Skip to content

Commit 59c0bd9

Browse files
committed
Merging changes synced from https://github.com/MicrosoftDocs/azure-docs-pr (branch live)
2 parents f4fe262 + 4d1a4f1 commit 59c0bd9

File tree

720 files changed

+7009
-8308
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

720 files changed

+7009
-8308
lines changed

.openpublishing.redirection.json

Lines changed: 382 additions & 102 deletions
Large diffs are not rendered by default.

articles/active-directory-b2c/claimsschema.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ manager: celestedg
88
ms.service: active-directory
99
ms.workload: identity
1010
ms.topic: reference
11-
ms.date: 03/02/2020
11+
ms.date: 02/12/2020
1212
ms.author: marsma
1313
ms.subservice: B2C
1414
---
@@ -47,7 +47,7 @@ The **ClaimType** element contains the following elements:
4747
| Element | Occurrences | Description |
4848
| ------- | ----------- | ----------- |
4949
| DisplayName | 1:1 | The title that's displayed to users on various screens. The value can be [localized](localization.md). |
50-
| DataType | 1:1 | The type of the claim. The data types of boolean, date, dateTime, int, long, string, stringCollection can be used. Primitive data type represents the equivalent of C# variable data type. stringCollection represents a collection of strings. For more information see [C# Types and variables](https://docs.microsoft.com/dotnet/csharp/tour-of-csharp/types-and-variables). Date follows ISO 8601 convention. |
50+
| DataType | 1:1 | The type of the claim. The data types of boolean, date, dateTime, int, long, string, stringCollection and phoneNumber can be used. Primitive data type represents the equivalent of C# variable data type. stringCollection represents a collection of strings. For more information see [C# Types and variables](https://docs.microsoft.com/dotnet/csharp/tour-of-csharp/types-and-variables). Date follows ISO 8601 convention. |
5151
| DefaultPartnerClaimTypes | 0:1 | The partner default claim types to use for a specified protocol. The value can be overwritten in the **PartnerClaimType** specified in the **InputClaim** or **OutputClaim** elements. Use this element to specify the default name for a protocol. |
5252
| Mask | 0:1 | An optional string of masking characters that can be applied when displaying the claim. For example, the phone number 324-232-4343 can be masked as XXX-XXX-4343. |
5353
| UserHelpText | 0:1 | A description of the claim type that can be helpful for users to understand its purpose. The value can be [localized](localization.md). |

articles/active-directory-b2c/custom-policy-developer-notes.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: celestedg
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: conceptual
12-
ms.date: 03/18/2019
12+
ms.date: 02/12/2020
1313
ms.author: marsma
1414
ms.subservice: B2C
1515
---
@@ -68,7 +68,7 @@ Custom policy/Identity Experience Framework capabilities are under constant and
6868
| Relying Party OAUTH1 | | | | Not supported. |
6969
| Relying Party OAUTH2 | | | X | |
7070
| Relying Party OIDC | | | X | |
71-
| Relying Party SAML | X | | | |
71+
| Relying Party SAML | |X | | |
7272
| Relying Party WSFED | X | | | |
7373
| REST API with basic and certificate auth | | | X | For example, Azure Logic Apps. |
7474

@@ -81,7 +81,7 @@ Custom policy/Identity Experience Framework capabilities are under constant and
8181
| Azure Email subsystem for email verification | | | X | |
8282
| Multi-language support| | | X | |
8383
| Predicate Validations | | | X | For example, password complexity. |
84-
| Using third party email service providers | X | | | |
84+
| Using third party email service providers | |X | | |
8585

8686
### Content Definition
8787

articles/active-directory-b2c/phone-number-claims-transformations.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: celestedg
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: conceptual
12-
ms.date: 12/17/2019
12+
ms.date: 02/12/2020
1313
ms.author: marsma
1414
ms.subservice: B2C
1515
---
@@ -29,7 +29,7 @@ This claim validates the format of the phone number. If it is in a valid format,
2929
| Item | TransformationClaimType | Data Type | Notes |
3030
| ---- | ----------------------- | --------- | ----- |
3131
| InputClaim | inputClaim | string | The claim of string type converting from. |
32-
| OutputClaim | outputClaim | string | The result of this claims transformation. |
32+
| OutputClaim | outputClaim | phoneNumber | The result of this claims transformation. |
3333

