Skip to content

Commit 5fef063

Browse files
authored
Merge pull request #264345 from MicrosoftDocs/main
1/26/2024 AM Publish
2 parents d3c0a77 + ea382a9 commit 5fef063

File tree

60 files changed

+1274
-407
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

60 files changed

+1274
-407
lines changed

articles/active-directory-b2c/analytics-with-application-insights.md

Lines changed: 14 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: CelesteDG
99
ms.service: active-directory
1010
ms.topic: how-to
1111

12-
ms.date: 01/11/2024
12+
ms.date: 01/26/2024
1313
ms.author: kengaderdus
1414
ms.subservice: B2C
1515
zone_pivot_groups: b2c-policy-type
@@ -38,6 +38,8 @@ In Azure Active Directory B2C (Azure AD B2C), you can send event data directly t
3838
- Measure performance.
3939
- Create notifications from Application Insights.
4040

41+
[!INCLUDE [active-directory-b2c-limited-to-custom-policy](../../includes/active-directory-b2c-public-preview.md)]
42+
4143
## Overview
4244

4345
To enable custom event logs, add an Application Insights technical profile. In the technical profile, you define the Application Insights instrumentation key, the event name, and the claims to record. To post an event, add the technical profile as an orchestration step in a [user journey](userjourneys.md).
@@ -183,11 +185,13 @@ Open the *TrustFrameworkExtensions.xml* file from the starter pack. Add the tech
183185
184186
## Add the technical profiles as orchestration steps
185187

186-
Add new orchestration steps that refer to the technical profiles.
188+
Add new orchestration steps that refer to the technical profiles.
187189

188190
> [!IMPORTANT]
189191
> After you add the new orchestration steps, renumber the steps sequentially without skipping any integers from 1 to N.
190192
193+
1. Identify the policy file that contains your user journey, such as `SocialAndLocalAccounts/SignUpOrSignin.xml`, then open it.
194+
191195
1. Call `AppInsights-SignInRequest` as the second orchestration step. This step tracks that a sign-up or sign-in request has been received.
192196

193197
```xml
@@ -199,10 +203,12 @@ Add new orchestration steps that refer to the technical profiles.
199203
</OrchestrationStep>
200204
```
201205

202-
1. Before the `SendClaims` orchestration step, add a new step that calls `AppInsights-UserSignup`. It's triggered when the user selects the sign-up button in a sign-up or sign-in journey.
206+
1. Before the `SendClaims` orchestration step, add a new step that calls `AppInsights-UserSignup`. It's triggered when the user selects the sign-up button in a sign-up or sign-in journey. You may need to update the orchestration step, `Order="8"`,to make sure you don't skip any integer from the first to the last orchestration step.
203207

204208
```xml
205-
<!-- Handles the user selecting the sign-up link in the local account sign-in page -->
209+
<!-- Handles the user selecting the sign-up link in the local account sign-in page
210+
The `SendClaims` orchestration step comes after this one,
211+
-->
206212
<OrchestrationStep Order="8" Type="ClaimsExchange">
207213
<Preconditions>
208214
<Precondition Type="ClaimsExist" ExecuteActionsIf="false">
@@ -221,10 +227,12 @@ Add new orchestration steps that refer to the technical profiles.
221227
</OrchestrationStep>
222228
```
223229

224-
1. After the `SendClaims` orchestration step, call `AppInsights-SignInComplete`. This step shows a successfully completed journey.
230+
1. After the `SendClaims` orchestration step, call `AppInsights-SignInComplete`. This step shows a successfully completed journey. You may need to update the orchestration step, `Order="10"`, to make sure you don't skip any integer from the first to the last orchestration step.
225231

