Skip to content

Commit 197c3b1

Browse files
authored
Merge branch 'master' into data-explorer-data-factory
2 parents 50bc320 + 93bc9e6 commit 197c3b1

File tree

479 files changed

+8493
-5202
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

479 files changed

+8493
-5202
lines changed

.openpublishing.redirection.json

Lines changed: 85 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -1715,6 +1715,66 @@
17151715
"redirect_url": "/azure/cosmos-db/manage-with-powershell",
17161716
"redirect_document_id": true
17171717
},
1718+
{
1719+
"source_path": "articles/cosmos-db/scripts/create-cassandra-database-account-cli.md",
1720+
"redirect_url": "/azure/cosmos-db/scripts/cli/cassandra/create",
1721+
"redirect_document_id": false
1722+
},
1723+
{
1724+
"source_path": "articles/cosmos-db/scripts/create-database-account-collections-cli.md",
1725+
"redirect_url": "/azure/cosmos-db/scripts/cli/sql/create",
1726+
"redirect_document_id": false
1727+
},
1728+
{
1729+
"source_path": "articles/cosmos-db/scripts/create-firewall-cli.md",
1730+
"redirect_url": "/azure/cosmos-db/scripts/cli/common/ipfirewall",
1731+
"redirect_document_id": false
1732+
},
1733+
{
1734+
"source_path": "articles/cosmos-db/scripts/create-gremlin-database-account-cli.md",
1735+
"redirect_url": "/azure/cosmos-db/scripts/cli/gremlin/create",
1736+
"redirect_document_id": false
1737+
},
1738+
{
1739+
"source_path": "articles/cosmos-db/scripts/create-mongodb-database-account-cli.md",
1740+
"redirect_url": "/azure/cosmos-db/scripts/cli/mongodb/create",
1741+
"redirect_document_id": false
1742+
},
1743+
{
1744+
"source_path": "articles/cosmos-db/scripts/create-table-database-account-cli.md",
1745+
"redirect_url": "/azure/cosmos-db/scripts/cli/table/create",
1746+
"redirect_document_id": false
1747+
},
1748+
{
1749+
"source_path": "articles/cosmos-db/scripts/ha-failover-policy.md",
1750+
"redirect_url": "/azure/cosmos-db/scripts/cli/common/regions",
1751+
"redirect_document_id": false
1752+
},
1753+
{
1754+
"source_path": "articles/cosmos-db/scripts/scale-collection-throughput-cli.md",
1755+
"redirect_url": "/azure/cosmos-db/scripts/cli/sql/throughput",
1756+
"redirect_document_id": false
1757+
},
1758+
{
1759+
"source_path": "articles/cosmos-db/scripts/scale-multiregion-cli.md",
1760+
"redirect_url": "/azure/cosmos-db/scripts/cli/common/regions",
1761+
"redirect_document_id": false
1762+
},
1763+
{
1764+
"source_path": "articles/cosmos-db/scripts/secure-get-account-key-cli.md",
1765+
"redirect_url": "/azure/cosmos-db/scripts/cli/common/keys",
1766+
"redirect_document_id": false
1767+
},
1768+
{
1769+
"source_path": "articles/cosmos-db/scripts/secure-mongo-connection-string.md",
1770+
"redirect_url": "/azure/cosmos-db/scripts/cli/common/keys",
1771+
"redirect_document_id": false
1772+
},
1773+
{
1774+
"source_path": "articles/cosmos-db/scripts/secure-generate-key-cli.md",
1775+
"redirect_url": "/azure/cosmos-db/scripts/cli/common/keys",
1776+
"redirect_document_id": false
1777+
},
17181778
{
17191779
"source_path": "articles/cosmos-db/programming.md",
17201780
"redirect_url": "/azure/cosmos-db/storedprocedures-triggers-udfs",
@@ -3070,16 +3130,6 @@
30703130
"redirect_url": "/azure/virtual-machines/linux/expand-disks",
30713131
"redirect_document_id": true
30723132
},
3073-
{
3074-
"source_path": "articles/virtual-machines/linux/disks-upload-vhd-to-managed-disk-cli.md",
3075-
"redirect_url": "/azure/virtual-machines/linux/managed-disks-overview",
3076-
"redirect_document_id": false
3077-
},
3078-
{
3079-
"source_path": "articles/virtual-machines/windows/disks-upload-vhd-to-managed-disk-powershell.md",
3080-
"redirect_url": "/azure/virtual-machines/windows/managed-disks-overview",
3081-
"redirect_document_id": false
3082-
},
30833133
{
30843134
"source_path": "articles/virtual-machines/linux/install-mongodb-nodejs.md",
30853135
"redirect_url": "/azure/virtual-machines/linux/install-mongodb",
@@ -20533,6 +20583,11 @@
2053320583
"source_path": "articles/virtual-machines/virtual-machines-linux-quick-create-cli-nodejs.md",
2053420584
"redirect_url": "/azure/virtual-machines/linux/quick-create-cli-nodejs",
2053520585
"redirect_document_id": false
20586+
},
20587+
{
20588+
"source_path": "articles/virtual-machines/linux/quick-create-cli-nodejs.md",
20589+
"redirect_url": "/azure/virtual-machines/linux/quick-create-cli",
20590+
"redirect_document_id": false
2053620591
},
2053720592
{
2053820593
"source_path": "articles/virtual-machines/virtual-machines-linux-quick-create-cli.md",
@@ -41711,6 +41766,26 @@
4171141766
"redirect_url": "/azure/azure-monitor/app/java-get-started",
4171241767
"redirect_document_id": false
4171341768
},
41769+
{
41770+
"source_path": "articles/azure-monitor/app/java-get-started-25-beta.md",
41771+
"redirect_url": "/azure/azure-monitor/app/java-get-started",
41772+
"redirect_document_id": false
41773+
},
41774+
{
41775+
"source_path": "articles/azure-monitor/app/java-trace-logs-25-beta.md",
41776+
"redirect_url": "/azure/azure-monitor/app/java-trace-logs",
41777+
"redirect_document_id": false
41778+
},
41779+
{
41780+
"source_path": "articles/azure-monitor/app/java-agent-25-beta.md",
41781+
"redirect_url": "/azure/azure-monitor/app/java-agent",
41782+
"redirect_document_id": false
41783+
},
41784+
{
41785+
"source_path": "articles/azure-monitor/app/micrometer-java-25-beta.md",
41786+
"redirect_url": "/azure/azure-monitor/app/micrometer-java",
41787+
"redirect_document_id": false
41788+
},
4171441789
{
4171541790
"source_path": "articles/cognitive-services/Translator/quickstart-csharp-translate.md",
4171641791
"redirect_url": "/azure/cognitive-services/Translator/quickstart-translate",

