You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory-b2c/identity-provider-facebook.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -38,7 +38,7 @@ If you don't already have a Facebook account, sign up at [https://www.facebook.c
38
38
39
39
1. Sign in to [Facebook for developers](https://developers.facebook.com/apps) with your Facebook developer account credentials.
40
40
1. Select **Create App**.
41
-
1. For the **Select an app type**, select **Consumer**, then select **Continue**.
41
+
1. For the **Select an app type**, select **Consumer**, then select **Next**.
42
42
1. Enter an **App Display Name** and a valid **App Contact Email**.
43
43
1. Select **Create App**. This step may require you to accept Facebook platform policies and complete an online security check.
44
44
1. Select **Settings** > **Basic**.
@@ -51,7 +51,7 @@ If you don't already have a Facebook account, sign up at [https://www.facebook.c
51
51
1. At the bottom of the page, select **Add Platform**, and then select **Website**.
52
52
1. In **Site URL**, enter the address of your website, for example `https://contoso.com`.
53
53
1. Select **Save Changes**.
54
-
1. From the menu, select the **plus** sign next to **PRODUCTS**. Under the **Add Products to Your App**, select **Set up** under **Facebook Login**.
54
+
1. From the menu, select the **plus** sign or **Add Product** link next to **PRODUCTS**. Under the **Add Products to Your App**, select **Set up** under **Facebook Login**.
55
55
1. From the menu, select **Facebook Login**, select **Settings**.
56
56
1. In **Valid OAuth redirect URIs**, enter `https://your-tenant-name.b2clogin.com/your-tenant-name.onmicrosoft.com/oauth2/authresp`. If you use a [custom domain](custom-domain.md), enter `https://your-domain-name/your-tenant-name.onmicrosoft.com/oauth2/authresp`. Replace `your-tenant-name` with the name of your tenant, and `your-domain-name` with your custom domain.
57
57
1. Select **Save Changes** at the bottom of the page.
Copy file name to clipboardExpand all lines: articles/active-directory-b2c/tutorial-create-user-flows.md
+29-15Lines changed: 29 additions & 15 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,7 +8,7 @@ manager: CelesteDG
8
8
ms.service: active-directory
9
9
ms.workload: identity
10
10
ms.topic: tutorial
11
-
ms.date: 10/12/2021
11
+
ms.date: 10/18/2021
12
12
ms.author: kengaderdus
13
13
ms.subservice: B2C
14
14
zone_pivot_groups: b2c-policy-type
@@ -49,7 +49,7 @@ A user flow lets you determine how users interact with your application when the
49
49
50
50
- If you don't have one already, [create an Azure AD B2C tenant](tutorial-create-tenant.md) that is linked to your Azure subscription.
51
51
-[Register a web application](tutorial-register-applications.md), and [enable ID token implicit grant](tutorial-register-applications.md#enable-id-token-implicit-grant).
52
-
-[Create a Facebook application](identity-provider-facebook.md#create-a-facebook-application). Skip the prerequisites and the rest of the steps in the [Set up sign-up and sign-in with a Facebook account](identity-provider-facebook.md) article. Although a Facebook application is not required for using custom policies, it's used in this walkthrough to demonstrate enabling social login in a custom policy.
52
+
53
53
54
54
::: zone-end
55
55
@@ -167,16 +167,6 @@ If you want to enable users to edit their profile in your application, you use a
167
167
1. For **Key usage**, select **Encryption**.
168
168
1. Select **Create**.
169
169
170
-
### Create the Facebook key
171
-
172
-
Add your Facebook application's [App Secret](identity-provider-facebook.md) as a policy key. You can use the App Secret of the application you created as part of this article's prerequisites.
173
-
174
-
1. Select **Policy Keys** and then select **Add**.
175
-
1. For **Options**, choose `Manual`.
176
-
1. For **Name**, enter `FacebookSecret`. The prefix `B2C_1A_` might be added automatically.
177
-
1. In **Secret**, enter your Facebook application's *App Secret* from developers.facebook.com. This value is the secret, not the application ID.
@@ -222,8 +212,11 @@ Next, expose the API by adding a scope:
222
212
Next, specify that the application should be treated as a public client:
223
213
224
214
1. In the left menu, under **Manage**, select **Authentication**.
225
-
1. Under **Advanced settings**, in the **Allow public client flows** section, set **Enable the following mobile and desktop flows** to **Yes**. Ensure that **"allowPublicClient": true** is set in the application manifest.
215
+
1. Under **Advanced settings**, in the **Allow public client flows** section, set **Enable the following mobile and desktop flows** to **Yes**.
