Skip to content

Commit 3fc0579

Browse files
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into abac-hns
2 parents 0a25eab + 3eeb804 commit 3fc0579

File tree

132 files changed

+1816
-871
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

132 files changed

+1816
-871
lines changed

articles/active-directory-b2c/analytics-with-application-insights.md

Lines changed: 14 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: CelesteDG
99
ms.service: active-directory
1010
ms.topic: how-to
1111

12-
ms.date: 01/11/2024
12+
ms.date: 01/26/2024
1313
ms.author: kengaderdus
1414
ms.subservice: B2C
1515
zone_pivot_groups: b2c-policy-type
@@ -38,6 +38,8 @@ In Azure Active Directory B2C (Azure AD B2C), you can send event data directly t
3838
- Measure performance.
3939
- Create notifications from Application Insights.
4040

41+
[!INCLUDE [active-directory-b2c-limited-to-custom-policy](../../includes/active-directory-b2c-public-preview.md)]
42+
4143
## Overview
4244

4345
To enable custom event logs, add an Application Insights technical profile. In the technical profile, you define the Application Insights instrumentation key, the event name, and the claims to record. To post an event, add the technical profile as an orchestration step in a [user journey](userjourneys.md).
@@ -183,11 +185,13 @@ Open the *TrustFrameworkExtensions.xml* file from the starter pack. Add the tech
183185
184186
## Add the technical profiles as orchestration steps
185187

186-
Add new orchestration steps that refer to the technical profiles.
188+
Add new orchestration steps that refer to the technical profiles.
187189

188190
> [!IMPORTANT]
189191
> After you add the new orchestration steps, renumber the steps sequentially without skipping any integers from 1 to N.
190192
193+
1. Identify the policy file that contains your user journey, such as `SocialAndLocalAccounts/SignUpOrSignin.xml`, then open it.
194+
191195
1. Call `AppInsights-SignInRequest` as the second orchestration step. This step tracks that a sign-up or sign-in request has been received.
192196

193197
```xml
@@ -199,10 +203,12 @@ Add new orchestration steps that refer to the technical profiles.
199203
</OrchestrationStep>
200204
```
201205

202-
1. Before the `SendClaims` orchestration step, add a new step that calls `AppInsights-UserSignup`. It's triggered when the user selects the sign-up button in a sign-up or sign-in journey.
206+
1. Before the `SendClaims` orchestration step, add a new step that calls `AppInsights-UserSignup`. It's triggered when the user selects the sign-up button in a sign-up or sign-in journey. You may need to update the orchestration step, `Order="8"`,to make sure you don't skip any integer from the first to the last orchestration step.
203207

204208
```xml
205-
<!-- Handles the user selecting the sign-up link in the local account sign-in page -->
209+
<!-- Handles the user selecting the sign-up link in the local account sign-in page
210+
The `SendClaims` orchestration step comes after this one,
211+
-->
206212
<OrchestrationStep Order="8" Type="ClaimsExchange">
207213
<Preconditions>
208214
<Precondition Type="ClaimsExist" ExecuteActionsIf="false">
@@ -221,10 +227,12 @@ Add new orchestration steps that refer to the technical profiles.
221227
</OrchestrationStep>
222228
```
223229

224-
1. After the `SendClaims` orchestration step, call `AppInsights-SignInComplete`. This step shows a successfully completed journey.
230+
1. After the `SendClaims` orchestration step, call `AppInsights-SignInComplete`. This step shows a successfully completed journey. You may need to update the orchestration step, `Order="10"`, to make sure you don't skip any integer from the first to the last orchestration step.
225231

