Skip to content

Commit 3470ce2

Browse files
committed
2 parents f9a665c + a2989d8 commit 3470ce2

File tree

201 files changed

+3932
-1085
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

201 files changed

+3932
-1085
lines changed

.openpublishing.redirection.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3639,7 +3639,7 @@
36393639
},
36403640
{
36413641
"source_path": "articles/key-vault/about-keys-secrets-and-certificates.md",
3642-
"redirect_url": "/azure/key-vault",
3642+
"redirect_url": "/azure/key-vault/general/about-keys-secrets-certificates",
36433643
"redirect_document_id": false
36443644
},
36453645
{

articles/active-directory-b2c/custom-policy-overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -39,7 +39,7 @@ These three types of policy files are used:
3939
- **Extensions file** - holds the unique configuration changes for your tenant.
4040
- **Relying Party (RP) file** - The single task-focused file that is invoked directly by the application or service (also, known as a Relying Party). Each unique task requires its own RP and depending on branding requirements, the number might be "total of applications x total number of use cases."
4141

42-
User flows in Azure AD B2C follow the three-file pattern depicted above, but the developer only sees the RP file, while the Azure portal makes changes in the background to the extensions file.
42+
User flows in Azure AD B2C follow the file pattern depicted above, but the developer only sees the RP file, while the Azure portal makes changes in the background to the extensions file.
4343

4444
Although there are three types of policy files, you aren't restricted to only three files. You may have multiple files of each file type. For example, if you don't want to make changes to your Extensions file, you can create an Extensions2 file to further extend the Extensions file.
4545