articles/active-directory-b2c/active-directory-b2c-get-started-custom.md

Lines changed: 33 additions & 33 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ manager: celestedg
88
ms.service: active-directory
99
ms.workload: identity
1010
ms.topic: conceptual
11-
ms.date: 07/16/2019
11+
ms.date: 09/26/2019
1212
ms.author: marsma
1313
ms.subservice: B2C
1414
---
@@ -21,44 +21,45 @@ ms.subservice: B2C
2121

2222
## Prerequisites
2323

24-
- If you don't have one already, you need to [create an Azure AD B2C tenant](tutorial-create-tenant.md) that is linked to your Azure subscription.
24+
- If you don't have one already, [create an Azure AD B2C tenant](tutorial-create-tenant.md) that is linked to your Azure subscription.
2525
- [Register your application](tutorial-register-applications.md) in the tenant that you created so that it can communicate with Azure AD B2C.
26+
- Complete the steps in [Set up sign-up and sign-in with a Facebook account](active-directory-b2c-setup-fb-app.md) to configure a Facebook application.
2627

2728
## Add signing and encryption keys
2829

29-
1. Sign in to the [Azure portal](https://portal.azure.com/) as the global administrator of your Azure AD B2C tenant.
30-
2. Make sure you're using the directory that contains your Azure AD B2C tenant. Select the **Directory + subscription** filter in the top menu and choose the directory that contains your tenant.
31-
3. Choose **All services** in the top-left corner of the Azure portal, search for and select **Azure AD B2C**.
32-
4. On the Overview page, select **Identity Experience Framework**.
30+
1. Sign in to the [Azure portal](https://portal.azure.com)
31+
1. Use the **Directory + subscription** filter in the top menu to select the directory that contains your Azure AD B2C tenant.
32+
1. In the left menu, select **Azure AD B2C**. Or, select **All services** and search for and select **Azure AD B2C**.
33+
1. On the Overview page, select **Identity Experience Framework**.
3334

3435
### Create the signing key
3536

3637
1. Select **Policy Keys** and then select **Add**.
37-
2. For **Options**, choose `Generate`.
38-
3. In **Name**, enter `TokenSigningKeyContainer`. The prefix `B2C_1A_` might be added automatically.
39-
4. For **Key type**, select **RSA**.
40-
5. For **Key usage**, select **Signature**.
41-
6. Click **Create**.
38+
1. For **Options**, choose `Generate`.
39+
1. In **Name**, enter `TokenSigningKeyContainer`. The prefix `B2C_1A_` might be added automatically.
40+
1. For **Key type**, select **RSA**.
41+
1. For **Key usage**, select **Signature**.
42+
1. Select **Create**.
4243

