Skip to content

Commit 3a4c56c

Browse files
committed
Merge branch 'master' of https://github.com/MicrosoftDocs/azure-docs-pr into tamram21-1018
2 parents 0baeee5 + bb91a87 commit 3a4c56c

File tree

120 files changed

+4327
-528
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

120 files changed

+4327
-528
lines changed

.openpublishing.redirection.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -4358,6 +4358,11 @@
43584358
"redirect_url": "/azure/app-service/tutorial-auth-aad",
43594359
"redirect_document_id": false
43604360
},
4361+
{
4362+
"source_path_from_root": "/articles/app-service/app-service-web-tutorial-connect-msi.md",
4363+
"redirect_url": "/azure/app-service/tutorial-connect-msi-sql-database",
4364+
"redirect_document_id": false
4365+
},
43614366
{
43624367
"source_path_from_root": "/articles/app-service/containers/tutorial-auth-aad.md",
43634368
"redirect_url": "/azure/app-service/tutorial-auth-aad?pivots=platform-linux",

articles/active-directory-b2c/access-tokens.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -62,7 +62,7 @@ If the **response_type** parameter in an `/authorize` request includes `token`,
6262

6363
To request an access token, you need an authorization code. Below is an example of a request to the `/authorize` endpoint for an authorization code. Custom domains are not supported for use with access tokens. Use your tenant-name.onmicrosoft.com domain in the request URL.
6464

65-
In the following example, you replace these values:
65+
In the following example, you replace these values in the query string:
6666

6767
- `<tenant-name>` - The name of your Azure AD B2C tenant.
6868
- `<policy-name>` - The name of your custom policy or user flow.
@@ -86,7 +86,7 @@ The response with the authorization code should be similar to this example:
8686
https://jwt.ms/?code=eyJraWQiOiJjcGltY29yZV8wOTI1MjAxNSIsInZlciI6IjEuMC...
8787
```
8888

89-
After successfully receiving the authorization code, you can use it to request an access token:
89+
After successfully receiving the authorization code, you can use it to request an access token. Note that the parameters are in the body of the HTTP POST request:
9090

9191
```http
9292
POST <tenant-name>.b2clogin.com/<tenant-name>.onmicrosoft.com/<policy-name>/oauth2/v2.0/token HTTP/1.1
@@ -100,7 +100,7 @@ grant_type=authorization_code
100100
&redirect_uri=https://jwt.ms
101101
&client_secret=2hMG2-_:y12n10vwH...
102102
```
103-
103+
104104
You should see something similar to the following response:
105105

106106
```json

articles/active-directory-b2c/add-ropc-policy.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -37,7 +37,7 @@ The following flows are not supported:
3737

3838
When using the ROPC flow, consider the following:
3939

40-
- ROPC doesn’t work when there is any interruption to the authentication flow that needs user interaction. For example, when a password has expired or needs to be changed, [multi-factor authentication](multi-factor-authentication.md) is required, or when more information needs to be collected during sign-in (for example, user consent).
40+
- ROPC doesn’t work when there is any interruption to the authentication flow that needs user interaction. For example, when a password has expired or needs to be changed, [multifactor authentication](multi-factor-authentication.md) is required, or when more information needs to be collected during sign-in (for example, user consent).
4141
- ROPC supports local accounts only. Users can’t sign in with [federated identity providers](add-identity-provider.md) like Microsoft, Google+, Twitter, AD-FS, or Facebook.
4242
- [Session Management](session-behavior.md), including [keep me signed-in (KMSI)](session-behavior.md#enable-keep-me-signed-in-kmsi), is not applicable.
4343

@@ -67,6 +67,9 @@ When using the ROPC flow, consider the following:
6767

6868
::: zone pivot="b2c-custom-policy"
6969

70+
## Pre-requisite
71+
If you've not done so, learn about custom policy starter pack in [Get started with custom policies in Active Directory B2C](tutorial-create-user-flows.md).
72+
7073
## Create a resource owner policy
7174

7275
1. Open the *TrustFrameworkExtensions.xml* file.

articles/active-directory-b2c/configure-authentication-sample-spa-app.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ manager: CelesteDG
77
ms.service: active-directory
88
ms.workload: identity
99
ms.topic: reference
10-
ms.date: 09/15/2021
10+
ms.date: 10/25/2021
1111
ms.author: kengaderdus
1212
ms.subservice: B2C
1313
ms.custom: "b2c-support"

articles/active-directory-b2c/configure-user-input.md

Lines changed: 7 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: CelesteDG
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: how-to
12-
ms.date: 10/15/2021
12+
ms.date: 10/22/2021
1313
ms.custom: project-no-code
1414
ms.author: kengaderdus
1515
ms.subservice: B2C
@@ -32,6 +32,10 @@ In this article, you collect a new attribute during your sign-up journey in Azur
3232

