia.

0 commit comments

Comments
 (0)