Skip to content

Commit 1f191d5

Browse files
authored
Merge branch 'master' into patch-1
2 parents 51c0bc9 + 268dbe8 commit 1f191d5

File tree

1,788 files changed

+36115
-15519
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

1,788 files changed

+36115
-15519
lines changed

.openpublishing.redirection.json

Lines changed: 97 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -7356,7 +7356,7 @@
73567356
},
73577357
{
73587358
"source_path": "articles/sql-database/sql-database-manage-single-databases-portal.md",
7359-
"redirect_url": "/azure/sql-database/sql-database-service-tiers",
7359+
"redirect_url": "/azure/sql-database/sql-database-service-tiers-vcore",
73607360
"redirect_document_id": false
73617361
},
73627362
{
@@ -7421,7 +7421,7 @@
74217421
},
74227422
{
74237423
"source_path": "articles/sql-database/sql-database-scale-on-the-fly.md",
7424-
"redirect_url": "/azure/sql-database/sql-database-service-tiers",
7424+
"redirect_url": "/azure/sql-database/sql-database-service-tiers-vcore",
74257425
"redirect_document_id": false
74267426
},
74277427
{
@@ -7444,14 +7444,19 @@
74447444
"redirect_url": "/azure/sql-database/sql-database-security-overview",
74457445
"redirect_document_id": false
74467446
},
7447+
{
7448+
"source_path": "articles/sql-database/sql-database-service-tiers.md",
7449+
"redirect_url": "/azure/sql-database/sql-database-service-tiers-vcore",
7450+
"redirect_document_id": false
7451+
},
74477452
{
74487453
"source_path": "articles/sql-database/sql-database-server-overview.md",
74497454
"redirect_url": "/azure/sql-database/sql-database-servers-databases",
74507455
"redirect_document_id": false
74517456
},
74527457
{
74537458
"source_path": "articles/sql-database/sql-database-service-tier-advisor.md",
7454-
"redirect_url": "/azure/sql-database/sql-database-service-tiers",
7459+
"redirect_url": "/azure/sql-database/sql-database-service-tiers-vcore",
74557460
"redirect_document_id": false
74567461
},
74577462
{
@@ -8285,15 +8290,40 @@
82858290
"redirect_document_id": false
82868291
},
82878292
{
8288-
"source_path": "articles/cognitive-services/Custom-Vision-Service/index.md",
8289-
"redirect_url": "/azure/cognitive-services/Custom-Vision-Service/home",
8293+
"source_path": "articles/cognitive-services/Computer-vision/index.md",
8294+
"redirect_url": "/azure/cognitive-services/Computer-vision/Home",
8295+
"redirect_document_id": false
8296+
},
8297+
{
8298+
"source_path": "articles/cognitive-services/Content-Moderator/index.md",
8299+
"redirect_url": "/azure/cognitive-services/content-moderator/overview",
82908300
"redirect_document_id": false
82918301
},
82928302
{
82938303
"source_path": "articles/cognitive-services/Content-Moderator/review-api-authentication.md",
82948304
"redirect_url": "/azure/cognitive-services/content-moderator/review-api",
82958305
"redirect_document_id": false
82968306
},
8307+
{
8308+
"source_path": "articles/cognitive-services/Custom-Vision-Service/index.md",
8309+
"redirect_url": "/azure/cognitive-services/Custom-Vision-Service/home",
8310+
"redirect_document_id": false
8311+
},
8312+
{
8313+
"source_path": "articles/cognitive-services/Emotion/index.md",
8314+
"redirect_url": "/azure/cognitive-services/Emotion/Home",
8315+
"redirect_document_id": false
8316+
},
8317+
{
8318+
"source_path": "articles/cognitive-services/Face/index.md",
8319+
"redirect_url": "/azure/cognitive-services/Face/Overview",
8320+
"redirect_document_id": false
8321+
},
8322+
{
8323+
"source_path": "articles/cognitive-services/video-indexer/index.md",
8324+
"redirect_url": "/azure/cognitive-services/video-indexer/video-indexer-overview",
8325+
"redirect_document_id": false
