Skip to content

Commit 69fe690

Browse files
committed
Merge remote-tracking branch 'refs/remotes/MicrosoftDocs/master'
2 parents adcb73f + 4235c54 commit 69fe690

File tree

107 files changed

+1025
-805
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

107 files changed

+1025
-805
lines changed

articles/active-directory-b2c/active-directory-b2c-setup-oidc-azure-active-directory.md

Lines changed: 2 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -8,16 +8,13 @@ manager: celestedg
88
ms.service: active-directory
99
ms.workload: identity
1010
ms.topic: conceptual
11-
ms.date: 07/08/2019
11+
ms.date: 08/06/2019
1212
ms.author: marsma
1313
ms.subservice: B2C
1414
---
1515

1616
# Set up sign-in for a specific Azure Active Directory organization in Azure Active Directory B2C
1717

18-
>[!NOTE]
19-
> This feature is in public preview. Do not use the feature in production environments.
20-
2118
To use an Azure Active Directory (Azure AD) as an [identity provider](active-directory-b2c-reference-oauth-code.md) in Azure AD B2C, you need to create an application that represents it. This article shows you how to enable sign-in for users from a specific Azure AD organization using a user flow in Azure AD B2C.
2219

2320
## Create an Azure AD app
@@ -50,7 +47,7 @@ To enable sign-in for users from a specific Azure AD organization, you need to r
5047
2. Choose **All services** in the top-left corner of the Azure portal, and then search for and select **Azure AD B2C**.
5148
3. Select **Identity providers**, and then select **Add**.
5249
4. Enter a **Name**. For example, enter `Contoso Azure AD`.
53-
5. Select **Identity provider type**, select **OpenID Connect (Preview)**, and then click **OK**.
50+
5. Select **Identity provider type**, select **OpenID Connect**, and then click **OK**.
5451
6. Select **Set up this identity provider**
5552
7. For **Metadata url**, enter the following URL replacing `your-AD-tenant-domain` with the domain name of your Azure AD tenant. For example `https://login.microsoftonline.com/contoso.onmicrosoft.com/.well-known/openid-configuration`:
5653

articles/active-directory-b2c/active-directory-b2c-setup-oidc-idp.md

Lines changed: 4 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: Set up sign-up and sign-in with OpenID Connect - Azure Active Directory B2C | Microsoft Docs
2+
title: Set up sign-up and sign-in with OpenID Connect - Azure Active Directory B2C
33
description: Set up sign-up and sign-in with OpenID Connect using Azure Active Directory B2C.
44
services: active-directory-b2c
55
author: mmacy
@@ -8,26 +8,22 @@ manager: celestedg
88
ms.service: active-directory
99
ms.workload: identity
1010
ms.topic: conceptual
11-
ms.date: 11/30/2018
11+
ms.date: 08/06/2019
1212
ms.author: marsma
1313
ms.subservice: B2C
1414
---
1515

1616
# Set up sign-up and sign-in with OpenID Connect using Azure Active Directory B2C
1717

18-
>[!NOTE]
19-
> This feature is in public preview. Do not use the feature in production environments.
20-
21-
22-
[OpenID Connect](active-directory-b2c-reference-oidc.md) is an authentication protocol, built on top of OAuth 2.0, that can be used to securely sign users in. Most identity providers that use this protocol, are supported in Azure AD B2C. This article explains how you can add custom OpenID Connect identity providers into your user flows.
18+
[OpenID Connect](active-directory-b2c-reference-oidc.md) is an authentication protocol built on top of OAuth 2.0 that can be used for secure user sign-in. Most identity providers that use this protocol are supported in Azure AD B2C. This article explains how you can add custom OpenID Connect identity providers into your user flows.
2319

2420
## Add the identity provider
2521

2622
1. Sign in to the [Azure portal](https://portal.azure.com/) as the global administrator of your Azure AD B2C tenant.
2723
2. Make sure you're using the directory that contains your Azure AD B2C tenant by clicking the **Directory and subscription filter** in the top menu and choosing the directory that contains your tenant.
2824
3. Choose **All services** in the top-left corner of the Azure portal, search for and select **Azure AD B2C**.
2925
4. Select **Identity Providers**, and then click **Add**.
30-
5. For the **Identity provider type**, select **OpenID Connect (Preview)**.
26+
5. For the **Identity provider type**, select **OpenID Connect**.
3127

3228
## Configure the identity provider
3329

articles/active-directory-b2c/active-directory-b2c-tutorials-spa.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -45,8 +45,8 @@ Additionally, you need the following in your local development environment:
4545
In the second tutorial that you completed as part of the prerequisites, you registered a web application in Azure AD B2C. To enable communication with the sample in the tutorial, you need to add a redirect URI to the application in Azure AD B2C.
4646

