You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory-b2c/embedded-login.md
+8-8Lines changed: 8 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -9,7 +9,7 @@ manager: CelesteDG
9
9
ms.service: active-directory
10
10
ms.workload: identity
11
11
ms.topic: how-to
12
-
ms.date: 08/17/2021
12
+
ms.date: 06/17/2022
13
13
ms.custom: project-no-code
14
14
ms.author: kengaderdus
15
15
ms.subservice: B2C
@@ -74,11 +74,11 @@ The **Sources** attribute contains the URI of your web application. Add a space
74
74
- The URI must use the https scheme.
75
75
- The full URI of the web app must be specified. Wildcards are not supported.
76
76
77
-
In addition, we recommend that you also block your own domain name from being embedded in an iframe by setting the Content-Security-Policy and X-Frame-Options headers respectively on your application pages. This will mitigate security concerns around older browsers related to nested embedding of iframes.
77
+
In addition, we recommend that you also block your own domain name from being embedded in an iframe by setting the `Content-Security-Policy` and `X-Frame-Options` headers respectively on your application pages. This will mitigate security concerns around older browsers related to nested embedding of iframes.
78
78
79
79
## Adjust policy user interface
80
80
81
-
With Azure AD B2C [user interface customization](customize-ui.md), you have almost full control over the HTML and CSS content presented to users. Follow the steps for customizing an HTML page using content definitions. To fit the Azure AD B2C user interface into the iframe size, provide clean HTML page without background and extra spaces.
81
+
With Azure AD B2C [user interface customization](customize-ui.md), you have almost full control over the HTML and CSS content presented to users. Follow the steps for customizing an HTML page using content definitions. To fit the Azure AD B2C user interface into the iframe size, provide clean HTML page without a background and extra spaces.
82
82
83
83
The following CSS code hides the Azure AD B2C HTML elements and adjusts the size of the panel to fill the iframe.
84
84
@@ -96,9 +96,9 @@ div.api_container{
96
96
}
97
97
```
98
98
99
-
In some cases, you might want to notify to your application of which Azure AD B2C page is currently being presented. For example, when a user selects the sign-up option, you might want the application to respond by hiding the links for signing in with a social account or adjusting the iframe size.
99
+
In some cases, you may want to notify your application about the Azure AD B2C page that's currently being presented. For example, when a user selects the sign-up option, you may want the application to respond by hiding the links for signing in with a social account or adjusting the iframe size.
100
100
101
-
To notify your application of the current Azure AD B2C page, [enable your policy for JavaScript](./javascript-and-page-layout.md), and then use HTML5 post messages. The following JavaScript code sends a post message to the app with `signUp`:
101
+
To notify your application about the current Azure AD B2C page, [enable your policy for JavaScript](./javascript-and-page-layout.md), and then use HTML5 to post messages. The following JavaScript code sends a post message to the app with `signUp`:
When a user selects the sign-in button, the [web app](integrate-with-app-code-samples.md#web-apps-and-apis) generates an authorization request that takes the user to Azure AD B2C sign-in experience. After sign-in is complete, Azure AD B2C returns an ID token, or authorization code, to the configured redirect URI within your application.
110
110
111
-
To support embedded login, the iframe **src** property points to the sign-in controller, such as `/account/SignUpSignIn`, which generates the authorization request and redirects the user to Azure AD B2C policy.
111
+
To support embedded login, the iframe `src` attribute points to the sign-in controller, such as `/account/SignUpSignIn`, which generates the authorization request and redirects the user to Azure AD B2C policy.
@@ -134,9 +134,9 @@ The redirect URI can be the same redirect URI used by the iframe. You can skip t
134
134
135
135
## Configure a single-page application
136
136
137
-
For a single-page application, you'll also need to a second "sign-in" HTML page that loads into the iframe. This sign-in page hosts the authentication library code that generates the authorization code and returns the token.
137
+
For a single-page application, you'll also need a second "sign-in" HTML page that loads into the iframe. This sign-in page hosts the authentication library code that generates the authorization code and returns the token.
138
138
139
-
When the single-page application needs the access token, use JavaScript code to obtain the access token from the iframe and object that contains it.
139
+
When the single-page application needs the access token, use JavaScript code to obtain the access token from the iframe and the object that contains it.