articles/active-directory-b2c/identity-provider-azure-ad-multi-tenant-custom.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -40,7 +40,7 @@ To enable sign-in for users from a specific Azure AD organization, you need to r
4040
https://your-B2C-tenant-name.b2clogin.com/your-B2C-tenant-name.onmicrosoft.com/oauth2/authresp
4141
```
4242
43-
For example, `https://contoso.b2clogin.com/contoso.onmicrosoft.com/oauth2/authresp`.
43+
For example, `https://fabrikam.b2clogin.com/fabrikam.onmicrosoft.com/oauth2/authresp`.
4444
4545
1. Select **Register**. Record the **Application (client) ID** for use in a later step.
4646
1. Select **Certificates & secrets**, and then select **New client secret**.
@@ -53,10 +53,10 @@ If you want to get the `family_name` and `given_name` claims from Azure AD, you
5353
1. Sign in to the [Azure portal](https://portal.azure.com). Search for and select **Azure Active Directory**.
5454
1. From the **Manage** section, select **App registrations**.
5555
1. Select the application you want to configure optional claims for in the list.
56-
1. From the **Manage** section, select **Token configuration (preview)**.
56+
1. From the **Manage** section, select **Token configuration**.
5757
1. Select **Add optional claim**.
58-
1. Select the token type you want to configure.
59-
1. Select the optional claims to add.
58+
1. For the **Token type**, select **ID**.
59+
1. Select the optional claims to add, `family_name` and `given_name`.
6060
1. Click **Add**.
6161
6262
## Create a policy key

articles/active-directory-b2c/identity-provider-azure-ad-single-tenant-custom.md

Lines changed: 2 additions & 34 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: celestedg
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: conceptual
12-
ms.date: 02/11/2020
12+
ms.date: 04/20/2020
1313
ms.author: mimart
1414
ms.subservice: B2C
1515
---
@@ -24,40 +24,8 @@ This article shows you how to enable sign-in for users from an Azure Active Dire
2424

2525
Complete the steps in [Get started with custom policies in Azure Active Directory B2C](custom-policy-get-started.md).
2626

27-
## Register an application
2827

29-
To enable sign-in for users from a specific Azure AD organization, you need to register an application within the organizational Azure AD tenant.
30-
31-
1. Sign in to the [Azure portal](https://portal.azure.com).
32-
1. Make sure you're using the directory that contains your organizational Azure AD tenant (for example, contoso.com). Select the **Directory + subscription filter** in the top menu, and then choose the directory that contains your Azure AD tenant.
33-
1. Choose **All services** in the top-left corner of the Azure portal, and then search for and select **App registrations**.
34-
1. Select **New registration**.
35-
1. Enter a **Name** for your application. For example, `Azure AD B2C App`.
36-
1. Accept the default selection of **Accounts in this organizational directory only** for this application.
37-
1. For the **Redirect URI**, accept the value of **Web**, and enter the following URL in all lowercase letters, where `your-B2C-tenant-name` is replaced with the name of your Azure AD B2C tenant.
38-
39-
```
40-
https://your-B2C-tenant-name.b2clogin.com/your-B2C-tenant-name.onmicrosoft.com/oauth2/authresp
41-
```
42-
43-
For example, `https://contoso.b2clogin.com/contoso.onmicrosoft.com/oauth2/authresp`.
44-
45-
1. Select **Register**. Record the **Application (client) ID** for use in a later step.
46-
1. Select **Certificates & secrets**, and then select **New client secret**.
47-
1. Enter a **Description** for the secret, select an expiration, and then select **Add**. Record the **Value** of the secret for use in a later step.
48-
49-
## Configuring optional claims
50-
51-
If you want to get the `family_name` and `given_name` claims from Azure AD, you can configure optional claims for your application in the Azure portal UI or application manifest. For more information, see [How to provide optional claims to your Azure AD app](../active-directory/develop/active-directory-optional-claims.md).
52-
53-
1. Sign in to the [Azure portal](https://portal.azure.com). Search for and select **Azure Active Directory**.
54-
1. From the **Manage** section, select **App registrations**.
55-
1. Select the application you want to configure optional claims for in the list.
56-
1. From the **Manage** section, select **Token configuration (preview)**.
57-
1. Select **Add optional claim**.
58-
1. Select the token type you want to configure.
59-
1. Select the optional claims to add.
60-
1. Click **Add**.
28+
[!INCLUDE [active-directory-b2c-identity-provider-azure-ad](../../includes/active-directory-b2c-identity-provider-azure-ad.md)]
6129

6230
## Create a policy key
6331

articles/active-directory-b2c/identity-provider-azure-ad-single-tenant.md

Lines changed: 9 additions & 32 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: celestedg
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: conceptual
12-
ms.date: 08/08/2019
12+
ms.date: 04/20/2020
1313
ms.author: mimart
1414
ms.subservice: B2C
1515
ms.custom: fasttrack-edit
@@ -19,51 +19,28 @@ ms.custom: fasttrack-edit
1919

2020
To use an Azure Active Directory (Azure AD) as an [identity provider](authorization-code-flow.md) in Azure AD B2C, you need to create an application that represents it. This article shows you how to enable sign-in for users from a specific Azure AD organization using a user flow in Azure AD B2C.
