You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory-b2c/active-directory-b2c-how-to-enable-billing.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -130,7 +130,7 @@ The management of Azure AD B2C using role-based access control is not affected b
130
130
131
131
Azure AD B2C tenants can be moved to another subscription if the source and destination subscriptions exist within the same Azure Active Directory tenant.
132
132
133
-
To learn how to move Azure resources like your Azure AD B2C tenant to another subscription, see [Move resources to new resource group or subscription](../azure-resource-manager/resource-group-move-resources.md).
133
+
To learn how to move Azure resources like your Azure AD B2C tenant to another subscription, see [Move resources to new resource group or subscription](../azure-resource-manager/management/move-resource-group-and-subscription.md).
134
134
135
135
Before you initiate the move, be sure to read the entire article to fully understand the limitations and requirements for such a move. In addition to instructions for moving resources, it includes critical information like a pre-move checklist and how to validate the move operation.
| x-ms-cpim-admin | main.b2cadmin.ext.azure.com | End of [browser session](active-directory-b2c-token-session-sso.md)| Holds user membership data across tenants. The tenants a user is a member of and level of membership (Admin or User). |
23
-
| x-ms-cpim-slice | login.microsoftonline.com, b2clogin.com, branded domain | End of [browser session](active-directory-b2c-token-session-sso.md)| Used to route requests to the appropriate production instance. |
24
-
| x-ms-cpim-trans | login.microsoftonline.com, b2clogin.com, branded domain | End of [browser session](active-directory-b2c-token-session-sso.md)| Used for tracking the transactions (number of authentication requests to Azure AD B2C) and the current transaction. |
25
-
| x-ms-cpim-sso:{Id} | login.microsoftonline.com, b2clogin.com, branded domain | End of [browser session](active-directory-b2c-token-session-sso.md)| Used for maintaining the SSO session. |
26
-
| x-ms-cpim-cache:{id}_n | login.microsoftonline.com, b2clogin.com, branded domain | End of [browser session](active-directory-b2c-token-session-sso.md), successful authentication | Used for maintaining the request state. |
27
-
| x-ms-cpim-csrf | login.microsoftonline.com, b2clogin.com, branded domain | End of [browser session](active-directory-b2c-token-session-sso.md)| Cross-Site Request Forgery token used for CRSF protection. |
28
-
| x-ms-cpim-dc | login.microsoftonline.com, b2clogin.com, branded domain | End of [browser session](active-directory-b2c-token-session-sso.md)| Used for Azure AD B2C network routing. |
29
-
| x-ms-cpim-ctx | login.microsoftonline.com, b2clogin.com, branded domain | End of [browser session](active-directory-b2c-token-session-sso.md)| Context |
30
-
| x-ms-cpim-rp | login.microsoftonline.com, b2clogin.com, branded domain | End of [browser session](active-directory-b2c-token-session-sso.md)| Used for storing membership data for the resource provider tenant. |
31
-
| x-ms-cpim-rc | login.microsoftonline.com, b2clogin.com, branded domain | End of [browser session](active-directory-b2c-token-session-sso.md)| Used for storing the relay cookie. |
32
-
22
+
| x-ms-cpim-admin | main.b2cadmin.ext.azure.com | End of [browser session](session-behavior.md)| Holds user membership data across tenants. The tenants a user is a member of and level of membership (Admin or User). |
23
+
| x-ms-cpim-slice | login.microsoftonline.com, b2clogin.com, branded domain | End of [browser session](session-behavior.md)| Used to route requests to the appropriate production instance. |
24
+
| x-ms-cpim-trans | login.microsoftonline.com, b2clogin.com, branded domain | End of [browser session](session-behavior.md)| Used for tracking the transactions (number of authentication requests to Azure AD B2C) and the current transaction. |
25
+
| x-ms-cpim-sso:{Id} | login.microsoftonline.com, b2clogin.com, branded domain | End of [browser session](session-behavior.md)| Used for maintaining the SSO session. |
26
+
| x-ms-cpim-cache:{id}_n | login.microsoftonline.com, b2clogin.com, branded domain | End of [browser session](session-behavior.md), successful authentication | Used for maintaining the request state. |
27
+
| x-ms-cpim-csrf | login.microsoftonline.com, b2clogin.com, branded domain | End of [browser session](session-behavior.md)| Cross-Site Request Forgery token used for CRSF protection. |
28
+
| x-ms-cpim-dc | login.microsoftonline.com, b2clogin.com, branded domain | End of [browser session](session-behavior.md)| Used for Azure AD B2C network routing. |
29
+
| x-ms-cpim-ctx | login.microsoftonline.com, b2clogin.com, branded domain | End of [browser session](session-behavior.md)| Context |
30
+
| x-ms-cpim-rp | login.microsoftonline.com, b2clogin.com, branded domain | End of [browser session](session-behavior.md)| Used for storing membership data for the resource provider tenant. |
31
+
| x-ms-cpim-rc | login.microsoftonline.com, b2clogin.com, branded domain | End of [browser session](session-behavior.md)| Used for storing the relay cookie. |
Copy file name to clipboardExpand all lines: articles/active-directory-b2c/relyingparty.md
+1-3Lines changed: 1 addition & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -204,7 +204,7 @@ The **OutputClaim** element contains the following attributes:
204
204
### SubjectNamingInfo
205
205
206
206
With the **SubjectNameingInfo** element, you control the value of the token subject:
207
-
-**JWT token** - the `sub` claim. This is a principal about which the token asserts information, such as the user of an application. This value is immutable and cannot be reassigned or reused. It can be used to perform safe authorization checks, such as when the token is used to access a resource. By default, the subject claim is populated with the object ID of the user in the directory. For more information, see [Token, session and single sign-on configuration](active-directory-b2c-token-session-sso.md).
207
+
-**JWT token** - the `sub` claim. This is a principal about which the token asserts information, such as the user of an application. This value is immutable and cannot be reassigned or reused. It can be used to perform safe authorization checks, such as when the token is used to access a resource. By default, the subject claim is populated with the object ID of the user in the directory. For more information, see [Token, session and single sign-on configuration](session-behavior.md).
208
208
-**SAML token** - the `<Subject><NameID>` element which identifies the subject element.
209
209
210
210
The **SubjectNamingInfo** element contains the following attribute:
@@ -242,5 +242,3 @@ The JWT token includes the `sub` claim with the user objectId:
0 commit comments