Skip to content

Commit 22c41cc

Browse files
committed
Merge branch 'main' into passwordless-work
2 parents 3f0a000 + 6847f0d commit 22c41cc

File tree

320 files changed

+4185
-9197
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

320 files changed

+4185
-9197
lines changed

.openpublishing.publish.config.json

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -32,6 +32,12 @@
3232
"need_preview_pull_request": true,
3333
"contribution_branch_mappings": {},
3434
"dependent_repositories": [
35+
{
36+
"path_to_root": "azure-docs-snippets-pr",
37+
"url": "https://github.com/MicrosoftDocs/azure-docs-snippets-pr",
38+
"branch": "main",
39+
"branch_mapping": {}
40+
},
3541
{
3642
"path_to_root": "azure-dev-docs-pr",
3743
"url": "https://github.com/MicrosoftDocs/azure-dev-docs-pr",

.openpublishing.redirection.active-directory.json

Lines changed: 20 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,15 @@
11
{
22
"redirections": [
3+
{
4+
"source_path_from_root": "/articles/active-directory/develop/active-directory-claims-mapping.md",
5+
"redirect_url": "/azure/active-directory/develop/active-directory-saml-claims-customization",
6+
"redirect_document_id": false
7+
},
8+
{
9+
"source_path_from_root": "/articles/active-directory/develop/configure-token-lifetimes.md",
10+
"redirect_url": "/azure/active-directory/develop/active-directory-saml-claims-customization",
11+
"redirect_document_id": false
12+
},
313
{
414
"source_path_from_root": "/articles/active-directory/authentication/how-to-mfa-microsoft-managed.md",
515
"redirect_url": "/azure/active-directory/authentication/concept-authentication-default-enablement",
@@ -50,6 +60,11 @@
5060
"redirect_url": "/azure/active-directory/saas-apps/safety-culture-tutorial",
5161
"redirect_document_id": false
5262
},
63+
{
64+
"source_path_from_root": "/articles/active-directory/saas-apps/firstbird-tutorial.md",
65+
"redirect_url": "/azure/active-directory/saas-apps/radancys-employee-referrals-tutorial",
66+
"redirect_document_id": false
67+
},
5368
{
5469
"source_path_from_root": "/articles/active-directory/saas-apps/icertisicm-tutorial.md",
5570
"redirect_url": "/azure/active-directory/saas-apps/tutorial-list",
@@ -11035,6 +11050,11 @@
1103511050
"source_path_from_root": "/articles/active-directory/cloud-infrastructure-entitlement-management/permissions-management-trial-playbook.md",
1103611051
"redirect_url": "/azure/active-directory/cloud-infrastructure-entitlement-management/permissions-management-trial-user-guide",
1103711052
"redirect_document_id": false
11053+
},
11054+
{
11055+
"source_path_from_root": "/articles/active-directory/develop/microsoft-graph-intro.md",
11056+
"redirect_url": "/graph/overview?toc=/azure/active-directory/develop/toc.json&bc=/azure/active-directory/develop/breadcrumb/toc.json",
11057+
"redirect_document_id": false
1103811058
}
1103911059
]
1104011060
}

.openpublishing.redirection.json

Lines changed: 365 additions & 0 deletions
Large diffs are not rendered by default.

articles/active-directory-b2c/TOC.yml

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -35,7 +35,7 @@
3535
# - name: 4 - Create custom policies
3636
# Create this file (tutorial-create-custom-policies.md), and content into it. You also need to update the index.yml's card, Customize, to reflect the new file name
3737
# What keywords users are searching in TOC: https://review.docs.microsoft.com/en-us/help/contribute/kusto/samples/discoverability-toc-filter?branch=main
38-
# href: tutorial-create-user-flows.md
38+
# href:tutorial-create-user-flows.md
3939
- name: 4 - Manage your tenant
4040
href: tenant-management.md
4141
displayName: break glass account, emergence account
@@ -106,6 +106,7 @@
106106
href: user-flow-overview.md
107107
- name: Custom policy overview
108108
href: custom-policy-overview.md
109+
displayName: extend, extensibility
109110
- name: API Connectors
110111
href: api-connectors-overview.md
111112
displayName: REST API, web API, API connectors, Dynamic data retrieval, external data sources, external identity data source, outbound webhooks, third-party integration
@@ -461,7 +462,8 @@
461462
- name: Integrate with our technology partners
462463
items:
463464
- name: Azure AD B2C partner gallery
464-
href: partner-gallery.md
465+
href: partner-gallery.md
466+
displayName: marketplace, integration, extensibility, extend, customization, customisation
465467
# Secure
466468
- name: Secure
467469
items:

