Skip to content

Commit 3e745c5

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into agents-articles-batch-5
2 parents 318852c + 8dee5a0 commit 3e745c5

File tree

468 files changed

+5814
-11751
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

468 files changed

+5814
-11751
lines changed

.openpublishing.publish.config.json

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -32,6 +32,12 @@
3232
"need_preview_pull_request": true,
3333
"contribution_branch_mappings": {},
3434
"dependent_repositories": [
35+
{
36+
"path_to_root": "azure-docs-snippets-pr",
37+
"url": "https://github.com/MicrosoftDocs/azure-docs-snippets-pr",
38+
"branch": "main",
39+
"branch_mapping": {}
40+
},
3541
{
3642
"path_to_root": "azure-dev-docs-pr",
3743
"url": "https://github.com/MicrosoftDocs/azure-dev-docs-pr",

.openpublishing.redirection.active-directory.json

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,15 @@
11
{
22
"redirections": [
3+
{
4+
"source_path_from_root": "/articles/active-directory/develop/active-directory-claims-mapping.md",
5+
"redirect_url": "/azure/active-directory/develop/active-directory-saml-claims-customization",
6+
"redirect_document_id": false
7+
},
8+
{
9+
"source_path_from_root": "/articles/active-directory/develop/configure-token-lifetimes.md",
10+
"redirect_url": "/azure/active-directory/develop/active-directory-saml-claims-customization",
11+
"redirect_document_id": false
12+
},
313
{
414
"source_path_from_root": "/articles/active-directory/authentication/how-to-mfa-microsoft-managed.md",
515
"redirect_url": "/azure/active-directory/authentication/concept-authentication-default-enablement",

.openpublishing.redirection.json

Lines changed: 395 additions & 0 deletions
Large diffs are not rendered by default.

articles/active-directory-b2c/add-identity-provider.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -2,11 +2,11 @@
22
title: Add an identity provider - Azure Active Directory B2C
33
description: Learn how to add an identity provider to your Active Directory B2C tenant.
44
services: active-directory-b2c
5-
author: kengaderdus
5+
author: garrodonnell
66
manager: CelesteDG
77

8-
ms.author: kengaderdus
9-
ms.date: 04/08/2022
8+
ms.author: godonnell
9+
ms.date: 01/19/2022
1010
ms.custom: mvc
1111
ms.topic: how-to
1212
ms.service: active-directory
@@ -19,9 +19,9 @@ You can configure Azure AD B2C to allow users to sign in to your application wit
1919

2020
With external identity provider federation, you can offer your consumers the ability to sign in with their existing social or enterprise accounts, without having to create a new account just for your application.
2121

22-
On the sign-up or sign-in page, Azure AD B2C presents a list of external identity providers the user can choose for sign-in. Once they select one of the external identity providers, they're taken (redirected) to the selected provider's website to complete the sign in process. After the user successfully signs in, they're returned to Azure AD B2C for authentication of the account in your application.
22+
On the sign-up or sign-in page, Azure AD B2C presents a list of external identity providers the user can choose for sign-in. Once they select one of the external identity providers, they're taken (redirected) to the selected provider's website to complete the sign-in process. After the user successfully signs in, they're returned to Azure AD B2C for authentication of the account in your application.
2323

24-
![Mobile sign-in example with a social account (Facebook)](media/add-identity-provider/external-idp.png)
24+
![Diagram showing mobile sign-in example with a social account (Facebook).](media/add-identity-provider/external-idp.png)
2525

2626
You can add identity providers that are supported by Azure Active Directory B2C (Azure AD B2C) to your [user flows](user-flow-overview.md) using the Azure portal. You can also add identity providers to your [custom policies](user-flow-overview.md).
2727

articles/active-directory-b2c/best-practices.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -39,6 +39,8 @@ Define your application and service architecture, inventory current systems, and
3939
| Usability vs. security | Your solution must strike the right balance between application usability and your organization's acceptable level of risk. |
4040
| Move on-premises dependencies to the cloud | To help ensure a resilient solution, consider moving existing application dependencies to the cloud. |
4141
| Migrate existing apps to b2clogin.com | The deprecation of login.microsoftonline.com will go into effect for all Azure AD B2C tenants on 04 December 2020. [Learn more](b2clogin.md). |
42+
| Use Identity Protection and Conditional Access | Use these capabilities for significantly greater control over risky authentications and access policies. Azure AD B2C Premium P2 is required. [Learn more](conditional-access-identity-protection-overview.md). |
43+
|Tenant size | You need to plan with Azure AD B2C tenant size in mind. By default, Azure AD B2C tenant can accommodate 1.25 million objects (user accounts and applications). You can increase this limit to 5.25 million objects by adding a custom domain to your tenant, and verifying it. If you need a bigger tenant size, you need to contact [Support](find-help-open-support-ticket.md).|
4244
| Use Identity Protection and Conditional Access | Use these capabilities for greater control over risky authentications and access policies. Azure AD B2C Premium P2 is required. [Learn more](conditional-access-identity-protection-overview.md). |
4345