140
140
141
141
> [!NOTE]
142
142
> Running MSAL 2.0 in an iframe is not currently supported.
Copy file name to clipboardExpand all lines: articles/active-directory-b2c/whats-new-docs.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -13,7 +13,7 @@ manager: CelesteDG
13
13
14
14
# Azure Active Directory B2C: What's new
15
15
16
-
Welcome to what's new in Azure Active Directory B2C documentation. This article lists new docs that have been added and those that have had significant updates in the last three months. To learn what's new with the B2C service, see [What's new in Azure Active Directory](../active-directory/fundamentals/whats-new.md).
16
+
Welcome to what's new in Azure Active Directory B2C documentation. This article lists new docs that have been added and those that have had significant updates in the last three months. To learn what's new with the B2C service, see [What's new in Azure Active Directory](../active-directory/fundamentals/whats-new.md) and [Azure AD B2C developer release notes](custom-policy-developer-notes.md)
Copy file name to clipboardExpand all lines: articles/active-directory-domain-services/network-considerations.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
9
9
ms.subservice: domain-services
10
10
ms.workload: identity
11
11
ms.topic: conceptual
12
-
ms.date: 01/06/2022
12
+
ms.date: 06/20/2022
13
13
ms.author: justinha
14
14
15
15
---
@@ -42,7 +42,7 @@ As you design the virtual network for Azure AD DS, the following considerations
42
42
43
43
A managed domain connects to a subnet in an Azure virtual network. Design this subnet for Azure AD DS with the following considerations:
44
44
45
-
* A managed domain must be deployed in its own subnet. Don't use an existing subnet or a gateway subnet. This includes the usage of remote gateways settings in the virtual network peering which puts the managed domain in an unsupported state.
45
+
* A managed domain must be deployed in its own subnet. Using an existing subnet, gateway subnet, or remote gateways settings in the virtual network peering is unsupported.
46
46
* A network security group is created during the deployment of a managed domain. This network security group contains the required rules for correct service communication.
47
47
* Don't create or use an existing network security group with your own custom rules.
48
48
* A managed domain requires 3-5 IP addresses. Make sure that your subnet IP address range can provide this number of addresses.
@@ -30,7 +30,7 @@ The following Azure AD Multi-Factor Authentication settings are available in the
30
30
|[Notifications](#notifications)| Enable notifications of events from MFA Server. |
31
31
|[OATH tokens](concept-authentication-oath-tokens.md)| Used in cloud-based Azure AD Multi-Factor Authentication environments to manage OATH tokens for users. |
32
32
|[Phone call settings](#phone-call-settings)| Configure settings related to phone calls and greetings for cloud and on-premises environments. |
33
-
| Providers | This will show any existing authentication providers that you have associated with your account. Adding new providers is disabled as of September 1, 2018. |
33
+
| Providers | This will show any existing authentication providers that you've associated with your account. Adding new providers is disabled as of September 1, 2018. |
34
34
35
35

36
36
@@ -243,8 +243,8 @@ If your organization uses the NPS extension to provide MFA to on-premises applic
243
243
244
244
| Azure AD tenant type | Trusted IP feature options |
245
245
|:--- |:--- |
246
-
| Managed |**Specific range of IP addresses**: Administrators specify a range of IP addresses that can bypass multi-factor authentication for users who sign in from the company intranet. A maximum of 50 trusted IP ranges can be configured.|
247
-
| Federated |**All Federated Users**: All federated users who sign in from inside the organization can bypass multi-factor authentication. Users bypass verification by using a claim that's issued by Active Directory Federation Services (AD FS).<br/>**Specific range of IP addresses**: Administrators specify a range of IP addresses that can bypass multi-factor authentication for users who sign in from the company intranet. |
246
+
| Managed |**Specific range of IP addresses**: Administrators specify a range of IP addresses that can bypass multi-factor authentications for users who sign in from the company intranet. A maximum of 50 trusted IP ranges can be configured.|
247
+
| Federated |**All Federated Users**: All federated users who sign in from inside the organization can bypass multi-factor authentications. Users bypass verifications by using a claim that's issued by Active Directory Federation Services (AD FS).<br/>**Specific range of IP addresses**: Administrators specify a range of IP addresses that can bypass multi-factor authentication for users who sign in from the company intranet. |
248
248
249
249
Trusted IP bypass works only from inside the company intranet. If you select the **All Federated Users** option and a user signs in from outside the company intranet, the user has to authenticate by using multi-factor authentication. The process is the same even if the user presents an AD FS claim.
