Skip to content

Commit 2eb222e

Browse files
committed
2 parents 4615d09 + c893a75 commit 2eb222e

File tree

4,695 files changed

+76348
-36805
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

4,695 files changed

+76348
-36805
lines changed

.openpublishing.publish.config.json

Lines changed: 15 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -297,6 +297,16 @@
297297
"branch": "master",
298298
"branch_mapping": {}
299299
},
300+
{
301+
"path_to_root": "cosmos-dotnet-v4-getting-started",
302+
"url": "https://github.com/Azure-Samples/cosmos-dotnet-v4-getting-started",
303+
"branch": "master"
304+
},
305+
{
306+
"path_to_root": "cosmos-dotnet-bulk-import",
307+
"url": "https://github.com/Azure-Samples/cosmos-dotnet-bulk-import-throughput-optimizer",
308+
"branch": "master"
309+
},
300310
{
301311
"path_to_root": "samples-cosmosdb-dotnet-web-app",
302312
"url": "https://github.com/Azure-Samples/cosmos-dotnet-todo-app",
@@ -377,6 +387,11 @@
377387
"url": "https://github.com/microsoft/immersive-reader-sdk",
378388
"branch": "master",
379389
"branch_mapping": {}
390+
},
391+
{
392+
"path_to_root": "azure-cosmosdb-java-v2",
393+
"url": "https://github.com/Azure/azure-cosmosdb-java",
394+
"branch": "master"
380395
}
381396
],
382397
"branch_target_mapping": {

.openpublishing.redirection.json

Lines changed: 805 additions & 70 deletions
Large diffs are not rendered by default.

articles/active-directory-b2c/active-directory-b2c-devquickstarts-android.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -34,7 +34,9 @@ Next, register an application in your Azure AD B2C tenant. This gives Azure AD t
3434

3535
[!INCLUDE [active-directory-b2c-appreg-native](../../includes/active-directory-b2c-appreg-native.md)]
3636

37-
Record the **APPLICATION ID** for use in a later step. Next, select the application in the list and record the **Custom Redirect URI**, also for use in a later step. For example, `com.onmicrosoft.contosob2c.exampleapp://oauth/redirect`.
37+
Record the **Application (client) ID** for use in a later step.
38+
39+
Also record your custom redirect URI for use in a later step. For example, `com.onmicrosoft.contosob2c.exampleapp://oauth/redirect`.
3840

3941
## Create your user flows
4042

articles/active-directory-b2c/active-directory-b2c-devquickstarts-ios.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -33,7 +33,9 @@ Next, register an application in your Azure AD B2C tenant. This gives Azure AD t
3333

3434
[!INCLUDE [active-directory-b2c-appreg-native](../../includes/active-directory-b2c-appreg-native.md)]
3535

36-
Record the **APPLICATION ID** for use in a later step. Next, select the application in the list and record the **Custom Redirect URI**, also for use in a later step. For example, `com.onmicrosoft.contosob2c.exampleapp://oauth/redirect`.
36+
Record the **Application (client) ID** for use in a later step.
37+
38+
Also record your custom redirect URI for use in a later step. For example, `com.onmicrosoft.contosob2c.exampleapp://oauth/redirect`.
3739

3840
## Create your user flows
3941
In Azure AD B2C, every user experience is defined by a [user flow](active-directory-b2c-reference-policies.md). This application contains one identity experience: a combined sign-in and sign-up. When you create the user flow, be sure to:

articles/active-directory-b2c/active-directory-b2c-faqs.md

Lines changed: 32 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ manager: celestedg
88
ms.service: active-directory
99
ms.workload: identity
1010
ms.topic: conceptual
11-
ms.date: 08/31/2019
11+
ms.date: 10/14/2019
1212
ms.author: marsma
1313
ms.subservice: B2C
1414
---
@@ -126,15 +126,20 @@ Not currently. This feature is on our roadmap. Verifying your domain in the **Do
126126

127127
### How do I delete my Azure AD B2C tenant?
128128

129-
Follow these steps to delete your Azure AD B2C tenant:
129+
Follow these steps to delete your Azure AD B2C tenant.
130130

