Skip to content

Commit 10d2004

Browse files
authored
Merge branch 'MicrosoftDocs:main' into main
2 parents 4bbe46c + a3af3eb commit 10d2004

File tree

1,429 files changed

+11897
-9592
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

1,429 files changed

+11897
-9592
lines changed

articles/active-directory-b2c/display-control-time-based-one-time-password.md

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: CelesteDG
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: reference
12-
ms.date: 12/09/2021
12+
ms.date: 07/20/2022
1313
ms.author: kengaderdus
1414
ms.subservice: B2C
1515
---
@@ -116,4 +116,8 @@ The following screenshot illustrates a TOTP verification page.
116116

117117
## Next steps
118118

119-
- Learn how to validate a TOTP code in [Define an Azure AD MFA technical profile](multi-factor-auth-technical-profile.md).
119+
- Learn more about multifactor authentication in [Enable multifactor authentication in Azure Active Directory B2C](multi-factor-authentication.md?pivots=b2c-custom-policy)
120+
121+
- Learn how to validate a TOTP code in [Define an Azure AD MFA technical profile](multi-factor-auth-technical-profile.md).
122+
123+
- Explore a sample [Azure AD B2C MFA with TOTP using any Authenticator app custom policy in GitHub](https://github.com/azure-ad-b2c/samples/tree/master/policies/totp).

articles/active-directory-b2c/identity-provider-twitter.md

Lines changed: 26 additions & 20 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: CelesteDG
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: how-to
12-
ms.date: 09/16/2021
12+
ms.date: 07/20/2022
1313
ms.custom: project-no-code
1414
ms.author: kengaderdus
1515
ms.subservice: B2C
@@ -34,30 +34,35 @@ zone_pivot_groups: b2c-policy-type
3434
To enable sign-in for users with a Twitter account in Azure AD B2C, you need to create a Twitter application. If you don't already have a Twitter account, you can sign up at [`https://twitter.com/signup`](https://twitter.com/signup). You also need to [Apply for a developer account](https://developer.twitter.com/). For more information, see [Apply for access](https://developer.twitter.com/en/apply-for-access).
3535

3636
1. Sign in to the [Twitter Developer Portal](https://developer.twitter.com/portal/projects-and-apps) with your Twitter account credentials.
37-
1. Under **Standalone Apps**, select **+Create App**.
38-
1. Enter an **App name**, and then select **Complete**.
39-
1. Copy the value of the **App key**, and **API key secret**. You use both of them to configure Twitter as an identity provider in your tenant.
40-
1. Under **Setup your App**, select **App settings**.
41-
1. Under **Authentication settings**, select **Edit**
42-
1. Select **Enable 3-legged OAuth** checkbox.
43-
1. Select **Request email address from users** checkbox.
44-
1. For the **Callback URLs**, enter `https://your-tenant.b2clogin.com/your-tenant-name.onmicrosoft.com/your-user-flow-Id/oauth1/authresp`. If you use a [custom domain](custom-domain.md), enter `https://your-domain-name/your-tenant-name.onmicrosoft.com/your-user-flow-Id/oauth1/authresp`. Use all lowercase letters when entering your tenant name and user flow ID even if they are defined with uppercase letters in Azure AD B2C. Replace:
37+
1. Select **+ Create Project** button.
38+
1. Under **Project name** tab, enter a preferred name of your project, and then select **Next** button.
39+
1. Under **Use case** tab, select your preferred use case, and then select **Next**.
40+
1. Under **Project description** tab, enter your project description, and then select **Next** button.
41+
1. Under **App name** tab, enter a name for your app, such as *azureadb2c*, and the select **Next** button.
42+
1. Under **Keys & Tokens** tab, copy the value of **API Key** and **API Key Secret** for later. You use both of them to configure Twitter as an identity provider in your Azure AD B2C tenant.
43+
1. Select **App settings** to open the app settings.
44+
1. At the lower part of the page, under **User authentication settings**, select **Set up**.
45+
1. In the **User authentication settings** page, select **OAuth 2.0** option.
46+
1. Under **OAUTH 2.0 SETTINGS**, for the **Type of app**, select your appropriate app type such as *Web App*.
47+
1. Under **GENERAL AUTHENTICATION SETTINGS**:
48+
1. For the **Callback URI/Redirect URL**, enter `https://your-tenant.b2clogin.com/your-tenant-name.onmicrosoft.com/your-user-flow-Id/oauth1/authresp`. If you use a [custom domain](custom-domain.md), enter `https://your-domain-name/your-tenant-name.onmicrosoft.com/your-user-flow-Id/oauth1/authresp`. Use all lowercase letters when entering your tenant name and user flow ID even if they are defined with uppercase letters in Azure AD B2C. Replace:
4549
- `your-tenant-name` with the name of your tenant name.
4650
- `your-domain-name` with your custom domain.
4751
- `your-user-flow-Id` with the identifier of your user flow. For example, `b2c_1a_signup_signin_twitter`.
4852