3333
## Add user attributes your user flow
3434

35+
1. Sign in to the [Azure portal](https://portal.azure.com/).
36+
1. Make sure you're using the directory that contains your Azure AD B2C tenant. Select the **Directories + subscriptions** icon in the portal toolbar.
37+
1. On the **Portal settings | Directories + subscriptions** page, find your Azure AD B2C directory in the **Directory name** list, and then select **Switch**.
38+
1. Under **Azure services**, select **Azure AD B2C**. Or use the search box to find and select **Azure AD B2C**.
3539
1. In your Azure AD B2C tenant, select **User flows**.
3640
1. Select your policy (for example, "B2C_1_SignupSignin") to open it.
3741
1. Select **User attributes** and then select the user attribute (for example, "City").
@@ -63,7 +67,7 @@ To provide a set list of values for the city attribute:
6367
1. [Enable language customization on the user flow](language-customization.md#support-requested-languages-for-ui_locales)
6468
1. Select your policy (for example, "B2C_1_SignupSignin") to open it.
6569
1. On the **Languages** page for the user flow, select the language that you want to customize.
66-
1. Under **Page-level-resources files**, select **Local account sign up page**.
70+
1. Under **Page-level resources files**, select **Local account sign up page**.
6771
1. Select **Download defaults** (or **Download overrides** if you have previously edited this language).
6872
1. Create a `LocalizedCollections` attribute.
6973

@@ -107,7 +111,7 @@ The `LocalizedCollections` is an array of `Name` and `Value` pairs. The order fo
107111
1. Select **User flows** and select your policy (for example, "B2C_1_SignupSignin") to open it.
108112
1. Select **Languages**.
109113
1. Select the language that you want to translate to.
110-
1. Select the **Local account sign up page**.
114+
1. Under **Page-level-resources files**, select **Local account sign up page**.
111115
1. Select the folder icon, and select the JSON file to upload. The changes are saved to your user flow automatically.
112116

113117
## Test your user flow

articles/active-directory-b2c/identity-provider-azure-ad-single-tenant.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -47,10 +47,10 @@ To enable sign-in for users with an Azure AD account from a specific Azure AD or
4747
1. Sign in to the [Azure portal](https://portal.azure.com).
4848
1. Make sure you're using the directory that contains your organizational Azure AD tenant (for example, Contoso). Select the **Directories + subscriptions** icon in the portal toolbar.
4949
1. On the **Portal settings | Directories + subscriptions** page, find your Azure AD directory in the **Directory name** list, and then select **Switch**.
50-
1. Choose **All services** in the top-left corner of the Azure portal, and then search for and select **App registrations**.
50+
1. Under **Azure services**, select **App registrations** or search for and select **App registrations**.
5151
1. Select **New registration**.
5252
1. Enter a **Name** for your application. For example, `Azure AD B2C App`.
53-
1. Accept the default selection of **Accounts in this organizational directory only** for this application.
53+
1. Accept the default selection of **Accounts in this organizational directory only (Default Directory only - Single tenant)** for this application.
5454
1. For the **Redirect URI**, accept the value of **Web**, and enter the following URL in all lowercase letters, where `your-B2C-tenant-name` is replaced with the name of your Azure AD B2C tenant.
5555

