Skip to content

Commit 5361d9f

Browse files
authored
Merge pull request #176163 from MicrosoftDocs/master
10/18 AM Publish
2 parents 147910f + 5552aab commit 5361d9f

File tree

45 files changed

+357
-160
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

45 files changed

+357
-160
lines changed

articles/active-directory-b2c/identity-provider-facebook.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -38,7 +38,7 @@ If you don't already have a Facebook account, sign up at [https://www.facebook.c
3838

3939
1. Sign in to [Facebook for developers](https://developers.facebook.com/apps) with your Facebook developer account credentials.
4040
1. Select **Create App**.
41-
1. For the **Select an app type**, select **Consumer**, then select **Continue**.
41+
1. For the **Select an app type**, select **Consumer**, then select **Next**.
4242
1. Enter an **App Display Name** and a valid **App Contact Email**.
4343
1. Select **Create App**. This step may require you to accept Facebook platform policies and complete an online security check.
4444
1. Select **Settings** > **Basic**.
@@ -51,7 +51,7 @@ If you don't already have a Facebook account, sign up at [https://www.facebook.c
5151
1. At the bottom of the page, select **Add Platform**, and then select **Website**.
5252
1. In **Site URL**, enter the address of your website, for example `https://contoso.com`.
5353
1. Select **Save Changes**.
54-
1. From the menu, select the **plus** sign next to **PRODUCTS**. Under the **Add Products to Your App**, select **Set up** under **Facebook Login**.
54+
1. From the menu, select the **plus** sign or **Add Product** link next to **PRODUCTS**. Under the **Add Products to Your App**, select **Set up** under **Facebook Login**.
5555
1. From the menu, select **Facebook Login**, select **Settings**.
5656
1. In **Valid OAuth redirect URIs**, enter `https://your-tenant-name.b2clogin.com/your-tenant-name.onmicrosoft.com/oauth2/authresp`. If you use a [custom domain](custom-domain.md), enter `https://your-domain-name/your-tenant-name.onmicrosoft.com/oauth2/authresp`. Replace `your-tenant-name` with the name of your tenant, and `your-domain-name` with your custom domain.
5757
1. Select **Save Changes** at the bottom of the page.

articles/active-directory-b2c/tutorial-create-user-flows.md

Lines changed: 29 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ manager: CelesteDG
88
ms.service: active-directory
99
ms.workload: identity
1010
ms.topic: tutorial
11-
ms.date: 10/12/2021
11+
ms.date: 10/18/2021
1212
ms.author: kengaderdus
1313
ms.subservice: B2C
1414
zone_pivot_groups: b2c-policy-type
@@ -49,7 +49,7 @@ A user flow lets you determine how users interact with your application when the
4949

5050
- If you don't have one already, [create an Azure AD B2C tenant](tutorial-create-tenant.md) that is linked to your Azure subscription.
5151
- [Register a web application](tutorial-register-applications.md), and [enable ID token implicit grant](tutorial-register-applications.md#enable-id-token-implicit-grant).
52-
- [Create a Facebook application](identity-provider-facebook.md#create-a-facebook-application). Skip the prerequisites and the rest of the steps in the [Set up sign-up and sign-in with a Facebook account](identity-provider-facebook.md) article. Although a Facebook application is not required for using custom policies, it's used in this walkthrough to demonstrate enabling social login in a custom policy.
52+
5353

5454
::: zone-end
5555

@@ -167,16 +167,6 @@ If you want to enable users to edit their profile in your application, you use a
167167
1. For **Key usage**, select **Encryption**.
168168
1. Select **Create**.
169169

170-
### Create the Facebook key
171-
172-
Add your Facebook application's [App Secret](identity-provider-facebook.md) as a policy key. You can use the App Secret of the application you created as part of this article's prerequisites.
173-
174-
1. Select **Policy Keys** and then select **Add**.
175-
1. For **Options**, choose `Manual`.
176-
1. For **Name**, enter `FacebookSecret`. The prefix `B2C_1A_` might be added automatically.
177-
1. In **Secret**, enter your Facebook application's *App Secret* from developers.facebook.com. This value is the secret, not the application ID.
178-
1. For **Key usage**, select **Signature**.
179-
1. Select **Create**.
180170