4344
### Create the encryption key
4445

4546
1. Select **Policy Keys** and then select **Add**.
46-
2. For **Options**, choose `Generate`.
47-
3. In **Name**, enter `TokenEncryptionKeyContainer`. The prefix `B2C_1A`_ might be added automatically.
48-
4. For **Key type**, select **RSA**.
49-
5. For **Key usage**, select **Encryption**.
50-
6. Click **Create**.
47+
1. For **Options**, choose `Generate`.
48+
1. In **Name**, enter `TokenEncryptionKeyContainer`. The prefix `B2C_1A`_ might be added automatically.
49+
1. For **Key type**, select **RSA**.
50+
1. For **Key usage**, select **Encryption**.
51+
1. Select **Create**.
5152

5253
### Create the Facebook key
5354

54-
If you already have a [Facebook application secret](active-directory-b2c-setup-fb-app.md), add it as a policy key to your tenant. Otherwise, you must create the key with a placeholder value so that your policies pass validation.
55+
Add your Facebook application's [App Secret](active-directory-b2c-setup-fb-app.md) as a policy key. You can use the App Secret of the application you created as part of this article's prerequisites.
5556

5657
1. Select **Policy Keys** and then select **Add**.
57-
2. For **Options**, choose `Manual`.
58-
3. For **Name**, enter `FacebookSecret`. The prefix `B2C_1A_` might be added automatically.
59-
4. In **Secret**, enter your Facebook secret from developers.facebook.com or `0` as a placeholder. This value is the secret, not the application ID.
60-
5. For **Key usage**, select **Signature**.
61-
6. Click **Create**.
58+
1. For **Options**, choose `Manual`.
59+
1. For **Name**, enter `FacebookSecret`. The prefix `B2C_1A_` might be added automatically.
60+
1. In **Secret**, enter your Facebook application's *App Secret* from developers.facebook.com. This value is the secret, not the application ID.
61+
1. For **Key usage**, select **Signature**.
62+
1. Select **Create**.
6263

6364
## Register Identity Experience Framework applications
6465

@@ -74,19 +75,19 @@ Azure AD B2C requires you to register two applications that are used to sign up
7475
1. For **Name**, enter `IdentityExperienceFramework`.
7576
1. For **Application type**, choose **Web app/API**.
7677
1. For **Sign-on URL**, enter `https://your-tenant-name.b2clogin.com/your-tenant-name.onmicrosoft.com`, where `your-tenant-name` is your Azure AD B2C tenant domain name. All URLs should now be using [b2clogin.com](b2clogin.md).
77-
1. Click **Create**. After it's created, copy the application ID and save it to use later.
78+
1. Select **Create**. After it's created, copy the application ID and save it to use later.
7879

7980
### Register the ProxyIdentityExperienceFramework application
8081

8182
1. In **App registrations (Legacy)**, select **New application registration**.
82-
2. For **Name**, enter `ProxyIdentityExperienceFramework`.
83-
3. For **Application type**, choose **Native**.
84-
4. For **Redirect URI**, enter `https://your-tenant-name.b2clogin.com/your-tenant-name.onmicrosoft.com`, where `your-tenant-name` is your Azure AD B2C tenant.
85-
5. Click **Create**. After it's created, copy the application ID and save it to use later.
86-
6. On the Settings page, select **Required permissions**, and then select **Add**.
87-
7. Choose **Select an API**, search for and select **IdentityExperienceFramework**, and then click **Select**.
88-
9. Select the check box next to **Access IdentityExperienceFramework**, click **Select**, and then click **Done**.
89-
10. Select **Grant Permissions**, and then confirm by selecting **Yes**.
83+
1. For **Name**, enter `ProxyIdentityExperienceFramework`.
84+
1. For **Application type**, choose **Native**.
85+
1. For **Redirect URI**, enter `https://your-tenant-name.b2clogin.com/your-tenant-name.onmicrosoft.com`, where `your-tenant-name` is your Azure AD B2C tenant.
86+
1. Select **Create**. After it's created, copy the application ID and save it to use later.
87+
1. Select **Settings**, then select **Required permissions**, and then select **Add**.
88+
1. Choose **Select an API**, search for and select **IdentityExperienceFramework**, and then click **Select**.
89+
1. Select the check box next to **Access IdentityExperienceFramework**, click **Select**, and then click **Done**.
90+
1. Select **Grant permissions**, and then confirm by selecting **Yes**.
9091

9192
## Custom policy starter pack
9293

@@ -156,7 +157,6 @@ As you upload the files, Azure adds the prefix `B2C_1A_` to each.
156157