226232
```xml
227-
<!-- Track that we have successfully sent a token -->
233+
<!-- Track that we have successfully sent a token
234+
The `SendClaims` orchestration step come before this one,
235+
-->
228236
<OrchestrationStep Order="10" Type="ClaimsExchange">
229237
<ClaimsExchanges>
230238
<ClaimsExchange Id="TrackSignInComplete" TechnicalProfileReferenceId="AppInsights-SignInComplete" />

articles/active-directory-b2c/b2clogin.md

Lines changed: 18 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -9,12 +9,12 @@ manager: CelesteDG
99
ms.service: active-directory
1010

1111
ms.topic: how-to
12-
ms.date: 01/11/2024
12+
ms.date: 01/26/2024
1313
ms.author: kengaderdus
1414
ms.subservice: B2C
1515

1616

17-
#Customer intent: As an Azure AD B2C application developer, I want to update the redirect URLs in my identity provider's applications to reference b2clogin.com or a custom domain, so that I can authenticate users with Azure AD B2C using the updated endpoints and policies.
17+
#Customer intent: As an Azure AD B2C application developer, I want to update the redirect URLs in my identity provider's applications to reference b2clogin.com or a custom domain, so that I can authenticate users with Azure AD B2C using the updated endpoints.
1818

1919
---
2020

@@ -27,17 +27,18 @@ When you set up an identity provider for sign-up and sign-in in your Azure Activ
2727
The transition to b2clogin.com only applies to authentication endpoints that use Azure AD B2C policies (user flows or custom policies) to authenticate users. These endpoints have a `<policy-name>` parameter, which specifies the policy Azure AD B2C should use. [Learn more about Azure AD B2C policies](technical-overview.md#identity-experiences-user-flows-or-custom-policies).
2828

2929
Old endpoints may look like:
30-
- <code>https://<b>login.microsoft.com</b>/\<tenant-name\>.onmicrosoft.com/<b>\<policy-name\></b>/oauth2/v2.0/authorize</code>
31-
- <code>https://<b>login.microsoft.com</b>/\<tenant-name\>.onmicrosoft.com/oauth2/v2.0/authorize<b>?p=\<policy-name\></b></code>
30+
- <code>https://<b>login.microsoft.com</b>/\<tenant-name\>.onmicrosoft.com/<b>\<policy-name\></b>/oauth2/v2.0/authorize</code> or <code>https://<b>login.microsoft.com</b>/\<tenant-name\>.onmicrosoft.com/oauth2/v2.0/authorize<b>?p=\<policy-name\></b></code> for `/authorize` endpoint.
31+
- <code>https://<b>login.microsoft.com</b>/\<tenant-name\>.onmicrosoft.com/<b>\<policy-name\></b>/oauth2/v2.0/logout</code> or <code>https://<b>login.microsoft.com</b>/\<tenant-name\>.onmicrosoft.com/oauth2/v2.0/logout<b>?p=\<policy-name\></b></code> for `/logout` endpoint.
3232

33-
A corresponding updated endpoint would look like:
34-
- <code>https://<b>\<tenant-name\>.b2clogin.com</b>/\<tenant-name\>.onmicrosoft.com/<b>\<policy-name\></b>/oauth2/v2.0/authorize</code>
35-
- <code>https://<b>\<tenant-name\>.b2clogin.com</b>/\<tenant-name\>.onmicrosoft.com/oauth2/v2.0/authorize?<b>p=\<policy-name\></b></code>
33+
A corresponding updated endpoint would look similar to the following endpoints:
34+
- <code>https://<b>\<tenant-name\>.b2clogin.com</b>/\<tenant-name\>.onmicrosoft.com/<b>\<policy-name\></b>/oauth2/v2.0/authorize</code> or <code>https://<b>\<tenant-name\>.b2clogin.com</b>/\<tenant-name\>.onmicrosoft.com/oauth2/v2.0/authorize?<b>p=\<policy-name\></b></code> for the `/authorize` endpoint.
35+
- <code>https://<b>\<tenant-name\>.b2clogin.com</b>/\<tenant-name\>.onmicrosoft.com/<b>\<policy-name\></b>/oauth2/v2.0/logout</code> or <code>https://<b>\<tenant-name\>.b2clogin.com</b>/\<tenant-name\>.onmicrosoft.com/oauth2/v2.0/logout?<b>p=\<policy-name\></b></code> for the `/logout` endpoint.
3636

37-
With Azure AD B2C [custom domain](./custom-domain.md) the corresponding updated endpoint would look like:
3837

39-
- <code>https://<b>login.contoso.com</b>/\<tenant-name\>.onmicrosoft.com/<b>\<policy-name\></b>/oauth2/v2.0/authorize</code>
40-
- <code>https://<b>login.contoso.com</b>/\<tenant-name\>.onmicrosoft.com/oauth2/v2.0/authorize?<b>p=\<policy-name\></b></code>
38+
With Azure AD B2C [custom domain](./custom-domain.md) the corresponding updated endpoint would look similar to the following endpoints. You can use either of these endpoints:
39+
40+
- <code>https://<b>login.contoso.com</b>/\<tenant-name\>.onmicrosoft.com/<b>\<policy-name\></b>/oauth2/v2.0/authorize</code> or <code>https://<b>login.contoso.com</b>/\<tenant-name\>.onmicrosoft.com/oauth2/v2.0/authorize?<b>p=\<policy-name\></b></code> for the `/authorize` endpoint.
41+
- <code>https://<b>login.contoso.com</b>/\<tenant-name\>.onmicrosoft.com/<b>\<policy-name\></b>/oauth2/v2.0/logout</code> or <code>https://<b>login.contoso.com</b>/\<tenant-name\>.onmicrosoft.com/oauth2/v2.0/logout?<b>p=\<policy-name\></b></code> for the `/logout` endpoint.
4142

4243
## Endpoints that are not affected
4344

@@ -49,6 +50,12 @@ This change doesn't affect all endpoints, which don't contain a policy parameter
4950
https://login.microsoftonline.com/<tenant-name>.onmicrosoft.com/oauth2/v2.0/token
5051
```
5152

