Skip to content

Commit 12ed462

Browse files
authored
Merge branch 'main' into patch-3
2 parents 5a6a240 + a624505 commit 12ed462

File tree

1,250 files changed

+25877
-9711
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

1,250 files changed

+25877
-9711
lines changed

.openpublishing.publish.config.json

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -986,6 +986,7 @@
986986
".openpublishing.redirection.azure-percept.json",
987987
".openpublishing.redirection.azure-productivity.json",
988988
".openpublishing.redirection.azure-australia.json",
989+
".openpublishing.redirection.aks.json",
989990
"articles/azure-fluid-relay/.openpublishing.redirection.fluid-relay.json",
990991
"articles/azure-netapp-files/.openpublishing.redirection.azure-netapp-files.json",
991992
"articles/azure-relay/.openpublishing.redirection.relay.json",

.openpublishing.redirection.active-directory.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10845,8 +10845,12 @@
1084510845
"source_path": "articles/azure-percept/voice-control-your-inventory-then-visualize-with-power-bi-dashboard.md",
1084610846
"redirect_url": "/azure/azure-percept/index",
1084710847
"redirect_document_id": false
10848+
},
10849+
{
10850+
"source_path_from_root": "/articles/active-directory/fundamentals/keep-me-signed-in.md",
10851+
"redirect_url": "/azure/active-directory/fundamentals/customize-branding",
10852+
"redirect_document_id": false
1084810853
}
1084910854

10850-
1085110855
]
1085210856
}

.openpublishing.redirection.aks.json

Lines changed: 9 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,9 @@
1+
{
2+
"redirections": [
3+
{
4+
"source_path_from_root": "/articles/aks/azure-cni-overlay.md",
5+
"redirect_url": "/azure/aks",
6+
"redirect_document_id": false
7+
}
8+
]
9+
}

.openpublishing.redirection.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -6928,6 +6928,11 @@
69286928
"redirect_url": "/azure/azure-government/compare-azure-government-global-azure",
69296929
"redirect_document_id": false
69306930
},
6931+
{
6932+
"source_path_from_root": "/articles/azure-government/documentation-government-overview.md",
6933+
"redirect_url": "/azure/azure-government/documentation-government-plan-security",
6934+
"redirect_document_id": false
6935+
},
69316936
{
69326937
"source_path_from_root": "/articles/security/compliance/azure-services-in-fedramp-auditscope.md",
69336938
"redirect_url": "/azure/azure-government/compliance/azure-services-in-fedramp-auditscope",

