Skip to content

Commit 561b5b4

Browse files
authored
Merge pull request #284147 from MicrosoftDocs/main
8/9 11:00 AM IST Publish
2 parents 7984940 + 58229c6 commit 561b5b4

File tree

379 files changed

+2715
-1692
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

379 files changed

+2715
-1692
lines changed

articles/active-directory-b2c/identity-provider-twitter.md

Lines changed: 28 additions & 28 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
2-
title: Set up sign-up and sign-in with a Twitter account
2+
title: Set up sign-up and sign-in with an X account
33
titleSuffix: Azure AD B2C
4-
description: Provide sign-up and sign-in to customers with Twitter accounts in your applications using Azure Active Directory B2C.
4+
description: Provide sign-up and sign-in to customers with X accounts in your applications using Azure Active Directory B2C.
55
author: garrodonnell
66
manager: CelesteDG
77
ms.service: active-directory
@@ -11,11 +11,11 @@ ms.author: godonnell
1111
ms.subservice: B2C
1212
zone_pivot_groups: b2c-policy-type
1313

14-
#Customer Intent: As a developer setting up sign-up and sign-in with a Twitter account using Azure Active Directory B2C, I want to configure Twitter as an identity provider so that I can enable users to sign in with their Twitter accounts.
14+
#Customer Intent: As a developer setting up sign-up and sign-in with an X account using Azure Active Directory B2C, I want to configure X as an identity provider so that I can enable users to sign in with their X accounts.
1515

1616
---
1717

18-
# Set up sign-up and sign-in with a Twitter account using Azure Active Directory B2C
18+
# Set up sign-up and sign-in with an X account using Azure Active Directory B2C
1919

2020
[!INCLUDE [active-directory-b2c-choose-user-flow-or-custom-policy](../../includes/active-directory-b2c-choose-user-flow-or-custom-policy.md)]
2121
::: zone pivot="b2c-custom-policy"
@@ -30,10 +30,10 @@ zone_pivot_groups: b2c-policy-type
3030

3131
## Create an application
3232

33-
To enable sign-in for users with a Twitter account in Azure AD B2C, you need to create a Twitter application. If you don't already have a Twitter account, you can sign up at [`https://twitter.com/signup`](https://twitter.com/signup). You also need to [Apply for a developer account](https://developer.twitter.com/). For more information, see [Apply for access](https://developer.twitter.com/en/apply-for-access).
33+
To enable sign-in for users with an X account in Azure AD B2C, you need to create an X application. If you don't already have an X account, you can sign up at [`https://x.com/signup`](https://x.com/signup). You also need to [Apply for a developer account](https://developer.x.com/). For more information, see [Apply for access](https://developer.x.com/en/apply-for-access).
3434

3535
::: zone pivot="b2c-custom-policy"
36-
1. Sign in to the [Twitter Developer Portal](https://developer.twitter.com/portal/projects-and-apps) with your Twitter account credentials.
36+
1. Sign in to the [X Developer Portal](https://developer.x.com/portal/projects-and-apps) with your X account credentials.
3737
1. Select **+ Create Project** button.
3838
1. Under **Project name** tab, enter a preferred name of your project, and then select **Next** button.
3939
1. Under **Use case** tab, select your preferred use case, and then select **Next**.
@@ -47,7 +47,7 @@ To enable sign-in for users with a Twitter account in Azure AD B2C, you need to
4747
1. For the **Callback URI/Redirect URL**, enter `https://your-tenant-name.b2clogin.com/your-tenant-name.onmicrosoft.com/your-policy-id/oauth1/authresp`. If you use a [custom domain](custom-domain.md), enter `https://your-domain-name/your-tenant-name.onmicrosoft.com/your-user-flow-Id/oauth1/authresp`. Use all lowercase letters when entering your tenant name and user flow ID even if they are defined with uppercase letters in Azure AD B2C. Replace:
4848
- `your-tenant-name` with the name of your tenant name.
4949
- `your-domain-name` with your custom domain.
50-
- `your-policy-id` with the identifier of your user flow. For example, `b2c_1a_signup_signin_twitter`.
50+
- `your-policy-id` with the identifier of your user flow. For example, `b2c_1a_signup_signin_x`.
5151
1. For the **Website URL**, enter `https://your-tenant.b2clogin.com`. Replace `your-tenant` with the name of your tenant. For example, `https://contosob2c.b2clogin.com`. If you use a [custom domain](custom-domain.md), enter `https://your-domain-name`.
5252
1. (Optional) Enter a URL for the **Terms of service**, for example `http://www.contoso.com/tos`. The policy URL is a page you maintain to provide terms and conditions for your application.
5353
1. (Optional) Enter a URL for the **Privacy policy**, for example `http://www.contoso.com/privacy`. The policy URL is a page you maintain to provide privacy information for your application.
@@ -57,21 +57,21 @@ To enable sign-in for users with a Twitter account in Azure AD B2C, you need to
5757

