Skip to content

Commit 5f48222

Browse files
authored
Merge pull request #153686 from MicrosoftDocs/master
Merge Master to Live, 4 AM
2 parents d40ffda + ea9ce6c commit 5f48222

File tree

203 files changed

+3202
-1740
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

203 files changed

+3202
-1740
lines changed

.openpublishing.redirection.json

Lines changed: 23 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -28801,9 +28801,29 @@
2880128801
},
2880228802
{
2880328803
"source_path_from_root": "/articles/marketplace/cloud-partner-portal-orig/cloud-partner-portal-migration-to-partner-center.md",
28804-
"redirect_url": "/azure/marketplace/partner-center-portal/account-migration-from-cpp-to-pc",
28804+
"redirect_url": "/azure/marketplace/account-migration-from-cpp-to-pc",
2880528805
"redirect_document_id": false
2880628806
},
28807+
{
28808+
"source_path_from_root": "/articles/marketplace/partner-center-portal/account-migration-from-cpp-to-pc.md",
28809+
"redirect_url": "/azure/marketplace/account-migration-from-cpp-to-pc",
28810+
"redirect_document_id": false
28811+
},
28812+
{
28813+
"source_path_from_root": "/articles/marketplace/partner-center-portal/create-account.md",
28814+
"redirect_url": "/azure/marketplace/create-account",
28815+
"redirect_document_id": false
28816+
},
28817+
{
28818+
"source_path_from_root": "/articles/marketplace/partner-center-portal/manage-account.md",
28819+
"redirect_url": "/azure/marketplace/manage-account",
28820+
"redirect_document_id": false
28821+
},
28822+
{
28823+
"source_path_from_root": "/articles/marketplace/partner-center-portal/company-work-accounts.md",
28824+
"redirect_url": "/azure/marketplace/company-work-accounts",
28825+
"redirect_document_id": false
28826+
},
2880728827
{
2880828828
"source_path_from_root": "/articles/marketplace/cloud-partner-portal/portal-tour/cpp-insights-page.md",
2880928829
"redirect_url": "/azure/marketplace/partner-center-portal/analytics",
@@ -28996,7 +29016,7 @@
2899629016
},
2899729017
{
2899829018
"source_path_from_root": "/articles/marketplace-publishing/marketplace-publishing-accounts-creation-registration.md",
28999-
"redirect_url": "/azure/marketplace/partner-center-portal/create-account",
29019+
"redirect_url": "/azure/marketplace/create-account",
2900029020
"redirect_document_id": true
2900129021
},
2900229022
{
@@ -29396,7 +29416,7 @@
2939629416
},
2939729417
{
2939829418
"source_path_from_root": "/articles/marketplace/cloud-partner-portal/cloud-partner-portal-manage-users.md",
29399-
"redirect_url": "/azure/marketplace/partner-center-portal/manage-account",
29419+
"redirect_url": "/azure/marketplace/manage-account",
2940029420
"redirect_document_id": true
2940129421
},
2940229422
{
296 Bytes
Loading
471 Bytes
Loading
731 Bytes
Loading
23.4 KB
Loading
Loading
Loading
-75 Bytes
Loading
-21 Bytes
Loading

articles/active-directory-b2c/troubleshoot-custom-policies.md

Lines changed: 21 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ manager: celestedg
88
ms.service: active-directory
99
ms.workload: identity
1010
ms.topic: troubleshooting
11-
ms.date: 04/06/2021
11+
ms.date: 04/08/2021
1212
ms.author: mimart
1313
ms.subservice: B2C
1414
---
@@ -81,18 +81,31 @@ You can include the correlation ID in your Azure AD B2C tokens. To include the c
8181

8282
To diagnose problems with your custom policies, use [Application Insights](troubleshoot-with-application-insights.md). Application Insights traces the activity of your custom policy user journey. It provides a way to diagnose exceptions and observe the exchange of claims between Azure AD B2C and the various claims providers that are defined by technical profiles, such as identity providers, API-based services, the Azure AD B2C user directory, and other services.
8383