articles/active-directory-b2c/enable-authentication-web-api.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -443,7 +443,7 @@ Under the project root folder, create a *config.json* file, and then add to it t
443443
```json
444444
{
445445
"credentials": {
446-
"tenantName": "<your-tenant-name>",
446+
"tenantName": "<your-tenant-name>.onmicrosoft.com",
447447
"clientID": "<your-webapi-application-ID>",
448448
"issuer": "https://<your-tenant-name>.b2clogin.com/<your-tenant-ID>/v2.0/"
449449
},
@@ -470,7 +470,7 @@ In the *config.json* file, update the following properties:
470470

471471
|Section |Key |Value |
472472
|---------|---------|---------|
473-
| credentials | tenantName | The first part of your Azure AD B2C [tenant name](tenant-management.md#get-your-tenant-name) (for example, `contoso`).|
473+
| credentials | tenantName | Your Azure AD B2C [tenant name/domain name](tenant-management.md#get-your-tenant-name) (for example, `contoso.onmicrosoft.com`).|
474474
| credentials |clientID | The web API application ID. In the [preceding diagram](#app-registration-overview), it's the application with *App ID: 2*. To learn how to get your web API application registration ID, see [Prerequisites](#prerequisites). |
475475
| credentials | issuer| The token issuer `iss` claim value. By default, Azure AD B2C returns the token in the following format: `https://<your-tenant-name>.b2clogin.com/<your-tenant-ID>/v2.0/`. Replace `<your-tenant-name>` with the first part of your Azure AD B2C [tenant name](tenant-management.md#get-your-tenant-name). Replace `<your-tenant-ID>` with your [Azure AD B2C tenant ID](tenant-management.md#get-your-tenant-id). |
476476
| policies | policyName | The user flows, or custom policy. To learn how to get your user flow or policy, see [Prerequisites](#prerequisites).|

articles/active-directory-b2c/index.yml

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -29,7 +29,7 @@ landingContent:
2929
- text: What is Azure AD B2C?
3030
url: overview.md
3131
- text: Compare solutions for External Identities
32-
url: ../active-directory/external-identities/external-identities-overview.md?bc=%2fazure%2factive-directory-b2c%2fbread%2ftoc.json&toc=%2fazure%2factive-directory-b2c%2fTOC.json
32+
url: ../active-directory/external-identities/external-identities-overview.md?bc=/azure/active-directory-b2c/bread/toc.json&toc=/azure/active-directory-b2c/TOC.json
3333
- text: Get started with Azure AD B2C
3434
url: tutorial-create-tenant.md
3535
- text: Technical and feature overview
@@ -43,13 +43,13 @@ landingContent:
4343
- linkListType: learn
4444
links:
4545
- text: Authentication and authorization
46-
url: ../active-directory/develop/authentication-vs-authorization.md?bc=%2fazure%2factive-directory-b2c%2fbread%2ftoc.json&toc=%2fazure%2factive-directory-b2c%2fTOC.json
46+
url: ../active-directory/develop/authentication-vs-authorization.md?bc=/azure/active-directory-b2c/bread/toc.json&toc=/azure/active-directory-b2c/TOC.json
4747
- text: Tokens
48-
url: ../active-directory/develop/security-tokens.md?bc=%2fazure%2factive-directory-b2c%2fbread%2ftoc.json&toc=%2fazure%2factive-directory-b2c%2fTOC.json
48+
url: ../active-directory/develop/security-tokens.md?bc=/azure/active-directory-b2c/bread/toc.json&toc=/azure/active-directory-b2c/TOC.json
4949
- text: Protocols
50-
url: ../active-directory/develop/v2-app-types.md?bc=%2fazure%2factive-directory-b2c%2fbread%2ftoc.json&toc=%2fazure%2factive-directory-b2c%2fTOC.json
50+
url: ../active-directory/develop/v2-app-types.md?bc=/azure/active-directory-b2c/bread/toc.json&toc=/azure/active-directory-b2c/TOC.json
5151
- text: Authentication library
52-
url: ../active-directory/develop/msal-overview.md?bc=%2fazure%2factive-directory-b2c%2fbread%2ftoc.json&toc=%2fazure%2factive-directory-b2c%2fTOC.json
52+
url: ../active-directory/develop/msal-overview.md?bc=/azure/active-directory-b2c/bread/toc.json&toc=/azure/active-directory-b2c/TOC.json
5353
- text: 'Build a web site: HTML, CSS, JavaScript'
5454
url: /learn/modules/build-simple-website/
5555

Binary file not shown.
61.8 KB
Loading

articles/active-directory-b2c/partner-deduce.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -129,7 +129,7 @@ In order to collect the user_agent from client-side, create your own `**ContentD
129129
