Skip to content

Commit 2065343

Browse files
committed
Merge branch 'master' of https://github.com/MicrosoftDocs/azure-docs-pr into patricka-blockchain-ad-update
2 parents dd882e9 + 02639ca commit 2065343

File tree

5,900 files changed

+41072
-37504
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

5,900 files changed

+41072
-37504
lines changed

.openpublishing.redirection.json

Lines changed: 701 additions & 957 deletions
Large diffs are not rendered by default.

articles/active-directory-b2c/TOC.yml

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -320,6 +320,9 @@
320320
href: active-directory-b2c-devquickstarts-graph-dotnet.md
321321
- name: Audit logs
322322
href: active-directory-b2c-reference-audit-logs.md
323+
- name: Manage users - Azure portal
324+
href: manage-users-portal.md
325+
displayName: create users, add users, delete users
323326
- name: Secure API Management API
324327
href: secure-api-management.md
325328
displayName: apim, api management, migrate, b2clogin.com

articles/active-directory-b2c/active-directory-b2c-devquickstarts-graph-dotnet.md

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -273,10 +273,11 @@ Inspect the `B2CGraphClient.SendGraphPatchRequest()` method for details on how t
273273

274274
### Search users
275275

276-
You can search for users in your B2C tenant in two ways:
276+
You can search for users in your B2C tenant in the following ways:
277277

278278
* Reference the user's **object ID**.
279279
* Reference their sign-in identifer, the `signInNames` property.
280+
* Reference any of the valid OData parameters. For example, 'givenName', 'surname', 'displayName' etc.
280281

281282
Run one of the following commands to search for a user:
282283

@@ -290,6 +291,9 @@ For example:
290291
```cmd
291292
B2C Get-User 2bcf1067-90b6-4253-9991-7f16449c2d91
292293
B2C Get-User $filter=signInNames/any(x:x/value%20eq%20%27consumer@fabrikam.com%27)
294+
B2C get-user $filter=givenName%20eq%20%27John%27
295+
B2C get-user $filter=surname%20eq%20%27Doe%27
296+
B2C get-user $filter=displayName%20eq%20%27John%20Doe%27
293297
```
294298