8326+
},
82978327
{
82988328
"source_path": "articles/cognitive-services/video-indexer/home.md",
82998329
"redirect_url": "/azure/cognitive-services/video-indexer/video-indexer-get-started",
@@ -10156,7 +10186,7 @@
1015610186
},
1015710187
{
1015810188
"source_path": "articles/active-directory/active-directory-aadconnectsync-connector-domino.md",
10159-
"redirect_url": "/azure/active-directory/connect/active-directory-aadconnectsync-connector-domino",
10189+
"redirect_url": "https://docs.microsoft.com/microsoft-identity-manager/reference/microsoft-identity-manager-2016-connector-domino",
1016010190
"redirect_document_id": false
1016110191
},
1016210192
{
@@ -10166,12 +10196,12 @@
1016610196
},
1016710197
{
1016810198
"source_path": "articles/active-directory/active-directory-aadconnectsync-connector-genericldap.md",
10169-
"redirect_url": "/azure/active-directory/connect/active-directory-aadconnectsync-connector-genericldap",
10199+
"redirect_url": "https://docs.microsoft.com/microsoft-identity-manager/reference/microsoft-identity-manager-2016-connector-genericldap",
1017010200
"redirect_document_id": false
1017110201
},
1017210202
{
1017310203
"source_path": "articles/active-directory/active-directory-aadconnectsync-connector-genericsql-step-by-step.md",
10174-
"redirect_url": "/azure/active-directory/connect/active-directory-aadconnectsync-connector-genericsql-step-by-step",
10204+
"redirect_url": "https://docs.microsoft.com/microsoft-identity-manager/reference/microsoft-identity-manager-2016-connector-genericsql-step-by-step",
1017510205
"redirect_document_id": false
1017610206
},
1017710207
{
@@ -10181,7 +10211,7 @@
1018110211
},
1018210212
{
1018310213
"source_path": "articles/active-directory/active-directory-aadconnectsync-connector-genericsql.md",
10184-
"redirect_url": "/azure/active-directory/connect/active-directory-aadconnectsync-connector-genericsql",
10214+
"redirect_url": "https://docs.microsoft.com/microsoft-identity-manager/reference/microsoft-identity-manager-2016-connector-genericsql",
1018510215
"redirect_document_id": false
1018610216
},
1018710217
{
@@ -18624,6 +18654,17 @@
1862418654
"redirect_url": "/azure/stream-analytics/stream-analytics-test-query",
1862518655
"redirect_document_id": false
1862618656
},
18657+
{
18658+
"source_path": "articles/active-directory/develop/active-directory-devquickstarts-windowsphone.md",
18659+
"redirect_url": "/azure/active-directory/develop",
18660+
"redirect_document_id": false
18661+
},
18662+
{
18663+
"source_path": "articles/active-directory/develop/active-directory-devquickstarts-windowsstore.md",
18664+
"redirect_url": "/azure/active-directory/develop",
18665+
"redirect_document_id": false
18666+
18667+
},
1862718668
{
1862818669
"source_path": "articles/active-directory/develop/active-directory-v2-devquickstarts-android.md",
1862918670
"redirect_url": "/azure/active-directory/develop/guidedsetups/active-directory-android",
@@ -18702,6 +18743,7 @@
1870218743
{
1870318744
"source_path": "articles/machine-learning/desktop-workbench/support-for-aml-services.md",
1870418745
"redirect_url": "/azure/machine-learning/service/support-for-aml-services",
18746+
"redirect_document_id": false
1870518747
},
1870618748
{
1870718749
"source_path": "articles/stream-analytics/stream-analytics-add-outputs.md",
@@ -18768,6 +18810,11 @@
1876818810
"redirect_url": "/azure/active-directory/authentication/howto-mfa-mfasettings",
1876918811
"redirect_document_id": false
1877018812
},
18813+
{
18814+
"source_path": "articles/multi-factor-authentication/multi-factor-authentication.md",
18815+
"redirect_url": "/azure/active-directory/authentication/multi-factor-authentication",