84-
We recommend installing the [Azure AD B2C extension](https://marketplace.visualstudio.com/items?itemName=AzureADB2CTools.aadb2c) for [VS Code](https://code.visualstudio.com/). With the Azure AD B2C extension, the logs are organized for you by policy name, correlation ID (Application Insights presents the first digit of the correlation ID), and the log timestamp. This feature helps you find the relevant log based on the local timestamp and see the user journey as executed by Azure AD B2C.
84+
We recommend installing the [Azure AD B2C extension](https://marketplace.visualstudio.com/items?itemName=AzureADB2CTools.aadb2c) for [VS Code](https://code.visualstudio.com/). With the Azure AD B2C extension, the logs are organized for you by policy name, correlation ID (Application Insights presents the first digit of the correlation ID), and the log timestamp. This feature helps you find the relevant log based on the local timestamp and see the user journey as executed by Azure AD B2C.
8585

8686
> [!NOTE]
87-
> The community has developed the Visual Studio Code extension for Azure AD B2C to help identity developers. The extension is not supported by Microsoft and is made available strictly as-is.
87+
> - There is a short delay, typically less than five minutes, before you can see new logs in Application Insights.
88+
> - The community has developed the Visual Studio Code extension for Azure AD B2C to help identity developers. The extension is not supported by Microsoft and is made available strictly as-is.
8889

8990
A single sign-in flow can issue more than one Azure Application Insights trace. In the following screenshot, the *B2C_1A_signup_signin* policy has three logs. Each log represents part of the sign-in flow.
9091

92+
The following screenshot shows the Azure AD B2C extension for VS Code with Azure Application Insights trace explorer.
93+
9194
![Screenshot of Azure AD B2C extension for VS Code with Azure Application Insights trace.](./media/troubleshoot-custom-policies/vscode-extension-application-insights-trace.png)
9295

96+
### Filter the trace log
97+
98+
With the focus on the Azure AD B2C trace explorer, start to type the first digit of the correlation ID, or a time you want to find. You will see a filter box in the top-right of the Azure AD B2C trace explorer showing what you have typed so far, and matching trace logs will be highlighted.
99+
100+
![Screenshot of Azure AD B2C extension Azure AD B2C trace explorer filter highlighting.](./media/troubleshoot-custom-policies/vscode-extension-application-insights-highlight.png)
101+
102+
Hovering over the filter box and selecting **Enable Filter on Type** will show only matching trace logs. Use the **'X' Clear button** to clear the filter.
103+
104+
![Screenshot of Azure AD B2C extension Azure AD B2C trace explorer filter.](./media/troubleshoot-custom-policies/vscode-extension-application-insights-filter.png)
105+
93106
### Application Insights trace log details
94107

95-
When you select an Azure Application Insights trace, the extension opens the **Application Insights details** page with the following information:
108+
When you select an Azure Application Insights trace, the extension opens the **Application Insights details** window with the following information:
96109

97110
- **Application Insights** - Generic information about the trace log, including the policy name, correlation ID, Azure Application Insights trace ID, and trace timestamp.
98111
- **Technical profiles** - List of technical profiles that appear in the trace log.
@@ -102,6 +115,10 @@ When you select an Azure Application Insights trace, the extension opens the **A
102115
- **Exceptions** - List of exceptions or fatal errors that appear in the trace log.
103116
- **Application Insights JSON** - The raw data the returns from the Application Insights.
104117

118+
The following screenshot shows an example of the Application Insights trace log details window.
119+
120+
![Screenshot of Azure AD B2C extension Azure AD B2C trace report.](./media/troubleshoot-custom-policies/vscode-extension-application-insights-report.png)
121+
105122
## Troubleshoot JWT tokens
106123

107124
For JWT token validation and debugging purposes, your can decode JWTs using a site like [https://jwt.ms](https://jwt.ms). Create a test application that can redirect to `https://jwt.ms` for token inspection. If you haven't already done so, [register a web application](tutorial-register-applications.md), and [enable ID token implicit grant](tutorial-register-applications.md#enable-id-token-implicit-grant).

0 commit comments

Comments
 (0)