4953
1. For the **Website URL**, enter `https://your-tenant.b2clogin.com`. Replace `your-tenant` with the name of your tenant. For example, `https://contosob2c.b2clogin.com`. If you use a [custom domain](custom-domain.md), enter `https://your-domain-name`.
5054
1. Enter a URL for the **Terms of service**, for example `http://www.contoso.com/tos`. The policy URL is a page you maintain to provide terms and conditions for your application.
5155
1. Enter a URL for the **Privacy policy**, for example `http://www.contoso.com/privacy`. The policy URL is a page you maintain to provide privacy information for your application.
52-
1. Select **Save**.
56+
1. Select **Save**.
5357

5458
::: zone pivot="b2c-user-flow"
5559

5660
## Configure Twitter as an identity provider
5761

5862
1. Sign in to the [Azure portal](https://portal.azure.com/) as the global administrator of your Azure AD B2C tenant.
59-
1. Make sure you're using the directory that contains your Azure AD B2C tenant. Select the **Directories + subscriptions** icon in the portal toolbar.
60-
1. On the **Portal settings | Directories + subscriptions** page, find your Azure AD B2C directory in the **Directory name** list, and then select **Switch**.
63+
1. Make sure you're using the directory that contains your Azure AD B2C tenant.
64+
1. Select the **Directories + subscriptions** icon in the portal toolbar.
65+
1. On the **Portal settings | Directories + subscriptions** page, find your Azure AD B2C directory in the **Directory name** list, and then select **Switch**.
6166
1. Choose **All services** in the top-left corner of the Azure portal, search for and select **Azure AD B2C**.
6267
1. Select **Identity providers**, then select **Twitter**.
6368
1. Enter a **Name**. For example, *Twitter*.
@@ -86,25 +91,26 @@ If the sign-in process is successful, your browser is redirected to `https://jwt
8691

8792
## Create a policy key
8893

89-
You need to store the secret key that you previously recorded in your Azure AD B2C tenant.
94+
You need to store the secret key that you previously recorded for Twitter app in your Azure AD B2C tenant.
9095

9196
1. Sign in to the [Azure portal](https://portal.azure.com/).
92-
1. Make sure you're using the directory that contains your Azure AD B2C tenant. Select the **Directories + subscriptions** icon in the portal toolbar.
93-
1. On the **Portal settings | Directories + subscriptions** page, find your Azure AD B2C directory in the **Directory name** list, and then select **Switch**.
94-
1. Choose **All services** in the top-left corner of the Azure portal, and then search for and select **Azure AD B2C**.
95-
1. On the Overview page, select **Identity Experience Framework**.
97+
1. Make sure you're using the directory that contains your Azure AD B2C tenant.
98+
1. Select the **Directories + subscriptions** icon in the portal toolbar.
99+
1. On the **Portal settings | Directories + subscriptions** page, find your Azure AD B2C directory in the **Directory name** list, and then select **Switch**.
100+
1. In the Azure portal, search for and select **Azure AD B2C**.
101+
1. On the left menu, under **Policies**, select **Identity Experience Framework**.
96102
1. Select **Policy Keys** and then select **Add**.
97103
1. For **Options**, choose `Manual`.
98104
1. Enter a **Name** for the policy key. For example, `TwitterSecret`. The prefix `B2C_1A_` is added automatically to the name of your key.
99-
1. In **Secret**, enter your client secret that you previously recorded.
105+
1. For **Secret**, enter your *API key secret* value that you previously recorded.
100106
1. For **Key usage**, select `Encryption`.
101107
1. Click **Create**.
102108