5858
::: zone pivot="b2c-user-flow"
5959

60-
1. Sign in to the [Twitter Developer Portal](https://developer.twitter.com/portal/projects-and-apps) with your Twitter account credentials.
60+
1. Sign in to the [X Developer Portal](https://developer.x.com/portal/projects-and-apps) with your X account credentials.
6161
1. Select **+ Create Project** button.
6262
1. Under **Project name** tab, enter a preferred name of your project, and then select **Next** button.
6363
1. Under **Use case** tab, select your preferred use case, and then select **Next**.
6464
1. Under **Project description** tab, enter your project description, and then select **Next** button.
6565
1. Under **App name** tab, enter a name for your app, such as *azureadb2c*, and the select **Next** button.
66-
1. Under **Keys & Tokens** tab, copy the value of **API Key** and **API Key Secret** for later. You use both of them to configure Twitter as an identity provider in your Azure AD B2C tenant.
66+
1. Under **Keys & Tokens** tab, copy the value of **API Key** and **API Key Secret** for later. You use both of them to configure X as an identity provider in your Azure AD B2C tenant.
6767
1. Select **App settings** to open the app settings.
6868
1. At the lower part of the page, under **User authentication settings**, select **Set up**.
6969
1. Under **Type of app**, select your appropriate app type such as *Web App*.
7070
1. Under **App Info**:
7171
1. For the **Callback URI/Redirect URL**, enter `https://your-tenant.b2clogin.com/your-tenant-name.onmicrosoft.com/your-user-flow-name/oauth1/authresp`. If you use a [custom domain](custom-domain.md), enter `https://your-domain-name/your-tenant-name.onmicrosoft.com/your-user-flow-Id/oauth1/authresp`. Use all lowercase letters when entering your tenant name and user flow ID even if they are defined with uppercase letters in Azure AD B2C. Replace:
7272
- `your-tenant-name` with the name of your tenant name.
7373
- `your-domain-name` with your custom domain.
74-
- `your-user-flow-name` with the identifier of your user flow. For example, `b2c_1_signup_signin_twitter`.
74+
- `your-user-flow-name` with the identifier of your user flow. For example, `b2c_1_signup_signin_x`.
7575
1. For the **Website URL**, enter `https://your-tenant.b2clogin.com`. Replace `your-tenant` with the name of your tenant. For example, `https://contosob2c.b2clogin.com`. If you use a [custom domain](custom-domain.md), enter `https://your-domain-name`.
7676
1. Enter a URL for the **Terms of service**, for example `http://www.contoso.com/tos`. The policy URL is a page you maintain to provide terms and conditions for your application.
7777
1. Enter a URL for the **Privacy policy**, for example `http://www.contoso.com/privacy`. The policy URL is a page you maintain to provide privacy information for your application.
@@ -81,23 +81,23 @@ To enable sign-in for users with a Twitter account in Azure AD B2C, you need to
8181

8282
::: zone pivot="b2c-user-flow"
8383

84-
## Configure Twitter as an identity provider
84+
## Configure X as an identity provider
8585