To customize the user interface, you specify a URL in the `ContentDefinition` element with customized HTML content. In the self-asserted technical profile or orchestration step, you point to that ContentDefinition identifier.
130130

131131

132-
1. Open the `TrustFrameworksExtension.xml` and define a new **ContentDefinition** to customize the [self-asserted technical profile](https://docs.microsoft.com/azure/active-directory-b2c/self-asserted-technical-profile).
132+
1. Open the `TrustFrameworksExtension.xml` and define a new **ContentDefinition** to customize the [self-asserted technical profile](/azure/active-directory-b2c/self-asserted-technical-profile).
133133

134134
1. Find the `BuildingBlocks` element and add the `**api.selfassertedDeduce**` ContentDefinition:
135135

@@ -434,11 +434,11 @@ The **ClaimsSchema** element defines the claim types that can be referenced as p
434434

435435
### Step 6: Add Deduce ClaimsProvider
436436

437-
A **claims provider** is an interface to communicate with different types of parties via its [technical profiles](https://docs.microsoft.com/azure/active-directory-b2c/technicalprofiles).
437+
A **claims provider** is an interface to communicate with different types of parties via its [technical profiles](/azure/active-directory-b2c/technicalprofiles).
438438

439439
- `SelfAsserted-UserAgent` self-asserted technical profile is used to collect user_agent from client-side.
440440

441-
- `deduce_insight_api` technical profile sends data to the Deduce RESTful service in an input claims collection and receives data back in an output claims collection. For more information, see [integrate REST API claims exchanges in your Azure AD B2C custom policy](https://docs.microsoft.com/azure/active-directory-b2c/api-connectors-overview?pivots=b2c-custom-policy)
441+
- `deduce_insight_api` technical profile sends data to the Deduce RESTful service in an input claims collection and receives data back in an output claims collection. For more information, see [integrate REST API claims exchanges in your Azure AD B2C custom policy](/azure/active-directory-b2c/api-connectors-overview?pivots=b2c-custom-policy)
442442

443443
You can define Deduce as a claims provider by adding it to the **ClaimsProvider** element in the extension file of your policy.
444444

articles/active-directory-b2c/tutorial-delete-tenant.md

Lines changed: 49 additions & 28 deletions
Original file line numberDiff line numberDiff line change
@@ -8,14 +8,14 @@ manager: CelesteDG
88
ms.service: active-directory
99
ms.workload: identity
1010
ms.topic: tutorial
11-
ms.date: 09/20/2021
11+
ms.date: 08/30/2022
1212
ms.author: kengaderdus
1313
ms.subservice: B2C
1414
---
1515

1616
# Clean up resources and delete the tenant
1717

18-
When you've finished the Azure AD B2C tutorials, you can delete the tenant you used for testing or training. To delete the tenant, you'll first need to delete all tenant resources. In this article, you'll:
18+
When you've finished the Azure Active Directory B2C (Azure AD B2C) tutorials, you can delete the tenant you used for testing or training. To delete the tenant, you'll first need to delete all tenant resources. In this article, you'll:
1919

2020
> [!div class="checklist"]
2121
> * Use the **Delete tenant** option to identify cleanup tasks
@@ -25,62 +25,83 @@ When you've finished the Azure AD B2C tutorials, you can delete the tenant you u
2525
## Identify cleanup tasks
2626

2727
1. Sign in to the [Azure portal](https://portal.azure.com/) with a global administrator or subscription administrator role. Use the same work or school account or the same Microsoft account that you used to sign up for Azure.
28-
1. Make sure you're using the directory that contains your Azure AD B2C tenant. Select the **Directories + subscriptions** icon in the portal toolbar.
29-
1. On the **Portal settings | Directories + subscriptions** page, find your Azure AD B2C directory in the **Directory name** list, and then select **Switch**.
30-
1. Select the **Azure Active Directory** service.
31-
1. Under **Manage**, select **Properties**.
28+
1. Make sure you're using the directory that contains your Azure AD B2C tenant:
29+
1. Select the **Directories + subscriptions** icon in the portal toolbar.
30+
1. On the **Portal settings | Directories + subscriptions** page, find your Azure AD B2C directory in the **Directory name** list, and then select **Switch** button next to it.
31+