103109
## Configure Twitter as an identity provider
104110

105111
To enable users to sign in using a Twitter account, you need to define the account as a claims provider that Azure AD B2C can communicate with through an endpoint. The endpoint provides a set of claims that are used by Azure AD B2C to verify that a specific user has authenticated.
106112

107-
You can define a Twitter account as a claims provider by adding it to the **ClaimsProviders** element in the extension file of your policy.
113+
You can define a Twitter account as a claims provider by adding it to the **ClaimsProviders** element in the extension file of your policy. Refer to the custom policy starter pack that you downloaded in the Prerequisites of this article.
108114

109115
1. Open the *TrustFrameworkExtensions.xml*.
110116
2. Find the **ClaimsProviders** element. If it does not exist, add it under the root element.
@@ -149,7 +155,7 @@ You can define a Twitter account as a claims provider by adding it to the **Clai
149155
</ClaimsProvider>
150156
```
151157

152-
4. Replace the value of **client_id** with the *API key secret* that you previously recorded.
158+
4. Replace the value of **client_id** with the *API key* that you previously recorded.
153159
5. Save the file.
154160

155161
[!INCLUDE [active-directory-b2c-add-identity-provider-to-user-journey](../../includes/active-directory-b2c-add-identity-provider-to-user-journey.md)]

articles/active-directory-b2c/javascript-and-page-layout.md

Lines changed: 15 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -233,6 +233,21 @@ function addTermsOfUseLink() {
233233

234234
In the code, replace `termsOfUseUrl` with the link to your terms of use agreement. For your directory, create a new user attribute called **termsOfUse** and then include **termsOfUse** as a user attribute.
235235

236+
Alternatively, you can add a link at the bottom of self-asserted pages, without using of JavaScript. Use the following localization:
237+
238+
```xml
239+
<LocalizedResources Id="api.localaccountsignup.en">
240+
<LocalizedStrings>
241+
<!-- The following elements will display a link at the bottom of the page. -->
242+
<LocalizedString ElementType="UxElement" StringId="disclaimer_link_1_text">Terms of use</LocalizedString>
243+
<LocalizedString ElementType="UxElement" StringId="disclaimer_link_1_url">termsOfUseUrl</LocalizedString>
244+
</LocalizedStrings>
245+
</LocalizedResources>
246+
```
247+
248+
Replace `termsOfUseUrl` with the link to your organization's privacy policy and terms of use.
249+
250+
236251
## Next steps
237252

238253
Find more information about how to [Customize the user interface of your application in Azure Active Directory B2C](customize-ui-with-html.md).

articles/active-directory-b2c/localization-string-ids.md

Lines changed: 21 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ manager: CelesteDG
88
ms.service: active-directory
99
ms.workload: identity
1010
ms.topic: reference
11-
ms.date: 04/12/2022
11+
ms.date: 04/19/2022
1212
ms.author: kengaderdus
1313
ms.subservice: B2C
1414
---
@@ -177,6 +177,18 @@ The following are the IDs for a content definition with an ID of `api.localaccou
177177
| **ver_intro_msg** | Verification is necessary. Please click Send button. |
178178
| **ver_input** | Verification code |
179179

180+
### Sign-up and self-asserted pages disclaimer links
181+
182+
The following `UxElement` string IDs will display disclaimer link(s) at the bottom of the self-asserted page. These links are not displayed by default unless specified in the localized strings.
183+
184+
| ID | Example value |
185+
| --- | ------------- |
186+
| **disclaimer_msg_intro** | By providing your phone number, you consent to receiving a one-time passcode sent by text message to help you sign into {insert your application name}. Standard messsage and data rates may apply. |
187+
| **disclaimer_link_1_text** | Privacy Statement |
188+
| **disclaimer_link_1_url** | {insert your privacy statement URL} |
189+
| **disclaimer_link_2_text** | Terms and Conditions |
190+
| **disclaimer_link_2_url** | {insert your terms and conditions URL} |
191+
180192
### Sign-up and self-asserted pages error messages
181193

182194
| ID | Default value |
@@ -238,6 +250,14 @@ The following example shows the use of some of the user interface elements in th
238250
<LocalizedString ElementType="UxElement" StringId="ver_input">Verification code</LocalizedString>