18816+
"redirect_document_id": false
18817+
},
1877118818
{
1877218819
"source_path": "articles/multi-factor-authentication/multi-factor-authentication-versions-plans.md",
1877318820
"redirect_url": "/azure/active-directory/authentication/concept-mfa-licensing",
@@ -18793,6 +18840,26 @@
1879318840
"redirect_url": "/azure/active-directory/authentication/concept-sspr-customization",
1879418841
"redirect_document_id": true
1879518842
},
18843+
{
18844+
"source_path": "articles/active-directory/active-directory-deploying-ws-ad-guidelines.md",
18845+
"redirect_url": "https://docs.microsoft.com/windows-server/identity/ad-ds/introduction-to-active-directory-domain-services-ad-ds-virtualization-level-100",
18846+
"redirect_document_id": true
18847+
},
18848+
{
18849+
"source_path": "articles/active-directory/active-directory-install-replica-active-directory-domain-controller.md",
18850+
"redirect_url": "https://docs.microsoft.com/windows-server/identity/ad-ds/introduction-to-active-directory-domain-services-ad-ds-virtualization-level-100",
18851+
"redirect_document_id": true
18852+
},
18853+
{
18854+
"source_path": "articles/active-directory/active-directory-new-forest-virtual-machine.md",
18855+
"redirect_url": "https://docs.microsoft.com/windows-server/identity/ad-ds/introduction-to-active-directory-domain-services-ad-ds-virtualization-level-100",
18856+
"redirect_document_id": true
18857+
},
18858+
{
18859+
"source_path": "articles/active-directory/virtual-networks-windows-server-active-directory-virtual-machines.md",
18860+
"redirect_url": "https://docs.microsoft.com/windows-server/identity/ad-ds/introduction-to-active-directory-domain-services-ad-ds-virtualization-level-100",
18861+
"redirect_document_id": true
18862+
},
1879618863
{
1879718864
"source_path": "articles/active-directory/active-directory-passwords-data.md",
1879818865
"redirect_url": "/azure/active-directory/authentication/howto-sspr-authenticationdata",
@@ -19012,11 +19079,31 @@
1901219079
"source_path": "articles/network-watcher/network-watcher-check-next-hop-powershell.md",
1901319080
"redirect_url": "/azure/network-watcher/diagnose-vm-network-routing-problem-powershell",
1901419081
"redirect_document_id": true
19015-
},
19082+
},
19083+
{
19084+
"source_path": "articles/network-watcher/network-watcher-troubleshoot-manage-portal.md",
19085+
"redirect_url": "/azure/network-watcher/diagnose-communication-problem-between-networks",
19086+
"redirect_document_id": true
19087+
},
1901619088
{
1901719089
"source_path": "articles/multi-factor-authentication/multi-factor-authentication-get-started-user-states.md",
1901819090
"redirect_url": "/azure/active-directory/authentication/howto-mfa-userstates",
1901919091
"redirect_document_id": true
19092+
},
19093+
{
19094+
"source_path": "articles/active-directory/active-directory-saas-successcenter-provisioning-tutorial.md",
19095+
"redirect_url": "/azure/active-directory/active-directory-saas-cornerstone-ondemand-provisioning-tutorial",
19096+
"redirect_document_id": false
19097+
},
19098+
{
19099+
"source_path": "articles/active-directory/privileged-identity-management/active-directory-securing-privileged-access.md",
19100+
"redirect_url": "/azure/active-directory/admin-roles-best-practices",
19101+
"redirect_document_id": false
19102+
},
19103+
{
19104+
"source_path": "articles/active-directory/develop/active-directory-v2-devquickstarts-webapp-webapi-dotnet.md",
19105+
"redirect_url": "https://github.com/AzureADQuickStarts/AppModelv2-WebApp-WebAPI-OpenIDConnect-DotNet",
19106+
"redirect_document_id": false
1902019107
}
1902119108
]
1902219109
}