181171
## Register Identity Experience Framework applications
182172

@@ -222,8 +212,11 @@ Next, expose the API by adding a scope:
222212
Next, specify that the application should be treated as a public client:
223213

224214
1. In the left menu, under **Manage**, select **Authentication**.
225-
1. Under **Advanced settings**, in the **Allow public client flows** section, set **Enable the following mobile and desktop flows** to **Yes**. Ensure that **"allowPublicClient": true** is set in the application manifest.
215+
1. Under **Advanced settings**, in the **Allow public client flows** section, set **Enable the following mobile and desktop flows** to **Yes**.
226216
1. Select **Save**.
217+
1. Ensure that **"allowPublicClient": true** is set in the application manifest:
218+
1. In the left menu, under **Manage**, select **Manifest** to open application manifest.
219+
1. Find **allowPublicClient** key and ensure its value is set to **true**.
227220

228221
Now, grant permissions to the API scope you exposed earlier in the *IdentityExperienceFramework* registration:
229222

@@ -303,14 +296,35 @@ As you upload the files, Azure adds the prefix `B2C_1A_` to each.
303296
1. For **Select application** on the overview page of the custom policy, select the web application named *webapp1* that you previously registered.
304297
1. Make sure that the **Reply URL** is `https://jwt.ms`.
305298
1. Select **Run now**.
306-
1. Sign up using an email address.
299+
1. Sign up using an email address. Don't use **Facebook** option yet.
307300
1. Select **Run now** again.
308301
1. Sign in with the same account to confirm that you have the correct configuration.
309302

310303
## Add Facebook as an identity provider
311304

312-
As mentioned in [Prerequisites](#prerequisites), Facebook is *not* required for using custom policies, but is used here to demonstrate how you can enable federated social login in a custom policy.
305+
The **SocialAndLocalAccounts** starter pack includes Facebook social sign in. Facebook is *not* required for using custom policies, but we use it here to demonstrate how you can enable federated social login in a custom policy.
306+
307+
### Create Facebook application
308+
309+
Use the steps outlined in [Create a Facebook application](identity-provider-facebook.md#create-a-facebook-application) to obtain Facebook *App ID* and *App Secret*. Skip the prerequisites and the rest of the steps in the [Set up sign-up and sign-in with a Facebook account](identity-provider-facebook.md) article.
310+
311+
### Create the Facebook key
312+
313+
Add your Facebook application's [App Secret](identity-provider-facebook.md) as a policy key. You can use the App Secret of the application you created as part of this article's prerequisites.
314+
315+
1. Sign in to the [Azure portal](https://portal.azure.com).
316+
1. Make sure you're using the directory that contains your Azure AD B2C tenant. Select the **Directories + subscriptions** icon in the portal toolbar.
317+
1. On the **Portal settings | Directories + subscriptions** page, find your Azure AD B2C directory in the **Directory name** list, and then select **Switch**.
318+
1. In the Azure portal, search for and select **Azure AD B2C**.
319+
1. On the overview page, under **Policies**, select **Identity Experience Framework**.
320+
1. Select **Policy Keys** and then select **Add**.
321+
1. For **Options**, choose `Manual`.
322+
1. For **Name**, enter `FacebookSecret`. The prefix `B2C_1A_` might be added automatically.
323+
1. In **Secret**, enter your Facebook application's *App Secret* from developers.facebook.com. This value is the secret, not the application ID.
324+
1. For **Key usage**, select **Signature**.
325+
1. Select **Create**.
313326

327+
### Update TrustFrameworkExtensions.xml in custom policy starter pack
314328
1. In the `SocialAndLocalAccounts/`**`TrustFrameworkExtensions.xml`** file, replace the value of `client_id` with the Facebook application ID:
315329