239251
<LocalizedString ElementType="UxElement" StringId="ver_intro_msg">Verification is necessary. Please click Send button.</LocalizedString>
240252
<LocalizedString ElementType="UxElement" StringId="ver_success_msg">E-mail address verified. You can now continue.</LocalizedString>
253+
<!-- The following elements will display a message and two links at the bottom of the page.
254+
For policies that you intend to show to users in the United States, we suggest displaying the following text. Replace the content of the disclaimer_link_X_url elements with links to your organization's privacy statement and terms and conditions.
255+
Uncomment any of these lines to display them. -->
256+
<!-- <LocalizedString ElementType="UxElement" StringId="disclaimer_msg_intro">By providing your phone number, you consent to receiving a one-time passcode sent by text message to help you sign into {insert your application name}. Standard messsage and data rates may apply.</LocalizedString> -->
257+
<!-- <LocalizedString ElementType="UxElement" StringId="disclaimer_link_1_text">Privacy Statement</LocalizedString>
258+
<LocalizedString ElementType="UxElement" StringId="disclaimer_link_1_url">{insert your privacy statement URL}</LocalizedString> -->
259+
<!-- <LocalizedString ElementType="UxElement" StringId="disclaimer_link_2_text">Terms and Conditions</LocalizedString>
260+
<LocalizedString ElementType="UxElement" StringId="disclaimer_link_2_url">{insert your terms and conditions URL}</LocalizedString> -->
241261
<LocalizedString ElementType="ErrorMessage" StringId="ServiceThrottled">There are too many requests at this moment. Please wait for some time and try again.</LocalizedString>
242262
<LocalizedString ElementType="ErrorMessage" StringId="UserMessageIfClaimNotVerified">Claim not verified: {0}</LocalizedString>
243263
<LocalizedString ElementType="ErrorMessage" StringId="UserMessageIfClaimsPrincipalAlreadyExists">A user with the specified ID already exists. Please choose a different one.</LocalizedString>

articles/active-directory-b2c/multi-factor-authentication.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ manager: CelesteDG
88
ms.service: active-directory
99
ms.workload: identity
1010
ms.topic: how-to
11-
ms.date: 06/27/2022
11+
ms.date: 07/20/2022
1212
ms.custom: project-no-code
1313
ms.author: kengaderdus
1414
ms.subservice: B2C
@@ -83,7 +83,7 @@ To enable multifactor authentication, get the custom policy starter pack from Gi
8383

8484
- [Download the .zip file](https://github.com/Azure-Samples/active-directory-b2c-custom-policy-starterpack/archive/master.zip) or clone the repository from `https://github.com/Azure-Samples/active-directory-b2c-custom-policy-starterpack`, and then update the XML files in the **SocialAndLocalAccountsWithMFA** starter pack with your Azure AD B2C tenant name. The **SocialAndLocalAccountsWithMFA** enables social and local sign in options, and multifactor authentication options, except for the Authenticator app - TOTP option.
8585
- To support the **Authenticator app - TOTP** MFA option, download the custom policy files from `https://github.com/azure-ad-b2c/samples/tree/master/policies/totp`, and then update the XML files with your Azure AD B2C tenant name. Make sure to include `TrustFrameworkExtensions.xml`, `TrustFrameworkLocalization.xml`, and `TrustFrameworkBase.xml` XML files from the **SocialAndLocalAccounts** starter pack.
86-
- Update your [page layout] to version `2.1.9`. For more information, see [Select a page layout](contentdefinitions.md#select-a-page-layout).
86+
- Update your [page layout] to version `2.1.14`. For more information, see [Select a page layout](contentdefinitions.md#select-a-page-layout).
8787

8888
::: zone-end
8989

articles/active-directory-b2c/phone-factor-technical-profile.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -93,6 +93,7 @@ The **CryptographicKeys** element is not used.
9393
| ManualPhoneNumberEntryAllowed| No | Specify whether or not a user is allowed to manually enter a phone number. Possible values: `true`, or `false` (default).|
9494
| setting.authenticationMode | No | The method to validate the phone number. Possible values: `sms`, `phone`, or `mixed` (default).|
9595