4446
## Implementation
@@ -86,5 +88,6 @@ Stay up to date with the state of the service and find support options.
8688
| Best practice | Description |
8789
|--|--|
8890
| [Service updates](https://azure.microsoft.com/updates/?product=active-directory-b2c) | Stay up to date with Azure AD B2C product updates and announcements. |
89-
| [Microsoft Support](support-options.md) | File a support request for Azure AD B2C technical issues. Billing and subscription management support is provided at no cost. |
91+
| [Microsoft Support](find-help-open-support-ticket.md) | File a support request for Azure AD B2C technical issues. Billing and subscription management support is provided at no cost. |
9092
| [Azure status](https://azure.status.microsoft/status) | View the current health status of all Azure services. |
93+

articles/active-directory-b2c/custom-domain.md

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: CelesteDG
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: how-to
12-
ms.date: 07/26/2022
12+
ms.date: 11/3/2022
1313
ms.author: kengaderdus
1414
ms.subservice: B2C
1515
ms.custom: "b2c-support"
@@ -20,7 +20,11 @@ zone_pivot_groups: b2c-policy-type
2020

2121
[!INCLUDE [active-directory-b2c-choose-user-flow-or-custom-policy](../../includes/active-directory-b2c-choose-user-flow-or-custom-policy.md)]
2222

23-
This article describes how to enable custom domains in your redirect URLs for Azure Active Directory B2C (Azure AD B2C). Using a custom domain with your application provides a more seamless user experience. From the user's perspective, they remain in your domain during the sign in process rather than redirecting to the Azure AD B2C default domain *<tenant-name>.b2clogin.com*.
23+
This article describes how to enable custom domains in your redirect URLs for Azure Active Directory B2C (Azure AD B2C). By using a verified custom domain, you've benefits such as:
24+
25+
- It provides a more seamless user experience. From the user's perspective, they remain in your domain during the sign in process rather than redirecting to the Azure AD B2C default domain *<tenant-name>.b2clogin.com*.
26+
27+
- You increase the number of objects (user accounts and applications) you can create in your Azure AD B2C tenant from the default 1.25 million to 5.25 million.
2428

2529
![Screenshot demonstrates an Azure AD B2C custom domain user experience.](./media/custom-domain/custom-domain-user-experience.png)
2630

articles/active-directory-b2c/faq.yml

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -43,7 +43,10 @@ sections:
4343
In an Azure AD B2C tenant, most apps want the user to sign-in with any arbitrary email address (for example, [email protected], [email protected], [email protected], or [email protected]). This type of account is a local account. We also support arbitrary user names as local accounts (for example, joe, bob, sarah, or jim). You can choose one of these two local account types when configuring identity providers for Azure AD B2C in the Azure portal. In your Azure AD B2C tenant, select **Identity providers**, select **Local account**, and then select **Username**.
4444
4545
User accounts for applications can be created through a sign-up user flow, sign-up or sign-in user flow, the Microsoft Graph API, or in the Azure portal.
46-
46+
- question: |
47+
How many users can an Azure AD B2C tenant accommodate?
48+
answer: |
49+
- By default, each tenant can accommodate a total of **1.25 million** objects (user accounts and applications), but you can increase this limit to **5.25 million** objects when you [add and verify a custom domain](custom-domain.md). If you want to increase this limit, please contact [Microsoft Support](find-help-open-support-ticket.md). However, if you created your tenant before **September 2022**, this limit doesn't affect you, and your tenant will retain the size allocated to it at creation, that's, **50 million** objects.
4750
- question: |
4851
Which social identity providers do you support now? Which ones do you plan to support in the future?
4952
answer: |

articles/active-directory-b2c/microsoft-graph-operations.md

Lines changed: 21 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ manager: CelesteDG
88
ms.service: active-directory
99
ms.workload: identity
1010
ms.topic: how-to
11-
ms.date: 03/03/2022
11+
ms.date: 11/3/2022
1212
ms.custom: "project-no-code, ignite-fall-2021, b2c-support"
1313
ms.author: kengaderdus
1414
ms.subservice: B2C
@@ -26,7 +26,7 @@ Watch this video to learn about Azure AD B2C user migration using Microsoft Grap
2626
2727
## Prerequisites
2828