3434
The **ConvertStringToPhoneNumberClaim** claims transformation is always executed from a [validation technical profile](validation-technical-profile.md) that is called by a [self-asserted technical profile](self-asserted-technical-profile.md) or [display control](display-controls.md). The **UserMessageIfClaimsTransformationInvalidPhoneNumber** self-asserted technical profile metadata controls the error message that is presented to the user.
3535

articles/active-directory/authentication/TOC.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -64,7 +64,7 @@
6464
items:
6565
- name: Self-service password reset
6666
items:
67-
- name: Deploy self-service password reset
67+
- name: Deployment guide
6868
href: howto-sspr-deployment.md
6969
- name: Pre-register authentication data
7070
href: howto-sspr-authenticationdata.md
@@ -74,7 +74,7 @@
7474
href: howto-sspr-windows.md
7575
- name: Cloud-based MFA
7676
items:
77-
- name: Deploy cloud-based MFA
77+
- name: Deployment guide
7878
href: howto-mfa-getstarted.md
7979
- name: Per user MFA
8080
href: howto-mfa-userstates.md

articles/active-directory/authentication/index.yml

Lines changed: 11 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ metadata:
1212
ms.topic: landing-page
1313
author: iainfoulds
1414
ms.author: iainfou
15-
ms.date: 08/20/2019
15+
ms.date: 02/11/2020
1616
ms.collection: M365-identity-device-management
1717

1818
# linkListType: architecture | concept | deploy | download | get-started | how-to-guide | learn | overview | quickstart | reference | tutorial | whats-new
@@ -43,16 +43,16 @@ landingContent:
4343
url: concept-sspr-howitworks.md
4444
- text: Password writeback
4545
url: concept-sspr-writeback.md
46-
- linkListType: quickstart
46+
- linkListType: tutorial
4747
links:
48-
- text: Self-service password reset quickstart
49-
url: quickstart-sspr.md
48+
- text: Enable self-service password reset
49+
url: tutorial-enable-sspr.md
50+
- text: Enable password writeback to on-premises
51+
url: tutorial-enable-writeback.md
5052
- linkListType: deploy
5153
links:
52-
- text: Deploy Azure AD self-service password reset
54+
- text: Deployment guide for self-service password reset
5355
url: howto-sspr-deployment.md
54-
- text: Enable password writeback
55-
url: howto-sspr-writeback.md
5656
- text: Enable password reset from the Windows login screen
5757
url: howto-sspr-windows.md
5858

@@ -65,13 +65,13 @@ landingContent:
6565
url: concept-mfa-howitworks.md
6666
- linkListType: tutorial
6767
links:
68-
- text: Pilot Azure MFA for specific applications
69-
url: tutorial-mfa-applications.md
70-
- text: Use risk detections to trigger Multi-Factor Authentication and password changes
68+
- text: Enable Azure Multi-Factor Authentication
69+
url: tutorial-enable-azure-mfa.md
70+
- text: Enable risk-based Azure Multi-Factor Authentication
7171
url: tutorial-risk-based-sspr-mfa.md
7272
- linkListType: deploy
7373
links:
74-
- text: Deploy Azure Multi-Factor Authentication
74+
- text: Deployment guide for Azure Multi-Factor Authentication
7575
url: howto-mfa-getstarted.md
7676
- text: Use NPS extension to integrate on-premises applications
7777
url: howto-mfa-nps-extension.md

articles/active-directory/azuread-dev/TOC.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -176,6 +176,8 @@
176176
items:
177177
- name: Glossary
178178
href: ../develop/developer-glossary.md?toc=/azure/active-directory/azuread-dev/toc.json&bc=/azure/active-directory/azuread-dev/breadcrumb/toc.json
179+
- name: Videos
180+
href: videos.md
179181
- name: Azure roadmap
180182
href: https://azure.microsoft.com/roadmap/?category=security-identity
181183
- name: Azure AD blog

articles/active-directory/azuread-dev/v1-overview.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -53,5 +53,8 @@ The following articles provide detailed information about APIs, protocol message
5353
| [Glossary](../develop/developer-glossary.md?toc=/azure/active-directory/azuread-dev/toc.json&bc=/azure/active-directory/azuread-dev/breadcrumb/toc.json) | Terminology and definitions of words that are used throughout this documentation. |
5454
| | |
5555

56+
## Videos
57+
58+
See [Azure Active Directory developer platform videos](videos.md) for help migrating to the new Microsoft identity platform.
5659