articles/active-directory-b2c/best-practices.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -39,6 +39,8 @@ Define your application and service architecture, inventory current systems, and
3939
| Usability vs. security | Your solution must strike the right balance between application usability and your organization's acceptable level of risk. |
4040
| Move on-premises dependencies to the cloud | To help ensure a resilient solution, consider moving existing application dependencies to the cloud. |
4141
| Migrate existing apps to b2clogin.com | The deprecation of login.microsoftonline.com will go into effect for all Azure AD B2C tenants on 04 December 2020. [Learn more](b2clogin.md). |
42+
| Use Identity Protection and Conditional Access | Use these capabilities for significantly greater control over risky authentications and access policies. Azure AD B2C Premium P2 is required. [Learn more](conditional-access-identity-protection-overview.md). |
43+
|Tenant size | You need to plan with Azure AD B2C tenant size in mind. By default, Azure AD B2C tenant can accommodate 1.25 million objects (user accounts and applications). You can increase this limit to 5.25 million objects by adding a custom domain to your tenant, and verifying it. If you need a bigger tenant size, you need to contact [Support](find-help-open-support-ticket.md).|
4244
| Use Identity Protection and Conditional Access | Use these capabilities for greater control over risky authentications and access policies. Azure AD B2C Premium P2 is required. [Learn more](conditional-access-identity-protection-overview.md). |
4345

4446
## Implementation
@@ -86,5 +88,6 @@ Stay up to date with the state of the service and find support options.
8688
| Best practice | Description |
8789
|--|--|
8890
| [Service updates](https://azure.microsoft.com/updates/?product=active-directory-b2c) | Stay up to date with Azure AD B2C product updates and announcements. |
89-
| [Microsoft Support](support-options.md) | File a support request for Azure AD B2C technical issues. Billing and subscription management support is provided at no cost. |
91+
| [Microsoft Support](find-help-open-support-ticket.md) | File a support request for Azure AD B2C technical issues. Billing and subscription management support is provided at no cost. |
9092
| [Azure status](https://azure.status.microsoft/status) | View the current health status of all Azure services. |
93+

articles/active-directory-b2c/custom-domain.md

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: CelesteDG
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: how-to
12-
ms.date: 07/26/2022
12+
ms.date: 11/3/2022
1313
ms.author: kengaderdus
1414
ms.subservice: B2C
1515
ms.custom: "b2c-support"
@@ -20,7 +20,11 @@ zone_pivot_groups: b2c-policy-type
2020

2121
[!INCLUDE [active-directory-b2c-choose-user-flow-or-custom-policy](../../includes/active-directory-b2c-choose-user-flow-or-custom-policy.md)]
2222

23-
This article describes how to enable custom domains in your redirect URLs for Azure Active Directory B2C (Azure AD B2C). Using a custom domain with your application provides a more seamless user experience. From the user's perspective, they remain in your domain during the sign in process rather than redirecting to the Azure AD B2C default domain *<tenant-name>.b2clogin.com*.
23+
This article describes how to enable custom domains in your redirect URLs for Azure Active Directory B2C (Azure AD B2C). By using a verified custom domain, you've benefits such as:
24+
25+
- It provides a more seamless user experience. From the user's perspective, they remain in your domain during the sign in process rather than redirecting to the Azure AD B2C default domain *<tenant-name>.b2clogin.com*.
26+
27+
- You increase the number of objects (user accounts and applications) you can create in your Azure AD B2C tenant from the default 1.25 million to 5.25 million.
2428