226232
```xml
227-
<!-- Track that we have successfully sent a token -->
233+
<!-- Track that we have successfully sent a token
234+
The `SendClaims` orchestration step come before this one,
235+
-->
228236
<OrchestrationStep Order="10" Type="ClaimsExchange">
229237
<ClaimsExchanges>
230238
<ClaimsExchange Id="TrackSignInComplete" TechnicalProfileReferenceId="AppInsights-SignInComplete" />

articles/active-directory-b2c/b2c-global-identity-funnel-based-design.md

Lines changed: 3 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -2,16 +2,15 @@
22
title: Build a global identity solution with funnel-based approach
33
titleSuffix: Azure AD B2C
44
description: Learn the funnel-based design consideration for Azure AD B2C to provide customer identity management for global customers.
5-
65
author: gargi-sinha
76
manager: martinco
8-
97
ms.service: active-directory
10-
118
ms.topic: conceptual
12-
ms.date: 12/15/2022
9+
ms.date: 01/26/2024
1310
ms.author: gasinh
1411
ms.subservice: B2C
12+
13+
#customer intent: I'm a developer, and I need to understand how to build a global identity solution using a funnel-based approach, so I can implement it in my organization's Azure AD B2C environment.
1514
---
1615

1716
# Build a global identity solution with funnel-based approach

articles/active-directory-b2c/b2c-global-identity-proof-of-concept-funnel.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,9 +8,11 @@ manager: martinco
88
ms.service: active-directory
99

1010
ms.topic: conceptual
11-
ms.date: 12/15/2022
11+
ms.date: 01/26/2024
1212
ms.author: gasinh
1313
ms.subservice: B2C
14+
15+
#customer intent: As a developer, I want to understand how to build a global identity solution using a funnel-based approach, so I can implement it in my organization's Azure AD B2C environment.
1416
---
1517

1618
# Azure Active Directory B2C global identity framework proof of concept for funnel-based configuration

articles/active-directory-b2c/b2c-global-identity-proof-of-concept-regional.md

Lines changed: 3 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,16 +1,15 @@
11
---
22
title: Azure Active Directory B2C global identity framework proof of concept for region-based configuration
33
description: Learn how to create a proof of concept regional based approach for Azure AD B2C to provide customer identity and access management for global customers.
4-
54
author: gargi-sinha
65
manager: martinco
7-
86
ms.service: active-directory
9-
107
ms.topic: conceptual
11-
ms.date: 12/15/2022
8+
ms.date: 01/24/2024
129
ms.author: gasinh
1310
ms.subservice: B2C
11+
12+
#customer intent: I'm a developer implementing Azure Active Directory B2C, and I want to configure region-based sign-up, sign-in, and password reset journeys. My goal is for users to be directed to the correct region and their data managed accordingly.
1413
---
1514

1615
# Azure Active Directory B2C global identity framework proof of concept for region-based configuration

articles/active-directory-b2c/b2c-global-identity-region-based-design.md

Lines changed: 3 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -2,16 +2,15 @@
22
title: Build a global identity solution with region-based approach
33
titleSuffix: Azure AD B2C
44
description: Learn the region-based design consideration for Azure AD B2C to provide customer identity management for global customers.
5-
65
author: gargi-sinha
76
manager: martinco
8-
97
ms.service: active-directory
10-
118
ms.topic: conceptual
12-
ms.date: 12/15/2022
9+
ms.date: 01/26/2024
1310
ms.author: gasinh
1411
ms.subservice: B2C
12+
13+
#customer intent: I'm a developer implementing a global identity solution. I need to understand the different scenarios and workflows for region-based design approach in Azure AD B2C. My goal is to design and implement the authentication and sign-up processes effectively for users from different regions.
1514
---
1615

1716
# Build a global identity solution with region-based approach

articles/active-directory-b2c/b2c-global-identity-solutions.md

Lines changed: 3 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -2,16 +2,15 @@
22
title: Azure Active Directory B2C global identity framework
33
titleSuffix: Azure AD B2C
44
description: Learn how to configure Azure AD B2C to provide customer identity and access management for global customers.
5-
65
author: gargi-sinha
76
manager: martinco
8-
97
ms.service: active-directory
10-
118
ms.topic: conceptual
12-
ms.date: 12/15/2022
9+
ms.date: 01/26/2024
1310
ms.author: gasinh
1411
ms.subservice: B2C
12+
13+
#customer intent: I'm a developer building a customer-facing application. I need to understand the different approaches to implement an identity platform using Azure AD B2C tenants for a globally operating business model. I want to make an informed decision about the architecture that best suits my application's requirements.