5760
[!INCLUDE [Help and support](../../../includes/active-directory-develop-help-support-include.md)]
Lines changed: 71 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,71 @@
1+
---
2+
title: Azure ADAL to MSAL migration videos | Azure
3+
description: Videos that help you migrate from the Azure Active Directory developer platform to the Microsoft identity platform
4+
services: active-directory
5+
author: mmacy
6+
manager: CelesteDG
7+
ms.service: active-directory
8+
ms.subservice: develop
9+
ms.topic: conceptual
10+
ms.workload: identity
11+
ms.date: 02/12/2020
12+
ms.author: marsma
13+
ms.custom: aaddev
14+
ms.reviewer: celested
15+
titleSuffix: Microsoft identity platform
16+
---
17+
18+
# Azure Active Directory developer platform videos
19+
20+
Learn about the new Microsoft identity platform and how to migrate to it from the Azure Active Directory (Azure AD) developer platform. The videos are typically 1-2 minutes long.
21+
22+
## Migrate from v1.0 to v2.0
23+
24+
**Learn about migrating to the the latest version of the Microsoft identity platform**
25+
26+
:::row:::
27+
:::column:::
28+
New Microsoft identity platform overview
29+
:::column-end:::
30+
:::column:::
31+
> [!VIDEO https://www.youtube.com/embed/bNlcFuIo3r8]
32+
:::column-end:::
33+
:::column:::
34+
Introduction to the MSAL libraries
35+
:::column-end:::
36+
:::column:::
37+
> [!VIDEO https://www.youtube.com/embed/apbbx2n4tnU]
38+
:::column-end:::
39+
:::row-end:::
40+
:::row:::
41+
:::column:::
42+
Endpoints and the benefits of moving to v2.0
43+
:::column-end:::
44+
:::column:::
45+
> [!VIDEO https://www.youtube.com/embed/qpdC45tZYDg]
46+
:::column-end:::
47+
:::column:::
48+
Migrating your ADAL codebase to MSAL
49+
:::column-end:::
50+
:::column:::
51+
> [!VIDEO https://www.youtube.com/embed/xgL_z9yCnrE]
52+
:::column-end:::
53+
:::row-end:::
54+
:::row:::
55+
:::column:::
56+
Why migrate from ADAL to MSAL
57+
:::column-end:::
58+
:::column:::
59+
> [!VIDEO https://www.youtube.com/embed/qpdC45tZYDg]
60+
:::column-end:::
61+
:::column:::
62+
Advantages of MSAL over ADAL
63+
:::column-end:::
64+
:::column:::
65+
> [!VIDEO https://www.youtube.com/embed/q-TDszj2O-4]
66+
:::column-end:::
67+
:::row-end:::
68+
69+
## Next steps
70+
71+
Learn about the new [Microsoft identity platform](https://docs.microsoft.com/azure/active-directory/develop)
Lines changed: 147 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,147 @@
1+
---
2+
3+
title: Tutorial for bulk inviting B2B collaboration users - Azure Active Directory | Microsoft Docs
4+
description: In this tutorial, you learn how to use PowerShell and a CSV file to send bulk invitations to external Azure AD B2B collaboration guest users.
5+
6+
services: active-directory
7+
ms.service: active-directory
8+
ms.subservice: B2B
9+
ms.topic: tutorial
10+
ms.date: 02/11/2020
11+
12+
ms.author: mimart
13+
author: msmimart
14+
manager: celestedg
15+
ms.reviewer: mal
16+
17+
#customer intent: As a tenant administrator, I want to send B2B invitations to multiple external users at the same time so that I can avoid having to send individual invitations to each user.
18+
19+
ms.collection: M365-identity-device-management
20+
---
21+
22+
# Tutorial: Use PowerShell to bulk invite Azure AD B2B collaboration users
23+
24+
If you use Azure Active Directory (Azure AD) B2B collaboration to work with external partners, you can invite multiple guest users to your organization at the same time. In this tutorial, you learn how to use PowerShell to send bulk invitations to external users. Specifically, you do the following:
25+
26+
> [!div class="checklist"]
27+
> * Prepare a comma-separated value (.csv) file with the user information
28+
> * Run a PowerShell script to send invitations
29+
> * Verify the users were added to the directory
30+
31+
If you don’t have an Azure subscription, create a [free account](https://azure.microsoft.com/free/?WT.mc_id=A261C142F) before you begin.
32+
33+
## Prerequisites
34+
35+
### Install the latest AzureADPreview module
36+
37+
Make sure that you install the latest version of the Azure AD PowerShell for Graph module (AzureADPreview).
38+
39+
First, check which modules you have installed. Open Windows PowerShell as an elevated user (Run as administrator), and run the following command:
40+
41+
```powershell
42+
Get-Module -ListAvailable AzureAD*
43+
```
44+
45+
Based on the output, do one of the following:
46+
47+
- If no results are returned, run the following command to install the AzureADPreview module:
48+
49+
```powershell
50+
Install-Module AzureADPreview
51+
```
52+
53+
- If only the AzureAD module shows up in the results, run the following commands to install the AzureADPreview module:
54+
55+
```powershell
56+
Uninstall-Module AzureAD
57+
Install-Module AzureADPreview
58+
```
59+
60+
- If only the AzureADPreview module shows up in the results, but you receive a message that indicates there's a later version, run the following commands to update the module:
61+
62+
```powershell
63+
Uninstall-Module AzureADPreview
64+
Install-Module AzureADPreview
65+
```
66+
67+
You may receive a prompt that you're installing the module from an untrusted repository. This occurs if you haven't previously set the PSGallery repository as a trusted repository. Press **Y** to install the module.
68+
69+
### Get test email accounts
70+
71+
You need two or more test email accounts that you can send the invitations to. The accounts must be from outside your organization. You can use any type of account, including social accounts such as gmail.com or outlook.com addresses.
72+
73+
## Prepare the CSV file
74+
75+
In Microsoft Excel, create a CSV file with the list of invitee user names and email addresses. Make sure to include the **Name** and **InvitedUserEmailAddress** column headings.
76+
77+
For example, create a worksheet in the following format:
78+
79+
![PowerShell output showing pending user acceptance](media/tutorial-bulk-invite/AddUsersExcel.png)
80+
81+
Save the file as **C:\BulkInvite\Invitations.csv**.
82+
83+
If you don't have Excel, you can create a CSV file in any text editor, such as Notepad. Separate each value with a comma, and each row with a new line.
84+
85+
## Sign in to your tenant
86+
87+
Run the following command to connect to the tenant domain:
88+
89+
```powershell
90+
Connect-AzureAD -TenantDomain "<Tenant_Domain_Name>"
91+
```
92+
93+
For example, `Connect-AzureAD -TenantDomain "contoso.onmicrosoft.com"`.
94+
95+
When prompted, enter your credentials.
96+
97+
## Send bulk invitations
98+
99+
To send the invitations, run the following PowerShell script (where **c:\bulkinvite\invitations.csv** is the path of the CSV file):
100+
101+
```powershell
102+
$invitations = import-csv c:\bulkinvite\invitations.csv
103+
104+
$messageInfo = New-Object Microsoft.Open.MSGraph.Model.InvitedUserMessageInfo
105+
106+
$messageInfo.customizedMessageBody = "Hello. You are invited to the Contoso organization."
107+
108+
foreach ($email in $invitations)
109+
{New-AzureADMSInvitation `
110+
-InvitedUserEmailAddress $email.InvitedUserEmailAddress `
111+
-InvitedUserDisplayName $email.Name `
112+
-InviteRedirectUrl https://myapps.microsoft.com `
113+
-InvitedUserMessageInfo $messageInfo `
114+
-SendInvitationMessage $true
115+
}
116+
```
117+
118+
The script sends an invitation to the email addresses in the Invitations.csv file. You should see output similar to the following for each user:
119+
120+
![PowerShell output showing pending user acceptance](media/tutorial-bulk-invite/B2BBulkImport.png)
121+
122+
## Verify users exist in the directory
123+
124+
To verify that the invited users were added to Azure AD, run the following command:
125+
126+
```powershell
127+
Get-AzureADUser -Filter "UserType eq 'Guest'"
128+
```
129+
130+
You should see the users that you invited listed, with a user principal name (UPN) in the format *emailaddress*#EXT#\@*domain*. For example, *lstokes_fabrikam.com#EXT#\@contoso.onmicrosoft.com*, where contoso.onmicrosoft.com is the organization from which you sent the invitations.
131+
132+
## Clean up resources
133+
134+
When no longer needed, you can delete the test user accounts in the directory. Run the following command to delete a user account:
135+
136+
```powershell
137+
Remove-AzureADUser -ObjectId "<UPN>"
138+
```
139+
140+
For example: `Remove-AzureADUser -ObjectId "lstokes_fabrikam.com#EXT#@contoso.onmicrosoft.com"`
141+
142+
## Next steps
143+
144+
In this tutorial, you sent bulk invitations to guest users outside of your organization. Next, learn how the invitation redemption process works.
145+
146+
> [!div class="nextstepaction"]
147+
> [Learn about the Azure AD B2B collaboration invitation redemption process](redemption-experience.md)

0 commit comments

Comments
 (0)