articles/active-directory-b2c/TOC.yml

Lines changed: 13 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -94,8 +94,6 @@
9494
items:
9595
- name: Configure identity providers
9696
items:
97-
- name: Custom OpenID Connect
98-
href: active-directory-b2c-setup-oidc-idp.md
9997
- name: Microsoft Account
10098
href: active-directory-b2c-setup-msa-app.md
10199
- name: Facebook
@@ -114,6 +112,10 @@
114112
href: active-directory-b2c-setup-qq-app.md
115113
- name: WeChat
116114
href: active-directory-b2c-setup-wechat-app.md
115+
- name: Azure AD (Single Tenant)
116+
href: active-directory-b2c-setup-oidc-azure-active-directory.md
117+
- name: Custom OpenID Connect
118+
href: active-directory-b2c-setup-oidc-idp.md
117119
- name: Set up self-serve-password reset
118120
href: active-directory-b2c-reference-sspr.md
119121
- name: Customizing the UI
@@ -139,8 +141,14 @@
139141
href: active-directory-b2c-reference-language-customization.md
140142
- name: Use the reporting API
141143
href: active-directory-b2c-reference-usage-reporting-api.md
144+
- name: Access audit logs
145+
href: active-directory-b2c-reference-audit-logs.md
142146
- name: Migrate users
143147
href: active-directory-b2c-user-migration.md
148+
- name: Using b2clogin.com
149+
href: b2clogin.md
150+
- name: Using age gating
151+
href: basic-age-gating.md
144152
- name: Identity Experience Framework
145153
items:
146154
- name: Custom policies
@@ -151,8 +159,10 @@
151159
href: active-directory-b2c-get-started-custom.md
152160
- name: Configure OIDC/OAUTH providers
153161
items:
154-
- name: Azure AD
162+
- name: Azure AD (Single-Tenant)
155163
href: active-directory-b2c-setup-aad-custom.md
164+
- name: Azure AD (Multi-Tenant)
165+
href: active-directory-b2c-setup-commonaad-custom.md
156166
- name: Microsoft Account
157167
href: active-directory-b2c-custom-setup-msa-idp.md
158168
- name: Google+
@@ -161,8 +171,6 @@
161171
href: active-directory-b2c-custom-setup-li-idp.md
162172
- name: Twitter
163173
href: active-directory-b2c-custom-setup-twitter-idp.md
164-
- name: Multi-tenant
165-
href: active-directory-b2c-setup-commonaad-custom.md
166174
- name: Configure SAML providers
167175
items:
168176
- name: ADFS
Lines changed: 116 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,116 @@
1+
---
2+
title: 'Azure Active Directory B2C: Audit logs samples and definitions'
3+
description: Guide and samples on accessing the Azure AD B2C Audit logs
4+
services: active-directory-b2c
5+
author: sromeroz
6+
manager: sasubram
7+
ms.author: sezambra
8+
9+
ms.service: active-directory-b2c
10+
ms.topic: article
11+
ms.workload: identity
12+
ms.date: 08/04/2017
13+
---
14+
15+
# Accessing Azure AD B2C audit logs
16+
17+
Azure Active Directory B2C (Azure AD B2C) emits audit logs containing activity information about B2C resources, issued tokens, and administrator access. This article provides a brief overview of the information available through audit logs and instructions on how to access this data for your Azure AD B2C tenant.
18+
19+
> [!IMPORTANT]
20+
> Audit logs are only retained for seven days. Plan to download and store your logs using one of the methods shown below if you require a longer retention period.
21+
22+
##Overview of activities available in the B2C category of audit logs
23+
The **B2C** category in audit logs contains the following types of activities:
24+
|Activity type |Description |
25+
|---------|---------|
26+
|Authorization |Activities concerning the authorization of a user to access B2C resources (for example, an administrator accessing a list of B2C policies) |
27+
|Directory |Activities related to directory attributes retrieved when an administrator signs in using the Azure Portal |
28+
|Application | CRUD operations on B2C applications |
29+
|Key |CRUD operations on keys stored in B2C key container |
30+
|Resource |CRUD operations on B2C resources (for example, policies and identity providers)
31+
|Authentication |Validation of user credentials and token issuance|
32+
33+
> [!NOTE]
34+
> For user object CRUD activities, refer to the **Core Directory** category.
35+
36+
##Example activity
37+
The example below shows the data captured when a user signs in with an external identity provider:
38+
![Audit Logs - Example](./media/active-directory-b2c-reference-audit-logs/audit-logs-example.png)
39+
40+
##Accessing audit logs through the Azure Portal
41+
1. Go to the [Azure portal](https://portal.azure.com). Make sure you are in your B2C directory.
42+
2. Click on **Azure Active Directory** in the favorites bar on the left