8686
1. Sign in to the [Azure portal](https://portal.azure.com/) as the global administrator of your Azure AD B2C tenant.
8787
1. If you have access to multiple tenants, select the **Settings** icon in the top menu to switch to your Azure AD B2C tenant from the **Directories + subscriptions** menu.
8888
1. Choose **All services** in the top-left corner of the Azure portal, search for and select **Azure AD B2C**.
8989
1. Select **Identity providers**, then select **Twitter**.
90-
1. Enter a **Name**. For example, *Twitter*.
91-
1. For the **Client ID**, enter the *API Key* of the Twitter application that you created earlier.
90+
1. Enter a **Name**. For example, *X*.
91+
1. For the **Client ID**, enter the *API Key* of the X application that you created earlier.
9292
1. For the **Client secret**, enter the *API key secret* that you recorded.
9393
1. Select **Save**.
9494

95-
## Add Twitter identity provider to a user flow
95+
## Add X identity provider to a user flow
9696

97-
At this point, the Twitter identity provider has been set up, but it's not yet available in any of the sign-in pages. To add the Twitter identity provider to a user flow:
97+
At this point, the X identity provider has been set up, but it's not yet available in any of the sign-in pages. To add the X identity provider to a user flow:
9898

9999
1. In your Azure AD B2C tenant, select **User flows**.
100-
1. Select the user flow that you want to add the Twitter identity provider.
100+
1. Select the user flow that you want to add the X identity provider.
101101
1. Under the **Social identity providers**, select **Twitter**.
102102
1. Select **Save**.
103103

@@ -106,44 +106,44 @@ At this point, the Twitter identity provider has been set up, but it's not yet a
106106
1. To test your policy, select **Run user flow**.
107107
1. For **Application**, select the web application named *testapp1* that you previously registered. The **Reply URL** should show `https://jwt.ms`.
108108
1. Select the **Run user flow** button.
109-
1. From the sign-up or sign-in page, select **Twitter** to sign in with Twitter account.
109+
1. From the sign-up or sign-in page, select **Twitter** to sign in with X account.
110110

111111
::: zone-end
112112

113113
::: zone pivot="b2c-custom-policy"
114114

115115
## Create a policy key
116116

117-
You need to store the secret key that you previously recorded for Twitter app in your Azure AD B2C tenant.
117+
You need to store the secret key that you previously recorded for X app in your Azure AD B2C tenant.
118118

119119
1. Sign in to the [Azure portal](https://portal.azure.com/).
120120
1. If you have access to multiple tenants, select the **Settings** icon in the top menu to switch to your Azure AD B2C tenant from the **Directories + subscriptions** menu.
121121
1. In the Azure portal, search for and select **Azure AD B2C**.
122122
1. On the left menu, under **Policies**, select **Identity Experience Framework**.
123123
1. Select **Policy Keys** and then select **Add**.
124124
1. For **Options**, choose `Manual`.
125-
1. Enter a **Name** for the policy key. For example, `TwitterSecret`. The prefix `B2C_1A_` is added automatically to the name of your key.
125+
1. Enter a **Name** for the policy key. For example, `XSecret`. The prefix `B2C_1A_` is added automatically to the name of your key.
126126
1. For **Secret**, enter your *API key secret* value that you previously recorded.
127127
1. For **Key usage**, select `Signature`.
128128
1. Click **Create**.
129129

130-
## Configure Twitter as an identity provider
130+
## Configure X as an identity provider
131131

132-
To enable users to sign in using a Twitter account, you need to define the account as a claims provider that Azure AD B2C can communicate with through an endpoint. The endpoint provides a set of claims that are used by Azure AD B2C to verify that a specific user has authenticated.
132+
To enable users to sign in using an X account, you need to define the account as a claims provider that Azure AD B2C can communicate with through an endpoint. The endpoint provides a set of claims that are used by Azure AD B2C to verify that a specific user has authenticated.
133133

134-
You can define a Twitter account as a claims provider by adding it to the **ClaimsProviders** element in the extension file of your policy. Refer to the custom policy starter pack that you downloaded in the Prerequisites of this article.
134+
You can define an X account as a claims provider by adding it to the **ClaimsProviders** element in the extension file of your policy. Refer to the custom policy starter pack that you downloaded in the Prerequisites of this article.
135135

