Skip to content

Commit 2401c70

Browse files
authored
Merge pull request #207726 from MicrosoftDocs/main
8/11 AM Publish
2 parents 1d5a84a + 5911af5 commit 2401c70

File tree

125 files changed

+1279
-422
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

125 files changed

+1279
-422
lines changed

articles/active-directory-b2c/identity-provider-twitter.md

Lines changed: 33 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -33,6 +33,32 @@ zone_pivot_groups: b2c-policy-type
3333

3434
To enable sign-in for users with a Twitter account in Azure AD B2C, you need to create a Twitter application. If you don't already have a Twitter account, you can sign up at [`https://twitter.com/signup`](https://twitter.com/signup). You also need to [Apply for a developer account](https://developer.twitter.com/). For more information, see [Apply for access](https://developer.twitter.com/en/apply-for-access).
3535

36+
::: zone pivot="b2c-custom-policy"
37+
1. Sign in to the [Twitter Developer Portal](https://developer.twitter.com/portal/projects-and-apps) with your Twitter account credentials.
38+
1. Select **+ Create Project** button.
39+
1. Under **Project name** tab, enter a preferred name of your project, and then select **Next** button.
40+
1. Under **Use case** tab, select your preferred use case, and then select **Next**.
41+
1. Under **Project description** tab, enter your project description, and then select **Next** button.
42+
1. Under **App name** tab, enter a name for your app, such as *azureadb2c*, and the select **Next** button.
43+
1. Under **Keys & Tokens** tab, copy the value of **API Key** and **API Key Secret** for later. You use both of them to configure Twitter as an identity provider in your Azure AD B2C tenant.
44+
1. Select **App settings** to open the app settings.
45+
1. At the lower part of the page, under **User authentication settings**, select **Set up**.
46+
1. In the **User authentication settings** page, select **OAuth 2.0** option.
47+
1. Under **OAUTH 2.0 SETTINGS**, for the **Type of app**, select your appropriate app type such as *Web App*.
48+
1. Under **GENERAL AUTHENTICATION SETTINGS**:
49+
1. For the **Callback URI/Redirect URL**, enter `https://your-tenant.b2clogin.com/your-tenant-name.onmicrosoft.com/your-policy-id/oauth1/authresp`. If you use a [custom domain](custom-domain.md), enter `https://your-domain-name/your-tenant-name.onmicrosoft.com/your-user-flow-Id/oauth1/authresp`. Use all lowercase letters when entering your tenant name and user flow ID even if they are defined with uppercase letters in Azure AD B2C. Replace:
50+
- `your-tenant-name` with the name of your tenant name.
51+
- `your-domain-name` with your custom domain.
52+
- `your-policy-id` with the identifier of your user flow. For example, `b2c_1a_signup_signin_twitter`.
53+
1. For the **Website URL**, enter `https://your-tenant.b2clogin.com`. Replace `your-tenant` with the name of your tenant. For example, `https://contosob2c.b2clogin.com`. If you use a [custom domain](custom-domain.md), enter `https://your-domain-name`.
54+
1. Enter a URL for the **Terms of service**, for example `http://www.contoso.com/tos`. The policy URL is a page you maintain to provide terms and conditions for your application.
55+
1. Enter a URL for the **Privacy policy**, for example `http://www.contoso.com/privacy`. The policy URL is a page you maintain to provide privacy information for your application.
56+
1. Select **Save**.
57+
::: zone-end
58+
59+
60+
::: zone pivot="b2c-user-flow"
61+
3662
1. Sign in to the [Twitter Developer Portal](https://developer.twitter.com/portal/projects-and-apps) with your Twitter account credentials.
3763
1. Select **+ Create Project** button.
3864
1. Under **Project name** tab, enter a preferred name of your project, and then select **Next** button.
@@ -45,15 +71,16 @@ To enable sign-in for users with a Twitter account in Azure AD B2C, you need to
4571
1. In the **User authentication settings** page, select **OAuth 2.0** option.
4672
1. Under **OAUTH 2.0 SETTINGS**, for the **Type of app**, select your appropriate app type such as *Web App*.
4773
1. Under **GENERAL AUTHENTICATION SETTINGS**:
48-
1. For the **Callback URI/Redirect URL**, enter `https://your-tenant.b2clogin.com/your-tenant-name.onmicrosoft.com/your-user-flow-Id/oauth1/authresp`. If you use a [custom domain](custom-domain.md), enter `https://your-domain-name/your-tenant-name.onmicrosoft.com/your-user-flow-Id/oauth1/authresp`. Use all lowercase letters when entering your tenant name and user flow ID even if they are defined with uppercase letters in Azure AD B2C. Replace:
74+
1. For the **Callback URI/Redirect URL**, enter `https://your-tenant.b2clogin.com/your-tenant-name.onmicrosoft.com/your-user-flow-name/oauth1/authresp`. If you use a [custom domain](custom-domain.md), enter `https://your-domain-name/your-tenant-name.onmicrosoft.com/your-user-flow-Id/oauth1/authresp`. Use all lowercase letters when entering your tenant name and user flow ID even if they are defined with uppercase letters in Azure AD B2C. Replace:
4975
- `your-tenant-name` with the name of your tenant name.
5076
- `your-domain-name` with your custom domain.
51-
- `your-user-flow-Id` with the identifier of your user flow. For example, `b2c_1a_signup_signin_twitter`.
52-
77+
- `your-user-flow-name` with the identifier of your user flow. For example, `b2c_1_signup_signin_twitter`.
5378
1. For the **Website URL**, enter `https://your-tenant.b2clogin.com`. Replace `your-tenant` with the name of your tenant. For example, `https://contosob2c.b2clogin.com`. If you use a [custom domain](custom-domain.md), enter `https://your-domain-name`.
5479
1. Enter a URL for the **Terms of service**, for example `http://www.contoso.com/tos`. The policy URL is a page you maintain to provide terms and conditions for your application.
5580
1. Enter a URL for the **Privacy policy**, for example `http://www.contoso.com/privacy`. The policy URL is a page you maintain to provide privacy information for your application.
5681
1. Select **Save**.
82+
83+
::: zone-end
5784