250
250
@@ -256,7 +256,7 @@ When trusted IPs are used, multi-factor authentication isn't required for browse
256
256
257
257
#### User experience outside the corporate network
258
258
259
-
Regardless of whether trusted IP are defined, multi-factor authentication is required for browser flows. App passwords are required for older rich-client applications.
259
+
Regardless of whether trusted IPs are defined, multi-factor authentication is required for browser flows. App passwords are required for older rich-client applications.
260
260
261
261
#### Enable named locations by using Conditional Access
262
262
@@ -277,14 +277,14 @@ To enable trusted IPs by using Conditional Access policies, complete the followi
277
277
1. Select **Configure MFA trusted IPs**.
278
278
1. On the **Service Settings** page, under **Trusted IPs**, choose one of these options:
279
279
280
-
***For requests from federated users originating from my intranet**: To choose this option, select the checkbox. All federated users who sign in from the corporate network bypass multi-factor authentication by using a claim that's issued by AD FS. Ensure that AD FS has a rule to add the intranet claim to the appropriate traffic. If the rule doesn't exist, create the following rule in AD FS:
280
+
***For requests from federated users originating from my intranet**: To choose this option, select the checkbox. All federated users who sign in from the corporate network bypass multi-factor authentications by using a claim that's issued by AD FS. Ensure that AD FS has a rule to add the intranet claim to the appropriate traffic. If the rule doesn't exist, create the following rule in AD FS:
***For requests from a specific range of public IPs**: To choose this option, enter the IP addresses in the text box, in CIDR notation.
285
285
* For IP addresses that are in the range *xxx.xxx.xxx*.1 through *xxx.xxx.xxx*.254, use notation like ***xxx.xxx.xxx*.0/24**.
286
286
* For a single IP address, use notation like ***xxx.xxx.xxx.xxx*/32**.
287
-
* Enter up to 50 IP address ranges. Users who sign in from these IP addresses bypass multi-factor authentication.
287
+
* Enter up to 50 IP address ranges. Users who sign in from these IP addresses bypass multi-factor authentications.
288
288
289
289
1. Select **Save**.
290
290
@@ -299,12 +299,12 @@ If you don't want to use Conditional Access policies to enable trusted IPs, you
299
299
300
300
***For requests from federated users on my intranet**: To choose this option, select the checkbox. All federated users who sign in from the corporate network bypass multi-factor authentication by using a claim that's issued by AD FS. Ensure that AD FS has a rule to add the intranet claim to the appropriate traffic. If the rule doesn't exist, create the following rule in AD FS:
***For requests from a specified range of IP address subnets**: To choose this option, enter the IP addresses in the text box, in CIDR notation.
305
305
* For IP addresses that are in the range *xxx.xxx.xxx*.1 through *xxx.xxx.xxx*.254, use notation like ***xxx.xxx.xxx*.0/24**.
306
306
* For a single IP address, use notation like ***xxx.xxx.xxx.xxx*/32**.
307
-
* Enter up to 50 IP address ranges. Users who sign in from these IP addresses bypass multi-factor authentication.
307
+
* Enter up to 50 IP address ranges. Users who sign in from these IP addresses bypass multi-factor authentications.
308
308
309
309
1. Select **Save**.
310
310
@@ -366,7 +366,7 @@ To enable and configure the option to allow users to remember their MFA status a
366
366
1. Select **Per-user MFA**.
367
367
1. Under **multi-factor authentication** at the top of the page, select **service settings**.
368
368
1. On the **service settings** page, under **remember multi-factor authentication**, select **Allow users to remember multi-factor authentication on devices they trust**.
369
-
1. Set the number of days to allow trusted devices to bypass multi-factor authentication. For the optimal user experience, extend the duration to 90 or more days.
369
+
1. Set the number of days to allow trusted devices to bypass multi-factor authentications. For the optimal user experience, extend the duration to 90 or more days.
0 commit comments