295299
### Delete users

articles/active-directory-b2c/active-directory-b2c-reference-oauth-code.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -111,6 +111,7 @@ grant_type=authorization_code&client_id=90c0fe63-bcf2-44d5-8fb7-b8bbc0b29dc6&sco
111111
|{tenant}| Required | Name of your Azure AD B2C tenant|
112112
|{policy}| Required| The user flow that was used to acquire the authorization code. You cannot use a different user flow in this request. |
113113
| client_id |Required |The application ID assigned to your app in the [Azure portal](https://portal.azure.com).|
114+
| client_secret | Yes, in Web Apps | The application secret that was generated in the [Azure portal](https://portal.azure.com/). Client secrets are used in this flow for Web App scenarios, where the client can securely store a client secret. For Native App (public client) scenarios, client secrets cannot be securely stored, and therefore are not used in this call. If you use a client secret, please change it on a periodic basis. |
114115
| grant_type |Required |The type of grant. For the authorization code flow, the grant type must be `authorization_code`. |
115116
| scope |Recommended |A space-separated list of scopes. A single scope value indicates to Azure AD both of the permissions that are being requested. Using the client ID as the scope indicates that your app needs an access token that can be used against your own service or web API, represented by the same client ID. The `offline_access` scope indicates that your app needs a refresh token for long-lived access to resources. You also can use the `openid` scope to request an ID token from Azure AD B2C. |
116117
| code |Required |The authorization code that you acquired in the first leg of the flow. |
@@ -176,7 +177,7 @@ grant_type=refresh_token&client_id=90c0fe63-bcf2-44d5-8fb7-b8bbc0b29dc6&scope=90
176177
|{tenant}| Required | Name of your Azure AD B2C tenant|
177178
|{policy} |Required |The user flow that was used to acquire the original refresh token. You cannot use a different user flow in this request. |
178179
| client_id |Required |The application ID assigned to your app in the [Azure portal](https://portal.azure.com). |
179-
| client_secret |Required |The client_secret associated to your client_id in the [Azure portal](https://portal.azure.com). |
180+
| client_secret | Yes, in Web Apps | The application secret that was generated in the [Azure portal](https://portal.azure.com/). Client secrets are used in this flow for Web App scenarios, where the client can securely store a client secret. For Native App (public client) scenarios, client secrets cannot be securely stored, and therefore are not used in this call. If you use a client secret, please change it on a periodic basis. |
180181
| grant_type |Required |The type of grant. For this leg of the authorization code flow, the grant type must be `refresh_token`. |
181182
| scope |Recommended |A space-separated list of scopes. A single scope value indicates to Azure AD both of the permissions that are being requested. Using the client ID as the scope indicates that your app needs an access token that can be used against your own service or web API, represented by the same client ID. The `offline_access` scope indicates that your app will need a refresh token for long-lived access to resources. You also can use the `openid` scope to request an ID token from Azure AD B2C. |
182183
| redirect_uri |Optional |The redirect URI of the application where you received the authorization code. |
Lines changed: 60 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,60 @@
1+
---
2+
title: Create & delete Azure AD B2C consumer user accounts in the Azure portal
3+
description: Learn how to use the Azure portal to create and delete consumer users in your Azure AD B2C directory.
4+
services: active-directory-b2c
5+
author: mmacy
6+
manager: celestedg
7+
8+
ms.service: active-directory
9+
ms.workload: identity
10+
ms.topic: conceptual
11+
ms.date: 11/09/2019
12+
ms.author: marsma
13+
ms.subservice: B2C
14+
---
15+
16+
# Use the Azure portal to create and delete consumer users in Azure AD B2C
17+
18+
There might be scenarios in which you want to manually create consumer accounts in your Azure Active Directory B2C (Azure AD B2C) directory. Although consumer accounts in an Azure AD B2C directory are most commonly created when users sign up to use one of your applications, you can create them programmatically and by using the Azure portal. This article focuses on the Azure portal method of user creation and deletion.
19+
20+
To add or delete users, your account must be assigned the *User administrator* or *Global administrator* role.
21+
22+
[!INCLUDE [active-directory-b2c-public-preview](../../includes/active-directory-b2c-public-preview.md)]
23+
24+
## Types of user accounts
25+
26+
As described in [Overview of user accounts in Azure AD B2C](user-overview.md), there are three types of user accounts that can be created in an Azure AD B2C directory:
27+
28+
* Work
29+
* Guest
30+
* Consumer
31+
32+
This article focuses on working with **consumer accounts** in the Azure portal. For information about creating and deleting Work and Guest accounts, see [Add or delete users using Azure Active Directory](../active-directory/fundamentals/add-users-azure-active-directory.md).
33+
34+
## Create a consumer user
35+
36+
1. Sign in to the [Azure portal](https://portal.azure.com).
37+
1. Select the **Directory + subscription** filter in the top menu, and then select the directory that contains your Azure AD B2C tenant.
38+
1. In the left menu, select **Azure AD B2C**. Or, select **All services** and search for and select **Azure AD B2C**.
39+
1. Under **Manage**, select **Users**.
40+
1. Select **New user**.
41+
1. Select **Create Azure AD B2C user**.
42+
1. Choose a **Sign in method** and enter either an **Email** address or a **Username** for the new user. The sign in method you select here must match the setting you've specified for your Azure AD B2C tenant's *Local account* identity provider (see **Manage** > **Identity providers** in your Azure AD B2C tenant).
43+
1. Enter a **Name** for the user. This is typically the full name (given and surname) of the user.
44+
1. (Optional) You can **Block sign in** if you wish to delay the ability for the user to sign in. You can enable sign in later by editing the user's **Profile** in the Azure portal.
45+
1. Choose **Auto-generate password** or **Let me create password**.
46+
1. Specify the user's **First name** and **Last name**.
47+
1. Select **Create**.
48+
49+
Unless you've selected **Block sign in**, the user can now sign in using the sign in method (email or username) that you specified.
50+
51+
## Delete a consumer user
52+
53+
1. In your Azure AD B2C directory, select **Users**, and then select the user you want to delete.
54+
1. Select **Delete**, and then **Yes** to confirm the deletion.
55+
56+
For details about restoring a user within the first 30 days after deletion, or for permanently deleting a user, see [Restore or remove a recently deleted user using Azure Active Directory](../active-directory/fundamentals/active-directory-users-restore.md).
57+
58+
## Next steps
59+
60+
For automated user management scenarios, for example migrating users from another identity provider to your Azure AD B2C directory, see [Azure AD B2C: User migration](active-directory-b2c-user-migration.md).

articles/active-directory-b2c/validation-technical-profile.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -35,6 +35,9 @@ A validation technical profile can be conditionally executed based on preconditi
3535