5885
::: zone pivot="b2c-user-flow"
5986

@@ -83,8 +110,6 @@ At this point, the Twitter identity provider has been set up, but it's not yet a
83110
1. Select the **Run user flow** button.
84111
1. From the sign-up or sign-in page, select **Twitter** to sign in with Twitter account.
85112

86-
If the sign-in process is successful, your browser is redirected to `https://jwt.ms`, which displays the contents of the token returned by Azure AD B2C.
87-
88113
::: zone-end
89114

90115
::: zone pivot="b2c-custom-policy"
@@ -186,7 +211,9 @@ You can define a Twitter account as a claims provider by adding it to the **Clai
186211
1. For **Application**, select a web application that you [previously registered](tutorial-register-applications.md). The **Reply URL** should show `https://jwt.ms`.
187212
1. Select the **Run now** button.
188213
1. From the sign-up or sign-in page, select **Twitter** to sign in with Twitter account.
214+
::: zone-end
189215

190216
If the sign-in process is successful, your browser is redirected to `https://jwt.ms`, which displays the contents of the token returned by Azure AD B2C.
191217

192-
::: zone-end
218+
> [!TIP]
219+
> If you're facing `unauthorized` error while testing this identity provider, make sure you use the correct Twitter API Key and API Key Secret, or try to apply for [elevated](https://developer.twitter.com/en/portal/products/elevated) access. Also, we recommend you've a look at [Twitter's projects structure](https://developer.twitter.com/en/docs/projects/overview), if you registered your app before the feature was available.

articles/active-directory-b2c/localization-string-ids.md

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -377,7 +377,7 @@ The following are the IDs for a [Verification display control](display-control-v
377377

378378
| ID | Default value |
379379
| --- | ------------- |
380-
|intro_msg <sup>*</sup>| Verification is necessary. Please click Send button.|
380+
|intro_msg<sup>1</sup>| Verification is necessary. Please click Send button.|
381381
|success_send_code_msg | Verification code has been sent. Please copy it to the input box below.|
382382
|failure_send_code_msg | We are having trouble verifying your email address. Please enter a valid email address and try again.|
383383
|success_verify_code_msg | E-mail address verified. You can now continue.|
@@ -386,13 +386,16 @@ The following are the IDs for a [Verification display control](display-control-v
386386
|but_verify_code | Verify code|
387387
|but_send_new_code | Send new code|
388388
|but_change_claims | Change e-mail|
389+
| UserMessageIfVerificationControlClaimsNotVerified<sup>2</sup>| The claims for verification control have not been verified. |
389390

