You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory-b2c/self-asserted-technical-profile.md
+6-5Lines changed: 6 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -9,7 +9,7 @@ manager: celestedg
9
9
ms.service: active-directory
10
10
ms.workload: identity
11
11
ms.topic: reference
12
-
ms.date: 12/10/2019
12
+
ms.date: 02/04/2020
13
13
ms.author: marsma
14
14
ms.subservice: B2C
15
15
---
@@ -186,15 +186,16 @@ You can also call a REST API technical profile with your business logic, overwri
186
186
187
187
| Attribute | Required | Description |
188
188
| --------- | -------- | ----------- |
189
-
| setting.showContinueButton | No | Displays the continue button. Possible values: `true` (default), or `false`|
190
-
| setting.showCancelButton | No | Displays the cancel button. Possible values: `true` (default), or `false`|
191
189
| setting.operatingMode | No | For a sign-in page, this property controls the behavior of the username field, such as input validation and error messages. Expected values: `Username` or `Email`. |
190
+
| AllowGenerationOfClaimsWithNullValues| No| Allow to generate a claim with null value. For example, in a case user doesn't select a checkbox.|
192
191
| ContentDefinitionReferenceId | Yes | The identifier of the [content definition](contentdefinitions.md) associated with this technical profile. |
193
192
| EnforceEmailVerification | No | For sign-up or profile edit, enforces email verification. Possible values: `true` (default), or `false`. |
194
-
| setting.showSignupLink | No | Displays the sign-up button. Possible values: `true` (default), or `false`|
195
193
| setting.retryLimit | No | Controls the number of times a user can try to provide the data that is checked against a validation technical profile . For example, a user tries to sign-up with an account that already exists and keeps trying until the limit reached.
196
194
| SignUpTarget | No | The signup target exchange identifier. When the user clicks the sign-up button, Azure AD B2C executes the specified exchange identifier. |
197
-
195
+
| setting.showCancelButton | No | Displays the cancel button. Possible values: `true` (default), or `false`|
196
+
| setting.showContinueButton | No | Displays the continue button. Possible values: `true` (default), or `false`|
197
+
| setting.showSignupLink | No | Displays the sign-up button. Possible values: `true` (default), or `false`|
198
+
| setting.forgotPasswordLinkLocation| No| Displays the forgot password link. Possible values: `AfterInput` (default) the link is displayed at the bottom of the page, or `None` removes the forgot password link.|
Copy file name to clipboardExpand all lines: articles/active-directory-b2c/string-transformations.md
+112-1Lines changed: 112 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -9,7 +9,7 @@ manager: celestedg
9
9
ms.service: active-directory
10
10
ms.workload: identity
11
11
ms.topic: reference
12
-
ms.date: 02/03/2020
12
+
ms.date: 02/04/2020
13
13
ms.author: marsma
14
14
ms.subservice: B2C
15
15
---
@@ -495,6 +495,47 @@ Use this claims transformation to parse the domain name after the @ symbol of th
495
495
- Output claims:
496
496
-**domain**: outlook.com
497
497
498
+
## SetClaimsIfRegexMatch
499
+
500
+
Checks that a string claim `claimToMatch` and `matchTo` input parameter are equal, and sets the output claims with the value present in `outputClaimIfMatched` input parameter, along with compare result output claim, which is to be set as `true` or `false` based on the result of comparison.
501
+
502
+
| Item | TransformationClaimType | Data Type | Notes |
| inputClaim | claimToMatch | string | The claim type, which is to be compared. |
505
+
| InputParameter | matchTo | string | The regular expression to match. |
506
+
| InputParameter | outputClaimIfMatched | string | The value to be set if strings are equal. |
507
+
| OutputClaim | outputClaim | string | If regular expression is match, this output claim contains the value of `outputClaimIfMatched` input parameter. Or null, if no match. |
508
+
| OutputClaim | regexCompareResultClaim | boolean | The regular expression match result output claim type, which is to be set as `true` or `false` based on the result of matching. |
509
+
510
+
For example, checks whether the provided phone number is valid, based on phone number regular expression pattern.
Checks that a string claim and `matchTo` input parameter are equal, and sets the output claims with the value present in `stringMatchMsg` and `stringMatchMsgCode` input parameters, along with compare result output claim, which is to be set as `true` or `false` based on the result of comparison.
@@ -703,3 +744,73 @@ For example, normalize a phone number, by removing the `-` characters
703
744
- Output claims:
704
745
-**outputClaim**: "+164411452054"
705
746
747
+
## StringJoin
748
+
749
+
Concatenates the elements of a specified string collection claim type, using the specified separator between each element or member.
750
+
751
+
| Item | TransformationClaimType | Data Type | Notes |
| InputClaim | inputClaim | stringCollection | A collection that contains the strings to concatenate. |
754
+
| InputParameter | delimiter | string | The string to use as a separator, such as comma `,`. |
755
+
| OutputClaim | outputClaim | string | A string that consists of the members of the `inputClaim` string collection, delimited by the `delimiter` input parameter. |
756
+
757
+
The following example takes a string collection of user roles, and convert it to a comma delimiter string. You can user this method to store a string collection in Azure AD user account. Later, when you read the account from the directory, use the `StringSplit` to convert the comma delimiter string back to string collection.
| InputClaim | inputClaim | string | A string claim type that contains the sub strings to split. |
790
+
| InputParameter | delimiter | string | The string to use as a separator, such as comma `,`. |
791
+
| OutputClaim | outputClaim | stringCollection | A string collection whose elements contain the substrings in this string that are delimited by the `delimiter` input parameter. |
792
+
793
+
The following example takes a comma delimiter string of user roles, and convert it to a string collection.
Copy file name to clipboardExpand all lines: articles/active-directory-b2c/userjourneys.md
+8-2Lines changed: 8 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,7 +8,7 @@ manager: celestedg
8
8
ms.service: active-directory
9
9
ms.workload: identity
10
10
ms.topic: reference
11
-
ms.date: 02/03/2020
11
+
ms.date: 02/04/2020
12
12
ms.author: marsma
13
13
ms.subservice: B2C
14
14
---
@@ -158,12 +158,18 @@ Preconditions can check multiple preconditions. The following example checks whe
158
158
159
159
An orchestration step of type `ClaimsProviderSelection` or `CombinedSignInAndSignUp` may contain a list of claims providers that a user can sign in with. The order of the elements inside the `ClaimsProviderSelections` elements controls the order of the identity providers presented to the user.
160
160
161
-
The **ClaimsProviderSelection** element contains the following element:
161
+
The **ClaimsProviderSelections** element contains the following element:
162
162
163
163
| Element | Occurrences | Description |
164
164
| ------- | ----------- | ----------- |
165
165
| ClaimsProviderSelection | 1:n| Provides the list of claims providers that can be selected.|
166
166
167
+
The **ClaimsProviderSelections** element contains the following attributes:
168
+
169
+
| Attribute | Required | Description |
170
+
| --------- | -------- | ----------- |
171
+
| DisplayOption| No | Controls the behavior of a case where a single claims provider selection is available. Possible values: `DoNotShowSingleProvider` (default) , the user is redirected immediately to the federated identity provider. Or `ShowSingleProvider` Azure AD B2C presents the sign-in page with the single identity provider selection. To use this attribute, the [content definition version](page-layout.md) must be `urn:com:microsoft:aad:b2c:elements:contract:providerselection:1.0.0` and above.|
172
+
167
173
The **ClaimsProviderSelection** element contains the following attributes:
0 commit comments