29-
To use MS Graph API, and interact with resources in your Azure AD B2C tenant, you need an application registration that grants the permissions to do so. Follow the steps in the [Manage Azure AD B2C with Microsoft Graph](microsoft-graph-get-started.md) article to create an application registration that your management application can use.
29+
- To use MS Graph API, and interact with resources in your Azure AD B2C tenant, you need an application registration that grants the permissions to do so. Follow the steps in the [Register a Microsoft Graph application](microsoft-graph-get-started.md) article to create an application registration that your management application can use.
3030

3131
## User management
3232
> [!NOTE]
@@ -162,6 +162,25 @@ For user flows, these extension properties are [managed by using the Azure porta
162162
> [!NOTE]
163163
> In Azure AD, directory extensions are managed through the [extensionProperty resource type](/graph/api/resources/extensionproperty) and its associated methods. However, because they are used in B2C through the `b2c-extensions-app` app which should not be updated, they are managed in Azure AD B2C using the [identityUserFlowAttribute resource type](/graph/api/resources/identityuserflowattribute) and its associated methods.
164164
165+
## Tenant usage
166+
167+
Use the [Get organization details](/graph/api/organization-get) API to get your directory size quota. You need to add the `$select` query parameter as shown in the following HTTP request:
168+
169+
```http
170+
GET https://graph.microsoft.com/v1.0/organization/organization-id?$select=directorySizeQuota
171+
```
172+
Replace `organization-id` with your organization or tenant ID.
173+
174+
The response to the above request looks similar to the following JSON snippet:
175+
176+
```json
177+
{
178+
"directorySizeQuota": {
179+
"used": 156,
180+
"total": 1250000
181+
}
182+
}
183+
```
165184
## Audit logs
166185

167186
- [List audit logs](/graph/api/directoryaudit-list)

articles/active-directory-b2c/service-limits.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ manager: CelesteDG
88
ms.service: active-directory
99
ms.workload: identity
1010
ms.topic: reference
11-
ms.date: 12/01/2022
11+
ms.date: 12/29/2022
1212
ms.subservice: B2C
1313
zone_pivot_groups: b2c-policy-type
1414
---
@@ -164,6 +164,8 @@ The following table lists the administrative configuration limits in the Azure A
164164
|Number of sign-out URLs per application  |1 |
165165
|String Limit per Attribute |250 Chars |
166166
|Number of B2C tenants per subscription |20 |
167+
|Total number of objects (user accounts and applications) per tenant (default limit)|1.25 million |
168+
|Total number of objects (user accounts and applications) per tenant (using a verified custom domain)|5.25 million |
167169
|Levels of [inheritance](custom-policy-overview.md#inheritance-model) in custom policies |10 |
168170
|Number of policies per Azure AD B2C tenant (user flows + custom policies) |200 |
169171
|Maximum policy file size |1024 KB |

articles/active-directory-b2c/sign-in-options.md

Lines changed: 21 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: CelesteDG
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: conceptual
12-
ms.date: 11/03/2022
12+
ms.date: 01/18/2022
1313
ms.author: godonnell
1414
ms.subservice: B2C
1515

@@ -28,7 +28,7 @@ Email sign-up is enabled by default in your local account identity provider sett
2828
- **Sign-up**: users are prompted for an email address, which is verified at sign-up (optional) and becomes their login ID. The user then enters any other information requested on the sign-up page, for example, display name, given name, and surname. Then they select **Continue** to create an account.
2929
- **Password reset**: Users enter and verify their email, after which the user can reset the password
3030

31-
![Email sign-up or sign-in experience](./media/sign-in-options/local-account-email-experience.png)
31+
![Series of screenshots showing email sign-up or sign-in experience.](./media/sign-in-options/local-account-email-experience.png)
3232

3333
Learn how to configure email sign-in in your local account identity provider.
3434
## Username sign-in
@@ -39,7 +39,7 @@ Your local account identity provider includes a Username option that lets users
3939
- **Sign-up**: Users will be prompted for a username, which will become their login ID. Users will also be prompted for an email address, which will be verified at sign-up. The email address will be used during a password reset flow. The user enters any other information requested on the sign-up page, for example, Display Name, Given Name, and Surname. The user then selects Continue to create the account.
4040
- **Password reset**: Users must enter their username and the associated email address. The email address must be verified, after which, the user can reset the password.
4141