1. In the Azure portal, search for and select the **Azure Active Directory** service.
32+
1. In the left menu, under **Manage**, select **Properties**.
3233
1. Under **Access management for Azure resources**, select **Yes**, and then select **Save**.
33-
1. Sign out of the Azure portal and then sign back in to refresh your access. Make sure you're using the directory that contains your Azure AD B2C tenant. Select the **Directories + subscriptions** icon in the portal toolbar.
34-
1. On the **Portal settings | Directories + subscriptions** page, find your Azure AD B2C directory in the **Directory name** list, and then select **Switch**.
35-
1. Select the **Azure Active Directory** service.
36-
1. On the **Overview** page, select **Delete tenant**. The **Required action** column indicates the resources you'll need to remove before you can delete the tenant.
34+
1. Sign out of the Azure portal and then sign back in to refresh your access.
35+
1. Repeat step two to make sure you're using the directory that contains your Azure AD B2C tenant.
36+
1. In the Azure portal, search for and select the **Azure Active Directory** service
37+
1. On the **Overview** page, select **Manage tenants**.
38+
1. On the **Manage tenants** page, select (by check marking) the tenant you want to delete, and then, at the top of the page, select the **Delete** button. The **Required action** column indicates the resources you need to remove before you can delete the tenant.
3739

3840
![Delete tenant tasks](media/tutorial-delete-tenant/delete-tenant-tasks.png)
3941

4042
## Delete tenant resources
4143

42-
If you have the confirmation page open from the previous section, you can use the links in the **Required action** column to open the Azure portal pages where you can remove these resources. Or, you can remove tenant resources from within the Azure AD B2C service using the following steps.
44+
If you've the confirmation page open from the previous section, you can use the links in the **Required action** column to open the Azure portal pages where you can remove these resources. Or, you can remove tenant resources from within the Azure AD B2C service using the following steps.
4345

4446
1. Sign in to the [Azure portal](https://portal.azure.com/) with a global administrator or subscription administrator role. Use the same work or school account or the same Microsoft account that you used to sign up for Azure.
45-
1. Make sure you're using the directory that contains your Azure AD B2C tenant. Select the **Directories + subscriptions** icon in the portal toolbar.
46-
1. On the **Portal settings | Directories + subscriptions** page, find your Azure AD B2C directory in the **Directory name** list, and then select **Switch**.
47-
1. Select the **Azure AD B2C** service. Or use the search box to find and select **Azure AD B2C**.
48-
1. Delete all users *except* the admin account you're currently signed in as: Under **Manage**, select **Users**. On the **All users** page, select the checkbox next to each user (except the admin account you're currently signed in as). Select **Delete**, and then select **Yes** when prompted.
47+
1. Make sure you're using the directory that contains your Azure AD B2C tenant:
48+
1. Select the **Directories + subscriptions** icon in the portal toolbar.
49+
1. On the **Portal settings | Directories + subscriptions** page, find your Azure AD B2C directory in the **Directory name** list, and then select **Switch** button next to it.
50+
1. In the Azure portal, select the **Azure AD B2C** service, or search for and select **Azure AD B2C**.
51+
1. Delete all users *except* the admin account you're currently signed in as:
52+
1. Under **Manage**, select **Users**.
53+
1. On the **All users** page, select the checkbox next to each user (except the admin account you're currently signed in as).
54+
1. At the top of the page, select **Delete user**, and then select **Yes** when prompted.
4955

5056
![Delete users](media/tutorial-delete-tenant/delete-users.png)
5157

52-
1. Delete app registrations and the *b2c-extensions-app*: Under **Manage**, select **App registrations**. Select the **All applications** tab. Select an application, and then select **Delete**. Repeat for all applications, including the **b2c-extensions-app** application.
58+
1. Delete app registrations and the *b2c-extensions-app*:
59+
1. Under **Manage**, select **App registrations**.
60+