| setting.autodial| No| Specify whether the technical profile should auto dial or auto send an SMS. Possible values: `true`, or `false` (default). Auto dial requires the `setting.authenticationMode` metadata be set to `sms`, or `phone`. The input claims collection must have a single phone number. |
96+
| setting.autosubmit | No | Specifies whether the technical profile should auto submit the one-time password entry form. Possible values are `true` (default), or `false`. When auto-submit is turned off, the user needs to select a button to progress the journey. |
9697

9798
### UI elements
9899

articles/active-directory-b2c/tutorial-create-user-flows.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -343,7 +343,7 @@ As you upload the files, Azure adds the prefix `B2C_1A_` to each.
343343
In this article, you learned how to:
344344

345345
> [!div class="checklist"]
346-
> * Create a sig- up and sign in user flow
346+
> * Create a sign-up and sign in user flow
347347
> * Create a profile editing user flow
348348
> * Create a password reset user flow
349349

articles/active-directory-domain-services/policy-reference.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Built-in policy definitions for Azure Active Directory Domain Services
33
description: Lists Azure Policy built-in policy definitions for Azure Active Directory Domain Services. These built-in policy definitions provide common approaches to managing your Azure resources.
4-
ms.date: 07/06/2022
4+
ms.date: 07/20/2022
55
ms.service: active-directory
66
ms.subservice: domain-services
77
author: justinha

articles/active-directory/app-provisioning/partner-driven-integrations.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -80,7 +80,7 @@ If you have built a SCIM Gateway and would like to add it to this list, follow t
8080
1. Review the Azure AD SCIM [documentation](use-scim-to-provision-users-and-groups.md) to understand the Azure AD SCIM implementation.
8181
1. Test compatibility between the Azure AD SCIM client and your SCIM gateway.
8282
1. Click the pencil at the top of this document to edit the article
83-
1. Once you're redirected to Github, click the pencil at the top of the article to start making changes
83+
1. Once you're redirected to GitHub, click the pencil at the top of the article to start making changes
8484
1. Make changes in the article using the Markdown language and create a pull request. Make sure to provide a description for the pull request.
8585
1. An admin of the repository will review and merge your changes so that others can view them.
8686

articles/active-directory/app-provisioning/sap-successfactors-integration-reference.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -79,12 +79,12 @@ Based on the attribute-mapping, during full sync Azure AD provisioning service s
7979
>| OData API Host | Appends https to the *Tenant URL*. Example: `https://api4.successfactors.com` |
8080
>| OData API Endpoint | `/odata/v2/PerPerson` |
8181
>| OData $format query parameter | `json` |
82-
>| OData $filter query parameter | `(personEmpTerminationInfoNav/activeEmploymentsCount ge 1) and (lastModifiedDateTime le <CurrentExecutionTime>)` |
82+
>| OData $filter query parameter | `(personEmpTerminationInfoNav/activeEmploymentsCount ne null) and (lastModifiedDateTime le <CurrentExecutionTime>)` |
8383
>| OData $expand query parameter | This parameter value depends on the attributes mapped. Example: `employmentNav/userNav,employmentNav/jobInfoNav,personalInfoNav,personEmpTerminationInfoNav,phoneNav,emailNav,employmentNav/jobInfoNav/companyNav/countryOfRegistrationNav,employmentNav/jobInfoNav/divisionNav,employmentNav/jobInfoNav/departmentNav` |
8484
>| OData customPageSize query parameter | `100` |
8585
8686
> [!NOTE]
87-
> During the first initial full sync, Azure AD provisioning service does not pull inactive/terminated worker data.
87+
> During the full initial sync, both active and terminated workers from SAP SuccessFactors will be fetched.
8888
8989
For each SuccessFactors user, the provisioning service looks for an account in the target (Azure AD/on-premises Active Directory) using the matching attribute defined in the mapping. For example: if *personIdExternal* maps to *employeeId* and is set as the matching attribute, then the provisioning service uses the *personIdExternal* value to search for the user with *employeeId* filter. If a user match is found, then it updates the target attributes. If no match is found, then it creates a new entry in the target.
9090

0 commit comments

Comments
 (0)