2121

22-
## Create an Azure AD app
23-
24-
To enable sign-in for users from a specific Azure AD organization, you need to register an application within the organizational Azure AD tenant, which is not the same as your Azure AD B2C tenant.
25-
26-
1. Sign in to the [Azure portal](https://portal.azure.com).
27-
2. Make sure you're using the directory that contains your Azure AD tenant. Select the **Directory + subscription** filter in the top menu and choose the directory that contains your Azure AD tenant. This is not the same tenant as your Azure AD B2C tenant.
28-
3. Choose **All services** in the top-left corner of the Azure portal, and then search for and select **App registrations**.
29-
4. Select **New registration**.
30-
5. Enter a name for your application. For example, `Azure AD B2C App`.
31-
6. Accept the selection of **Accounts in this organizational directory only** for this application.
32-
7. For the **Redirect URI**, accept the value of **Web**, and enter the following URL in all lowercase letters, where `your-B2C-tenant-name` is replaced with the name of your Azure AD B2C tenant. For example, `https://fabrikam.b2clogin.com/fabrikam.onmicrosoft.com/oauth2/authresp`:
33-
34-
```
35-
https://your-B2C-tenant-name.b2clogin.com/your-B2C-tenant-name.onmicrosoft.com/oauth2/authresp
36-
```
37-
38-
All URLs should now be using [b2clogin.com](b2clogin.md).
39-
40-
8. Click **Register**. Copy the **Application (client) ID** to be used later.
41-
9. Select **Certificates & secrets** in the application menu, and then select **New client secret**.
42-
10. Enter a name for the client secret. For example, `Azure AD B2C App Secret`.
43-
11. Select the expiration period. For this application, accept the selection of **In 1 year**.
44-
12. Select **Add** and copy the value of the new client secret that is displayed to be used later.
22+
[!INCLUDE [active-directory-b2c-identity-provider-azure-ad](../../includes/active-directory-b2c-identity-provider-azure-ad.md)]
4523

4624
## Configure Azure AD as an identity provider
4725

4826
1. Make sure you're using the directory that contains Azure AD B2C tenant. Select the **Directory + subscription** filter in the top menu and choose the directory that contains your Azure AD B2C tenant.
4927
1. Choose **All services** in the top-left corner of the Azure portal, and then search for and select **Azure AD B2C**.
5028
1. Select **Identity providers**, and then select **New OpenID Connect provider**.
5129
1. Enter a **Name**. For example, enter *Contoso Azure AD*.
52-
1. For **Metadata url**, enter the following URL replacing `your-AD-tenant-domain` with the domain name of your Azure AD tenant:
30+
1. For **Metadata url**, enter the following URL replacing `{tenant}` with the domain name of your Azure AD tenant:
5331

5432
```
55-
https://login.microsoftonline.com/your-AD-tenant-domain/.well-known/openid-configuration
33+
https://login.microsoftonline.com/{tenant}/v2.0/.well-known/openid-configuration
5634
```
5735
58-
For example, `https://login.microsoftonline.com/contoso.onmicrosoft.com/.well-known/openid-configuration`.
59-
60-
**Do not** use the Azure AD v2.0 metadata endpoint, for example `https://login.microsoftonline.com/contoso.onmicrosoft.com/v2.0/.well-known/openid-configuration`. Doing so results in an error similar to `AADB2C: A claim with id 'UserId' was not found, which is required by ClaimsTransformation 'CreateAlternativeSecurityId' with id 'CreateAlternativeSecurityId' in policy 'B2C_1_SignUpOrIn' of tenant 'contoso.onmicrosoft.com'` when attempting to sign in.
36+
For example, `https://login.microsoftonline.com/contoso.onmicrosoft.com/v2.0/.well-known/openid-configuration`.
6137
6238
1. For **Client ID**, enter the application ID that you previously recorded.
6339
1. For **Client secret**, enter the client secret that you previously recorded.
64-
1. Leave the default values for **Scope**, **Response type**, and **Response mode**.
65-
1. (Optional) Enter a value for **Domain_hint**. For example, *ContosoAD*. This is the value to use when referring to this identity provider using *domain_hint* in the request.
66-
1. Under **Identity provider claims mapping**, enter the following claims mapping values:
40+
1. For the **Scope**, enter the `openid profile`.
41+
1. Leave the default values for **Response type**, and **Response mode**.
42+
1. (Optional) For the **Domain hint**, enter `contoso.com`. For more information, see [Set up direct sign-in using Azure Active Directory B2C](direct-signin.md#redirect-sign-in-to-a-social-provider).
43+
1. Under **Identity provider claims mapping**, select the following claims:
6744
6845
* **User ID**: *oid*
6946
* **Display name**: *name*

articles/active-directory/authentication/howto-authentication-methods-usage-insights.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -91,6 +91,8 @@ The data shown in these reports will be delayed by up to 60 minutes. A "Last ref
9191

9292
Usage and insights data is not a replacement for the Azure Multi-Factor Authentication activity reports or information contained in the Azure AD sign-ins report.
9393

94+
Report can't currently be filtered to exclude external users.
95+
9496
## Next steps
9597

9698