2529
![Screenshot demonstrates an Azure AD B2C custom domain user experience.](./media/custom-domain/custom-domain-user-experience.png)
2630

articles/active-directory-b2c/faq.yml

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -43,7 +43,10 @@ sections:
4343
In an Azure AD B2C tenant, most apps want the user to sign-in with any arbitrary email address (for example, [email protected], [email protected], [email protected], or [email protected]). This type of account is a local account. We also support arbitrary user names as local accounts (for example, joe, bob, sarah, or jim). You can choose one of these two local account types when configuring identity providers for Azure AD B2C in the Azure portal. In your Azure AD B2C tenant, select **Identity providers**, select **Local account**, and then select **Username**.
4444
4545
User accounts for applications can be created through a sign-up user flow, sign-up or sign-in user flow, the Microsoft Graph API, or in the Azure portal.
46-
46+
- question: |
47+
How many users can an Azure AD B2C tenant accommodate?
48+
answer: |
49+
- By default, each tenant can accommodate a total of **1.25 million** objects (user accounts and applications), but you can increase this limit to **5.25 million** objects when you [add and verify a custom domain](custom-domain.md). If you want to increase this limit, please contact [Microsoft Support](find-help-open-support-ticket.md). However, if you created your tenant before **September 2022**, this limit doesn't affect you, and your tenant will retain the size allocated to it at creation, that's, **50 million** objects.
4750
- question: |
4851
Which social identity providers do you support now? Which ones do you plan to support in the future?
4952
answer: |

articles/active-directory-b2c/identity-verification-proofing.md

Lines changed: 30 additions & 21 deletions
Original file line numberDiff line numberDiff line change
@@ -4,43 +4,52 @@ titleSuffix: Azure AD B2C
44
description: Learn about our partners who integrate with Azure AD B2C to provide identity proofing and verification solutions
55
services: active-directory-b2c
66
author: gargi-sinha
7-
manager: CelesteDG
7+
manager: martinco
88
ms.reviewer: kengaderdus
9-
109
ms.service: active-directory
1110
ms.workload: identity
1211
ms.topic: how-to
13-
ms.date: 09/13/2022
12+
ms.date: 01/18/2023
1413
ms.author: gasinh
15-
ms.subservice: B2C
1614
---
1715

1816
# Identity verification and proofing partners
1917

20-
With Azure AD B2C partners, customers can enable identity verification and proofing of their end users before allowing account registration or access. Identity verification and proofing can check document, knowledge-based information and liveness.
18+
With Azure Active Directory B2C (Azure AD B2C) and solutions from software-vendor partners, customers can enable end-user identity verification and proofing for account registration. Identity verification and proofing can check documents, knowledge-based information, and liveness.
19+
20+
## Architecture diagram
21+
22+
The following architecture diagram illustrates the verification and proofing flow.
2123

22-
A high-level architecture diagram explains the flow.
24+
![Diagram of of the identity proofing flow, from registration to access approval.](./media/partner-gallery/third-party-identity-proofing.png)
2325

24-
![Diagram shows the identity proofing flow](./media/partner-gallery/third-party-identity-proofing.png)
26+
1. User begins registration with a device.
27+
2. User enters information.
28+
3. Digital-risk score is assessed, then third-party identity proofing and identity validation occurs.
29+
4. Identity is validated or rejected.
30+
5. User attributes are passed to Azure Active Directory B2C.
31+
6. If user verification is successful, a user account is created in Azure AD B2C during sign-in.
32+
7. Based on the verification result, the user receives an access-approved or -denied message.
2533

26-
Microsoft partners with the following ISV partners.
34+
## Software vendors and integration documentation
2735