1514
---
1615

1716
# Azure Active Directory B2C global identity framework

articles/active-directory-b2c/b2clogin.md

Lines changed: 18 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -9,12 +9,12 @@ manager: CelesteDG
99
ms.service: active-directory
1010

1111
ms.topic: how-to
12-
ms.date: 01/11/2024
12+
ms.date: 01/26/2024
1313
ms.author: kengaderdus
1414
ms.subservice: B2C
1515

1616

17-
#Customer intent: As an Azure AD B2C application developer, I want to update the redirect URLs in my identity provider's applications to reference b2clogin.com or a custom domain, so that I can authenticate users with Azure AD B2C using the updated endpoints and policies.
17+
#Customer intent: As an Azure AD B2C application developer, I want to update the redirect URLs in my identity provider's applications to reference b2clogin.com or a custom domain, so that I can authenticate users with Azure AD B2C using the updated endpoints.
1818

1919
---
2020

@@ -27,17 +27,18 @@ When you set up an identity provider for sign-up and sign-in in your Azure Activ
2727
The transition to b2clogin.com only applies to authentication endpoints that use Azure AD B2C policies (user flows or custom policies) to authenticate users. These endpoints have a `<policy-name>` parameter, which specifies the policy Azure AD B2C should use. [Learn more about Azure AD B2C policies](technical-overview.md#identity-experiences-user-flows-or-custom-policies).
2828

2929
Old endpoints may look like:
30-
- <code>https://<b>login.microsoft.com</b>/\<tenant-name\>.onmicrosoft.com/<b>\<policy-name\></b>/oauth2/v2.0/authorize</code>
31-
- <code>https://<b>login.microsoft.com</b>/\<tenant-name\>.onmicrosoft.com/oauth2/v2.0/authorize<b>?p=\<policy-name\></b></code>
30+
- <code>https://<b>login.microsoft.com</b>/\<tenant-name\>.onmicrosoft.com/<b>\<policy-name\></b>/oauth2/v2.0/authorize</code> or <code>https://<b>login.microsoft.com</b>/\<tenant-name\>.onmicrosoft.com/oauth2/v2.0/authorize<b>?p=\<policy-name\></b></code> for `/authorize` endpoint.
31+
- <code>https://<b>login.microsoft.com</b>/\<tenant-name\>.onmicrosoft.com/<b>\<policy-name\></b>/oauth2/v2.0/logout</code> or <code>https://<b>login.microsoft.com</b>/\<tenant-name\>.onmicrosoft.com/oauth2/v2.0/logout<b>?p=\<policy-name\></b></code> for `/logout` endpoint.
3232

33-
A corresponding updated endpoint would look like:
34-
- <code>https://<b>\<tenant-name\>.b2clogin.com</b>/\<tenant-name\>.onmicrosoft.com/<b>\<policy-name\></b>/oauth2/v2.0/authorize</code>
35-
- <code>https://<b>\<tenant-name\>.b2clogin.com</b>/\<tenant-name\>.onmicrosoft.com/oauth2/v2.0/authorize?<b>p=\<policy-name\></b></code>
33+
A corresponding updated endpoint would look similar to the following endpoints:
34+
- <code>https://<b>\<tenant-name\>.b2clogin.com</b>/\<tenant-name\>.onmicrosoft.com/<b>\<policy-name\></b>/oauth2/v2.0/authorize</code> or <code>https://<b>\<tenant-name\>.b2clogin.com</b>/\<tenant-name\>.onmicrosoft.com/oauth2/v2.0/authorize?<b>p=\<policy-name\></b></code> for the `/authorize` endpoint.
35+
- <code>https://<b>\<tenant-name\>.b2clogin.com</b>/\<tenant-name\>.onmicrosoft.com/<b>\<policy-name\></b>/oauth2/v2.0/logout</code> or <code>https://<b>\<tenant-name\>.b2clogin.com</b>/\<tenant-name\>.onmicrosoft.com/oauth2/v2.0/logout?<b>p=\<policy-name\></b></code> for the `/logout` endpoint.
3636

37-
With Azure AD B2C [custom domain](./custom-domain.md) the corresponding updated endpoint would look like:
3837

39-
- <code>https://<b>login.contoso.com</b>/\<tenant-name\>.onmicrosoft.com/<b>\<policy-name\></b>/oauth2/v2.0/authorize</code>
40-
- <code>https://<b>login.contoso.com</b>/\<tenant-name\>.onmicrosoft.com/oauth2/v2.0/authorize?<b>p=\<policy-name\></b></code>
38+
With Azure AD B2C [custom domain](./custom-domain.md) the corresponding updated endpoint would look similar to the following endpoints. You can use either of these endpoints:
39+
40+
- <code>https://<b>login.contoso.com</b>/\<tenant-name\>.onmicrosoft.com/<b>\<policy-name\></b>/oauth2/v2.0/authorize</code> or <code>https://<b>login.contoso.com</b>/\<tenant-name\>.onmicrosoft.com/oauth2/v2.0/authorize?<b>p=\<policy-name\></b></code> for the `/authorize` endpoint.
41+
- <code>https://<b>login.contoso.com</b>/\<tenant-name\>.onmicrosoft.com/<b>\<policy-name\></b>/oauth2/v2.0/logout</code> or <code>https://<b>login.contoso.com</b>/\<tenant-name\>.onmicrosoft.com/oauth2/v2.0/logout?<b>p=\<policy-name\></b></code> for the `/logout` endpoint.
4142

4243
## Endpoints that are not affected
4344

@@ -49,6 +50,12 @@ This change doesn't affect all endpoints, which don't contain a policy parameter
4950
https://login.microsoftonline.com/<tenant-name>.onmicrosoft.com/oauth2/v2.0/token
5051
```
5152