226
216
1. Select **Save**.
217
+
1. Ensure that **"allowPublicClient": true** is set in the application manifest:
218
+
1. In the left menu, under **Manage**, select **Manifest** to open application manifest.
219
+
1. Find **allowPublicClient** key and ensure its value is set to **true**.
227
220
228
221
Now, grant permissions to the API scope you exposed earlier in the *IdentityExperienceFramework* registration:
229
222
@@ -303,14 +296,35 @@ As you upload the files, Azure adds the prefix `B2C_1A_` to each.
303
296
1. For **Select application** on the overview page of the custom policy, select the web application named *webapp1* that you previously registered.
304
297
1. Make sure that the **Reply URL** is `https://jwt.ms`.
305
298
1. Select **Run now**.
306
-
1. Sign up using an email address.
299
+
1. Sign up using an email address. Don't use **Facebook** option yet.
307
300
1. Select **Run now** again.
308
301
1. Sign in with the same account to confirm that you have the correct configuration.
309
302
310
303
## Add Facebook as an identity provider
311
304
312
-
As mentioned in [Prerequisites](#prerequisites), Facebook is *not* required for using custom policies, but is used here to demonstrate how you can enable federated social login in a custom policy.
305
+
The **SocialAndLocalAccounts** starter pack includes Facebook social sign in. Facebook is *not* required for using custom policies, but we use it here to demonstrate how you can enable federated social login in a custom policy.
306
+
307
+
### Create Facebook application
308
+
309
+
Use the steps outlined in [Create a Facebook application](identity-provider-facebook.md#create-a-facebook-application) to obtain Facebook *App ID* and *App Secret*. Skip the prerequisites and the rest of the steps in the [Set up sign-up and sign-in with a Facebook account](identity-provider-facebook.md) article.
310
+
311
+
### Create the Facebook key
312
+
313
+
Add your Facebook application's [App Secret](identity-provider-facebook.md) as a policy key. You can use the App Secret of the application you created as part of this article's prerequisites.
314
+
315
+
1. Sign in to the [Azure portal](https://portal.azure.com).
316
+
1. Make sure you're using the directory that contains your Azure AD B2C tenant. Select the **Directories + subscriptions** icon in the portal toolbar.
317
+
1. On the **Portal settings | Directories + subscriptions** page, find your Azure AD B2C directory in the **Directory name** list, and then select **Switch**.
318
+
1. In the Azure portal, search for and select **Azure AD B2C**.
319
+
1. On the overview page, under **Policies**, select **Identity Experience Framework**.
320
+
1. Select **Policy Keys** and then select **Add**.
321
+
1. For **Options**, choose `Manual`.
322
+
1. For **Name**, enter `FacebookSecret`. The prefix `B2C_1A_` might be added automatically.
323
+
1. In **Secret**, enter your Facebook application's *App Secret* from developers.facebook.com. This value is the secret, not the application ID.
324
+
1. For **Key usage**, select **Signature**.
325
+
1. Select **Create**.
313
326
327
+
### Update TrustFrameworkExtensions.xml in custom policy starter pack
314
328
1. In the `SocialAndLocalAccounts/`**`TrustFrameworkExtensions.xml`** file, replace the value of `client_id` with the Facebook application ID:
Copy file name to clipboardExpand all lines: articles/active-directory/authentication/concept-password-ban-bad-combined-policy.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -22,7 +22,7 @@ As the combined check for password policy and banned passwords gets rolled out t
22
22
23
23
## Azure AD password policies
24
24
25
-
A password policy is applied to all user and admin accounts that are created and managed directly in Azure AD. You can ban weak passwords and define parameters to [lock out an account](howto-password-smart-lockout.md) after repeated bad password attempts. Other password policy settings can't be modified.
25
+
A password policy is applied to all user and admin accounts that are created and managed directly in Azure AD. You can [ban weak passwords](concept-password-ban-bad.md) and define parameters to [lock out an account](howto-password-smart-lockout.md) after repeated bad password attempts. Other password policy settings can't be modified.
26
26
27
27
The Azure AD password policy doesn't apply to user accounts synchronized from an on-premises AD DS environment using Azure AD Connect, unless you enable EnforceCloudPasswordPolicyForPasswordSyncedUsers.