43+
44+
![Audit Logs - AAD button](./media/active-directory-b2c-reference-audit-logs/audit-logs-portal-aad.png)
45+
46+
1. Under **Activity**, click on **Audit Logs**
47+
48+
![Audit Logs - Logs section](./media/active-directory-b2c-reference-audit-logs/audit-logs-portal-section.png)
49+
50+
2. In the **Category** dropbox, select **B2C**
51+
3. Click on **Apply**
52+
53+
![Audit Logs - Category](./media/active-directory-b2c-reference-audit-logs/audit-logs-portal-category.png)
54+
55+
You will see a list of activities logged over the last seven days.
56+
- Use the **Activity Resource Type** dropdown to filter by the activity types outlined above
57+
- Use the **Date Range** dropdown to filter the date range of the activities shown
58+
- If you click on a specific row in the list, a contextual box on the right will show you additional attributes associated with the activity
59+
- Click on **Download** to download the activities as a csv file
60+
61+
##Accessing audit logs through the Azure AD reporting API
62+
Audit logs are published to the same pipeline as other activities for Azure Active Directory, so they can be accessed through the [Azure Active Directory reporting API](https://docs.microsoft.com/en-us/azure/active-directory/active-directory-reporting-api-audit-reference).
63+
64+
###Prerequisites
65+
To authenticate to the Azure AD reporting API you first need to register an application. Make sure to follow the steps in [Prerequisites to access the Azure AD reporting APIs](https://azure.microsoft.com/documentation/articles/active-directory-reporting-api-getting-started/).
66+
67+
###Accesing the API
68+
To download the Azure AD B2C audit logs via the API, you'll want to filter the logs to the **B2C** category. To filter by category, use the query string parameter when calling the Azure AD reporting API endpoint, as shown below:
69+
70+
`https://graph.windows.net/your-b2c-tentant.onmicrosoft.com/activities/audit?api-version=beta&$filter=category eq 'B2C'`
71+
72+
###PowerShell script
73+
The following script provides an example of using PowerShell to query the Azure AD reporting API and store the results as a JSON file:
74+
75+
```powershell
76+
# This script will require registration of a Web Application in Azure Active Directory (see https://azure.microsoft.com/documentation/articles/active-directory-reporting-api-getting-started/)
77+
78+
# Constants
79+
$ClientID = "your-client-application-id-here" # Insert your application's Client ID, a Globally Unique ID (registered by Global Admin)
80+
$ClientSecret = "your-client-application-secret-here" # Insert your application's Client Key/Secret string
81+
$loginURL = "https://login.microsoftonline.com"
82+
$tenantdomain = "your-b2c-tenant.onmicrosoft.com" # AAD B2C Tenant; for example, contoso.onmicrosoft.com
83+
$resource = "https://graph.windows.net" # Azure AD Graph API resource URI
84+
$7daysago = "{0:s}" -f (get-date).AddDays(-7) + "Z" # Use 'AddMinutes(-5)' to decrement minutes, for example
85+
Write-Output "Searching for events starting $7daysago"
86+
87+
# Create HTTP header, get an OAuth2 access token based on client id, secret and tenant domain
88+
$body = @{grant_type="client_credentials";resource=$resource;client_id=$ClientID;client_secret=$ClientSecret}
89+
$oauth = Invoke-RestMethod -Method Post -Uri $loginURL/$tenantdomain/oauth2/token?api-version=1.0 -Body $body
90+
91+
# Parse audit report items, save output to file(s): auditX.json, where X = 0 thru n for number of nextLink pages
92+
if ($oauth.access_token -ne $null) {
93+
$i=0
94+
$headerParams = @{'Authorization'="$($oauth.token_type) $($oauth.access_token)"}
95+
$url = 'https://graph.windows.net/' + $tenantdomain + '/activities/audit?api-version=beta&$filter=category eq ''B2C''and activityDate gt ' + $7daysago
96+
97+
# loop through each query page (1 through n)
98+
Do{
99+
# display each event on the console window
100+
Write-Output "Fetching data using Uri: $url"
101+
$myReport = (Invoke-WebRequest -UseBasicParsing -Headers $headerParams -Uri $url)
102+
foreach ($event in ($myReport.Content | ConvertFrom-Json).value) {
103+
Write-Output ($event | ConvertTo-Json)
104+
}
105+
106+
# save the query page to an output file
107+
Write-Output "Save the output to a file audit$i.json"
108+
$myReport.Content | Out-File -FilePath audit$i.json -Force
109+
$url = ($myReport.Content | ConvertFrom-Json).'@odata.nextLink'
110+
$i = $i+1
111+
} while($url -ne $null)
112+
} else {
113+
Write-Host "ERROR: No Access Token"
114+
}
115+
```
116+

0 commit comments

Comments
 (0)