53+
However, if you only want to obtain a token to authenticate users, then you can specify the policy that your application wishes to use to authenticate users. In this case, the updated `/token` endpoints would look similar to the following examples.
54+
55+
- <code>https://<b>\<tenant-name\>.b2clogin.com</b>/\<tenant-name\>.onmicrosoft.com/<b>\<policy-name\></b>/oauth2/v2.0/token</code> or <code>https://<b>\<tenant-name\>.b2clogin.com</b>/\<tenant-name\>.onmicrosoft.com/oauth2/v2.0/token?<b>p=\<policy-name\></b></code> when you use *b2clogin.com*.
56+
57+
- <code>https://<b>login.contoso.com</b>/\<tenant-name\>.onmicrosoft.com/<b>\<policy-name\></b>/oauth2/v2.0/token</code> or <code>https://<b>login.contoso.com</b>/\<tenant-name\>.onmicrosoft.com/oauth2/v2.0/token?<b>p=\<policy-name\></b></code> when you use a custom domain.
58+
5259
## Overview of required changes
5360

5461
There are several modifications you might need to make to migrate your applications from *login.microsoftonline.com* using Azure AD B2C endpoints:
@@ -149,4 +156,4 @@ For migrating Azure API Management APIs protected by Azure AD B2C, see the [Migr
149156
[msal-dotnet]: https://github.com/AzureAD/microsoft-authentication-library-for-dotnet
150157
[msal-dotnet-b2c]: https://github.com/AzureAD/microsoft-authentication-library-for-dotnet/wiki/AAD-B2C-specifics
151158
[msal-js]: https://github.com/AzureAD/microsoft-authentication-library-for-js
152-
[msal-js-b2c]: ../active-directory/develop/msal-b2c-overview.md
159+
[msal-js-b2c]: ../active-directory/develop/msal-b2c-overview.md