131+
You can use the current **Applications** experience or our new unified **App registrations (Preview)** experience. [Learn more about the preview experience](http://aka.ms/b2cappregintro).
132+
133+
#### [Applications](#tab/applications/)
134+
135+
1. Sign in to the [Azure portal](https://portal.azure.com/) as the *Subscription Administrator*. Use the same work or school account or the same Microsoft account that you used to sign up for Azure.
136+
1. Select the **Directory + subscription** filter in the top menu, and then select the directory that contains your Azure AD B2C tenant.
137+
1. In the left menu, select **Azure AD B2C**. Or, select **All services** and search for and select **Azure AD B2C**.
131138
1. Delete all the **User flows (policies)** in your Azure AD B2C tenant.
132139
1. Delete all the **Applications** you registered in your Azure AD B2C tenant.
133-
1. Next, sign in to the [Azure portal](https://portal.azure.com/) as the Subscription Administrator. Use the same work or school account or the same Microsoft account that you used to sign up for Azure.
134-
1. Switch to the Azure AD B2C tenant you want to delete.
135140
1. Select **Azure Active Directory** on the left-hand menu.
136141
1. Under **Manage**, select **Users**.
137-
1. Select each user in turn (exclude the Subscription Administrator user you are currently signed in as). Select **Delete** at the bottom of the page and select **YES** when prompted.
142+
1. Select each user in turn (exclude the *Subscription Administrator* user you are currently signed in as). Select **Delete** at the bottom of the page and select **YES** when prompted.
138143
1. Under **Manage**, select **App registrations** (or **App registrations (Legacy)**).
139144
1. Select **View all applications**
140145
1. Select the application named **b2c-extensions-app**, select **Delete**, and then select **Yes** when prompted.
@@ -146,6 +151,28 @@ Follow these steps to delete your Azure AD B2C tenant:
146151
1. Select **Azure Active Directory** on the left-hand menu.
147152
1. On the **Overview** page, select **Delete directory**. Follow the on-screen instructions to complete the process.
148153

154+
#### [App registrations (Preview)](#tab/app-reg-preview/)
155+
156+
1. Sign in to the [Azure portal](https://portal.azure.com/) as the *Subscription Administrator*. Use the same work or school account or the same Microsoft account that you used to sign up for Azure.
157+
1. Select the **Directory + subscription** filter in the top menu, and then select the directory that contains your Azure AD B2C tenant.
158+
1. In the left menu, select **Azure AD B2C**. Or, select **All services** and search for and select **Azure AD B2C**.
159+
1. Delete all **User flows (policies)** in your Azure AD B2C tenant.
160+
1. Select **App registrations (Preview)**, then select the **All applications** tab.
161+
1. Delete all applications that you registered.
162+
1. Delete the **b2c-extensions-app**.
163+
1. Under **Manage**, select **Users**.
164+
1. Select each user in turn (exclude the *Subscription Administrator* user you are currently signed in as). Select **Delete** at the bottom of the page and select **Yes** when prompted.
165+
1. Select **Azure Active Directory** on the left-hand menu.
166+
1. Under **Manage**, select **User settings**.
167+
1. If present, under **LinkedIn account connections**, select **No**, then select **Save**.
168+
1. Under **Manage**, select **Properties**
169+
1. Under **Access management for Azure resources**, select **Yes**, and then select **Save**.
170+
1. Sign out of the Azure portal and then sign back in to refresh your access.
171+
1. Select **Azure Active Directory** on the left-hand menu.
172+
1. On the **Overview** page, select **Delete directory**. Follow the on-screen instructions to complete the process.
173+
174+
* * *
175+
149176
### Can I get Azure AD B2C as part of Enterprise Mobility Suite?
150177

151178
No, Azure AD B2C is a pay-as-you-go Azure service and is not part of Enterprise Mobility Suite.

articles/active-directory-b2c/active-directory-b2c-get-started-custom.md

Lines changed: 64 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ manager: celestedg
88
ms.service: active-directory
99
ms.workload: identity
1010
ms.topic: conceptual
11-
ms.date: 09/26/2019
11+
ms.date: 10/18/2019
1212
ms.author: marsma
1313
ms.subservice: B2C
1414
---
@@ -63,10 +63,16 @@ Add your Facebook application's [App Secret](active-directory-b2c-setup-fb-app.m
6363

6464
## Register Identity Experience Framework applications
6565

66-
Azure AD B2C requires you to register two applications that are used to sign up and sign in users: IdentityExperienceFramework (a web app), and ProxyIdentityExperienceFramework (a native app) with delegated permission from the IdentityExperienceFramework app. Local accounts exist only in your tenant. Your users sign up with a unique email address/password combination to access your tenant-registered applications.
66+
Azure AD B2C requires you to register two applications that it uses to sign up and sign in users with local accounts: *IdentityExperienceFramework*, a web API, and *ProxyIdentityExperienceFramework*, a native app with delegated permission to the IdentityExperienceFramework app. Your users can sign up with an email address or username and a password to access your tenant-registered applications, which creates a "local account." Local accounts exist only in your Azure AD B2C tenant.
67+
68+
You need to register these two applications in your Azure AD B2C tenant only once.
6769

