Skip to content

Commit 58caad9

Browse files
committed
Merging changes synced from https://github.com/MicrosoftDocs/azure-docs-pr (branch live)
2 parents 5ab5062 + 9ee0cba commit 58caad9

File tree

260 files changed

+2779
-2369
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

260 files changed

+2779
-2369
lines changed

.vscode/settings.json

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,7 @@
11
{
2+
"markdown.docsetName": "azure",
3+
"markdown.docsetRootFolderName": "articles",
4+
"markdown.omitDefaultJsonProperties": true,
25
"markdown.docsetLanguages": [
36
".NET Core CLI",
47
"Apache",

articles/active-directory-b2c/TOC.yml

Lines changed: 4 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -233,18 +233,16 @@
233233
href: direct-signin.md
234234
- name: Add your own business logic
235235
items:
236+
- name: Integrate REST API
237+
href: custom-policy-rest-api-intro.md
236238
- name: Validate user input
237239
href: custom-policy-rest-api-claims-validation.md
238240
displayName: rest claims validation, validate
239241
- name: Obtain additional claims
240242
href: custom-policy-rest-api-claims-exchange.md
241243
displayName: rest claims exchange
242-
- name: Add your own RESTful API
243-
href: rest-api-claims-exchange-dotnet.md
244-
- name: Secure RESTful APIs with basic auth
245-
href: secure-rest-api-dotnet-basic-auth.md
246-
- name: Secure RESTful APIs with certificate auth
247-
href: secure-rest-api-dotnet-certificate-auth.md
244+
- name: Secure REST API
245+
href: secure-rest-api.md
248246
- name: Define custom attributes
249247
href: custom-policy-custom-attributes.md
250248
- name: Troubleshooting

articles/active-directory-b2c/active-directory-technical-profile.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: celestedg
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: reference
12-
ms.date: 03/24/2020
12+
ms.date: 03/26/2020
1313
ms.author: mimart
1414
ms.subservice: B2C
1515
---
@@ -251,7 +251,7 @@ The following technical profile deletes a social user account using **alternativ
251251
| ClientId | No | The client identifier for accessing the tenant as a third party. For more information, see [Use custom attributes in a custom profile edit policy](custom-policy-custom-attributes.md) |
252252
| IncludeClaimResolvingInClaimsHandling  | No | For input and output claims, specifies whether [claims resolution](claim-resolver-overview.md) is included in the technical profile. Possible values: `true`, or `false` (default). If you want to use a claims resolver in the technical profile, set this to `true`. |
253253

254-
### Error messages
254+
### UI elements
255255

256256
The following settings can be used to configure the error message displayed upon failure. The metadata should be configured in the [self-asserted](self-asserted-technical-profile.md) technical profile. The error messages can be [localized](localization.md).
257257