53+
However, if you only want to obtain a token to authenticate users, then you can specify the policy that your application wishes to use to authenticate users. In this case, the updated `/token` endpoints would look similar to the following examples.
54+
55+
- <code>https://<b>\<tenant-name\>.b2clogin.com</b>/\<tenant-name\>.onmicrosoft.com/<b>\<policy-name\></b>/oauth2/v2.0/token</code> or <code>https://<b>\<tenant-name\>.b2clogin.com</b>/\<tenant-name\>.onmicrosoft.com/oauth2/v2.0/token?<b>p=\<policy-name\></b></code> when you use *b2clogin.com*.
56+
57+
- <code>https://<b>login.contoso.com</b>/\<tenant-name\>.onmicrosoft.com/<b>\<policy-name\></b>/oauth2/v2.0/token</code> or <code>https://<b>login.contoso.com</b>/\<tenant-name\>.onmicrosoft.com/oauth2/v2.0/token?<b>p=\<policy-name\></b></code> when you use a custom domain.
58+
5259
## Overview of required changes
5360

5461
There are several modifications you might need to make to migrate your applications from *login.microsoftonline.com* using Azure AD B2C endpoints:
@@ -149,4 +156,4 @@ For migrating Azure API Management APIs protected by Azure AD B2C, see the [Migr
149156
[msal-dotnet]: https://github.com/AzureAD/microsoft-authentication-library-for-dotnet
150157
[msal-dotnet-b2c]: https://github.com/AzureAD/microsoft-authentication-library-for-dotnet/wiki/AAD-B2C-specifics
151158
[msal-js]: https://github.com/AzureAD/microsoft-authentication-library-for-js
152-
[msal-js-b2c]: ../active-directory/develop/msal-b2c-overview.md
159+
[msal-js-b2c]: ../active-directory/develop/msal-b2c-overview.md

articles/active-directory-b2c/custom-domain.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ author: kengaderdus
66
manager: CelesteDG
77
ms.service: active-directory
88
ms.topic: how-to
9-
ms.date: 01/11/2024
9+
ms.date: 01/26/2024
1010
ms.author: kengaderdus
1111
ms.subservice: B2C
1212
ms.custom: "b2c-support"
@@ -267,8 +267,8 @@ In the following redirect URI:
267267
https://<custom-domain-name>/<tenant-name>/oauth2/authresp
268268
```
269269

270-
- Replace **&lt;custom-domain-name&gt;** with your custom domain name.
271-
- Replace **&lt;tenant-name&gt;** with the name of your tenant, or your tenant ID.
270+
- Replace &lt;`custom-domain-name`&gt; with your custom domain name.
271+
- Replace &lt;`tenant-name`&gt; with the name of your tenant, or your tenant ID.
272272

273273
The following example shows a valid OAuth redirect URI:
274274

@@ -295,9 +295,9 @@ The custom domain integration applies to authentication endpoints that use Azure
295295
- <code>https://\<custom-domain\>/<tenant-name\>/<b>\<policy-name\></b>/oauth2/v2.0/token</code>
296296

297297
Replace:
298-
- **custom-domain** with your custom domain
299-
- **tenant-name** with your tenant name or tenant ID
300-
- **policy-name** with your policy name.
298+
- &lt;`custom-domain`&gt; with your custom domain
299+
- &lt;`tenant-name`&gt; with your tenant name or tenant ID
300+
- &lt;`policy-name`&gt; with your policy name.
301301

302302
The [SAML service provider](./saml-service-provider.md) metadata may look like the following sample:
303303

articles/active-directory-b2c/external-identities-videos.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -2,16 +2,16 @@
22
title: Microsoft Azure Active Directory B2C external identity video series
33
titleSuffix: Azure AD B2C
44
description: Learn about external identities in Azure AD B2C in the Microsoft identity platform
5-
65
author: gargi-sinha
76
manager: martinco
87
ms.reviewer: kengaderdus
98
ms.service: active-directory
10-
119
ms.topic: how-to
12-
ms.date: 06/08/2023
10+
ms.date: 01/26/2024
1311
ms.author: gasinh
1412
ms.subservice: B2C
13+
14+
#customer intent: I'm a developers working with Azure Active Directory B2C. I need videos that provide a deep-dive into the architecture and features of the service. My goal is to gain a better understanding of how to implement and utilize Azure AD B2C in my applications.
1515
---
1616

1717
# Microsoft Azure Active Directory B2C external identity video series

articles/active-directory-b2c/identity-verification-proofing.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -2,15 +2,15 @@
22
title: Identity proofing and verification for Azure AD B2C
33
titleSuffix: Azure AD B2C
44
description: Learn about our partners who integrate with Azure AD B2C to provide identity proofing and verification solutions
5-
65
author: gargi-sinha
76
manager: martinco
87
ms.reviewer: kengaderdus
98
ms.service: active-directory
10-
119
ms.topic: how-to
12-
ms.date: 01/18/2023
10+
ms.date: 01/26/2024
1311
ms.author: gasinh
12+
13+
#customer intent: I'm a developer integrating Azure AD B2C, and I want to configure an identity verification and proofing provider. I need to combat identity fraud and create a trusted user experience for account registration.
1414
---
1515

1616
# Identity verification and proofing partners

0 commit comments

Comments
 (0)