Skip to content

Commit 4ad208c

Browse files
committed
Merge branch 'master' of https://github.com/Microsoft/azure-docs-pr into azureadds-linux-domain-join
2 parents 987da07 + e8a4f70 commit 4ad208c

File tree

5,637 files changed

+103081
-78723
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

5,637 files changed

+103081
-78723
lines changed

.openpublishing.publish.config.json

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -90,6 +90,12 @@
9090
"url": "https://github.com/Azure/azure-docs-json-samples",
9191
"branch": "master"
9292
},
93+
{
94+
"path_to_root": "samples-key-vault-dotnet-quickstart",
95+
"url": "https://github.com/Azure-Samples/key-vault-dotnet-core-quickstart",
96+
"branch": "master",
97+
"branch_mapping": {}
98+
},
9399
{
94100
"path_to_root": "samples-mediaservices-integration",
95101
"url": "https://github.com/Azure-Samples/media-services-dotnet-functions-integration",

.openpublishing.redirection.json

Lines changed: 396 additions & 36 deletions
Large diffs are not rendered by default.

articles/active-directory-b2c/TOC.yml

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -309,7 +309,7 @@
309309
href: b2clogin.md
310310
- name: Migrate web API to b2clogin.com
311311
href: multiple-token-endpoints.md
312-
displayName: migrate, b2clogin, owin, jwt
312+
displayName: migrate, b2clogin, owin
313313
- name: Automation
314314
items:
315315
- name: Export usage report
@@ -318,6 +318,9 @@
318318
href: active-directory-b2c-devquickstarts-graph-dotnet.md
319319
- name: Audit logs
320320
href: active-directory-b2c-reference-audit-logs.md
321+
- name: Secure API Management API
322+
href: secure-api-management.md
323+
displayName: apim, api management, migrate, b2clogin.com
321324
- name: Compliance
322325
items:
323326
- name: User access

articles/active-directory-b2c/active-directory-b2c-devquickstarts-graph-dotnet.md

Lines changed: 7 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -38,13 +38,15 @@ After you have a B2C tenant, you need to register your application using the [Az
3838
3939
1. Sign in to the [Azure portal](https://portal.azure.com).
4040
2. Choose your Azure AD B2C tenant by selecting your account in the top right corner of the page.
41-
3. In the left-hand navigation pane, choose **All Services**, click **App Registrations**, and click **Add**.
41+
3. In the left-hand navigation pane, choose **All Services**, click **App Registrations**, and click **New registration**.
4242
4. Follow the prompts and create a new application.
43-
1. Select **Web App / API** as the Application Type.
44-
2. Provide **any Sign-on URL** (e.g. `https://B2CGraphAPI`) as it's not relevant for this example.
43+
1. Add an appropriate name
44+
2. Select **Accounts in this Organizational directory only**
45+
3. Select **Web** as the Application Type and provide **any Sign-on URL** (e.g. `https://B2CGraphAPI`) as it's not relevant for this example.
46+
4. Click Register.
4547
5. The application will now show up in the list of applications, click on it to obtain the **Application ID** (also known as Client ID). Copy it as you'll need it in a later section.
46-
6. In the Settings menu, click **Keys**.
47-
7. In the **Passwords** section, enter the key description and select a duration, and then click **Save**. Copy the key value (also known as Client Secret) for use in a later section.
48+
6. In the Settings menu, click **Certificates & secrets**.
49+
7. In the **Client secrets** section, click on **New client secret**, provide a description for the secret and select a duration, and then click **Add**. Copy the value of the secret (also known as Client Secret) for use in a later section.
4850

4951
## Configure create, read and update permissions for your application
5052
Now you need to configure your application to get all the required permissions to create, read, update and delete users.

articles/active-directory-b2c/active-directory-b2c-faqs.md

Lines changed: 6 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ manager: celestedg
88
ms.service: active-directory
99
ms.workload: identity
1010
ms.topic: conceptual
11-
ms.date: 08/08/2019
11+
ms.date: 08/31/2019
1212
ms.author: marsma
1313
ms.subservice: B2C
1414
---
@@ -39,11 +39,9 @@ User accounts for applications must always be created through a sign-up user flo
3939

4040
### Which social identity providers do you support now? Which ones do you plan to support in the future?
4141

42-
We currently support Facebook, Google+, LinkedIn, Amazon, Twitter (preview), WeChat (preview), Weibo (preview), and QQ (Preview). We will add support for other popular social identity providers based on customer demand.
42+
We currently support several social identity providers including Amazon, Facebook, GitHub (preview), Google, LinkedIn, Microsoft Account (MSA), QQ (preview), Twitter, WeChat (preview), and Weibo (preview). We evaluate adding support for other popular social identity providers based on customer demand.
4343

