You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory-b2c/active-directory-b2c-custom-rest-api-netfw-secure-basic.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -298,7 +298,7 @@ After your RESTful service is protected by the client ID (username) and secret,
298
298
299
299
## Step 5: Upload the policy to your tenant
300
300
301
-
1. In the [Azure portal](https://portal.azure.com), switch to the [context of your Azure AD B2C tenant](active-directory-b2c-navigate-to-b2c-context.md), and then open **Azure AD B2C**.
301
+
1. In the [Azure portal](https://portal.azure.com), switch to the [context of your Azure AD B2C tenant](tutorial-create-tenant.md), and then open **Azure AD B2C**.
Copy file name to clipboardExpand all lines: articles/active-directory-b2c/active-directory-b2c-custom-rest-api-netfw-secure-cert.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -96,7 +96,7 @@ To support client certificate authentication in your custom policy, change the t
96
96
97
97
## Step 4: Upload the policy to your tenant
98
98
99
-
1. In the [Azure portal](https://portal.azure.com), switch to the [context of your Azure AD B2C tenant](active-directory-b2c-navigate-to-b2c-context.md), and then select **Azure AD B2C**.
99
+
1. In the [Azure portal](https://portal.azure.com), switch to the [context of your Azure AD B2C tenant](tutorial-create-tenant.md), and then select **Azure AD B2C**.
Copy file name to clipboardExpand all lines: articles/active-directory-b2c/active-directory-b2c-custom-rest-api-netfw.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -333,7 +333,7 @@ After you add the new claim, the relying party code looks like this:
333
333
334
334
## Step 7: Upload the policy to your tenant
335
335
336
-
1. Inthe [Azureportal](https://portal.azure.com), switch to the [context of your Azure AD B2C tenant](active-directory-b2c-navigate-to-b2c-context.md), and then open **Azure AD B2C**.
336
+
1. Inthe [Azureportal](https://portal.azure.com), switch to the [context of your Azure AD B2C tenant](tutorial-create-tenant.md), and then open **Azure AD B2C**.
Copy file name to clipboardExpand all lines: articles/active-directory-b2c/active-directory-b2c-how-to-enable-billing.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -130,7 +130,7 @@ The management of Azure AD B2C using role-based access control is not affected b
130
130
131
131
Azure AD B2C tenants can be moved to another subscription if the source and destination subscriptions exist within the same Azure Active Directory tenant.
132
132
133
-
To learn how to move Azure resources like your Azure AD B2C tenant to another subscription, see [Move resources to new resource group or subscription](../azure-resource-manager/resource-group-move-resources.md).
133
+
To learn how to move Azure resources like your Azure AD B2C tenant to another subscription, see [Move resources to new resource group or subscription](../azure-resource-manager/management/move-resource-group-and-subscription.md).
134
134
135
135
Before you initiate the move, be sure to read the entire article to fully understand the limitations and requirements for such a move. In addition to instructions for moving resources, it includes critical information like a pre-move checklist and how to validate the move operation.
1. Inthe [Azureportal](https://portal.azure.com), switch to the [context of your Azure AD B2C tenant](active-directory-b2c-navigate-to-b2c-context.md), and then select **Azure AD B2C**.
216
+
1. Inthe [Azureportal](https://portal.azure.com), switch to the [context of your Azure AD B2C tenant](tutorial-create-tenant.md), and then select **Azure AD B2C**.