157158
## Add Facebook as an identity provider
158159

159-
1. Complete the steps in [Set up sign-up and sign-in with a Facebook account](active-directory-b2c-setup-fb-app.md) to configure a Facebook application.
160160
1. In the `SocialAndLocalAccounts/`**`TrustFrameworkExtensions.xml`** file, replace the value of `client_id` with the Facebook application ID:
161161

162162
```xml
@@ -168,7 +168,7 @@ As you upload the files, Azure adds the prefix `B2C_1A_` to each.
168168

169169
1. Upload the *TrustFrameworkExtensions.xml* file to your tenant.
170170
1. Under **Custom policies**, select **B2C_1A_signup_signin**.
171-
1. Select **Run now** and select Facebook to sign in with Facebook and test the custom policy. Or, invoke the policy directly from your registered application.
171+
1. Select **Run now** and select Facebook to sign in with Facebook and test the custom policy.
172172

173173
## Next steps
174174

Lines changed: 20 additions & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -1,34 +1,36 @@
11
---
2-
title: Disable email verification during consumer sign-up in Azure Active Directory B2C | Microsoft Docs
3-
description: A topic demonstrating how to disable email verification during consumer sign-up in Azure Active Directory B2C.
2+
title: Disable email verification during customer sign-up in Azure Active Directory B2C
3+
description: Learn how to disable email verification during customer sign-up in Azure Active Directory B2C.
44
services: active-directory-b2c
55
author: mmacy
66
manager: celestedg
77

88
ms.service: active-directory
99
ms.workload: identity
1010
ms.topic: conceptual
11-
ms.date: 11/30/2018
11+
ms.date: 09/25/2018
1212
ms.author: marsma
1313
ms.subservice: B2C
1414
---
1515

16-
# Disable email verification during consumer sign-up in Azure Active Directory B2C
17-
When enabled, Azure Active Directory B2C (Azure AD B2C) gives a consumer the ability to sign up for applications by providing an email address and creating a local account. Azure AD B2C ensures valid email addresses by requiring consumers to verify them during the sign-up process. It also prevents a malicious automated process from generating fake accounts for the applications.
16+
# Disable email verification during customer sign-up in Azure Active Directory B2C
1817

19-
Some application developers prefer to skip email verification during the sign-up process and instead have consumers verify the email address later. To support this, Azure AD B2C can be configured to disable email verification. Doing so creates a smoother sign-up process and gives developers the flexibility to differentiate the consumers that have verified their email address from those consumers that have not.
18+
By default, Azure Active Directory B2C (Azure AD B2C) verifies your customer's email address for local accounts (accounts for users who sign up with email address or username). Azure AD B2C ensures valid email addresses by requiring customers to verify them during the sign-up process. It also prevents a malicious actors from using automated processes to generate fraudulent accounts in your applications.
2019

21-
By default, sign-up user flows have email verification turned on. Use the following steps to turn it off:
20+
Some application developers prefer to skip email verification during the sign-up process and instead have customers verify their email address later. To support this, Azure AD B2C can be configured to disable email verification. Doing so creates a smoother sign-up process and gives developers the flexibility to differentiate customers that have verified their email address from customers that have not.
2221

23-
1. Click **User flows**.
24-
2. Click your user flow (for example, "B2C_1_SiUp") to open it.
25-
3. Click **Page layouts**.
26-
4. Click **Local account sign-up page**.
27-
5. Click **Email Address** in the **Name** column under the **User attributes** section.
28-
6. Under **Requires verification**, select **No**.
29-
7. Click **Save** at the top of the blade. You're done!
22+
Follow these steps to disable email verification:
3023

31-
> [!NOTE]
32-
> Disabling email verification in the sign-up process may lead to spam. If you disable the default one, we recommend adding your own verification system.
33-
>
34-
>
24+
1. Sign in to the [Azure portal](https://portal.azure.com)
25+
1. Use the **Directory + subscription** filter in the top menu to select the directory that contains your Azure AD B2C tenant.
26+
1. In the left menu, select **Azure AD B2C**. Or, select **All services** and search for and select **Azure AD B2C**.
27+
1. Select **User flows**.
28+
1. Select the user flow for which you want to disable email verification. For example, *B2C_1_signinsignup*.
29+
1. Select **Page layouts**.
30+
1. Select **Local account sign-up page**.
31+
1. Under **User attributes**, select **Email Address**.
32+
1. In the **REQUIRES VERIFICATION** drop down, select **No**.
33+
1. Select **Save**. Email verification is now disabled for this user flow.
34+
35+
> [!WARNING]
36+
> Disabling email verification in the sign-up process may lead to spam. If you disable the default Azure AD B2C-provided email verification, we recommend that you implement a replacement verification system.

0 commit comments

Comments
 (0)