44-
Azure AD B2C has also added support for [custom policies](active-directory-b2c-overview-custom.md). These custom policies allow a developer to create their own policy with any identity provider that supports [OpenID Connect](https://openid.net/specs/openid-connect-core-1_0.html) or SAML.
45-
46-
Get started with custom policies by checking out our [custom policy starter pack](https://github.com/Azure-Samples/active-directory-b2c-custom-policy-starterpack).
44+
Azure AD B2C also supports [custom policies](active-directory-b2c-overview-custom.md). Custom policies allow you to create your own policy for any identity provider that supports [OpenID Connect](https://openid.net/specs/openid-connect-core-1_0.html) or SAML. Get started with custom policies by checking out our [custom policy starter pack](https://github.com/Azure-Samples/active-directory-b2c-custom-policy-starterpack).
4745

4846
### Can I configure scopes to gather more information about consumers from various social identity providers?
4947

@@ -122,9 +120,9 @@ No, Azure AD B2C does not support the same set of reports as Azure AD Premium. H
122120

123121
Yes! Read about [language customization](active-directory-b2c-reference-language-customization.md), which is in public preview. We provide translations for 36 languages, and you can override any string to suit your needs.
124122

125-
### Can I use my own URLs on my sign-up and sign-in pages that are served by Azure AD B2C? For instance, can I change the URL from login.microsoftonline.com to login.contoso.com?
123+
### Can I use my own URLs on my sign-up and sign-in pages that are served by Azure AD B2C? For instance, can I change the URL from contoso.b2clogin.com to login.contoso.com?
126124

127-
Not currently. This feature is on our roadmap. Verifying your domain in the **Domains** tab in the Azure portal does not accomplish this goal.
125+
Not currently. This feature is on our roadmap. Verifying your domain in the **Domains** tab in the Azure portal does not accomplish this goal. However, with b2clogin.com, we offer a [neutral top level domain](b2clogin.md), and thus the external appearance can be implemented without the mention of Microsoft.
128126

129127
### How do I delete my Azure AD B2C tenant?
130128

@@ -141,7 +139,7 @@ Follow these steps to delete your Azure AD B2C tenant:
141139
1. Select **View all applications**
142140
1. Select the application named **b2c-extensions-app**, select **Delete**, and then select **Yes** when prompted.
143141
1. Under **Manage**, select **User settings**.
144-
1. Under **LinkedIn account connections**, select **No**, then select **Save**.
142+
1. If present, under **LinkedIn account connections**, select **No**, then select **Save**.
145143
1. Under **Manage**, select **Properties**
146144
1. Under **Access management for Azure resources**, select **Yes**, and then select **Save**.
147145
1. Sign out of the Azure portal and then sign back in to refresh your access.

articles/active-directory-b2c/active-directory-b2c-overview-custom.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -51,7 +51,7 @@ The customer identity and access management (CIAM) service in Azure includes:
5151

5252
Azure AD B2C interacts with identity providers, users, other systems, and with the local user directory in sequence to achieve an identity task. For example, sign in a user, register a new user, or reset a password. The Identity Experience Framework and a policy (also called a user journey or a trust framework policy) establishes multi-party trust and explicitly defines the actors, the actions, the protocols, and the sequence of steps to complete.
5353

54-
The Identity Experience Framework is a fully configurable, policy-driven, cloud-based Azure platform that orchestrates trust between entities in standard protocol formats such as OpenID Connect, OAuth, SAML, WSFed, and a few non-standard ones, for example REST API-based system-to-system claims exchanges. The framework creates user-friendly, white-labeled experiences that support HTML and CSS.
54+
The Identity Experience Framework is a fully configurable, policy-driven, cloud-based Azure platform that orchestrates trust between entities in standard protocol formats such as OpenID Connect, OAuth, SAML, and a few non-standard ones, for example REST API-based system-to-system claims exchanges. The framework creates user-friendly, white-labeled experiences that support HTML and CSS.
5555