28-
| ISV partner | Description and integration walkthroughs |
29-
|:-------------------------|:--------------|
30-
| ![Screenshot of a deduce logo.](./media/partner-gallery/deduce-logo.png) | [Deduce](./partner-deduce.md) is an identity verification and proofing provider focused on stopping account takeover and registration fraud. It helps combat identity fraud and creates a trusted user experience. |
31-
| ![Screenshot of a eid-me logo](./media/partner-gallery/eid-me-logo.png) | [eID-Me](./partner-eid-me.md) is an identity verification and decentralized digital identity solution for Canadian citizens. It enables organizations to meet Identity Assurance Level (IAL) 2 and Know Your Customer (KYC) requirements. |
32-
|![Screenshot of an Experian logo.](./media/partner-gallery/experian-logo.png) | [Experian](./partner-experian.md) is an Identity verification and proofing provider that performs risk assessments based on user attributes to prevent fraud. |
33-
|![Screenshot of an IDology logo.](./media/partner-gallery/idology-logo.png) | [IDology](./partner-idology.md) is an Identity verification and proofing provider with ID verification solutions, fraud prevention solutions, compliance solutions, and others.|
34-
|![Screenshot of a Jumio logo.](./media/partner-gallery/jumio-logo.png) | [Jumio](./partner-jumio.md) is an ID verification service, which enables real-time automated ID verification, safeguarding customer data. |
35-
| ![Screenshot of a LexisNexis logo.](./media/partner-gallery/lexisnexis-logo.png) | [LexisNexis](./partner-lexisnexis.md) is a profiling and identity validation provider that verifies user identification and provides comprehensive risk assessment based on user’s device. |
36-
| ![Screenshot of a Onfido logo](./media/partner-gallery/onfido-logo.png) | [Onfido](./partner-onfido.md) is a document ID and facial biometrics verification solution that allows companies to meet *Know Your Customer* and identity requirements in real time. |
36+
Microsoft partners with independent software vendors (ISVs). Use the following table to locate an ISV and related integration documentation.
3737

38-
## Additional information
38+
| ISV logo | ISV link and description| Integration documentation|
39+
|---|---|---|
40+
| ![Screenshot of the Deduce logo.](./media/partner-gallery/deduce-logo.png) | [Deduce](https://www.deduce.com/): Identity verification and proofing provider that helps stop account takeover and registration fraud. Use it to combat identity fraud and create a trusted user experience. |[Configure Azure AD B2C with Deduce to combat identity fraud and create a trusted user experience](partner-deduce.md)|
41+
| ![Screenshot of the eID-Me logo.](./media/partner-gallery/eid-me-logo.png) | [Bluink, Ltd.](https://bluink.ca/): eID-Me is an identity verification and decentralized digital identity solution for Canadian citizens. Use it to meet Identity Assurance Level (IAL) 2 and Know Your Customer (KYC) requirements. |[Configure eID-Me with Azure AD B2C for identity verification](partner-eid-me.md)|
42+
|![Screenshot of the Experian logo.](./media/partner-gallery/experian-logo.png) | [Experian Information Solutions, Inc.](https://www.experian.com/business/products/crosscore): Identity verification and proofing provider with solutions that perform risk assessments based on user attributes. |[Tutorial: Configure Experian with Azure AD B2C](partner-experian.md)|
43+
|![Screenshot of the IDology logo.](./media/partner-gallery/idology-logo.png) | [IDology, a GBG company](https://www.idology.com/solutions/): Identity verification and proofing provider with ID verification, fraud prevention, and compliance solutions.|[Tutorial for configuring IDology with Azure AD B2C](partner-idology.md)|
44+
|![Screenshot of the Jumio logo.](./media/partner-gallery/jumio-logo.png) | [Jumio](https://www.jumio.com/): Identify verification service with products for real-time, automated ID verification. |[Tutorial for configuring Jumio with Azure AD B2C](partner-jumio.md)|
45+
| ![Screenshot of the LexisNexis logo.](./media/partner-gallery/lexisnexis-logo.png) | [LexisNexis Risk Solutions Group](https://risk.lexisnexis.com/products/threatmetrix): Profiling and identity validation provider that verifies user identification and provides risk assessment based on user devices. See, ThreatMetrix. |[Tutorial for configuring LexisNexis with Azure AD B2C](partner-lexisnexis.md)|
46+
| ![Screenshot of the Onfido logo.](./media/partner-gallery/onfido-logo.png) | [Onfido](https://onfido.com/): Document ID and facial biometrics verification solutions to meet Know Your Customer (KYC) and identity requirements. |[Tutorial for configuring Onfido with Azure AD B2C](partner-onfido.md)|
3947

40-
- [Custom policies in Azure AD B2C](./custom-policy-overview.md)
48+
## Resources
4149