articles/active-directory-b2c/custom-domain.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ author: kengaderdus
66
manager: CelesteDG
77
ms.service: active-directory
88
ms.topic: how-to
9-
ms.date: 01/11/2024
9+
ms.date: 01/26/2024
1010
ms.author: kengaderdus
1111
ms.subservice: B2C
1212
ms.custom: "b2c-support"
@@ -267,8 +267,8 @@ In the following redirect URI:
267267
https://<custom-domain-name>/<tenant-name>/oauth2/authresp
268268
```
269269

270-
- Replace **&lt;custom-domain-name&gt;** with your custom domain name.
271-
- Replace **&lt;tenant-name&gt;** with the name of your tenant, or your tenant ID.
270+
- Replace &lt;`custom-domain-name`&gt; with your custom domain name.
271+
- Replace &lt;`tenant-name`&gt; with the name of your tenant, or your tenant ID.
272272

273273
The following example shows a valid OAuth redirect URI:
274274

@@ -295,9 +295,9 @@ The custom domain integration applies to authentication endpoints that use Azure
295295
- <code>https://\<custom-domain\>/<tenant-name\>/<b>\<policy-name\></b>/oauth2/v2.0/token</code>
296296

297297
Replace:
298-
- **custom-domain** with your custom domain
299-
- **tenant-name** with your tenant name or tenant ID
300-
- **policy-name** with your policy name.
298+
- &lt;`custom-domain`&gt; with your custom domain
299+
- &lt;`tenant-name`&gt; with your tenant name or tenant ID
300+
- &lt;`policy-name`&gt; with your policy name.
301301

302302
The [SAML service provider](./saml-service-provider.md) metadata may look like the following sample:
303303

articles/active-directory-b2c/troubleshoot-with-application-insights.md

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ author: kengaderdus
66
manager: CelesteDG
77
ms.service: active-directory
88
ms.topic: troubleshooting
9-
ms.date: 01/11/2024
9+
ms.date: 01/22/2024
1010
ms.author: kengaderdus
1111
ms.subservice: B2C
1212
zone_pivot_groups: b2c-policy-type
@@ -27,6 +27,8 @@ zone_pivot_groups: b2c-policy-type
2727

2828
::: zone pivot="b2c-custom-policy"
2929

30+
[!INCLUDE [active-directory-b2c-limited-to-custom-policy](../../includes/active-directory-b2c-public-preview.md)]
31+
3032
This article provides steps for collecting logs from Active Directory B2C (Azure AD B2C) so that you can diagnose problems with your custom policies. Application Insights provides a way to diagnose exceptions and visualize application performance issues. Azure AD B2C includes a feature for sending data to Application Insights.
3133

3234
The detailed activity logs described here should be enabled **ONLY** during the development of your custom policies.
@@ -176,7 +178,7 @@ After you save the settings, the Application insights logs appear on the **Azure
176178

177179
## Configure Application Insights in Production
178180

179-
To improve your production environment performance and better user experience, it's important to configure your policy to ignore messages that are unimportant. Use the following configuration in production environments and no logs are sent to your application insights.
181+
To improve your production environment performance and better user experience, it's important to configure your policy to ignore messages that are unimportant. You also need to make sure that you don't log Personally Identifiable Information (PII). Use the following configuration in production environments and no logs are sent to your application insights.
180182

181183
1. Set the `DeploymentMode` attribute of the [TrustFrameworkPolicy](trustframeworkpolicy.md) to `Production`.
182184

articles/active-directory-b2c/trustframeworkpolicy.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ manager: CelesteDG
88
ms.service: active-directory
99

1010
ms.topic: reference
11-
ms.date: 01/11/2024
11+
ms.date: 01/23/2024
1212
ms.author: kengaderdus
1313
ms.subservice: B2C
1414

@@ -75,6 +75,8 @@ The **TrustFrameworkPolicy** element contains the following elements:
7575

7676
To inherit a policy from another policy, a **BasePolicy** element must be declared under the **TrustFrameworkPolicy** element of the policy file. The **BasePolicy** element is a reference to the base policy from which this policy is derived.
7777

78+
[!INCLUDE [active-directory-b2c-advanced-audience-warning](../../includes/active-directory-b2c-custom-policy-occurrence.md)]
79+
7880
The **BasePolicy** element contains the following elements:
7981

8082
| Element | Occurrences | Description |

articles/active-directory-b2c/view-audit-logs.md

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,18 +9,20 @@ manager: CelesteDG
99
ms.service: active-directory
1010
ms.topic: how-to
1111

12-
ms.date: 01/11/2024
12+
ms.date: 01/22/2024
1313
ms.author: kengaderdus
1414
ms.subservice: B2C
1515
ms.custom: fasttrack-edit
1616

1717

18-
#Customer intent: As an Azure AD B2C administrator, I want to access and view the audit logs for my B2C tenant, so that I can monitor activity, track user sign-ins, and troubleshoot any issues related to B2C resources and applications.
18+
#Customer intent: As an Azure AD B2C administrator, I want to access and view the audit logs for my Azure AD B2C tenant, so that I can monitor activity, track user sign-ins, and troubleshoot any issues related to B2C resources and applications.
1919

2020
---
2121

2222
# Accessing Azure AD B2C audit logs
2323

24+
[!INCLUDE [active-directory-b2c-limited-to-custom-policy](../../includes/active-directory-b2c-public-preview.md)]
25+
2426
Azure Active Directory B2C (Azure AD B2C) emits audit logs containing activity information about B2C resources, tokens issued, and administrator access. This article provides a brief overview of the information available in audit logs and instructions on how to access this data for your Azure AD B2C tenant.
2527

2628