5656
A custom policy is represented as one or several XML-formatted files that refer to each other in a hierarchical chain. The XML elements define the claims schema, claims transformations, content definitions, claims providers, technical profiles, and user journey orchestration steps, among other elements. A custom policy is accessible as one or several XML files that are executed by the Identity Experience Framework when invoked by a relying party. Developers configuring custom policies must define the trusted relationships in careful detail to include metadata endpoints, exact claims exchange definitions, and configure secrets, keys, and certificates as needed by each identity provider.
5757

articles/active-directory-b2c/active-directory-b2c-quickstarts-desktop-app.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
2-
title: Quickstart - Set up sign-in for a desktop app using Azure Active Directory B2C | Microsoft Docs
3-
description: Run a sample ASP.NET desktop application that uses Azure Active Directory B2C to provide account sign-in.
2+
title: Quickstart - Set up sign-in for a desktop app using Azure Active Directory B2C
3+
description: Run a sample WPF desktop application that uses Azure Active Directory B2C to provide account sign-in.
44
services: active-directory-b2c
55
author: mmacy
66
manager: celestedg
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.workload: identity
1010
ms.topic: quickstart
1111
ms.custom: mvc
12-
ms.date: 11/30/2018
12+
ms.date: 09/12/2019
1313
ms.author: marsma
1414
ms.subservice: B2C
1515
---
@@ -23,7 +23,7 @@ Azure Active Directory (Azure AD) B2C provides cloud identity management to keep
2323
## Prerequisites
2424

2525
- [Visual Studio 2019](https://www.visualstudio.com/downloads/) with the **ASP.NET and web development** workload.
26-
- A social account from either Facebook, Google, Microsoft, or Twitter.
26+
- A social account from either Facebook, Google, or Microsoft.
2727
- [Download a zip file](https://github.com/Azure-Samples/active-directory-b2c-dotnet-desktop/archive/master.zip) or clone the sample web app from GitHub.
2828

2929
```
@@ -41,10 +41,10 @@ Azure Active Directory (Azure AD) B2C provides cloud identity management to keep
4141
4242
![Screenshot of the sample WPF application](media/active-directory-b2c-quickstarts-desktop-app/wpf-sample-application.png)
4343
44-
The sample supports several sign-up options. These options include using a social identity provider or creating a local account using an email address. For this quickstart, use a social identity provider account from either Facebook, Google, Microsoft, or Twitter.
44+
The sample supports several sign-up options. These options include using a social identity provider or creating a local account using an email address. For this quickstart, use a social identity provider account from either Facebook, Google, or Microsoft.
4545
4646
47-
2. Azure AD B2C presents a custom login page for a fictitious brand called Wingtip Toys for the sample web app. To sign up using a social identity provider, click the button of the identity provider you want to use.
47+
2. Azure AD B2C presents a sign-in page for a fictitious company called Fabrikam for the sample web application. To sign up using a social identity provider, click the button of the identity provider you want to use.
4848
4949
![Sign In or Sign Up page showing identity providers](media/active-directory-b2c-quickstarts-desktop-app/sign-in-or-sign-up-wpf.png)
5050
@@ -62,7 +62,7 @@ Azure AD B2C provides functionality to allow users to update their profiles. The
6262
6363
![Edit profile button highlighted in WPF sample app](media/active-directory-b2c-quickstarts-desktop-app/edit-profile-wpf.png)
6464
65-
2. Choose the identity provider associated with the account you created. For example, if you used Twitter as the identity provider when you created your account, choose Twitter to modify the associated profile details.
65+
2. Choose the identity provider associated with the account you created. For example, if you used Facebook as the identity provider when you created your account, choose Facebook to modify the associated profile details.
6666
6767
3. Change your **Display name** or **City**, and then click **Continue**.
6868

articles/active-directory-b2c/active-directory-b2c-quickstarts-spa.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: Quickstart - Set up sign-in for a single-page app using Azure Active Directory B2C | Microsoft Docs
2+
title: Quickstart - Set up sign-in for a single-page app using Azure Active Directory B2C
33
description: Run a sample single-page application that uses Azure Active Directory B2C to provide account sign-in.
44
services: active-directory-b2c
55
author: mmacy
@@ -8,7 +8,7 @@ manager: celestedg
88
ms.service: active-directory
99
ms.workload: identity
1010
ms.topic: quickstart
11-
ms.date: 10/24/2018
11+
ms.date: 09/12/2019
1212
ms.author: marsma
1313
ms.subservice: B2C
1414
---
@@ -23,7 +23,7 @@ Azure Active Directory (Azure AD) B2C provides cloud identity management to keep
2323

2424
- [Visual Studio 2019](https://www.visualstudio.com/downloads/) with the **ASP.NET and web development** workload.
2525
- Install [Node.js](https://nodejs.org/en/download/)
26-
- A social account from either Facebook, Google, Microsoft, or Twitter.
26+
- A social account from either Facebook, Google, or Microsoft.
2727
- [Download a zip file](https://github.com/Azure-Samples/active-directory-b2c-javascript-msal-singlepageapp/archive/master.zip) or clone the sample web app from GitHub.
2828

2929
```
@@ -54,9 +54,9 @@ Azure Active Directory (Azure AD) B2C provides cloud identity management to keep
5454
5555
![Single-page application sample app shown in browser](media/active-directory-b2c-quickstarts-spa/sample-app-spa.png)
5656
57-
The sample supports several sign-up options including using a social identity provider or creating a local account using an email address. For this quickstart, use a social identity provider account from either Facebook, Google, Microsoft, or Twitter.
57+
The sample supports several sign-up options including using a social identity provider or creating a local account using an email address. For this quickstart, use a social identity provider account from either Facebook, Google, or Microsoft.
5858
59-
2. Azure AD B2C presents a custom login page for a fictitious brand called Wingtip Toys for the sample web app. To sign up using a social identity provider, click the button of the identity provider you want to use.
59+
2. Azure AD B2C presents a sign-in page for a fictitious company called Fabrikam for the sample web application. To sign up using a social identity provider, click the button of the identity provider you want to use.
6060
6161
![Sign In or Sign Up page showing identity provider buttons](media/active-directory-b2c-quickstarts-spa/sign-in-or-sign-up-spa.png)
6262