articles/active-directory-b2c/custom-policy-keep-me-signed-in.md

Lines changed: 20 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ manager: celestedg
88
ms.service: active-directory
99
ms.workload: identity
1010
ms.topic: conceptual
11-
ms.date: 03/24/2020
11+
ms.date: 03/26/2020
1212
ms.author: mimart
1313
ms.subservice: B2C
1414
---
@@ -48,9 +48,27 @@ To enable KMSI, set the content definition `DataUri` element to [page identifier
4848
</BuildingBlocks>
4949
```
5050

51-
1. Save the extensions file.
51+
## Add the metadata to the self-asserted technical profile
52+
53+
To add the KMSI checkbox to the sign-up and sign-in page, set the `setting.enableRememberMe` metadata to false. Override the SelfAsserted-LocalAccountSignin-Email technical profiles in the extension file.
54+
55+
1. Find the ClaimsProviders element. If the element doesn't exist, add it.
56+
1. Add the following claims provider to the ClaimsProviders element:
5257

58+
```XML
59+
<ClaimsProvider>
60+
<DisplayName>Local Account</DisplayName>
61+
<TechnicalProfiles>
62+
<TechnicalProfile Id="SelfAsserted-LocalAccountSignin-Email">
63+
<Metadata>
64+
<Item Key="setting.enableRememberMe">True</Item>
65+
</Metadata>
66+
</TechnicalProfile>
67+
</TechnicalProfiles>
68+
</ClaimsProvider>
69+
```
5370

71+
1. Save the extensions file.
5472

5573
## Configure a relying party file
5674

articles/active-directory-b2c/custom-policy-rest-api-claims-exchange.md

Lines changed: 132 additions & 176 deletions
Large diffs are not rendered by default.

articles/active-directory-b2c/custom-policy-rest-api-claims-validation.md

Lines changed: 9 additions & 23 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: celestedg
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: conceptual
12-
ms.date: 03/16/2020
12+
ms.date: 03/26/2020
1313
ms.author: mimart
1414
ms.subservice: B2C
1515
---
@@ -18,28 +18,16 @@ ms.subservice: B2C
1818

1919
[!INCLUDE [active-directory-b2c-advanced-audience-warning](../../includes/active-directory-b2c-advanced-audience-warning.md)]
2020

21-
The Identity Experience Framework (IEF) that underpins Azure Active Directory B2C (Azure AD B2C) enables identity developers to integrate an interaction with a RESTful API in a user journey.
21+
The Identity Experience Framework (IEF) that underpins Azure Active Directory B2C (Azure AD B2C) enables identity developers to integrate an interaction with a RESTful API in a user journey. At the end of this walkthrough, you'll be able to create an Azure AD B2C user journey that interacts with [RESTful services](custom-policy-rest-api-intro.md) to validate user input.
2222

23-
At the end of this walkthrough, you will be able to create an Azure AD B2C user journey that interacts with RESTful services.
24-
25-
IEF can send data that has been stored in a claims bag during a user journey to your REST API. It can also parse JSON responses received from the REST API into the Azure AD B2C claim bag. The interaction with the API:
26-
27-
- Can be designed as a REST API claims exchange called from an orchestration step, or as a [validation technical profile](validation-technical-profile.md) called from within a [self asserted technical profile](self-asserted-technical-profile.md).
28-
- Typically validates input from the user. If the value from the user is rejected, the user can try again to enter a valid value with the opportunity to return an error message.
23+
In this scenario, we'll add the ability for users to enter a loyalty number into the Azure AD B2C sign-up page. We'll validate whether this combination of email and loyalty number is mapped to a promotional code by sending this data to a REST API. If the REST API finds a promotional code for this user, it will be returned to Azure AD B2C. Finally, the promotional code will be inserted into the token claims for the application to consume.
2924

3025
You can also design the interaction as an orchestration step. This is suitable when the REST API will not be validating data on screen, and always return claims. For more information, see [Walkthrough: Integrate REST API claims exchanges in your Azure AD B2C user journey as an orchestration step](custom-policy-rest-api-claims-exchange.md).
3126

32-
For the validation profile example, we will use the profile edit user journey in the starter pack file ProfileEdit.xml.
33-
34-
We can verify that the name provided by the user in the profile edit is not part of an exclusion list.
35-
36-
## Scenario
37-
38-
In this scenario, we'll add the ability for users to enter a loyalty number into the Azure AD B2C sign-up page. We'll validate whether this combination of email and loyalty number is mapped to a promotional code by sending this data to a REST API. If the REST API finds a promotional code for this user, it will be returned to Azure AD B2C. Finally, the promotional code will be inserted into the token claims for the application to consume.
39-
4027
## Prerequisites
4128

42-
Complete the steps in [Get started with custom policies](custom-policy-get-started.md). You should have a working custom policy for sign-up and sign-in with local accounts.
29+
- Complete the steps in [Get started with custom policies](custom-policy-get-started.md). You should have a working custom policy for sign-up and sign-in with local accounts.
30+
- Learn how to [Integrate REST API claims exchanges in your Azure AD B2C custom policy](custom-policy-rest-api-intro.md).
4331

4432
## Prepare a REST API endpoint
4533

@@ -110,7 +98,7 @@ A [Restful technical profile](restful-technical-profile.md) provides support for
11098
<DisplayName>REST APIs</DisplayName>
11199
<TechnicalProfiles>
112100
<TechnicalProfile Id="REST-ValidateProfile">
113-
<DisplayName>Check Player Tag Web Hook Azure Function</DisplayName>
101+
<DisplayName>Check loyaltyId Azure Function web hook</DisplayName>
114102
<Protocol Name="Proprietary" Handler="Web.TPEngine.Providers.RestfulProvider, Web.TPEngine, Version=1.0.0.0, Culture=neutral, PublicKeyToken=null" />
115103
<Metadata>
116104
<Item Key="ServiceUrl">https://your-account.azurewebsites.net/api/ValidateProfile?code=your-code</Item>
@@ -138,7 +126,7 @@ A [Restful technical profile](restful-technical-profile.md) provides support for
138126

139127
In this example, the `userLanguage` will be sent to the REST service as `lang` within the JSON payload. The value of the `userLanguage` claim contains the current user language ID. For more information, see [claim resolver](claim-resolver-overview.md).
140128

141-
The comments above `AuthenticationType` and `AllowInsecureAuthInProduction` specify changes you should make when you move to a production environment. To learn how to secure your RESTful APIs for production, see [Secure RESTful APIs with basic auth](secure-rest-api-dotnet-basic-auth.md) and [Secure RESTful APIs with certificate auth](secure-rest-api-dotnet-certificate-auth.md).
129+
The comments above `AuthenticationType` and `AllowInsecureAuthInProduction` specify changes you should make when you move to a production environment. To learn how to secure your RESTful APIs for production, see [Secure RESTful API](secure-rest-api.md).
142130

143131
## Validate the user input
144132

@@ -253,7 +241,7 @@ To return the promo code claim back to the relying party application, add an out
253241
"iat": 1584292103,
254242
"auth_time": 1584292103,
255243
"name": "Emily Smith",
256-
"email": "joe@outlook.com",
244+
"email": "emily@outlook.com",
257245
"given_name": "Emily",
258246
"family_name": "Smith",
259247
"promoCode": "84362"
@@ -263,10 +251,8 @@ To return the promo code claim back to the relying party application, add an out
263251

264252
## Next steps
265253

266-
267254
To learn how to secure your APIs, see the following articles:
268255

269256
- [Walkthrough: Integrate REST API claims exchanges in your Azure AD B2C user journey as an orchestration step](custom-policy-rest-api-claims-exchange.md)
270-
- [Secure your RESTful API with basic authentication (username and password)](secure-rest-api-dotnet-basic-auth.md)
271-
- [Secure your RESTful API with client certificates](secure-rest-api-dotnet-certificate-auth.md)
257+
- [Secure your RESTful API](secure-rest-api.md)
272258
- [Reference: RESTful technical profile](restful-technical-profile.md)

0 commit comments

Comments
 (0)