1. Select the **All applications** tab.
61+
1. Select an application to open it, and then select **Delete** button. Repeat for all applications, including the **b2c-extensions-app** application.
5362

5463
![Delete application](media/tutorial-delete-tenant/delete-applications.png)
5564

56-
1. Delete any identity providers you configured: Under **Manage**, select **Identity providers**. Select an identity provider you configured, and then select **Remove**.
65+
1. Delete any identity providers you configured:
66+
1. Under **Manage**, select **Identity providers**.
67+
1. Select an identity provider you configured, and then select **Remove**.
5768

5869
![Delete identity provider](media/tutorial-delete-tenant/identity-providers.png)
5970

60-
1. Delete user flows: Under **Policies**, select **User flows**. Next to each user flow, select the ellipses (...) and then select **Delete**.
71+
1. Delete user flows:
72+
1. Under **Policies**, select **User flows**.
73+
1. Next to each user flow, select the ellipses (...) and then select **Delete**.
6174

6275
![Delete user flows](media/tutorial-delete-tenant/user-flow.png)
6376

64-
1. Delete policy keys: Under **Policies**, select **Identity Experience Framework**, and then select **Policy keys**. Next to each policy key, select the ellipses (...) and then select **Delete**.
77+
1. Delete policy keys:
78+
1. Under **Policies**, select **Identity Experience Framework**, and then select **Policy keys**.
79+
1. Next to each policy key, select the ellipses (...) and then select **Delete**.
6580

66-
1. Delete custom policies: Under **Policies**, select **Identity Experience Framework**, select **Custom policies**, and then delete all policies.
81+
1. Delete custom policies:
82+
1. Under **Policies**, select **Identity Experience Framework**, and then select **Custom policies**.
83+
1. Next to each Custom policy, select the ellipses (...) and then select **Delete**.
6784

6885
## Delete the tenant
6986

87+
Once you delete all the tenant resources, you can now delete the tenant itself:
88+
7089
1. Sign in to the [Azure portal](https://portal.azure.com/) with a global administrator or subscription administrator role. Use the same work or school account or the same Microsoft account that you used to sign up for Azure.
71-
1. Make sure you're using the directory that contains your Azure AD B2C tenant. Select the **Directories + subscriptions** icon in the portal toolbar.
72-
1. On the **Portal settings | Directories + subscriptions** page, find your Azure AD B2C directory in the **Directory name** list, and then select **Switch**.
73-
1. Select the **Azure Active Directory** service.
90+
1. Make sure you're using the directory that contains your Azure AD B2C tenant:
91+
1. Select the **Directories + subscriptions** icon in the portal toolbar.
92+
1. On the **Portal settings | Directories + subscriptions** page, find your Azure AD B2C directory in the **Directory name** list, and then select **Switch** button next to it.
93+
1. In the Azure portal, search for and select the **Azure Active Directory** service.
7494
1. If you haven't already granted yourself access management permissions, do the following:
7595

76-
* Under **Manage**, select **Properties**.
77-
* Under **Access management for Azure resources**, select **Yes**, and then select **Save**.
78-
* Sign out of the Azure portal and then sign back in to refresh your access, and select the **Azure Active Directory** service.
96+
1. Under **Manage**, select **Properties**.
97+
1. Under **Access management for Azure resources**, select **Yes**, and then select **Save**.
98+
1. Sign out of the Azure portal and then sign back in to refresh your access, and select the **Azure Active Directory** service.
7999

80-
1. On the **Overview** page, select **Delete tenant**.
100+
1. On the **Overview** page, select **Manage tenants**.
81101

82-
![Delete the tenant](media/tutorial-delete-tenant/delete-tenant.png)
102+
:::image type="content" source="media/tutorial-delete-tenant/manage-tenant.png" alt-text="Screenshot of how to manage tenant for deletion.":::
83103

104+
1. On the **Manage tenants** page, select (by check marking) the tenant you want to delete, and then, at the top of the page, select the **Delete** button
84105
1. Follow the on-screen instructions to complete the process.
85106

86107
## Next steps

0 commit comments

Comments
 (0)