316330
```xml

articles/active-directory/authentication/concept-password-ban-bad-combined-policy.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,7 @@ As the combined check for password policy and banned passwords gets rolled out t
2222

2323
## Azure AD password policies
2424

25-
A password policy is applied to all user and admin accounts that are created and managed directly in Azure AD. You can ban weak passwords and define parameters to [lock out an account](howto-password-smart-lockout.md) after repeated bad password attempts. Other password policy settings can't be modified.
25+
A password policy is applied to all user and admin accounts that are created and managed directly in Azure AD. You can [ban weak passwords](concept-password-ban-bad.md) and define parameters to [lock out an account](howto-password-smart-lockout.md) after repeated bad password attempts. Other password policy settings can't be modified.
2626

2727
The Azure AD password policy doesn't apply to user accounts synchronized from an on-premises AD DS environment using Azure AD Connect, unless you enable EnforceCloudPasswordPolicyForPasswordSyncedUsers.
2828

@@ -35,7 +35,7 @@ The following Azure AD password policy requirements apply for all passwords that
3535
| Password length |Passwords require<br>- A minimum of 8 characters<br>- A maximum of 256 characters</li> |
3636
| Password complexity |Passwords require three out of four of the following:<br>- Uppercase characters<br>- Lowercase characters<br>- Numbers <br>- Symbols<br> Note: Password complexity check is not required for Education tenants. |
3737
| Password not recently used | When a user changes or resets their password, the new password cannot be the same as the current or recently used passwords. |
38-
| Password is not banned by Azure AD Password Protection | The password can't be on the global list of banned passwords for Azure AD Password Protection, or on a customizable list of banned passwords specific to your organization. |
38+
| Password is not banned by [Azure AD Password Protection](concept-password-ban-bad.md) | The password can't be on the global list of banned passwords for Azure AD Password Protection, or on the customizable list of banned passwords specific to your organization. |
3939

4040
## Password expiration policies
4141

@@ -57,4 +57,4 @@ The following expiration requirements apply to other providers that use Azure AD
5757
## Next steps
5858

5959
- [Password policies and account restrictions in Azure Active Directory](concept-sspr-policy.md)
60-
- [Eliminate bad passwords using Azure Active Directory Password Protection](concept-password-ban-bad.md)
60+
- [Eliminate bad passwords using Azure Active Directory Password Protection](concept-password-ban-bad.md)

articles/active-directory/conditional-access/concept-conditional-access-session.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: conditional-access
88
ms.topic: conceptual
9-
ms.date: 09/21/2021
9+
ms.date: 10/13/2021
1010

1111
ms.author: joflore
1212
author: MicrosoftGuyJFlo

articles/active-directory/governance/entitlement-management-overview.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -119,11 +119,11 @@ To better understand entitlement management and its documentation, you can refer
119119

120120
| Term | Description |
121121
| --- | --- |
122-
| access package | A bundle of resources that a team or project needs and is governed with policies. An access package is always contained in a catalog. You would create a new access package for a scenario in which users need to request access. |
123-
| access request | A request to access the resources in an access package. A request typically goes through an approval workflow. If approved, the requesting user receives an access package assignment. |
124-
| assignment | An assignment of an access package to a user ensures the user has all the resource roles of that access package. Access package assignments typically have a time limit before they expire. |
125-
| catalog | A container of related resources and access packages. Catalogs are used for delegation, so that non-administrators can create their own access packages. Catalog owners can add resources they own to a catalog. |
126-
| catalog creator | A collection of users who are authorized to create new catalogs. When a non-administrator user who is authorized to be a catalog creator creates a new catalog, they automatically become the owner of that catalog. |
122+
| access package | A bundle of resources that a team or project needs and is governed with policies. An access package is always contained in a catalog. You would create a new access package for a scenario in which users need to request access. |
123+
| access request | A request to access the resources in an access package. A request typically goes through an approval workflow. If approved, the requesting user receives an access package assignment. |