390-
Note: The `intro_msg` element is hidden, and not shown on the self-asserted page. To make it visible, use the [HTML customization](customize-ui-with-html.md) with Cascading Style Sheets. For example:
391+
<sup>1</sup> The `intro_msg` element is hidden, and not shown on the self-asserted page. To make it visible, use the [HTML customization](customize-ui-with-html.md) with Cascading Style Sheets. For example:
391392

392393
```css
393394
.verificationInfoText div{display: block!important}
394395
```
395396

397+
<sup>2</sup> This error message is displayed to the user if they enter a verification code, but instead of completing the verification by selecting on the **Verify** button, they select the **Continue** button.
398+
396399
### Verification display control example
397400

398401
```xml
@@ -408,6 +411,7 @@ Note: The `intro_msg` element is hidden, and not shown on the self-asserted page
408411
<LocalizedString ElementType="DisplayControl" ElementId="emailVerificationControl" StringId="but_verify_code">Verify code</LocalizedString>
409412
<LocalizedString ElementType="DisplayControl" ElementId="emailVerificationControl" StringId="but_send_new_code">Send new code</LocalizedString>
410413
<LocalizedString ElementType="DisplayControl" ElementId="emailVerificationControl" StringId="but_change_claims">Change e-mail</LocalizedString>
414+
<LocalizedString ElementType="ErrorMessage" StringId="UserMessageIfVerificationControlClaimsNotVerified">The claims for verification control have not been verified.</LocalizedString>
411415
</LocalizedStrings>
412416
</LocalizedResources>
413417
```

articles/active-directory-b2c/page-layout.md

Lines changed: 14 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -28,25 +28,32 @@ Azure AD B2C page layout uses the following versions of the [jQuery library](htt
2828

2929
|Element |Page layout version range |jQuery version |Handlebars Runtime version |Handlebars Compiler version |
3030
|---------|---------|------|--------|----------|
31-
|multifactor |>= 1.2.4 | 3.5.1 | 4.7.6 |4.7.7 |
31+
|multifactor |>= 1.2.8 | 3.5.1 | 4.7.7 |4.7.7 |
32+
| |>= 1.2.4 | 3.5.1 | 4.7.6 |4.7.7 |
3233
| |< 1.2.4 | 3.4.1 |4.0.12 |2.0.1 |
3334
| |< 1.2.0 | 1.12.4 |
34-
|selfasserted |>= 2.1.4 | 3.5.1 |4.7.6 |4.7.7 |
35+
|selfasserted |>= 2.1.11 | 3.5.1 |4.7.7 |4.7.7 |
36+
| |>= 2.1.4 | 3.5.1 |4.7.6 |4.7.7 |
3537
| |< 2.1.4 | 3.4.1 |4.0.12 |2.0.1 |
3638
| |< 1.2.0 | 1.12.4 |
37-
|unifiedssp |>= 2.1.4 | 3.5.1 |4.7.6 |4.7.7 |
39+
|unifiedssp |>= 2.1.7 | 3.5.1 |4.7.7 |4.7.7 |
40+
| |>= 2.1.4 | 3.5.1 |4.7.6 |4.7.7 |
3841
| |< 2.1.4 | 3.4.1 |4.0.12 |2.0.1 |
3942
| |< 1.2.0 | 1.12.4 |
40-
|globalexception |>= 1.2.1 | 3.5.1 |4.7.6 |4.7.7 |
43+
|globalexception |>= 1.2.3 | 3.5.1 |4.7.7 |4.7.7 |
44+
| |>= 1.2.1 | 3.5.1 |4.7.6 |4.7.7 |
4145
| |< 1.2.1 | 3.4.1 |4.0.12 |2.0.1 |
4246
| |< 1.2.0 | 1.12.4 |
43-
|providerselection |>= 1.2.1 | 3.5.1 |4.7.6 |4.7.7 |
47+
|providerselection |>= 1.2.3 | 3.5.1 |4.7.7 |4.7.7 |
48+
| |>= 1.2.1 | 3.5.1 |4.7.6 |4.7.7 |
4449
| |< 1.2.1 | 3.4.1 |4.0.12 |2.0.1 |
4550
| |< 1.2.0 | 1.12.4 |
46-
|claimsconsent |>= 1.2.1 | 3.5.1 |4.7.6 |4.7.7 |
51+
|claimsconsent |>= 1.2.2 | 3.5.1 |4.7.7 |4.7.7 |
52+
| |>= 1.2.2 | 3.5.1 |4.7.7 |4.7.7 |
4753
| |< 1.2.1 | 3.4.1 |4.0.12 |2.0.1 |
4854
| |< 1.2.0 | 1.12.4 |
49-
|unifiedssd |>= 1.2.1 | 3.5.1 |4.7.6 |4.7.7 |
55+
|unifiedssd |>= 1.2.3 | 3.5.1 |4.7.7 |4.7.7 |
56+
| |>= 1.2.1 | 3.5.1 |4.7.6 |4.7.7 |
5057
| |< 1.2.1 | 3.4.1 |4.0.12 |2.0.1 |
5158
| |< 1.2.0 | 1.12.4 |
5259