42-
- [Get started with custom policies in Azure AD B2C](./tutorial-create-user-flows.md?pivots=b2c-custom-policy&tabs=applications)
50+
- [Azure AD B2C custom policy overview](custom-policy-overview.md)
51+
- [Tutorial: Create user flows and custom policies in Azure Active Directory B2C](tutorial-create-user-flows.md?pivots=b2c-custom-policy&tabs=applications)
4352

4453
## Next steps
4554

46-
Select a partner in the tables mentioned to learn how to integrate their solution with Azure AD B2C.
55+
Select and contact a partner from the previous table to get started on solution integration with Azure AD B2C. The partners have similar processes to contact them for a product demo.

articles/active-directory-b2c/microsoft-graph-operations.md

Lines changed: 21 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ manager: CelesteDG
88
ms.service: active-directory
99
ms.workload: identity
1010
ms.topic: how-to
11-
ms.date: 03/03/2022
11+
ms.date: 11/3/2022
1212
ms.custom: "project-no-code, ignite-fall-2021, b2c-support"
1313
ms.author: kengaderdus
1414
ms.subservice: B2C
@@ -26,7 +26,7 @@ Watch this video to learn about Azure AD B2C user migration using Microsoft Grap
2626
2727
## Prerequisites
2828

29-
To use MS Graph API, and interact with resources in your Azure AD B2C tenant, you need an application registration that grants the permissions to do so. Follow the steps in the [Manage Azure AD B2C with Microsoft Graph](microsoft-graph-get-started.md) article to create an application registration that your management application can use.
29+
- To use MS Graph API, and interact with resources in your Azure AD B2C tenant, you need an application registration that grants the permissions to do so. Follow the steps in the [Register a Microsoft Graph application](microsoft-graph-get-started.md) article to create an application registration that your management application can use.
3030

3131
## User management
3232
> [!NOTE]
@@ -162,6 +162,25 @@ For user flows, these extension properties are [managed by using the Azure porta
162162
> [!NOTE]
163163
> In Azure AD, directory extensions are managed through the [extensionProperty resource type](/graph/api/resources/extensionproperty) and its associated methods. However, because they are used in B2C through the `b2c-extensions-app` app which should not be updated, they are managed in Azure AD B2C using the [identityUserFlowAttribute resource type](/graph/api/resources/identityuserflowattribute) and its associated methods.
164164
165+
## Tenant usage
166+
167+
Use the [Get organization details](/graph/api/organization-get) API to get your directory size quota. You need to add the `$select` query parameter as shown in the following HTTP request:
168+
169+
```http
170+
GET https://graph.microsoft.com/v1.0/organization/organization-id?$select=directorySizeQuota
171+
```
172+
Replace `organization-id` with your organization or tenant ID.
173+
174+
The response to the above request looks similar to the following JSON snippet:
175+
176+
```json
177+
{
178+
"directorySizeQuota": {
179+
"used": 156,
180+
"total": 1250000
181+
}
182+
}
183+
```
165184
## Audit logs
166185

167186
- [List audit logs](/graph/api/directoryaudit-list)

articles/active-directory-b2c/service-limits.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ manager: CelesteDG
88
ms.service: active-directory
99
ms.workload: identity
1010
ms.topic: reference
11-
ms.date: 12/01/2022
11+
ms.date: 12/29/2022
1212
ms.subservice: B2C
1313
zone_pivot_groups: b2c-policy-type
1414
---
@@ -164,6 +164,8 @@ The following table lists the administrative configuration limits in the Azure A
164164
|Number of sign-out URLs per application  |1 |
165165
|String Limit per Attribute |250 Chars |
166166
|Number of B2C tenants per subscription |20 |
167+
|Total number of objects (user accounts and applications) per tenant (default limit)|1.25 million |
168+
|Total number of objects (user accounts and applications) per tenant (using a verified custom domain)|5.25 million |
167169
|Levels of [inheritance](custom-policy-overview.md#inheritance-model) in custom policies |10 |
168170
|Number of policies per Azure AD B2C tenant (user flows + custom policies) |200 |
169171
|Maximum policy file size |1024 KB |

0 commit comments

Comments
 (0)