28
28
@@ -35,7 +35,7 @@ The following Azure AD password policy requirements apply for all passwords that
35
35
| Password length |Passwords require<br>- A minimum of 8 characters<br>- A maximum of 256 characters</li> |
36
36
| Password complexity |Passwords require three out of four of the following:<br>- Uppercase characters<br>- Lowercase characters<br>- Numbers <br>- Symbols<br> Note: Password complexity check is not required for Education tenants. |
37
37
| Password not recently used | When a user changes or resets their password, the new password cannot be the same as the current or recently used passwords. |
38
-
| Password is not banned by Azure AD Password Protection | The password can't be on the global list of banned passwords for Azure AD Password Protection, or on a customizable list of banned passwords specific to your organization. |
38
+
| Password is not banned by [Azure AD Password Protection](concept-password-ban-bad.md)| The password can't be on the global list of banned passwords for Azure AD Password Protection, or on the customizable list of banned passwords specific to your organization. |
39
39
40
40
## Password expiration policies
41
41
@@ -57,4 +57,4 @@ The following expiration requirements apply to other providers that use Azure AD
57
57
## Next steps
58
58
59
59
-[Password policies and account restrictions in Azure Active Directory](concept-sspr-policy.md)
60
-
-[Eliminate bad passwords using Azure Active Directory Password Protection](concept-password-ban-bad.md)
60
+
-[Eliminate bad passwords using Azure Active Directory Password Protection](concept-password-ban-bad.md)
Copy file name to clipboardExpand all lines: articles/active-directory/governance/entitlement-management-overview.md
+5-5Lines changed: 5 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -119,11 +119,11 @@ To better understand entitlement management and its documentation, you can refer
119
119
120
120
| Term | Description |
121
121
| --- | --- |
122
-
| access package | A bundle of resources that a team or project needs and is governed with policies. An access package is always contained in a catalog. You would create a new access package for a scenario in which users need to request access. |
123
-
| access request | A request to access the resources in an access package. A request typically goes through an approval workflow. If approved, the requesting user receives an access package assignment. |
124
-
| assignment | An assignment of an access package to a user ensures the user has all the resource roles of that access package. Access package assignments typically have a time limit before they expire. |
125
-
| catalog | A container of related resources and access packages. Catalogs are used for delegation, so that non-administrators can create their own access packages. Catalog owners can add resources they own to a catalog. |
126
-
| catalog creator | A collection of users who are authorized to create new catalogs. When a non-administrator user who is authorized to be a catalog creator creates a new catalog, they automatically become the owner of that catalog. |
122
+
| access package | A bundle of resources that a team or project needs and is governed with policies. An access package is always contained in a catalog. You would create a new access package for a scenario in which users need to request access. |
123
+
| access request | A request to access the resources in an access package. A request typically goes through an approval workflow. If approved, the requesting user receives an access package assignment. |
124
+
| assignment | An assignment of an access package to a user ensures the user has all the resource roles of that access package. Access package assignments typically have a time limit before they expire. |
125
+
| catalog | A container of related resources and access packages. Catalogs are used for delegation, so that non-administrators can create their own access packages. Catalog owners can add resources they own to a catalog. |
126
+
| catalog creator | A collection of users who are authorized to create new catalogs. When a non-administrator user who is authorized to be a catalog creator creates a new catalog, they automatically become the owner of that catalog. |
127
127
| connected organization | An external Azure AD directory or domain that you have a relationship with. The users from a connected organization can be specified in a policy as being allowed to request access. |
128
128
| policy | A set of rules that defines the access lifecycle, such as how users get access, who can approve, and how long users have access through an assignment. A policy is linked to an access package. For example, an access package could have two policies - one for employees to request access and a second for external users to request access. |
129
129
| resource | An asset, such as an Office group, a security group, an application, or a SharePoint Online site, with a role that a user can be granted permissions to. |
Copy file name to clipboardExpand all lines: articles/active-directory/hybrid/how-to-connect-pta-current-limitations.md
+1Lines changed: 1 addition & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -38,6 +38,7 @@ The following scenarios are _not_ supported:
38
38
- Detection of users with [leaked credentials](../identity-protection/overview-identity-protection.md).
39
39
- Azure AD Domain Services needs Password Hash Synchronization to be enabled on the tenant. Therefore tenants that use Pass-through Authentication _only_ don't work for scenarios that need Azure AD Domain Services.
40
40
- Pass-through Authentication is not integrated with [Azure AD Connect Health](./whatis-azure-ad-connect.md).
41
+
- Signing in to Azure AD joined (AADJ) devices with a temporary or expired password is not supported for Pass-through authentication users. The error "the sign-in method you're trying to use isn't allowed" will appear. These users must sign in to a browser to update their temporary password.
41
42
42
43
> [!IMPORTANT]
43
44
> As a workaround for unsupported scenarios _only_ (except Azure AD Connect Health integration), enable Password Hash Synchronization on the [Optional features](how-to-connect-install-custom.md#optional-features) page in the Azure AD Connect wizard.
0 commit comments