124+
| assignment | An assignment of an access package to a user ensures the user has all the resource roles of that access package. Access package assignments typically have a time limit before they expire. |
125+
| catalog | A container of related resources and access packages. Catalogs are used for delegation, so that non-administrators can create their own access packages. Catalog owners can add resources they own to a catalog. |
126+
| catalog creator | A collection of users who are authorized to create new catalogs. When a non-administrator user who is authorized to be a catalog creator creates a new catalog, they automatically become the owner of that catalog. |
127127
| connected organization | An external Azure AD directory or domain that you have a relationship with. The users from a connected organization can be specified in a policy as being allowed to request access. |
128128
| policy | A set of rules that defines the access lifecycle, such as how users get access, who can approve, and how long users have access through an assignment. A policy is linked to an access package. For example, an access package could have two policies - one for employees to request access and a second for external users to request access. |
129129
| resource | An asset, such as an Office group, a security group, an application, or a SharePoint Online site, with a role that a user can be granted permissions to. |

articles/active-directory/hybrid/how-to-connect-pta-current-limitations.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -38,6 +38,7 @@ The following scenarios are _not_ supported:
3838
- Detection of users with [leaked credentials](../identity-protection/overview-identity-protection.md).
3939
- Azure AD Domain Services needs Password Hash Synchronization to be enabled on the tenant. Therefore tenants that use Pass-through Authentication _only_ don't work for scenarios that need Azure AD Domain Services.
4040
- Pass-through Authentication is not integrated with [Azure AD Connect Health](./whatis-azure-ad-connect.md).
41+
- Signing in to Azure AD joined (AADJ) devices with a temporary or expired password is not supported for Pass-through authentication users. The error "the sign-in method you're trying to use isn't allowed" will appear. These users must sign in to a browser to update their temporary password.
4142

4243
> [!IMPORTANT]
4344
> As a workaround for unsupported scenarios _only_ (except Azure AD Connect Health integration), enable Password Hash Synchronization on the [Optional features](how-to-connect-install-custom.md#optional-features) page in the Azure AD Connect wizard.

articles/active-directory/manage-apps/f5-aad-integration.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -143,6 +143,8 @@ The following tutorials provide detailed guidance on implementing some of the mo
143143

144144
- [Securing F5 BIG-IP SSL-VPN with Azure AD SHA](f5-aad-password-less-vpn.md)
145145

146+
- [Configure Azure AD B2C with F5 BIG-IP](https://docs.microsoft.com/azure/active-directory-b2c/partner-f5)
147+
146148
## Additional resources
147149

148150
- [The end of passwords, go passwordless](https://www.microsoft.com/security/business/identity/passwordless)
@@ -167,4 +169,4 @@ Our recommendation is to start with an application that isn’t yet published vi
167169

168170
The below interactive guide walks through the high-level procedure for implementing SHA and seeing the end-user experience.
169171

170-
[![The image shows interactive guide cover](media/f5-aad-integration/interactive-guide.png)](https://aka.ms/Secure-Hybrid-Access-F5-Interactive-Guide)
172+
[![The image shows interactive guide cover](media/f5-aad-integration/interactive-guide.png)](https://aka.ms/Secure-Hybrid-Access-F5-Interactive-Guide)

articles/active-directory/manage-apps/toc.yml

Lines changed: 12 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -140,12 +140,18 @@
140140
items:
141141
- name: Secure hybrid access with Azure AD
142142
href: secure-hybrid-access.md
143-
- name: F5 and Azure AD integration
144-
href: f5-aad-integration.md
145-
- name: F5 BIG-IP VE deployment in Azure IaaS
146-
href: f5-bigip-deployment-guide.md
147-
- name: F5 Big-IP with Azure AD for passwordless VPN
148-
href: f5-aad-password-less-vpn.md
143+
- name: Datawiza
144+
href: datawiza-with-azure-ad.md
145+
- name: F5
146+
items:
147+
- name: F5 and Azure AD integration
148+
href: f5-aad-integration.md
149+
- name: F5 BIG-IP VE deployment in Azure IaaS
150+
href: f5-bigip-deployment-guide.md
151+
- name: F5 Big-IP with Azure AD for passwordless VPN
152+
href: f5-aad-password-less-vpn.md
153+
- name: Silverfort
154+
href: silverfort-azure-ad-integration.md
149155
- name: Single sign-on
150156
items:
151157
- name: Linked

0 commit comments

Comments
 (0)