| x-ms-cpim-admin | main.b2cadmin.ext.azure.com | End of [browser session](active-directory-b2c-token-session-sso.md)| Holds user membership data across tenants. The tenants a user is a member of and level of membership (Admin or User). |
23
-
| x-ms-cpim-slice | login.microsoftonline.com, b2clogin.com, branded domain | End of [browser session](active-directory-b2c-token-session-sso.md)| Used to route requests to the appropriate production instance. |
24
-
| x-ms-cpim-trans | login.microsoftonline.com, b2clogin.com, branded domain | End of [browser session](active-directory-b2c-token-session-sso.md)| Used for tracking the transactions (number of authentication requests to Azure AD B2C) and the current transaction. |
25
-
| x-ms-cpim-sso:{Id} | login.microsoftonline.com, b2clogin.com, branded domain | End of [browser session](active-directory-b2c-token-session-sso.md)| Used for maintaining the SSO session. |
26
-
| x-ms-cpim-cache:{id}_n | login.microsoftonline.com, b2clogin.com, branded domain | End of [browser session](active-directory-b2c-token-session-sso.md), successful authentication | Used for maintaining the request state. |
27
-
| x-ms-cpim-csrf | login.microsoftonline.com, b2clogin.com, branded domain | End of [browser session](active-directory-b2c-token-session-sso.md)| Cross-Site Request Forgery token used for CRSF protection. |
28
-
| x-ms-cpim-dc | login.microsoftonline.com, b2clogin.com, branded domain | End of [browser session](active-directory-b2c-token-session-sso.md)| Used for Azure AD B2C network routing. |
29
-
| x-ms-cpim-ctx | login.microsoftonline.com, b2clogin.com, branded domain | End of [browser session](active-directory-b2c-token-session-sso.md)| Context |
30
-
| x-ms-cpim-rp | login.microsoftonline.com, b2clogin.com, branded domain | End of [browser session](active-directory-b2c-token-session-sso.md)| Used for storing membership data for the resource provider tenant. |
31
-
| x-ms-cpim-rc | login.microsoftonline.com, b2clogin.com, branded domain | End of [browser session](active-directory-b2c-token-session-sso.md)| Used for storing the relay cookie. |
22
+
| x-ms-cpim-admin | main.b2cadmin.ext.azure.com | End of [browser session](session-behavior.md)| Holds user membership data across tenants. The tenants a user is a member of and level of membership (Admin or User). |
23
+
| x-ms-cpim-slice | login.microsoftonline.com, b2clogin.com, branded domain | End of [browser session](session-behavior.md)| Used to route requests to the appropriate production instance. |
24
+
| x-ms-cpim-trans | login.microsoftonline.com, b2clogin.com, branded domain | End of [browser session](session-behavior.md)| Used for tracking the transactions (number of authentication requests to Azure AD B2C) and the current transaction. |
25
+
| x-ms-cpim-sso:{Id} | login.microsoftonline.com, b2clogin.com, branded domain | End of [browser session](session-behavior.md)| Used for maintaining the SSO session. |
26
+
| x-ms-cpim-cache:{id}_n | login.microsoftonline.com, b2clogin.com, branded domain | End of [browser session](session-behavior.md), successful authentication | Used for maintaining the request state. |
27
+
| x-ms-cpim-csrf | login.microsoftonline.com, b2clogin.com, branded domain | End of [browser session](session-behavior.md)| Cross-Site Request Forgery token used for CRSF protection. |
28
+
| x-ms-cpim-dc | login.microsoftonline.com, b2clogin.com, branded domain | End of [browser session](session-behavior.md)| Used for Azure AD B2C network routing. |
29
+
| x-ms-cpim-ctx | login.microsoftonline.com, b2clogin.com, branded domain | End of [browser session](session-behavior.md)| Context |
30
+
| x-ms-cpim-rp | login.microsoftonline.com, b2clogin.com, branded domain | End of [browser session](session-behavior.md)| Used for storing membership data for the resource provider tenant. |
31
+
| x-ms-cpim-rc | login.microsoftonline.com, b2clogin.com, branded domain | End of [browser session](session-behavior.md)| Used for storing the relay cookie. |
Copy file name to clipboardExpand all lines: articles/active-directory-b2c/relyingparty.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -204,7 +204,7 @@ The **OutputClaim** element contains the following attributes:
204
204
### SubjectNamingInfo
205
205
206
206
With the **SubjectNameingInfo** element, you control the value of the token subject:
207
-
-**JWT token** - the `sub` claim. This is a principal about which the token asserts information, such as the user of an application. This value is immutable and cannot be reassigned or reused. It can be used to perform safe authorization checks, such as when the token is used to access a resource. By default, the subject claim is populated with the object ID of the user in the directory. For more information, see [Token, session and single sign-on configuration](active-directory-b2c-token-session-sso.md).
207
+
-**JWT token** - the `sub` claim. This is a principal about which the token asserts information, such as the user of an application. This value is immutable and cannot be reassigned or reused. It can be used to perform safe authorization checks, such as when the token is used to access a resource. By default, the subject claim is populated with the object ID of the user in the directory. For more information, see [Token, session and single sign-on configuration](session-behavior.md).
