Skip to content

Commit 1a67c33

Browse files
Merge pull request #105556 from mmacy/b2c-phone-auth-update
[b2c] phone auth update
2 parents 57c50fc + cdbb3ec commit 1a67c33

File tree

2 files changed

+28
-5
lines changed

2 files changed

+28
-5
lines changed

articles/active-directory-b2c/TOC.yml

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -350,8 +350,9 @@
350350
- name: Azure Monitor
351351
href: azure-monitor.md
352352
displayName: log, logs, logging, usage, events
353-
- name: Account management
353+
- name: Manage users - Microsoft Graph
354354
href: manage-user-accounts-graph-api.md
355+
displayName: account, accounts
355356
- name: Deploy with Azure Pipelines
356357
href: deploy-custom-policies-devops.md
357358
displayName: azure devops, ci/cd, cicd, custom policy, policies

articles/active-directory-b2c/phone-authentication.md

Lines changed: 26 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,29 +1,35 @@
11
---
2-
title: Phone sign-up and sign-in with custom policies
2+
title: Phone sign-up and sign-in with custom policies (Preview)
33
titleSuffix: Azure AD B2C
4-
description: Learn how to send one-time passwords in text messages to your application users' phones with custom policies in Azure Active Directory B2C.
4+
description: Send one-time passwords (OTP) in text messages to your application users' phones with custom policies in Azure Active Directory B2C.
55
services: active-directory-b2c
66
author: mmacy
77
manager: celestedg
88

99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: conceptual
12-
ms.date: 12/17/2019
12+
ms.date: 02/25/2020
1313
ms.author: marsma
1414
ms.subservice: B2C
1515
---
1616

17-
# Set up phone sign-up and sign-in with custom policies in Azure AD B2C
17+
# Set up phone sign-up and sign-in with custom policies in Azure AD B2C (Preview)
1818

1919
Phone sign-up and sign-in in Azure Active Directory B2C (Azure AD B2C) enables your users to sign up and sign in to your applications by using a one-time password (OTP) sent in a text message to their phone. One-time passwords can help minimize the risk of your users forgetting or having their passwords compromised.
2020

2121
Follow the steps in this article to use the custom policies to enable your customers to sign up and sign in to your applications by using a one-time password sent to their phone.
2222

2323
[!INCLUDE [b2c-public-preview-feature](../../includes/active-directory-b2c-public-preview.md)]
2424

25+
## Pricing
26+
27+
One-time passwords are sent to your users by using SMS text messages, and you may be charged for each message sent. For pricing information, see the **Separate Charges** section of [Azure Active Directory B2C pricing](https://azure.microsoft.com/pricing/details/active-directory-b2c/).
28+
2529
## Prerequisites
2630

31+
You need the following resources in place before setting up OTP.
32+
2733
* [Azure AD B2C tenant](tutorial-create-tenant.md)
2834
* [Web application registered](tutorial-register-applications.md) in your tenant
2935
* [Custom policies](custom-policy-get-started.md) uploaded to your tenant
@@ -66,6 +72,22 @@ As you upload each file, Azure adds the prefix `B2C_1A_`.
6672
1. Select **Run now** and sign up using an email address or a phone number.
6773
1. Select **Run now** once again and sign in with the same account to confirm that you have the correct configuration.
6874

75+
## Get user account by phone number
76+
77+
A user that signs up with a phone number but does not provide a recovery email address is recorded in your Azure AD B2C directory with their phone number as their sign-in name. If the user then wishes to change their phone number, your help desk or support team must first find their account, and then update their phone number.
78+
79+
You can find a user by their phone number (sign-in name) by using [Microsoft Graph](manage-user-accounts-graph-api.md):
80+
81+
```http
82+
GET https://graph.microsoft.com/v1.0/users?$filter=identities/any(c:c/issuerAssignedId eq '+{phone number}' and c/issuer eq '{tenant name}.onmicrosoft.com')
83+
```
84+
85+
For example:
86+
87+
```http
88+
GET https://graph.microsoft.com/v1.0/users?$filter=identities/any(c:c/issuerAssignedId eq '+450334567890' and c/issuer eq 'contosob2c.onmicrosoft.com')
89+
```
90+
6991
## Next steps
7092

7193
You can find the phone sign-up and sign-in custom policy starter pack (and other starter packs) on GitHub:

0 commit comments

Comments
 (0)