136136
1. Open the *TrustFrameworkExtensions.xml*.
137137
2. Find the **ClaimsProviders** element. If it does not exist, add it under the root element.
138138
3. Add a new **ClaimsProvider** as follows:
139139

140140
```xml
141141
<ClaimsProvider>
142-
<Domain>twitter.com</Domain>
143-
<DisplayName>Twitter</DisplayName>
142+
<Domain>x.com</Domain>
143+
<DisplayName>X</DisplayName>
144144
<TechnicalProfiles>
145145
<TechnicalProfile Id="Twitter-OAuth1">
146-
<DisplayName>Twitter</DisplayName>
146+
<DisplayName>X</DisplayName>
147147
<Protocol Name="OAuth1" />
148148
<Metadata>
149149
<Item Key="ProviderName">Twitter</Item>
@@ -152,7 +152,7 @@ You can define a Twitter account as a claims provider by adding it to the **Clai
152152
<Item Key="request_token_endpoint">https://api.twitter.com/oauth/request_token</Item>
153153
<Item Key="ClaimsEndpoint">https://api.twitter.com/1.1/account/verify_credentials.json?include_email=true</Item>
154154
<Item Key="ClaimsResponseFormat">json</Item>
155-
<Item Key="client_id">Your Twitter application API key</Item>
155+
<Item Key="client_id">Your X application API key</Item>
156156
</Metadata>
157157
<CryptographicKeys>
158158
<Key Id="client_secret" StorageReferenceId="B2C_1A_TwitterSecret" />
@@ -206,10 +206,10 @@ You can define a Twitter account as a claims provider by adding it to the **Clai
206206
1. Select your relying party policy, for example `B2C_1A_signup_signin`.
207207
1. For **Application**, select a web application that you [previously registered](tutorial-register-applications.md). The **Reply URL** should show `https://jwt.ms`.
208208
1. Select the **Run now** button.
209-
1. From the sign-up or sign-in page, select **Twitter** to sign in with Twitter account.
209+
1. From the sign-up or sign-in page, select **Twitter** to sign in with X account.
210210
::: zone-end
211211

212212
If the sign-in process is successful, your browser is redirected to `https://jwt.ms`, which displays the contents of the token returned by Azure AD B2C.
213213

214214
> [!TIP]
215-
> If you're facing `unauthorized` error while testing this identity provider, make sure you use the correct Twitter API Key and API Key Secret, or try to apply for [elevated](https://developer.twitter.com/en/portal/products/elevated) access. Also, we recommend you've a look at [Twitter's projects structure](https://developer.twitter.com/en/docs/projects/overview), if you registered your app before the feature was available.
215+
> If you're facing `unauthorized` error while testing this identity provider, make sure you use the correct X API Key and API Key Secret, or try to apply for [elevated](https://developer.x.com/en/portal/products/elevated) access. Also, we recommend you've a look at [X's projects structure](https://developer.x.com/en/docs/projects/overview), if you registered your app before the feature was available.

articles/active-directory-b2c/oauth1-technical-profile.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -14,23 +14,23 @@ ms.author: kengaderdus
1414
ms.subservice: B2C
1515

1616

17-
#Customer intent: As a developer implementing Azure Active Directory B2C custom policies, I want to define an OAuth1 technical profile, so that I can federate with an OAuth1 based identity provider like Twitter and allow users to sign in with their existing social or enterprise identities.
17+
#Customer intent: As a developer implementing Azure Active Directory B2C custom policies, I want to define an OAuth1 technical profile, so that I can federate with an OAuth1 based identity provider like X and allow users to sign in with their existing social or enterprise identities.
1818

1919
---
2020

2121
# Define an OAuth1 technical profile in an Azure Active Directory B2C custom policy
2222

2323
[!INCLUDE [active-directory-b2c-advanced-audience-warning](../../includes/active-directory-b2c-advanced-audience-warning.md)]
2424

25-
Azure Active Directory B2C (Azure AD B2C) provides support for the [OAuth 1.0 protocol](https://tools.ietf.org/html/rfc5849) identity provider. This article describes the specifics of a technical profile for interacting with a claims provider that supports this standardized protocol. With an OAuth1 technical profile, you can federate with an OAuth1 based identity provider, such as Twitter. Federating with the identity provider allows users to sign in with their existing social or enterprise identities.
25+
