You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
To enable sign-in for users with a Twitter account in Azure AD B2C, you need to create a Twitter application. If you don't already have a Twitter account, you can sign up at [`https://twitter.com/signup`](https://twitter.com/signup). You also need to [Apply for a developer account](https://developer.twitter.com/). For more information, see [Apply for access](https://developer.twitter.com/en/apply-for-access).
35
35
36
+
::: zone pivot="b2c-custom-policy"
37
+
1. Sign in to the [Twitter Developer Portal](https://developer.twitter.com/portal/projects-and-apps) with your Twitter account credentials.
38
+
1. Select **+ Create Project** button.
39
+
1. Under **Project name** tab, enter a preferred name of your project, and then select **Next** button.
40
+
1. Under **Use case** tab, select your preferred use case, and then select **Next**.
41
+
1. Under **Project description** tab, enter your project description, and then select **Next** button.
42
+
1. Under **App name** tab, enter a name for your app, such as *azureadb2c*, and the select **Next** button.
43
+
1. Under **Keys & Tokens** tab, copy the value of **API Key** and **API Key Secret** for later. You use both of them to configure Twitter as an identity provider in your Azure AD B2C tenant.
44
+
1. Select **App settings** to open the app settings.
45
+
1. At the lower part of the page, under **User authentication settings**, select **Set up**.
46
+
1. In the **User authentication settings** page, select **OAuth 2.0** option.
47
+
1. Under **OAUTH 2.0 SETTINGS**, for the **Type of app**, select your appropriate app type such as *Web App*.
48
+
1. Under **GENERAL AUTHENTICATION SETTINGS**:
49
+
1. For the **Callback URI/Redirect URL**, enter `https://your-tenant.b2clogin.com/your-tenant-name.onmicrosoft.com/your-policy-id/oauth1/authresp`. If you use a [custom domain](custom-domain.md), enter `https://your-domain-name/your-tenant-name.onmicrosoft.com/your-user-flow-Id/oauth1/authresp`. Use all lowercase letters when entering your tenant name and user flow ID even if they are defined with uppercase letters in Azure AD B2C. Replace:
50
+
-`your-tenant-name` with the name of your tenant name.
51
+
-`your-domain-name` with your custom domain.
52
+
-`your-policy-id` with the identifier of your user flow. For example, `b2c_1a_signup_signin_twitter`.
53
+
1. For the **Website URL**, enter `https://your-tenant.b2clogin.com`. Replace `your-tenant` with the name of your tenant. For example, `https://contosob2c.b2clogin.com`. If you use a [custom domain](custom-domain.md), enter `https://your-domain-name`.
54
+
1. Enter a URL for the **Terms of service**, for example `http://www.contoso.com/tos`. The policy URL is a page you maintain to provide terms and conditions for your application.
55
+
1. Enter a URL for the **Privacy policy**, for example `http://www.contoso.com/privacy`. The policy URL is a page you maintain to provide privacy information for your application.
56
+
1. Select **Save**.
57
+
::: zone-end
58
+
59
+
60
+
::: zone pivot="b2c-user-flow"
61
+
36
62
1. Sign in to the [Twitter Developer Portal](https://developer.twitter.com/portal/projects-and-apps) with your Twitter account credentials.
37
63
1. Select **+ Create Project** button.
38
64
1. Under **Project name** tab, enter a preferred name of your project, and then select **Next** button.
@@ -45,15 +71,16 @@ To enable sign-in for users with a Twitter account in Azure AD B2C, you need to
45
71
1. In the **User authentication settings** page, select **OAuth 2.0** option.
46
72
1. Under **OAUTH 2.0 SETTINGS**, for the **Type of app**, select your appropriate app type such as *Web App*.
47
73
1. Under **GENERAL AUTHENTICATION SETTINGS**:
48
-
1. For the **Callback URI/Redirect URL**, enter `https://your-tenant.b2clogin.com/your-tenant-name.onmicrosoft.com/your-user-flow-Id/oauth1/authresp`. If you use a [custom domain](custom-domain.md), enter `https://your-domain-name/your-tenant-name.onmicrosoft.com/your-user-flow-Id/oauth1/authresp`. Use all lowercase letters when entering your tenant name and user flow ID even if they are defined with uppercase letters in Azure AD B2C. Replace:
74
+
1. For the **Callback URI/Redirect URL**, enter `https://your-tenant.b2clogin.com/your-tenant-name.onmicrosoft.com/your-user-flow-name/oauth1/authresp`. If you use a [custom domain](custom-domain.md), enter `https://your-domain-name/your-tenant-name.onmicrosoft.com/your-user-flow-Id/oauth1/authresp`. Use all lowercase letters when entering your tenant name and user flow ID even if they are defined with uppercase letters in Azure AD B2C. Replace:
49
75
-`your-tenant-name` with the name of your tenant name.
50
76
-`your-domain-name` with your custom domain.
51
-
-`your-user-flow-Id` with the identifier of your user flow. For example, `b2c_1a_signup_signin_twitter`.
52
-
77
+
-`your-user-flow-name` with the identifier of your user flow. For example, `b2c_1_signup_signin_twitter`.