208
208
-**SAML token** - the `<Subject><NameID>` element which identifies the subject element.
209
209
210
210
The **SubjectNamingInfo** element contains the following attribute:
Managed identities for Azure resources provides Azure services with an automatically managed identity in Azure Active Directory. You can use this identity to authenticate to any service that supports Azure AD authentication, without having credentials in your code.
25
+
Managed identities for Azure resources provides Azure services with an automatically managed identity in Azure Active Directory. You can use this identity to authenticate to any service that supports Azure AD authentication, without having credentials in your code.
26
26
27
27
In this article, using the Azure Resource Manager deployment template, you learn how to perform the following managed identities for Azure resources operations on an Azure VM:
28
28
@@ -40,7 +40,7 @@ As with the Azure portal and scripting, [Azure Resource Manager](../../azure-res
40
40
- Using a local [JSON editor (such as VS Code)](../../azure-resource-manager/resource-manager-create-first-template.md), and then uploading and deploying by using PowerShell or CLI.
41
41
- Using the Visual Studio [Azure Resource Group project](../../azure-resource-manager/templates/create-visual-studio-deployment-project.md) to both create and deploy a template.
42
42
43
-
Regardless of the option you choose, template syntax is the same during initial deployment and redeployment. Enabling a system or user-assigned managed identity on a new or existing VM is done in the same manner. Also, by default, Azure Resource Manager does an [incremental update](../../azure-resource-manager/deployment-modes.md) to deployments.
43
+
Regardless of the option you choose, template syntax is the same during initial deployment and redeployment. Enabling a system or user-assigned managed identity on a new or existing VM is done in the same manner. Also, by default, Azure Resource Manager does an [incremental update](../../azure-resource-manager/templates/deployment-modes) to deployments.
44
44
45
45
## System-assigned managed identity
46
46
@@ -55,7 +55,7 @@ To enable system-assigned managed identity on a VM, your account needs the [Virt
55
55
2. To enable system-assigned managed identity, load the template into an editor, locate the `Microsoft.Compute/virtualMachines` resource of interest within the `resources` section and add the `"identity"` property at the same level as the `"type": "Microsoft.Compute/virtualMachines"` property. Use the following syntax:
56
56
57
57
```JSON
58
-
"identity": {
58
+
"identity": {
59
59
"type": "SystemAssigned"
60
60
},
61
61
```
@@ -76,7 +76,7 @@ To enable system-assigned managed identity on a VM, your account needs the [Virt
76
76
"type": "SystemAssigned",
77
77
},
78
78
},
79
-
79
+
80
80
//The following appears only if you provisioned the optional VM extension (to be deprecated)
@@ -106,9 +106,9 @@ After you have enabled system-assigned managed identity on your VM, you may want
106
106
To assign a role to your VM's system-assigned identity, your account needs the [User Access Administrator](/azure/role-based-access-control/built-in-roles#user-access-administrator) role assignment.
107
107
108
108
1. Whether you sign in to Azure locally or via the Azure portal, use an account that is associated with the Azure subscription that contains the VM.
109
-
109
+
110
110
2. Load the template into an [editor](#azure-resource-manager-templates) and add the following information to give your VM **Reader** access to the resource group in which it was created. Your template structure may vary depending on the editor and the deployment model you choose.
111
-
111
+
112
112
Under the `parameters` section add the following:
113
113
114
114
```JSON
@@ -152,15 +152,15 @@ To remove system-assigned managed identity from a VM, your account needs the [Vi
152
152
1. Whether you sign in to Azure locally or via the Azure portal, use an account that is associated with the Azure subscription that contains the VM.
153
153
154
154
2. Load the template into an [editor](#azure-resource-manager-templates) and locate the `Microsoft.Compute/virtualMachines` resource of interest within the `resources` section. If you have a VM that only has system-assigned managed identity, you can disable it by changing the identity type to `None`.
155
-
155
+
156
156
**Microsoft.Compute/virtualMachines API version 2018-06-01**
157
157
158
158
If your VM has both system and user-assigned managed identities, remove `SystemAssigned` from the identity type and keep `UserAssigned` along with the `userAssignedIdentities` dictionary values.