Azure Active Directory B2C (Azure AD B2C) provides support for the [OAuth 1.0 protocol](https://tools.ietf.org/html/rfc5849) identity provider. This article describes the specifics of a technical profile for interacting with a claims provider that supports this standardized protocol. With an OAuth1 technical profile, you can federate with an OAuth1 based identity provider, such as X. Federating with the identity provider allows users to sign in with their existing social or enterprise identities.
2626

2727
## Protocol
2828

2929
The **Name** attribute of the **Protocol** element needs to be set to `OAuth1`. For example, the protocol for the **Twitter-OAUTH1** technical profile is `OAuth1`.
3030

3131
```xml
3232
<TechnicalProfile Id="Twitter-OAUTH1">
33-
<DisplayName>Twitter</DisplayName>
33+
<DisplayName>X</DisplayName>
3434
<Protocol Name="OAuth1" />
3535
...
3636
```
@@ -45,7 +45,7 @@ The **OutputClaims** element contains a list of claims returned by the OAuth1 id
4545

4646
The **OutputClaimsTransformations** element may contain a collection of **OutputClaimsTransformation** elements that are used to modify the output claims or generate new ones.
4747

48-
The following example shows the claims returned by the Twitter identity provider:
48+
The following example shows the claims returned by the X identity provider:
4949

5050
- The **user_id** claim that is mapped to the **issuerUserId** claim.
5151
- The **screen_name** claim that is mapped to the **displayName** claim.
@@ -92,4 +92,4 @@ When you configure the redirect URI of your identity provider, enter `https://{t
9292

9393
Examples:
9494

95-
- [Add Twitter as an OAuth1 identity provider by using custom policies](identity-provider-twitter.md)
95+
- [Add X as an OAuth1 identity provider by using custom policies](identity-provider-twitter.md)

articles/active-directory-b2c/userjourneys.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -261,7 +261,7 @@ The **ClaimsProviderSelection** element contains the following attributes:
261261

262262
### Claims provider selection example
263263

264-
In the following orchestration step, the user can choose to sign in with Facebook, LinkedIn, Twitter, Google, or a local account. If the user selects one of the social identity providers, the second orchestration step executes with the selected claim exchange specified in the `TargetClaimsExchangeId` attribute. The second orchestration step redirects the user to the social identity provider to complete the sign-in process. If the user chooses to sign in with the local account, Azure AD B2C stays on the same orchestration step (the same sign-up page or sign-in page) and skips the second orchestration step.
264+
In the following orchestration step, the user can choose to sign in with Facebook, LinkedIn, X, Google, or a local account. If the user selects one of the social identity providers, the second orchestration step executes with the selected claim exchange specified in the `TargetClaimsExchangeId` attribute. The second orchestration step redirects the user to the social identity provider to complete the sign-in process. If the user chooses to sign in with the local account, Azure AD B2C stays on the same orchestration step (the same sign-up page or sign-in page) and skips the second orchestration step.
265265

266266
```xml
267267
<OrchestrationStep Order="1" Type="CombinedSignInAndSignUp" ContentDefinitionReferenceId="api.signuporsignin">

articles/advisor/index.yml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -6,11 +6,11 @@ summary: Azure Advisor scans your Azure configuration and recommends changes to
66
metadata:
77
title: Azure Advisor documentation
88
description: Azure Advisor is a personalized cloud consultant that helps you follow best practices to optimize your Azure deployments. It analyzes your resource configuration and usage telemetry. It then recommends solutions to help improve the performance, security, and high availability of your resources while looking for opportunities to reduce your overall Azure spend.
9+
ms.author: ikhapova
10+
author: ikhapova
911
ms.topic: landing-page
1012
ms.service: azure-advisor
11-
author: rboucher
12-
ms.author: robb
13-
ms.date: 10/16/2019
13+
ms.date: 08/08/2024
1414

1515
# linkListType: architecture | concept | deploy | download | get-started | how-to-guide | learn | overview | quickstart | reference | tutorial | video | whats-new
1616

0 commit comments

Comments
 (0)