53
78
1. For the **Website URL**, enter `https://your-tenant.b2clogin.com`. Replace `your-tenant` with the name of your tenant. For example, `https://contosob2c.b2clogin.com`. If you use a [custom domain](custom-domain.md), enter `https://your-domain-name`.
54
79
1. Enter a URL for the **Terms of service**, for example `http://www.contoso.com/tos`. The policy URL is a page you maintain to provide terms and conditions for your application.
55
80
1. Enter a URL for the **Privacy policy**, for example `http://www.contoso.com/privacy`. The policy URL is a page you maintain to provide privacy information for your application.
56
81
1. Select **Save**.
82
+
83
+
::: zone-end
57
84
58
85
::: zone pivot="b2c-user-flow"
59
86
@@ -83,8 +110,6 @@ At this point, the Twitter identity provider has been set up, but it's not yet a
83
110
1. Select the **Run user flow** button.
84
111
1. From the sign-up or sign-in page, select **Twitter** to sign in with Twitter account.
85
112
86
-
If the sign-in process is successful, your browser is redirected to `https://jwt.ms`, which displays the contents of the token returned by Azure AD B2C.
87
-
88
113
::: zone-end
89
114
90
115
::: zone pivot="b2c-custom-policy"
@@ -186,7 +211,9 @@ You can define a Twitter account as a claims provider by adding it to the **Clai
186
211
1. For **Application**, select a web application that you [previously registered](tutorial-register-applications.md). The **Reply URL** should show `https://jwt.ms`.
187
212
1. Select the **Run now** button.
188
213
1. From the sign-up or sign-in page, select **Twitter** to sign in with Twitter account.
214
+
::: zone-end
189
215
190
216
If the sign-in process is successful, your browser is redirected to `https://jwt.ms`, which displays the contents of the token returned by Azure AD B2C.
191
217
192
-
::: zone-end
218
+
> [!TIP]
219
+
> If you're facing `unauthorized` error while testing this identity provider, make sure you use the correct Twitter API Key and API Key Secret, or try to apply for [elevated](https://developer.twitter.com/en/portal/products/elevated) access. Also, we recommend you've a look at [Twitter's projects structure](https://developer.twitter.com/en/docs/projects/overview), if you registered your app before the feature was available.
Copy file name to clipboardExpand all lines: articles/active-directory-b2c/localization-string-ids.md
+6-2Lines changed: 6 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -377,7 +377,7 @@ The following are the IDs for a [Verification display control](display-control-v
377
377
378
378
| ID | Default value |
379
379
| --- | ------------- |
380
-
|intro_msg<sup>*</sup>| Verification is necessary. Please click Send button.|
380
+
|intro_msg<sup>1</sup>| Verification is necessary. Please click Send button.|
381
381
|success_send_code_msg | Verification code has been sent. Please copy it to the input box below.|
382
382
|failure_send_code_msg | We are having trouble verifying your email address. Please enter a valid email address and try again.|
383
383
|success_verify_code_msg | E-mail address verified. You can now continue.|
@@ -386,13 +386,16 @@ The following are the IDs for a [Verification display control](display-control-v
386
386
|but_verify_code | Verify code|
387
387
|but_send_new_code | Send new code|
388
388
|but_change_claims | Change e-mail|
389
+
| UserMessageIfVerificationControlClaimsNotVerified<sup>2</sup>| The claims for verification control have not been verified. |
389
390
390
-
Note: The `intro_msg` element is hidden, and not shown on the self-asserted page. To make it visible, use the [HTML customization](customize-ui-with-html.md) with Cascading Style Sheets. For example:
391
+
<sup>1</sup> The `intro_msg` element is hidden, and not shown on the self-asserted page. To make it visible, use the [HTML customization](customize-ui-with-html.md) with Cascading Style Sheets. For example:
<sup>2</sup> This error message is displayed to the user if they enter a verification code, but instead of completing the verification by selecting on the **Verify** button, they select the **Continue** button.
398
+
396
399
### Verification display control example
397
400
398
401
```xml
@@ -408,6 +411,7 @@ Note: The `intro_msg` element is hidden, and not shown on the self-asserted page
<LocalizedStringElementType="ErrorMessage"StringId="UserMessageIfVerificationControlClaimsNotVerified">The claims for verification control have not been verified.</LocalizedString>
#Customer intent: As an application developer, I want to understand the basic concepts of authentication and authorization in the Microsoft identity platform.
// Don't perform initial navigation in iframes or popups
159
+
initialNavigation: !BrowserUtils.isInIframe() && !BrowserUtils.isInPopup() ? 'enabledNonBlocking' : 'disabled' // Set to enabledBlocking to use Angular Universal
Copy file name to clipboardExpand all lines: articles/active-directory/manage-apps/myapps-overview.md
+4-3Lines changed: 4 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,15 +8,16 @@ ms.service: active-directory
8
8
ms.subservice: app-mgmt
9
9
ms.topic: conceptual
10
10
ms.workload: identity
11
-
ms.date: 05/05/2022
11
+
ms.date: 08/11/2022
12
12
ms.author: saibandaru
13
+
ms.custom: contperf-fy23q1
13
14
#Customer intent: As an Azure AD administrator, I want to make applications available to users in the My Apps portal.