159
159
160
160
**Microsoft.Compute/virtualMachines API version 2018-06-01**
161
-
161
+
162
162
If your `apiVersion` is `2017-12-01` and your VM has both system and user-assigned managed identities, remove `SystemAssigned` from the identity type and keep `UserAssigned` along with the `identityIds` array of the user-assigned managed identities.
163
-
163
+
164
164
The following example shows you how remove a system-assigned managed identity from a VM with no user-assigned managed identities:
165
165
166
166
```JSON
@@ -169,7 +169,7 @@ The following example shows you how remove a system-assigned managed identity fr
169
169
"type": "Microsoft.Compute/virtualMachines",
170
170
"name": "[parameters('vmName')]",
171
171
"location": "[resourceGroup().location]",
172
-
"identity": {
172
+
"identity": {
173
173
"type": "None"
174
174
}
175
175
}
@@ -206,11 +206,11 @@ To assign a user-assigned identity to a VM, your account needs the [Virtual Mach
206
206
}
207
207
}
208
208
```
209
-
209
+
210
210
**Microsoft.Compute/virtualMachines API version 2017-12-01**
211
-
211
+
212
212
If your `apiVersion` is `2017-12-01`, your user-assigned managed identities are stored in the `identityIds` array and the `<USERASSIGNEDIDENTITYNAME>` value must be stored in a variable defined in the `variables` section of your template.
213
-
213
+
214
214
```JSON
215
215
{
216
216
"apiVersion": "2017-12-01",
@@ -225,9 +225,9 @@ To assign a user-assigned identity to a VM, your account needs the [Virtual Mach
225
225
}
226
226
}
227
227
```
228
-
228
+
229
229
3. When you're done, the following sections should added to the `resource` section of your template and it should resemble the following:
230
-
230
+
231
231
**Microsoft.Compute/virtualMachines API version 2018-06-01**
232
232
233
233
```JSON
@@ -267,7 +267,7 @@ To assign a user-assigned identity to a VM, your account needs the [Virtual Mach
267
267
]
268
268
```
269
269
**Microsoft.Compute/virtualMachines API version 2017-12-01**
270
-
270
+
271
271
```JSON
272
272
"resources": [
273
273
{
@@ -283,7 +283,7 @@ To assign a user-assigned identity to a VM, your account needs the [Virtual Mach
283
283
]
284
284
}
285
285
},
286
-
286
+
287
287
//The following appears only if you provisioned the optional VM extension (to be deprecated)
@@ -313,33 +313,33 @@ To remove a user-assigned identity from a VM, your account needs the [Virtual Ma
313
313
1. Whether you sign in to Azure locally or via the Azure portal, use an account that is associated with the Azure subscription that contains the VM.
314
314
315
315
2. Load the template into an [editor](#azure-resource-manager-templates) and locate the `Microsoft.Compute/virtualMachines` resource of interest within the `resources` section. If you have a VM that only has user-assigned managed identity, you can disable it by changing the identity type to `None`.
316
-
316
+
317
317
The following example shows you how remove all user-assigned managed identities from a VM with no system-assigned managed identities:
318
-
318
+
319
319
```json
320
320
{
321
321
"apiVersion": "2018-06-01",
322
322
"type": "Microsoft.Compute/virtualMachines",
323
323
"name": "[parameters('vmName')]",
324
324
"location": "[resourceGroup().location]",
325
-
"identity": {
325
+
"identity": {
326
326
"type": "None"
327
327
},
328
328
}
329
329
```
330
-
330
+
331
331
**Microsoft.Compute/virtualMachines API version 2018-06-01**
332
-
332
+
333
333
To remove a single user-assigned managed identity from a VM, remove it from the `useraAssignedIdentities` dictionary.
334
334
335
335
If you have a system-assigned managed identity, keep it in the in the `type` value under the `identity` value.
336
-
336
+
337
337
**Microsoft.Compute/virtualMachines API version 2017-12-01**
338
338
339
339
To remove a single user-assigned managed identity from a VM, remove it from the `identityIds` array.
340
340
341
341
If you have a system-assigned managed identity, keep it in the in the `type` value under the `identity` value.
342
-
342
+
343
343
## Next steps
344
344
345
345
-[Managed identities for Azure resources overview](overview.md).
0 commit comments