articles/active-directory/develop/howto-create-self-signed-certificate.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,15 +2,15 @@
22
title: Create a self-signed public certificate to authenticate your application
33
description: Create a self-signed public certificate to authenticate your application.
44
services: active-directory
5-
author: FaithOmbongi
5+
author: henrymbuguakiarie
66
manager: CelesteDG
77

88
ms.service: active-directory
99
ms.subservice: develop
1010
ms.topic: conceptual
1111
ms.workload: identity
1212
ms.date: 08/10/2021
13-
ms.author: ombongifaith
13+
ms.author: henrymbugua
1414
ms.reviewer: jmprieur, saeeda, sureshja, ludwignick
1515
ms.custom: scenarios:getting-started
1616
#Customer intent: As an application developer, I want to understand the basic concepts of authentication and authorization in the Microsoft identity platform.

articles/active-directory/develop/tutorial-v2-angular-auth-code.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -136,6 +136,7 @@ Register your **Redirect URI** value as **http://localhost:4200/** and type as '
136136
```javascript
137137
import { NgModule } from '@angular/core';
138138
import { Routes, RouterModule } from '@angular/router';
139+
import { BrowserUtils } from '@azure/msal-browser';
139140
import { HomeComponent } from './home/home.component';
140141
import { ProfileComponent } from './profile/profile.component';
141142
@@ -154,7 +155,8 @@ Register your **Redirect URI** value as **http://localhost:4200/** and type as '
154155
155156
@NgModule({
156157
imports: [RouterModule.forRoot(routes, {
157-
initialNavigation: !isIframe ? 'enabled' : 'disabled' // Don't perform initial navigation in iframes
158+
// Don't perform initial navigation in iframes or popups
159+
initialNavigation: !BrowserUtils.isInIframe() && !BrowserUtils.isInPopup() ? 'enabledNonBlocking' : 'disabled' // Set to enabledBlocking to use Angular Universal
158160
})],
159161
exports: [RouterModule]
160162
})

articles/active-directory/manage-apps/myapps-overview.md

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -8,15 +8,16 @@ ms.service: active-directory
88
ms.subservice: app-mgmt
99
ms.topic: conceptual
1010
ms.workload: identity
11-
ms.date: 05/05/2022
11+
ms.date: 08/11/2022
1212
ms.author: saibandaru
13+
ms.custom: contperf-fy23q1
1314
#Customer intent: As an Azure AD administrator, I want to make applications available to users in the My Apps portal.
1415

1516
---
1617

1718
# My Apps portal overview
1819

19-
[My Apps](https://myapps.microsoft.com) is a web-based portal that is used for managing and launching applications in Azure Active Directory (Azure AD). To work with applications in My Apps, use an organizational account in Azure AD and obtain access granted by the Azure AD administrator. My Apps is separate from the Azure portal and doesn't require users to have an Azure subscription or Microsoft 365 subscription.
20+
My Apps is a web-based portal that is used for managing and launching applications in Azure Active Directory (Azure AD). To work with applications in My Apps, use an organizational account in Azure AD and obtain access granted by the Azure AD administrator. My Apps is separate from the Azure portal and doesn't require users to have an Azure subscription or Microsoft 365 subscription.
2021

2122
Users access the My Apps portal to:
2223

@@ -54,7 +55,7 @@ For more information, see [Properties of an enterprise application](application-
5455

5556
### Discover applications
5657

57-
When signed in to the My Apps portal, the applications that have been made visible are shown. For an application to be visible in the My Apps portal, set the appropriate properties in the Azure portal. Also in the Azure portal, assign a user or group with the appropriate members.
58+
When signed in to the [My Apps](https://myapps.microsoft.com) portal, the applications that have been made visible are shown. For an application to be visible in the My Apps portal, set the appropriate properties in the [Azure portal](https://portal.azure.com). Also in the Azure portal, assign a user or group with the appropriate members.
5859

5960
In the My Apps portal, to search for an application, enter an application name in the search box at the top of the page to find an application. The applications that are listed can be formatted in **List view** or a **Grid view**.