3636
A self-asserted technical profile may define a validation technical profile to be used for validating some or all of its output claims. All of the input claims of the referenced technical profile must appear in the output claims of the referencing validation technical profile.
3737

38+
> [!NOTE]
39+
> Only self-asserted technical profiles can use validation technical profiles. If you need to validate the output claims from non-self-asserted technical profiles, consider using an additional orchestration step in your user journey to accommodate the technical profile in charge of the validation.
40+
3841
## ValidationTechnicalProfiles
3942

4043
The **ValidationTechnicalProfiles** element contains the following elements:

articles/active-directory-domain-services/TOC.yml

Lines changed: 8 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -23,6 +23,8 @@
2323
href: tutorial-configure-password-hash-sync.md
2424
- name: Create an advanced managed domain
2525
href: tutorial-create-instance-advanced.md
26+
- name: Create a forest trust (preview)
27+
href: tutorial-create-forest-trust.md
2628
- name: Samples
2729
items:
2830
- name: Create a managed domain using Azure PowerShell
@@ -33,6 +35,12 @@
3335
href: administration-concepts.md
3436
- name: Common deployment scenarios
3537
href: scenarios.md
38+
- name: Forests and trusts
39+
items:
40+
- name: Resource forests
41+
href: concepts-resource-forest.md
42+
- name: Forest trusts
43+
href: concepts-forest-trust.md
3644
- name: How Azure AD DS synchronization works
3745
href: synchronization.md
3846
- name: How password hash synchronization works

articles/active-directory-domain-services/administration-concepts.md

Lines changed: 15 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -56,6 +56,18 @@ For users synchronized from an on-premises AD DS environment using Azure AD Conn
5656
5757
Once appropriately configured, the usable password hashes are stored in the Azure AD DS managed domain. If you delete the Azure AD DS managed domain, any password hashes stored at that point are also deleted. Synchronized credential information in Azure AD can't be reused if you later create an Azure AD DS managed domain - you must reconfigure the password hash synchronization to store the password hashes again. Previously domain-joined VMs or users won't be able to immediately authenticate - Azure AD needs to generate and store the password hashes in the new Azure AD DS managed domain. For more information, see [Password hash sync process for Azure AD DS and Azure AD Connect][azure-ad-password-sync].
5858

59+
## Forests and trusts
60+
61+
A *forest* is a logical construct used by Active Directory Domain Services (AD DS) to group one or more *domains*. The domains then store objects for user or groups, and provide authentication services.
62+
63+
In Azure AD DS, the forest only contains one domain. On-premises AD DS forests often contain many domains. In large organizations, especially after mergers and acquisitions, you may end up with multiple on-premises forests that each then contain multiple domains.
64+
65+
By default, an Azure AD DS managed domain is created as a *user* forest. This type of forest synchronizes all objects from Azure AD, including any user accounts created in an on-premises AD DS environment. User accounts can directly authenticate against the Azure AD DS managed domain, such as to sign in to a domain-joined VM. A user forest works when the password hashes can be synchronized and users aren't using exclusive sign-in methods like smart card authentication.
66+
67+
In an Azure AD DS *resource* forest, users authenticate over a one-way forest *trust* from their on-premises AD DS. With this approach, the user objects and password hashes aren't synchronized to Azure AD DS. The user objects and credentials only exist in the on-premises AD DS. This approach lets enterprises host resources and application platforms in Azure that depend on classic authentication such LDAPS, Kerberos, or NTLM, but any authentication issues or concerns are removed. Azure AD DS resource forests are currently in preview.
68+
69+
For more information about forest types in Azure AD DS, see [What are resource forests?][concepts-forest] and [How do forest trusts work in Azure AD DS?][concepts-trust]
70+
5971
## Next steps
6072

6173
To get started, [create an Azure AD DS managed domain][create-instance].
@@ -66,3 +78,6 @@ To get started, [create an Azure AD DS managed domain][create-instance].
6678
[secure-domain]: secure-your-domain.md
6779
[azure-ad-password-sync]: ../active-directory/hybrid/how-to-connect-password-hash-synchronization.md#password-hash-sync-process-for-azure-ad-domain-services
6880
[create-instance]: tutorial-create-instance.md
81+
[tutorial-create-instance-advanced]: tutorial-create-instance-advanced.md
82+
[concepts-forest]: concepts-resource-forest.md
83+
[concepts-trust]: concepts-forest-trust.md

0 commit comments

Comments
 (0)