42-
![Username sign-up or sign-in experience](./media/sign-in-options/local-account-username-experience.png)
42+
![Series of screenshots showing sign-up or sign-in experience.](./media/sign-in-options/local-account-username-experience.png)
4343

4444
## Phone sign-in
4545

@@ -53,7 +53,7 @@ Phone sign-in is a passwordless option in your local account identity provider s
5353
1. Next, the user is asked to provide a **recovery email**. The user enters their email address, and then selects *Send verification code*. A code is sent to the user's email inbox, which they can retrieve and enter in the Verification code box. Then the user selects Verify code.
5454
1. Once the code is verified, the user selects *Create* to create their account.
5555

56-
![Phone sign-up or sign-in experience](./media/sign-in-options/local-account-phone-experience.png)
56+
![Series of screenshots showing phone sign-up or sign-in experience.](./media/sign-in-options/local-account-phone-experience.png)
5757

5858
### Pricing for phone sign-in
5959

@@ -66,22 +66,35 @@ One-time passwords are sent to your users by using SMS text messages. Depending
6666

6767
When you enable phone sign-up and sign-in for your user flows, it's also a good idea to enable the recovery email feature. With this feature, a user can provide an email address that can be used to recover their account when they don't have their phone. This email address is used for account recovery only. It can't be used for signing in.
6868

69-
- When the recovery email prompt is **On**, a user signing up for the first time is prompted to verify a backup email. A user who hasn't provided a recovery email before is asked to verify a backup email during next sign in.
69+
- When the recovery email prompt is **On**, a user signing up for the first time is prompted to verify a backup email. A user who hasn't provided a recovery email before is asked to verify a backup email during next sign-in.
7070

7171
- When recovery email is **Off**, a user signing up or signing in isn't shown the recovery email prompt.
7272

7373
The following screenshots demonstrate the phone recovery flow:
7474

75-
![Phone recovery user flow](./media/sign-in-options/local-account-change-phone-flow.png)
75+
![Diagram showing phone recovery user flow.](./media/sign-in-options/local-account-change-phone-flow.png)
7676

7777

7878
## Phone or email sign-in
7979

8080
You can choose to combine the [phone sign-in](#phone-sign-in), and the [email sign-in](#email-sign-in) in your local account identity provider settings. In the sign-up or sign-in page, user can type a phone number, or email address. Based on the user input, Azure AD B2C takes the user to the corresponding flow.
8181

82-
![Phone or email sign-up or sign-in experience](./media/sign-in-options/local-account-phone-and-email-experience.png)
82+
![Series of screenshots showing phone or email sign-up or sign-in experience.](./media/sign-in-options/local-account-phone-and-email-experience.png)
83+
84+
85+
## Federated sign-in
86+
87+
You can configure Azure AD B2C to allow users to sign in to your application with credentials from external social or enterprise identity providers (IdPs). Azure AD B2C supports many [external identity providers](add-identity-provider.md) and any identity provider that supports OAuth 1.0, OAuth 2.0, OpenID Connect, and SAML protocols.
88+
89+
With external identity provider federation, you can offer your consumers the ability to sign in with their existing social or enterprise accounts, without having to create a new account just for your application.
90+
91+
On the sign-up or sign-in page, Azure AD B2C presents a list of external identity providers the user can choose for sign-in. Once they select one of the external identity providers, they're redirected to the selected provider's website to complete the sign-in process. After the user successfully signs in, they're returned to Azure AD B2C for authentication of the account in your application.
92+
93+
![Diagram showing mobile sign-in example with a social account (Facebook).](media/add-identity-provider/external-idp.png)
94+
95+
You can add identity providers that are supported by Azure Active Directory B2C (Azure AD B2C) to your [user flows](user-flow-overview.md) using the Azure portal. You can also add identity providers to your [custom policies](user-flow-overview.md).
8396

8497
## Next steps
8598

8699
- Find out more about the built-in policies provided by [User flows in Azure Active Directory B2C](user-flow-overview.md).
87-
- [Configure your local account identity provider](identity-provider-local.md).
100+
- [Configure your local account identity provider](identity-provider-local.md).

0 commit comments

Comments
 (0)