6061

articles/active-directory/roles/permissions-reference.md

Lines changed: 15 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -77,6 +77,7 @@ This article lists the Azure AD built-in roles you can assign to allow managemen
7777
> | [Knowledge Administrator](#knowledge-administrator) | Can configure knowledge, learning, and other intelligent features. | b5a8dcf3-09d5-43a9-a639-8e29ef291470 |
7878
> | [Knowledge Manager](#knowledge-manager) | Can organize, create, manage, and promote topics and knowledge. | 744ec460-397e-42ad-a462-8b3f9747a02c |
7979
> | [License Administrator](#license-administrator) | Can manage product licenses on users and groups. | 4d6ac14f-3453-41d0-bef9-a3e0c569773a |
80+
> | [Lifecycle Workflows Administrator](#lifecycle-workflows-administrator) | Create and manage all aspects of workflows and tasks associated with Lifecycle Workflows in Azure AD. | 59d46f88-662b-457b-bceb-5c3809e5908f |
8081
> | [Message Center Privacy Reader](#message-center-privacy-reader) | Can read security messages and updates in Office 365 Message Center only. | ac16e43d-7b2d-40e0-ac05-243ff356ab5b |
8182
> | [Message Center Reader](#message-center-reader) | Can read messages and updates for their organization in Office 365 Message Center only. | 790c1fb9-7f7d-4f88-86a1-ef1f95c05c1b |
8283
> | [Modern Commerce User](#modern-commerce-user) | Can manage commercial purchases for a company, department or team. | d24aef57-1500-4070-84db-2666f29cf966 |
@@ -1479,6 +1480,20 @@ Users in this role can add, remove, and update license assignments on users, gro
14791480
> | microsoft.office365.serviceHealth/allEntities/allTasks | Read and configure Service Health in the Microsoft 365 admin center |
14801481
> | microsoft.office365.webPortal/allEntities/standard/read | Read basic properties on all resources in the Microsoft 365 admin center |
14811482
1483+
## Lifecycle Workflows Administrator
1484+
1485+
Assign the Lifecycle Workflows Administrator role to users who need to do the following tasks:
1486+
1487+
- Create and manage all aspects of workflows and tasks associated with Lifecycle Workflows in Azure AD
1488+
- Check the execution of scheduled workflows
1489+
- Launch on-demand workflow runs
1490+
- Inspect workflow execution logs
1491+
1492+
> [!div class="mx-tableFixed"]
1493+
> | Actions | Description |
1494+
> | --- | --- |
1495+
> | microsoft.directory/lifecycleManagement/workflows/allProperties/allTasks | Manage all aspects of lifecycle management workflows and tasks in Azure AD |
1496+
14821497
## Message Center Privacy Reader
14831498

14841499
Users in this role can monitor all notifications in the Message Center, including data privacy messages. Message Center Privacy Readers get email notifications including those related to data privacy and they can unsubscribe using Message Center Preferences. Only the Global Administrator and the Message Center Privacy Reader can read data privacy messages. Additionally, this role contains the ability to view groups, domains, and subscriptions. This role has no permission to view, create, or manage service requests.

articles/active-directory/verifiable-credentials/TOC.yml

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -10,11 +10,11 @@
1010
- name: Tutorials
1111
expanded: true
1212
items:
13-
- name: Set up the Verifiable Credentials service
13+
- name: Set up the Verified ID service
1414
href: verifiable-credentials-configure-tenant.md
1515
- name: Issue a verifiable credential
1616
href: verifiable-credentials-configure-issuer.md
17-
- name: Verify a Verifiable Credential
17+
- name: Verify a verifiable credential
1818
href: verifiable-credentials-configure-verifier.md
1919
- name: Concepts
2020
expanded: true
@@ -52,9 +52,9 @@
5252
href: how-to-dnsbind.md
5353
- name: Register your website ID
5454
href: how-to-register-didwebsite.md
55-
- name: Revoke a Verifiable Credential
55+
- name: Revoke a verifiable credential
5656
href: how-to-issuer-revoke.md
57-
- name: Opt out of verifiable credentials
57+
- name: Opt out of Verified ID service
5858
href: how-to-opt-out.md
5959
- name: Samples
6060
expanded: true

0 commit comments

Comments
 (0)