Audit log events are only retained for **seven days**. Plan to download and store your logs using one of the methods shown below if you require a longer retention period.

articles/ai-services/openai/concepts/gpt-with-vision.md

Lines changed: 8 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -20,29 +20,34 @@ To try out GPT-4 Turbo with Vision, see the [quickstart](/azure/ai-services/open
2020

2121
The GPT-4 Turbo with Vision model answers general questions about what's present in the images or videos you upload.
2222

23-
2423
## Enhancements
2524

2625
Enhancements let you incorporate other Azure AI services (such as Azure AI Vision) to add new functionality to the chat-with-vision experience.
2726

2827
**Object grounding**: Azure AI Vision complements GPT-4 Turbo with Vision’s text response by identifying and locating salient objects in the input images. This lets the chat model give more accurate and detailed responses about the contents of the image.
2928

29+
> [!IMPORTANT]
30+
> To use Vision enhancement, you need a Computer Vision resource. It must be in the paid (S0) tier and in the same Azure region as your GPT-4 Turbo with Vision resource.
31+
3032
:::image type="content" source="../media/concepts/gpt-v/object-grounding.png" alt-text="Screenshot of an image with object grounding applied. Objects have bounding boxes with labels.":::
3133

3234
:::image type="content" source="../media/concepts/gpt-v/object-grounding-response.png" alt-text="Screenshot of a chat response to an image prompt about an outfit. The response is an itemized list of clothing items seen in the image.":::
3335

3436
**Optical Character Recognition (OCR)**: Azure AI Vision complements GPT-4 Turbo with Vision by providing high-quality OCR results as supplementary information to the chat model. It allows the model to produce higher quality responses for images with dense text, transformed images, and numbers-heavy financial documents, and increases the variety of languages the model can recognize in text.
3537

38+
> [!IMPORTANT]
39+
> To use Vision enhancement, you need a Computer Vision resource. It must be in the paid (S0) tier and in the same Azure region as your GPT-4 Turbo with Vision resource.
40+
3641
:::image type="content" source="../media/concepts/gpt-v/receipts.png" alt-text="Photo of several receipts.":::
3742

3843
:::image type="content" source="../media/concepts/gpt-v/ocr-response.png" alt-text="Screenshot of the JSON response of an OCR call.":::
3944

4045
**Video prompt**: The **video prompt** enhancement lets you use video clips as input for AI chat, enabling the model to generate summaries and answers about video content. It uses Azure AI Vision Video Retrieval to sample a set of frames from a video and create a transcript of the speech in the video.
4146

42-
In order to use the video prompt enhancement, you need both an Azure AI Vision resource and an Azure Video Indexer resource, in addition to your Azure OpenAI resource.
43-
4447
> [!VIDEO https://www.microsoft.com/en-us/videoplayer/embed/RW1eHRf]
4548
49+
> [!NOTE]
50+
> In order to use the video prompt enhancement, you need both an Azure AI Vision resource and an Azure Video Indexer resource, in the paid (S0) tier, in addition to your Azure OpenAI resource.
4651
4752
## Special pricing information
4853

articles/ai-services/openai/concepts/models.md

Lines changed: 10 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -107,10 +107,16 @@ See [model versions](../concepts/model-versions.md) to learn about how Azure Ope
107107
108108
### GPT-4 and GPT-4 Turbo Preview model availability
109109

110-
| Model Availability | gpt-4 (0314) | gpt-4 (0613) | gpt-4 (1106-preview) | gpt-4 (vision-preview) |
111-
|---|:---|:---|:---|:---|
112-
| Available to all subscriptions with Azure OpenAI access | | Australia East <br> Canada East <br> France Central <br> Sweden Central <br> Switzerland North | Australia East <br> Canada East <br> East US 2 <br> France Central <br> Norway East <br> South India <br> Sweden Central <br> UK South <br> West US | Sweden Central <br> Switzerland North <br> West US |
113-
| Available to subscriptions with current access to the model version in the region | East US <br> France Central <br> South Central US <br> UK South | East US <br> East US 2 <br> Japan East <br> UK South | | Australia East |
110+
111+
| Model | Regions where model is available to all subscriptions with Azure OpenAI access | Regions where model is available only to subscriptions with previous access to that model/region |
112+
|---|:---|:---|
113+
| gpt-4 (0314) | | East US <br> France Central <br> South Central US <br> UK South |
114+
| gpt-4 (0613) | Australia East <br> Canada East <br> France Central <br> Sweden Central <br> Switzerland North | East US <br> East US 2 <br> Japan East <br> UK South |
115+
| gpt-4 (1106-preview) | Australia East <br> Canada East <br> East US 2 <br> France Central <br> Norway East <br> South India <br> Sweden Central <br> UK South <br> West US | |
116+
| gpt-4 (vision-preview) | | Sweden Central <br> Switzerland North<br>Australia East <br> West US |
117+
118+
> [!NOTE]
119+
> As a temporary measure, GPT-4 Turbo with Vision is currently unavailable to new customers.
114120
115121
### GPT-3.5 models
116122

articles/ai-services/openai/gpt-v-quickstart.md

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -27,6 +27,12 @@ zone_pivot_groups: openai-quickstart-gpt-v
2727

2828
::: zone-end
2929

30+
::: zone pivot="programming-language-python"
31+
32+
[!INCLUDE [Python quickstart](includes/gpt-v-python.md)]
33+
34+
::: zone-end
35+
3036
## Next steps
3137

3238
* Learn more about these APIs in the [GPT-4 Turbo with Vision how-to guide](./gpt-v-quickstart.md)

0 commit comments

Comments
 (0)