Skip to content

Commit 55f7fc8

Browse files
authored
Merge pull request #89619 from MicrosoftDocs/master
9/24 PM Publish
2 parents 992e070 + fe7439d commit 55f7fc8

File tree

253 files changed

+3304
-2773
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

253 files changed

+3304
-2773
lines changed

.openpublishing.redirection.json

Lines changed: 38 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -36880,7 +36880,12 @@
3688036880
},
3688136881
{
3688236882
"source_path": "articles/monitoring-and-diagnostics/monitoring-archive-diagnostic-logs.md",
36883-
"redirect_url": "/azure/azure-monitor/platform/archive-diagnostic-logs",
36883+
"redirect_url": "/azure/azure-monitor/platform/resource-logs-collect-storage",
36884+
"redirect_document_id": false
36885+
},
36886+
{
36887+
"source_path": "articles/azure-monitor/platform/archive-diagnostic-logs.md",
36888+
"redirect_url": "/azure/azure-monitor/platform/resource-logs-collect-storage",
3688436889
"redirect_document_id": true
3688536890
},
3688636891
{
@@ -36898,6 +36903,11 @@
3689836903
"redirect_url": "/azure/azure-monitor/platform/diagnostic-logs-stream-template",
3689936904
"redirect_document_id": true
3690036905
},
36906+
{
36907+
"source_path": "articles/azure-monitor/platform/diagnostic-logs-stream-template.md",
36908+
"redirect_url": "/azure/azure-monitor/platform/diagnostic-settings-template",
36909+
"redirect_document_id": true
36910+
},
3690136911
{
3690236912
"source_path": "articles/monitoring-and-diagnostics/monitoring-autoscale-scale-by-custom-metric.md",
3690336913
"redirect_url": "/azure/azure-monitor/platform/autoscale-custom-metric",
@@ -36965,7 +36975,17 @@
3696536975
},
3696636976
{
3696736977
"source_path": "articles/monitoring-and-diagnostics/monitoring-overview-of-diagnostic-logs.md",
36968-
"redirect_url": "/azure/azure-monitor/platform/diagnostic-logs-overview",
36978+
"redirect_url": "/azure/azure-monitor/platform/resource-logs-overview",
36979+
"redirect_document_id": false
36980+
},
36981+
{
36982+
"source_path": "articles/monitoring-and-diagnostics/diagnostic-logs-overview.md",
36983+
"redirect_url": "/azure/azure-monitor/platform/resource-logs-overview",
36984+
"redirect_document_id": false
36985+
},
36986+
{
36987+
"source_path": "articles/azure-monitor/platform/diagnostic-logs-overview.md",
36988+
"redirect_url": "/azure/azure-monitor/platform/resource-logs-overview",
3696936989
"redirect_document_id": true
3697036990
},
3697136991
{
@@ -36980,14 +37000,24 @@
3698037000
},
3698137001
{
3698237002
"source_path": "articles/monitoring-and-diagnostics/monitoring-stream-diagnostic-logs-to-event-hubs.md",
36983-
"redirect_url": "/azure/azure-monitor/platform/diagnostic-logs-stream-event-hubs",
37003+
"redirect_url": "/azure/azure-monitor/platform/resource-logs-stream-event-hubs",
37004+
"redirect_document_id": false
37005+
},
37006+
{
37007+
"source_path": "articles/azure-monitor/platform/diagnostic-logs-stream-event-hubs.md",
37008+
"redirect_url": "/azure/azure-monitor/platform/resource-logs-stream-event-hubs",
3698437009
"redirect_document_id": true
3698537010
},
3698637011
{
3698737012
"source_path": "articles/monitoring-and-diagnostics/monitor-stream-diagnostic-logs-log-analytics.md",
3698837013
"redirect_url": "/azure/azure-monitor/platform/diagnostic-logs-stream-log-store",
3698937014
"redirect_document_id": true
3699037015
},
37016+
{
37017+
"source_path": "articles/azure-monitor/platform/diagnostic-logs-stream-log-store.md",
37018+
"redirect_url": "/azure/azure-monitor/platform/resource-logs-collect-workspace",
37019+
"redirect_document_id": true
37020+
},
3699137021
{
3699237022
"source_path": "articles/monitoring-and-diagnostics/monitor-tutorial-archive-monitoring-data.md",
3699337023
"redirect_url": "/azure/azure-monitor/learn/tutorial-archive-data",
@@ -41378,6 +41408,11 @@
4137841408
"redirect_url": "/azure/azure-monitor/app/overview-dashboard",
4137941409
"redirect_document_id": false
4138041410
},
41411+
{
41412+
"source_path": "articles/azure-monitor/platform/diagnostic-logs.md",
41413+
"redirect_url": "/azure/azure-monitor/platform/resource-logs-overview",
41414+
"redirect_document_id": false
41415+
},
4138141416
{
4138241417
"source_path": "articles/active-directory-domain-services/active-directory-ds-admin-guide-administer-domain.md",
4138341418
"redirect_url": "/azure/active-directory-domain-services/manage-domain",
Lines changed: 20 additions & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -1,34 +1,36 @@
11
---
2-
title: Disable email verification during consumer sign-up in Azure Active Directory B2C | Microsoft Docs
3-
description: A topic demonstrating how to disable email verification during consumer sign-up in Azure Active Directory B2C.
2+
title: Disable email verification during customer sign-up in Azure Active Directory B2C
3+
description: Learn how to disable email verification during customer sign-up in Azure Active Directory B2C.
44
services: active-directory-b2c
55
author: mmacy
66
manager: celestedg
77