5656
```
275 Bytes
Loading

articles/active-directory-b2c/saml-service-provider.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -313,10 +313,10 @@ For SAML apps, you need to configure several properties in the application regis
313313

314314
When your SAML application makes a request to Azure AD B2C, the SAML AuthN request includes an `Issuer` attribute. The value of this attribute is typically the same as the application's metadata `entityID` value. Azure AD B2C uses this value to look up the application registration in the directory and read the configuration. For this lookup to succeed, `identifierUri` in the application registration must be populated with a value that matches the `Issuer` attribute.
315315

316-
In the registration manifest, find the `identifierURIs` parameter and add the appropriate value. This value will be the same value that's configured in the SAML AuthN requests for `EntityId` at the application, and the `entityID` value in the application's metadata. You will also need to find the `accessTokenAcceptedVersion` paramater and set the value to `2`.
316+
In the registration manifest, find the `identifierURIs` parameter and add the appropriate value. This value will be the same value that's configured in the SAML AuthN requests for `EntityId` at the application, and the `entityID` value in the application's metadata. You will also need to find the `accessTokenAcceptedVersion` parameter and set the value to `2`.
317317

318318
> [!IMPORTANT]
319-
> If you do not update the `accessTokenAcceptedVersion` to `2` you will recive an error message requiring a verfied domain.
319+
> If you do not update the `accessTokenAcceptedVersion` to `2` you will recieve an error message requiring a verified domain.
320320
321321
The following example shows the `entityID` value in the SAML metadata:
322322

articles/active-directory-b2c/secure-rest-api.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: CelesteDG
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: how-to
12-
ms.date: 09/20/2021
12+
ms.date: 10/25/2021
1313
ms.author: kengaderdus
1414
ms.subservice: B2C
1515
zone_pivot_groups: b2c-policy-type
@@ -39,7 +39,7 @@ HTTP basic authentication is defined in [RFC 2617](https://tools.ietf.org/html/r
3939
To configure an API Connector with HTTP basic authentication, follow these steps:
4040

4141
1. Sign in to the [Azure portal](https://portal.azure.com/).
42-
2. Under **Azure services**, select **Azure AD B2C**.
42+
2. Under **Azure services**, select **Azure AD B2C** or search for and select **Azure AD B2C**.
4343
3. Select **API connectors**, and then select the **API Connector** you want to configure.
4444
4. For the **Authentication type**, select **Basic**.
4545
5. Provide the **Username**, and **Password** of your REST API endpoint.

articles/active-directory-b2c/technical-overview.md

Lines changed: 10 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -77,7 +77,7 @@ Learn more about [sign-in options](sign-in-options.md) or how to [set up the loc
7777

7878
Azure AD B2C lets you manage common attributes of consumer account profiles. For example display name, surname, given name, city, and others.
7979

80-
You can also extend the Azure AD schema to store additional information about your users. For example, their country/region of residency, preferred language, and preferences like whether they want to subscribe to a newsletter or enable multi-factor authentication. For more information, see:
80+
You can also extend the Azure AD schema to store additional information about your users. For example, their country/region of residency, preferred language, and preferences like whether they want to subscribe to a newsletter or enable multifactor authentication. For more information, see:
8181

8282
* [User profile attributes](user-profile-attributes.md)
8383
* [Add user attributes and customize user input in](configure-user-input.md)
@@ -208,21 +208,21 @@ Multiple applications can use the same user flow or custom policy. A single appl
208208

209209
For example, to sign in to an application, the application uses the *sign up or sign in* user flow. After the user has signed in, they may want to edit their profile, so the application initiates another authorization request, this time using the *profile edit* user flow.
210210

211-
## Multi-factor authentication (MFA)
211+
## Multifactor authentication (MFA)
212212

213-
Azure AD B2C multi-factor authentication (MFA) helps safeguard access to data and applications while maintaining simplicity for your users. It provides extra security by requiring a second form of authentication, and delivers strong authentication by offering a range of easy-to-use authentication methods.
213+
Azure AD B2C Multi-Factor Authentication (MFA) helps safeguard access to data and applications while maintaining simplicity for your users. It provides extra security by requiring a second form of authentication, and delivers strong authentication by offering a range of easy-to-use authentication methods.
214214

215215
Your users may or may not be challenged for MFA based on configuration decisions that you can make as an administrator.
216216

217-
See how to enable MFA in user flows in [Enable multi-factor authentication in Azure Active Directory B2C](multi-factor-authentication.md).
217+
See how to enable MFA in user flows in [Enable multifactor authentication in Azure Active Directory B2C](multi-factor-authentication.md).
218218

219219
## Conditional Access
220220

221221
Azure AD Identity Protection risk-detection features, including risky users and risky sign-ins, are automatically detected and displayed in your Azure AD B2C tenant. You can create Conditional Access policies that use these risk detections to determine remediation actions and enforce organizational policies.
222222

223223
![Conditional access flow](media/technical-overview/conditional-access-flow.png)
224224

225-
Azure AD B2C evaluates each sign-in event and ensures that all policy requirements are met before granting the user access. Risky users or sign-ins may be blocked, or challenged with a specific remediation like multi-factor authentication (MFA). For more information, see [Identity Protection and Conditional Access](conditional-access-identity-protection-overview.md).
225+
Azure AD B2C evaluates each sign-in event and ensures that all policy requirements are met before granting the user access. Risky users or sign-ins may be blocked, or challenged with a specific remediation like multifactor authentication (MFA). For more information, see [Identity Protection and Conditional Access](conditional-access-identity-protection-overview.md).
226226

227227
## Password complexity
228228

@@ -296,6 +296,11 @@ By integrating Azure Application Insights into Azure AD B2C custom policies, you
296296

297297
For more information, see [Track user behavior in Azure Active Directory B2C using Application Insights](analytics-with-application-insights.md).
298298

299+
## Region availability and data residency
300+
Azure AD B2C service is generally available worldwide, for availability, with the option for data residency in regions as specified in [Products available by region](https://azure.microsoft.com/regions/services/). Data residency is determined by the country/region you select when you [create your tenant](tutorial-create-tenant.md).
301+
302+
Learn more about [Azure Active Directory B2C service Region availability & data residency](data-residency.md).
303+
299304
## Automation using Microsoft Graph API
300305

301306
Use MS graph API to manage your Azure AD B2C directory. You can also create the Azure AD B2C directory itself. You can manage users, identity providers, user flows, custom policies and many more.

0 commit comments

Comments
 (0)