Skip to content

Commit 466a6a8

Browse files
committed
updated
2 parents a6c2af9 + 3ad29c5 commit 466a6a8

File tree

3,251 files changed

+38119
-19239
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

3,251 files changed

+38119
-19239
lines changed

.openpublishing.publish.config.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -334,6 +334,11 @@
334334
"path_to_root": "VideoReviewConsoleApp",
335335
"url": "https://github.com/MicrosoftContentModerator/VideoReviewConsoleApp",
336336
"branch": "master"
337+
},
338+
{
339+
"path_to_root": "cognitive-services-quickstart-code",
340+
"url": "https://github.com/Azure-Samples/cognitive-services-quickstart-code",
341+
"branch": "master"
337342
}
338343
],
339344
"branch_target_mapping": {

.openpublishing.redirection.json

Lines changed: 468 additions & 7 deletions
Large diffs are not rendered by default.

CODEOWNERS

Lines changed: 2 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -10,12 +10,7 @@
1010
articles/ @apex-docs-pr-reviewers
1111

1212
# Cognitive Services
13-
articles/cognitive-services/ @nitinme @tchristiani @cjgronlund
14-
articles/cognitive-services/LUIS/ @cjgronlund @nitinme @diberry
15-
articles/cognitive-services/Speaker-recognition/ @cjgronlund @nitinme @erhopf
16-
articles/cognitive-services/Speech-Service/ @cjgronlund @nitinme @erhopf
17-
articles/cognitive-services/Translator/ @cjgronlund @nitinme @erhopf
18-
articles/cognitive-services/QnAMaker/ @cjgronlund @nitinme @diberry
13+
articles/cognitive-services/ @diberry @erhopf, @nitinme
1914

2015
# DevOps
2116

@@ -26,4 +21,4 @@ articles/terraform/ @TomArcherMsft
2621

2722
# Governance
2823

29-
articles/governance/ @DCtheGeek
24+
articles/governance/ @DCtheGeek

articles/active-directory-b2c/TOC.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -46,7 +46,7 @@
4646
href: code-samples.md
4747
- name: Concepts
4848
items:
49-
- name: Applications types
49+
- name: Application types
5050
href: active-directory-b2c-apps.md
5151
- name: Authentication protocols
5252
href: active-directory-b2c-reference-protocols.md

articles/active-directory-b2c/active-directory-b2c-apps.md

Lines changed: 13 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -1,28 +1,28 @@
11
---
2-
title: Applications types that can be used in Azure Active Directory B2C | Microsoft Docs
3-
description: Learn about the types of applications you can use in the Azure Active Directory B2C.
2+
title: Application types that can be used in Azure Active Directory B2C
3+
description: Learn about the types of applications you can use with Azure Active Directory B2C.
44
services: active-directory-b2c
55
author: mmacy
66
manager: celestedg
77

88
ms.service: active-directory
99
ms.workload: identity
1010
ms.topic: conceptual
11-
ms.date: 01/11/2019
11+
ms.date: 07/24/2019
1212
ms.author: marsma
1313
ms.subservice: B2C
1414

1515
---
16-
# Applications types that can be used in Active Directory B2C
16+
# Application types that can be used in Active Directory B2C
1717

18-
Azure Active Directory (Azure AD) B2C supports authentication for a variety of modern application architectures. All of them are based on the industry standard protocols [OAuth 2.0](active-directory-b2c-reference-protocols.md) or [OpenID Connect](active-directory-b2c-reference-protocols.md). This document describes the types of applications that you can build, independent of the language or platform you prefer. It also helps you understand the high-level scenarios before you start building applications.
18+
Azure Active Directory (Azure AD) B2C supports authentication for a variety of modern application architectures. All of them are based on the industry standard protocols [OAuth 2.0](active-directory-b2c-reference-protocols.md) or [OpenID Connect](active-directory-b2c-reference-protocols.md). This article describes the types of applications that you can build, independent of the language or platform you prefer. It also helps you understand the high-level scenarios before you start building applications.
1919

2020
Every application that uses Azure AD B2C must be registered in your [Azure AD B2C tenant](active-directory-b2c-get-started.md) by using the [Azure portal](https://portal.azure.com/). The application registration process collects and assigns values, such as:
2121

2222
* An **Application ID** that uniquely identifies your application.
2323
* A **Reply URL** that can be used to direct responses back to your application.
2424