88
ms.service: active-directory
99
ms.workload: identity
1010
ms.topic: conceptual
11-
ms.date: 11/30/2018
11+
ms.date: 09/25/2018
1212
ms.author: marsma
1313
ms.subservice: B2C
1414
---
1515

16-
# Disable email verification during consumer sign-up in Azure Active Directory B2C
17-
When enabled, Azure Active Directory B2C (Azure AD B2C) gives a consumer the ability to sign up for applications by providing an email address and creating a local account. Azure AD B2C ensures valid email addresses by requiring consumers to verify them during the sign-up process. It also prevents a malicious automated process from generating fake accounts for the applications.
16+
# Disable email verification during customer sign-up in Azure Active Directory B2C
1817

19-
Some application developers prefer to skip email verification during the sign-up process and instead have consumers verify the email address later. To support this, Azure AD B2C can be configured to disable email verification. Doing so creates a smoother sign-up process and gives developers the flexibility to differentiate the consumers that have verified their email address from those consumers that have not.
18+
By default, Azure Active Directory B2C (Azure AD B2C) verifies your customer's email address for local accounts (accounts for users who sign up with email address or username). Azure AD B2C ensures valid email addresses by requiring customers to verify them during the sign-up process. It also prevents a malicious actors from using automated processes to generate fraudulent accounts in your applications.
2019

21-
By default, sign-up user flows have email verification turned on. Use the following steps to turn it off:
20+
Some application developers prefer to skip email verification during the sign-up process and instead have customers verify their email address later. To support this, Azure AD B2C can be configured to disable email verification. Doing so creates a smoother sign-up process and gives developers the flexibility to differentiate customers that have verified their email address from customers that have not.
2221

23-
1. Click **User flows**.
24-
2. Click your user flow (for example, "B2C_1_SiUp") to open it.
25-
3. Click **Page layouts**.
26-
4. Click **Local account sign-up page**.
27-
5. Click **Email Address** in the **Name** column under the **User attributes** section.
28-
6. Under **Requires verification**, select **No**.
29-
7. Click **Save** at the top of the blade. You're done!
22+
Follow these steps to disable email verification:
3023

31-
> [!NOTE]
32-
> Disabling email verification in the sign-up process may lead to spam. If you disable the default one, we recommend adding your own verification system.
33-
>
34-
>
24+
1. Sign in to the [Azure portal](https://portal.azure.com)
25+
1. Use the **Directory + subscription** filter in the top menu to select the directory that contains your Azure AD B2C tenant.
26+
1. In the left menu, select **Azure AD B2C**. Or, select **All services** and search for and select **Azure AD B2C**.
27+
1. Select **User flows**.
28+
1. Select the user flow for which you want to disable email verification. For example, *B2C_1_signinsignup*.
29+
1. Select **Page layouts**.
30+
1. Select **Local account sign-up page**.
31+
1. Under **User attributes**, select **Email Address**.
32+
1. In the **REQUIRES VERIFICATION** drop down, select **No**.
33+
1. Select **Save**. Email verification is now disabled for this user flow.
34+
35+
> [!WARNING]
36+
> Disabling email verification in the sign-up process may lead to spam. If you disable the default Azure AD B2C-provided email verification, we recommend that you implement a replacement verification system.

articles/active-directory-b2c/active-directory-b2c-reference-threat-management.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ manager: celestedg
88
ms.service: active-directory
99
ms.workload: identity
1010
ms.topic: conceptual
11-
ms.date: 07/10/2019
11+
ms.date: 09/26/2019
1212
ms.author: marsma
1313
ms.subservice: B2C
1414
---
@@ -32,10 +32,10 @@ The first 10 lockout periods are one minute long. The next 10 lockout periods ar
3232

3333
To manage password protection settings, including the lockout threshold:
3434

35-
1. Navigate to the [Azure portal](https://portal.azure.com).
36-
1. Select the **Directory + Subscription** filter in the top-right menu of the portal, then select your Azure AD B2C tenant.
37-
1. Select **Azure Active Directory** in the left-hand menu (or select **All services** in the upper-left section of the portal, then search for and select *Azure Active Directory*).
38-
1. Under **Security**, select **Authentication methods**, then select **Password protection**.
35+
1. Sign in to the [Azure portal](https://portal.azure.com)
36+
1. Use the **Directory + subscription** filter in the top menu to select the directory that contains your Azure AD B2C tenant.
37+
1. In the left menu, select **Azure AD B2C**. Or, select **All services** and search for and select **Azure AD B2C**.
38+
1. Under **Security**, select **Authentication methods (Preview)**, then select **Password protection**.
3939
1. Enter your desired password protection settings, then select **Save**.
4040

4141
![Azure portal Password protection page in Azure AD settings](media/active-directory-b2c-reference-threat-management/portal-02-password-protection.png)

articles/active-directory-b2c/active-directory-b2c-setup-sf-app-custom.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -123,7 +123,7 @@ You can define a Salesforce account as a claims provider by adding it to the **C
123123
<Key Id="SamlMessageSigning" StorageReferenceId="B2C_1A_SAMLSigningCert"/>
124124
</CryptographicKeys>
125125
<OutputClaims>
126-
<OutputClaim ClaimTypeReferenceId="socialIdpUserId" PartnerClaimType="userId"/>
126+
<OutputClaim ClaimTypeReferenceId="issuerUserId" PartnerClaimType="userId"/>
127127
<OutputClaim ClaimTypeReferenceId="givenName" PartnerClaimType="given_name"/>
128128
<OutputClaim ClaimTypeReferenceId="surname" PartnerClaimType="family_name"/>
129129
<OutputClaim ClaimTypeReferenceId="email" PartnerClaimType="email"/>

0 commit comments

Comments
 (0)