articles/active-directory-b2c/active-directory-b2c-quickstarts-web-app.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: Quickstart - Set up sign in for an ASP.NET application using Azure Active Directory B2C | Microsoft Docs
2+
title: Quickstart - Set up sign in for an ASP.NET application using Azure Active Directory B2C
33
description: Run a sample ASP.NET web app that uses Azure Active Directory B2C to provide account sign-in.
44
services: active-directory-b2c
55
author: mmacy
@@ -8,7 +8,7 @@ manager: celestedg
88
ms.service: active-directory
99
ms.topic: quickstart
1010
ms.custom: mvc
11-
ms.date: 11/30/2018
11+
ms.date: 09/12/2019
1212
ms.author: marsma
1313
ms.subservice: B2C
1414
---
@@ -22,14 +22,14 @@ Azure Active Directory (Azure AD) B2C provides cloud identity management to keep
2222
## Prerequisites
2323

2424
- [Visual Studio 2019](https://www.visualstudio.com/downloads/) with the **ASP.NET and web development** workload.
25-
- A social account from either Facebook, Google, Microsoft, or Twitter.
25+
- A social account from Facebook, Google, or Microsoft.
2626
- [Download a zip file](https://github.com/Azure-Samples/active-directory-b2c-dotnet-webapp-and-webapi/archive/master.zip) or clone the sample web application from GitHub.
2727

2828
```
2929
git clone https://github.com/Azure-Samples/active-directory-b2c-dotnet-webapp-and-webapi.git
3030
```
3131
32-
These two projects are in the sample solution:
32+
There are two projects are in the sample solution:
3333
3434
- **TaskWebApp** - A web application that creates and edits a task list. The web application uses the **sign-up or sign-in** user flow to sign up or sign in users.
3535
- **TaskService** - A web API that supports the create, read, update, and delete task list functionality. The web API is protected by Azure AD B2C and called by the web application.
@@ -51,9 +51,9 @@ Azure Active Directory (Azure AD) B2C provides cloud identity management to keep
5151
5252
![Sample ASP.NET web app in browser with sign up/sign link highlighted](media/active-directory-b2c-quickstarts-web-app/web-app-sign-in.png)
5353
54-
The sample supports several sign-up options including using a social identity provider or creating a local account using an email address. For this quickstart, use a social identity provider account from either Facebook, Google, Microsoft, or Twitter.
54+
The sample supports several sign-up options including using a social identity provider or creating a local account using an email address. For this quickstart, use a social identity provider account from either Facebook, Google, or Microsoft.
5555
56-
2. Azure AD B2C presents a custom sign-in page for a fictitious brand called Wingtip Toys for the sample web application. To sign up using a social identity provider, click the button of the identity provider you want to use.
56+
2. Azure AD B2C presents a sign-in page for a fictitious company called Fabrikam for the sample web application. To sign up using a social identity provider, click the button of the identity provider you want to use.
5757
5858
![Sign In or Sign Up page showing identity provider buttons](media/active-directory-b2c-quickstarts-web-app/sign-in-or-sign-up-web.png)
5959

0 commit comments

Comments
 (0)