- [Working with the authentication methods usage report API](https://docs.microsoft.com/graph/api/resources/authenticationmethods-usage-insights-overview?view=graph-rest-beta)

articles/active-directory/develop/active-directory-v2-protocols.md

Lines changed: 1 addition & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -19,9 +19,6 @@ ms.custom: aaddev
1919

2020
The Microsoft identity platform endpoint for identity-as-a-service with industry standard protocols, OpenID Connect and OAuth 2.0. While the service is standards-compliant, there can be subtle differences between any two implementations of these protocols. The information here will be useful if you choose to write your code by directly sending and handling HTTP requests or use a third party open-source library, rather than using one of our [open-source libraries](reference-v2-libraries.md).
2121

22-
> [!NOTE]
23-
> Not all Azure AD scenarios and features are supported by the Microsoft identity platform endpoint. To determine if you should use the Microsoft identity platform endpoint, read about [Microsoft identity platform limitations](active-directory-v2-limitations.md).
24-
2522
## The basics
2623

2724
In nearly all OAuth 2.0 and OpenID Connect flows, there are four parties involved in the exchange:
@@ -64,7 +61,7 @@ Where the `{tenant}` can take one of four different values:
6461
To learn how to interact with these endpoints, choose a particular app type in the [Protocols](#protocols) section and follow the links for more info.
6562

6663
> [!TIP]
67-
> Any app registered in Azure AD can use the Microsoft identity platform endpoint, even if they don't sign in personal accounts. This way, you can migrate existing applications to Microsoft identity platform and [MSAL](reference-v2-libraries.md) without re-creating your application.
64+
> Any app registered in Azure AD can use the Microsoft identity platform endpoint, even if they don't sign in personal accounts. This way, you can migrate existing applications to Microsoft identity platform and [MSAL](reference-v2-libraries.md) without re-creating your application.
6865
6966
## Tokens
7067

articles/active-directory/develop/tutorial-v2-angular.md

Lines changed: 0 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -50,10 +50,6 @@ This tutorial uses the following library:
5050
|---|---|
5151
|[msal.js](https://github.com/AzureAD/microsoft-authentication-library-for-js)|Microsoft Authentication Library for JavaScript Angular Wrapper|
5252

53-
> [!NOTE]
54-
> *Msal.js* targets the Microsoft identity platform endpoint, which enables personal accounts, work accounts, and school accounts to sign in and acquire tokens. The Microsoft identity platform endpoint has [some limitations](../azuread-dev/azure-ad-endpoint-comparison.md#limitations).
55-
> To understand the differences between the v1.0 and v2.0 endpoints, see the [endpoint comparison guide](../azuread-dev/azure-ad-endpoint-comparison.md).
56-
5753
You can find the source code for the MSAL.js library in the [AzureAD/microsoft-authentication-library-for-js](https://github.com/AzureAD/microsoft-authentication-library-for-js) repository on GitHub.
5854

5955
<!--end-collapse-->

articles/active-directory/develop/tutorial-v2-javascript-spa.md

Lines changed: 0 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -44,10 +44,6 @@ This guide uses the following library:
4444
|---|---|
4545
|[msal.js](https://github.com/AzureAD/microsoft-authentication-library-for-js)|Microsoft Authentication Library for JavaScript|
4646

47-
> [!NOTE]
48-
> *Msal.js* targets the Microsoft identity platform endpoint, which enables personal accounts and school and work accounts to sign in and acquire tokens. The Microsoft identity platform endpoint has [some limitations](../azuread-dev/azure-ad-endpoint-comparison.md#limitations).
49-
> To understand the differences between the v1.0 and v2.0 endpoints, see the [endpoint comparison guide](../azuread-dev/azure-ad-endpoint-comparison.md).
50-
5147
<!--end-collapse-->
5248

5349
## Set up your web server or project

articles/active-directory/develop/v2-app-types.md

Lines changed: 0 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -19,9 +19,6 @@ ms.custom: aaddev
1919

2020
The Microsoft identity platform (v2.0) endpoint supports authentication for a variety of modern app architectures, all of them based on industry-standard protocols [OAuth 2.0 or OpenID Connect](active-directory-v2-protocols.md). This article describes the types of apps that you can build by using Microsoft identity platform, regardless of your preferred language or platform. The information is designed to help you understand high-level scenarios before you [start working with the code](v2-overview.md#getting-started).
2121

22-
> [!NOTE]
23-
> The Microsoft identity platform endpoint doesn't support all Azure Active Directory (Azure AD) scenarios and features. To determine whether you should use the Microsoft identity platform endpoint, read about [Microsoft identity platform limitations](active-directory-v2-limitations.md).
24-
2522
## The basics
2623

2724
You must register each app that uses the Microsoft identity platform endpoint in the new [App registrations portal](https://go.microsoft.com/fwlink/?linkid=2083908). The app registration process collects and assigns these values for your app:

0 commit comments

Comments
 (0)