25-
Each request that is sent to Azure AD B2C specifies a **user flow**, which is a policy that controls the behavior of Azure AD. You can also use these endpoints to create a highly customizable set of user experiences. We provide a set of user flows to help you set up common policies, including sign-up, sign-in, and profile-edit policies. But you can also create your own custom policies. If you are not familiar with policies, you should read about the Azure AD B2C [extensible policy framework](active-directory-b2c-reference-policies.md) before you continue.
25+
Each request that is sent to Azure AD B2C specifies a **user flow** (a built-in policy) or a **custom policy** that controls the behavior of Azure AD B2C. Both policy types enable you to create a highly customizable set of user experiences.
2626

2727
The interaction of every application follows a similar high-level pattern:
2828

@@ -39,7 +39,7 @@ These steps can differ slightly based on the type of application you're building
3939

4040
For web applications (including .NET, PHP, Java, Ruby, Python, and Node.js) that are hosted on a server and accessed through a browser, Azure AD B2C supports [OpenID Connect](active-directory-b2c-reference-protocols.md) for all user experiences. In the Azure AD B2C implementation of OpenID Connect, your web application initiates user experiences by issuing authentication requests to Azure AD. The result of the request is an `id_token`. This security token represents the user's identity. It also provides information about the user in the form of claims:
4141

42-
```
42+
```json
4343
// Partial raw id_token
4444
eyJ0eXAiOiJKV1QiLCJhbGciOiJSUzI1NiIsIng1dCI6ImtyaU1QZG1Cd...
4545

@@ -102,19 +102,19 @@ To learn how to secure a web API by using Azure AD B2C, check out the web API tu
102102

103103
## Mobile and native applications
104104

105-
Applications that are installed on devices, such as mobile and desktop applications, often need to access back-end services or web APIs on behalf of users. You can add customized identity management experiences to your native applications and securely call back-end services by using Azure AD B2C and the [OAuth 2.0 authorization code flow](active-directory-b2c-reference-oauth-code.md).
105+
Applications that are installed on devices, such as mobile and desktop applications, often need to access back-end services or web APIs on behalf of users. You can add customized identity management experiences to your native applications and securely call back-end services by using Azure AD B2C and the [OAuth 2.0 authorization code flow](active-directory-b2c-reference-oauth-code.md).
106106

107107
In this flow, the application executes [policies](active-directory-b2c-reference-policies.md) and receives an `authorization_code` from Azure AD after the user completes the policy. The `authorization_code` represents the application's permission to call back-end services on behalf of the user who is currently signed in. The application can then exchange the `authorization_code` in the background for an `access_token` and a `refresh_token`. The application can use the `access_token` to authenticate to a back-end web API in HTTP requests. It can also use the `refresh_token` to get a new `access_token` when an older one expires.
108108

109109
## Current limitations
110110

111-
### Application not supported
111+
### Unsupported application types
112112

113113
#### Daemons/server-side applications
114114

115115
Applications that contain long-running processes or that operate without the presence of a user also need a way to access secured resources such as web APIs. These applications can authenticate and get tokens by using the application's identity (rather than a user's delegated identity) and by using the OAuth 2.0 client credentials flow. Client credential flow is not the same as on-behalf-flow and on-behalf-flow should not be used for server-to-server authentication.
116116

117-
Although client credential flow is not currently supported by Azure AD B2C, you can set up client credential flow using Azure AD. An Azure AD B2C tenant shares some functionality with Azure AD enterprise tenants. The client credential flow is supported using the Azure AD functionality of the Azure AD B2C tenant.
117+
Although client credential flow is not currently supported by Azure AD B2C, you can set up client credential flow using Azure AD. An Azure AD B2C tenant shares some functionality with Azure AD enterprise tenants. The client credential flow is supported using the Azure AD functionality of the Azure AD B2C tenant.
118118

119119
To set up client credential flow, see [Azure Active Directory v2.0 and the OAuth 2.0 client credentials flow](https://docs.microsoft.com/azure/active-directory/develop/active-directory-v2-protocols-oauth-client-creds). A successful authentication results in the receipt of a token formatted so that it can be used by Azure AD as described in [Azure AD token reference](https://docs.microsoft.com/azure/active-directory/develop/active-directory-token-and-claims).
120120

@@ -135,3 +135,6 @@ If you edit the Azure AD B2C application outside of the Azure portal, it becomes
135135

136136
To delete the application, go to the [Application Registration Portal](https://apps.dev.microsoft.com/) and delete the application there. In order for the application to be visible, you need to be the owner of the application (and not just an admin of the tenant).
137137

138+
## Next steps
139+
140+
Find out more about the built-in policies provided by [User flows in Azure Active Directory B2C](active-directory-b2c-reference-policies.md).

0 commit comments

Comments
 (0)