14
15
15
16
---
16
17
17
18
# My Apps portal overview
18
19
19
-
[My Apps](https://myapps.microsoft.com) is a web-based portal that is used for managing and launching applications in Azure Active Directory (Azure AD). To work with applications in My Apps, use an organizational account in Azure AD and obtain access granted by the Azure AD administrator. My Apps is separate from the Azure portal and doesn't require users to have an Azure subscription or Microsoft 365 subscription.
20
+
My Apps is a web-based portal that is used for managing and launching applications in Azure Active Directory (Azure AD). To work with applications in My Apps, use an organizational account in Azure AD and obtain access granted by the Azure AD administrator. My Apps is separate from the Azure portal and doesn't require users to have an Azure subscription or Microsoft 365 subscription.
20
21
21
22
Users access the My Apps portal to:
22
23
@@ -54,7 +55,7 @@ For more information, see [Properties of an enterprise application](application-
54
55
55
56
### Discover applications
56
57
57
-
When signed in to the My Apps portal, the applications that have been made visible are shown. For an application to be visible in the My Apps portal, set the appropriate properties in the Azure portal. Also in the Azure portal, assign a user or group with the appropriate members.
58
+
When signed in to the [My Apps](https://myapps.microsoft.com) portal, the applications that have been made visible are shown. For an application to be visible in the My Apps portal, set the appropriate properties in the [Azure portal](https://portal.azure.com). Also in the Azure portal, assign a user or group with the appropriate members.
58
59
59
60
In the My Apps portal, to search for an application, enter an application name in the search box at the top of the page to find an application. The applications that are listed can be formatted in **List view** or a **Grid view**.
Copy file name to clipboardExpand all lines: articles/active-directory/roles/permissions-reference.md
+15Lines changed: 15 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -77,6 +77,7 @@ This article lists the Azure AD built-in roles you can assign to allow managemen
77
77
> |[Knowledge Administrator](#knowledge-administrator)| Can configure knowledge, learning, and other intelligent features. | b5a8dcf3-09d5-43a9-a639-8e29ef291470 |
78
78
> |[Knowledge Manager](#knowledge-manager)| Can organize, create, manage, and promote topics and knowledge. | 744ec460-397e-42ad-a462-8b3f9747a02c |
79
79
> |[License Administrator](#license-administrator)| Can manage product licenses on users and groups. | 4d6ac14f-3453-41d0-bef9-a3e0c569773a |
80
+
> |[Lifecycle Workflows Administrator](#lifecycle-workflows-administrator)| Create and manage all aspects of workflows and tasks associated with Lifecycle Workflows in Azure AD. | 59d46f88-662b-457b-bceb-5c3809e5908f |
80
81
> |[Message Center Privacy Reader](#message-center-privacy-reader)| Can read security messages and updates in Office 365 Message Center only. | ac16e43d-7b2d-40e0-ac05-243ff356ab5b |
81
82
> |[Message Center Reader](#message-center-reader)| Can read messages and updates for their organization in Office 365 Message Center only. | 790c1fb9-7f7d-4f88-86a1-ef1f95c05c1b |
82
83
> |[Modern Commerce User](#modern-commerce-user)| Can manage commercial purchases for a company, department or team. | d24aef57-1500-4070-84db-2666f29cf966 |
@@ -1479,6 +1480,20 @@ Users in this role can add, remove, and update license assignments on users, gro
1479
1480
> | microsoft.office365.serviceHealth/allEntities/allTasks | Read and configure Service Health in the Microsoft 365 admin center |
1480
1481
> | microsoft.office365.webPortal/allEntities/standard/read | Read basic properties on all resources in the Microsoft 365 admin center |
1481
1482
1483
+
## Lifecycle Workflows Administrator
1484
+
1485
+
Assign the Lifecycle Workflows Administrator role to users who need to do the following tasks:
1486
+
1487
+
- Create and manage all aspects of workflows and tasks associated with Lifecycle Workflows in Azure AD
1488
+
- Check the execution of scheduled workflows
1489
+
- Launch on-demand workflow runs
1490
+
- Inspect workflow execution logs
1491
+
1492
+
> [!div class="mx-tableFixed"]
1493
+
> | Actions | Description |
1494
+
> | --- | --- |
1495
+
> | microsoft.directory/lifecycleManagement/workflows/allProperties/allTasks | Manage all aspects of lifecycle management workflows and tasks in Azure AD |
1496
+
1482
1497
## Message Center Privacy Reader
1483
1498
1484
1499
Users in this role can monitor all notifications in the Message Center, including data privacy messages. Message Center Privacy Readers get email notifications including those related to data privacy and they can unsubscribe using Message Center Preferences. Only the Global Administrator and the Message Center Privacy Reader can read data privacy messages. Additionally, this role contains the ability to view groups, domains, and subscriptions. This role has no permission to view, create, or manage service requests.
0 commit comments