6870
### Register the IdentityExperienceFramework application
6971

72+
To register an application in your Azure AD B2C tenant, you can use the current **Applications** experience, or our new unified **App registrations (Preview)** experience. [Learn more about the preview experience](https://aka.ms/b2cappregintro).
73+
74+
#### [Applications](#tab/applications/)
75+
7076
1. Select **All services** in the top-left corner of the Azure portal.
7177
1. In the search box, enter `Azure Active Directory`.
7278
1. Select **Azure Active Directory** in the search results.
@@ -77,8 +83,32 @@ Azure AD B2C requires you to register two applications that are used to sign up
7783
1. For **Sign-on URL**, enter `https://your-tenant-name.b2clogin.com/your-tenant-name.onmicrosoft.com`, where `your-tenant-name` is your Azure AD B2C tenant domain name. All URLs should now be using [b2clogin.com](b2clogin.md).
7884
1. Select **Create**. After it's created, copy the application ID and save it to use later.
7985

86+
#### [App registrations (Preview)](#tab/app-reg-preview/)
87+
88+
1. Select **App registrations (Preview)**, and then select **New registration**.
89+
1. For **Name**, enter `IdentityExperienceFramework`.
90+
1. Under **Supported account types**, select **Accounts in this organizational directory only**.
91+
1. Under **Redirect URI**, select **Web**, and then enter `https://your-tenant-name.b2clogin.com/your-tenant-name.onmicrosoft.com`, where `your-tenant-name` is your Azure AD B2C tenant domain name.
92+
1. Under **Permissions**, select the *Grant admin consent to openid and offline_access permissions* check box.
93+
1. Select **Register**.
94+
1. Record the **Application (client) ID** for use in a later step.
95+
96+
Next, expose the API by adding a scope:
97+
98+
1. Under **Manage**, select **Expose an API**.
99+
1. Select **Add a scope**, then select **Save and continue** to accept the default application ID URI.
100+
1. Enter the following values to create a scope that allows custom policy execution in your Azure AD B2C tenant:
101+
* **Scope name**: `user_impersonation`
102+
* **Admin consent display name**: `Access IdentityExperienceFramework`
103+
* **Admin consent description**: `Allow the application to access IdentityExperienceFramework on behalf of the signed-in user.`
104+
1. Select **Add scope**
105+
106+
* * *
107+
80108
### Register the ProxyIdentityExperienceFramework application
81109

110+
#### [Applications](#tab/applications/)
111+
82112
1. In **App registrations (Legacy)**, select **New application registration**.
83113
1. For **Name**, enter `ProxyIdentityExperienceFramework`.
84114
1. For **Application type**, choose **Native**.
@@ -89,6 +119,38 @@ Azure AD B2C requires you to register two applications that are used to sign up
89119
1. Select the check box next to **Access IdentityExperienceFramework**, click **Select**, and then click **Done**.
90120
1. Select **Grant permissions**, and then confirm by selecting **Yes**.
91121

122+
#### [App registrations (Preview)](#tab/app-reg-preview/)
123+
124+
1. Select **App registrations (Preview)**, and then select **New registration**.
125+
1. For **Name**, enter `ProxyIdentityExperienceFramework`.
126+
1. Under **Supported account types**, select **Accounts in this organizational directory only**.
127+
1. Under **Redirect URI**, use the drop-down to select **Public client/native (mobile & desktop)**.
128+
1. For **Redirect URI**, enter `https://your-tenant-name.b2clogin.com/your-tenant-name.onmicrosoft.com`, where `your-tenant-name` is your Azure AD B2C tenant.
129+
1. Under **Permissions**, select the *Grant admin consent to openid and offline_access permissions* check box.
130+
1. Select **Register**.
131+
1. Record the **Application (client) ID** for use in a later step.
132+
133+
Next, specify that the application should be treated as a public client:
134+
135+
1. Under **Manage**, select **Authentication**.
136+
1. Select **Try out the new experience** (if shown).
137+
1. Under **Advanced settings**, enable **Treat application as a public client** (select **Yes**).
138+
1. Select **Save**.
139+
140+
Now, grant permissions to the API scope you exposed earlier in the *IdentityExperienceFramework* registration:
141+
142+
1. Under **Manage**, select **API permissions**.
143+
1. Under **Configured permissions**, select **Add a permission**.
144+
1. Select the **My APIs** tab, then select the **IdentityExperienceFramework** application.
145+
1. Under **Permission**, select the **user_impersonation** scope that you defined earlier.
146+
1. Select **Add permissions**. As directed, wait a few minutes before proceeding to the next step.
147+
1. Select **Grant admin consent for (your tenant name)**.
148+
1. Select your currently signed-in administrator account, or sign in with an account in your Azure AD B2C tenant that's been assigned at least the *Cloud application administrator* role.
149+
1. Select **Accept**.
150+
1. Select **Refresh**, and then verify that "Granted for ..." appears under **STATUS** for both scopes. It might take a few minutes for the permissions to propagate.
151+
152+
* * *
153+
92154
## Custom policy starter pack
93155

94156
Custom policies are a set of XML files you upload to your Azure AD B2C tenant to define technical profiles and user journeys. We provide starter packs with several pre-built policies to get you going quickly. Each of these starter packs contains the smallest number of technical profiles and user journeys needed to achieve the scenarios described:

0 commit comments

Comments
 (0)