4747
1. Sign in to the [Azure portal](https://portal.azure.com).
48-
1. Make sure you're using the directory that contains your Azure AD B2C tenant by clicking the **Directory and subscription filter** in the top menu and choosing the directory that contains your tenant.
49-
1. Choose **All services** in the top-left corner of the Azure portal, and then search for and select **Azure AD B2C**.
48+
1. Make sure you're using the directory that contains your Azure AD B2C tenant by selecting the **Directory and subscription** filter in the top menu and choosing the directory that contains your tenant.
49+
1. Select **All services** in the top-left corner of the Azure portal, and then search for and select **Azure AD B2C**.
5050
1. Select **Applications**, and then select the *webapp1* application.
5151
1. Under **Reply URL**, add `http://localhost:6420`.
5252
1. Select **Save**.
@@ -105,23 +105,23 @@ Now that you've obtained the sample, update the code with your Azure AD B2C tena
105105
Listening on port 6420...
106106
```
107107
108-
1. Navigate to `http://localhost:6420` in your browser to view the application.
108+
1. Go to `http://localhost:6420` in your browser to view the application.
109109
110110
The sample supports sign-up, sign-in, profile editing, and password reset. This tutorial highlights how a user signs up using an email address.
111111
112112
### Sign up using an email address
113113
114-
1. Click **Login** to initiate the *B2C_1_signupsignin1* user flow you specified in an earlier step.
115-
1. Azure AD B2C presents a sign-in page with a sign-up link. Since you don't yet have an account, click the **Sign up now** link.
114+
1. Select **Login** to initiate the *B2C_1_signupsignin1* user flow you specified in an earlier step.
115+
1. Azure AD B2C presents a sign-in page with a sign-up link. Since you don't yet have an account, select the **Sign up now** link.
116116
1. The sign-up workflow presents a page to collect and verify the user's identity using an email address. The sign-up workflow also collects the user's password and the requested attributes defined in the user flow.
117117

118118
Use a valid email address and validate using the verification code. Set a password. Enter values for the requested attributes.
119119

120120
![Sign-up page presented by the sign-in/sign-up user flow](./media/active-directory-b2c-tutorials-desktop-app/sign-up-workflow.PNG)
121121

122-
1. Click **Create** to create a local account in the Azure AD B2C directory.
122+
1. Select **Create** to create a local account in the Azure AD B2C directory.
123123

124-
When you click **Create**, the sign up page closes and the sign in page reappears.
124+
When you select **Create**, the sign up page closes and the sign in page reappears.
125125

126126
You can now use your email address and password to sign in to the application.
127127

articles/active-directory-b2c/idp-pass-through-custom.md

Lines changed: 8 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: Pass an access token through a custom policy to your application in Azure Active Directory B2C | Microsoft Docs
2+
title: Pass an access token through a custom policy to your application in Azure Active Directory B2C
33
description: Learn how you can pass an access token for OAuth2.0 identity providers as a claim through a custom policy to your application in Azure Active Directory B2C.
44
services: active-directory-b2c
55
author: mmacy
@@ -8,22 +8,20 @@ manager: celestedg
88
ms.service: active-directory
99
ms.workload: identity
1010
ms.topic: conceptual
11-
ms.date: 02/19/2019
11+
ms.date: 08/17/2019
1212
ms.author: marsma
1313
ms.subservice: B2C
1414
---
1515

1616
# Pass an access token through a custom policy to your application in Azure Active Directory B2C
1717

18-
[!INCLUDE [active-directory-b2c-public-preview](../../includes/active-directory-b2c-public-preview.md)]
19-
20-
A [custom policy](active-directory-b2c-get-started-custom.md) in Azure Active Directory (Azure AD) B2C provides users of your application an opportunity to sign up or sign in with an identity provider. When this happens, Azure AD B2C receives an [access token](active-directory-b2c-reference-tokens.md) from the identity provider. Azure AD B2C uses that token to retrieve information about the user. You add a claim type and output claim to your custom policy to pass the token through to the applications that you register in Azure AD B2C.
18+
A [custom policy](active-directory-b2c-get-started-custom.md) in Azure Active Directory B2C (Azure AD B2C) provides users of your application an opportunity to sign up or sign in with an identity provider. When this happens, Azure AD B2C receives an [access token](active-directory-b2c-reference-tokens.md) from the identity provider. Azure AD B2C uses that token to retrieve information about the user. You add a claim type and output claim to your custom policy to pass the token through to the applications that you register in Azure AD B2C.
2119

2220
Azure AD B2C supports passing the access token of [OAuth 2.0](active-directory-b2c-reference-oauth-code.md) and [OpenID Connect](active-directory-b2c-reference-oidc.md) identity providers. For all other identity providers, the claim is returned blank.
2321

2422
## Prerequisites
2523

26-
- Your custom policy is configured with an OAuth 2.0 or OpenID Connect identity provider.
24+
* Your custom policy is configured with an OAuth 2.0 or OpenID Connect identity provider.
2725

2826
## Add the claim elements
2927

@@ -82,24 +80,24 @@ When testing your applications in Azure AD B2C, it can be useful to have the Azu
8280
### Upload the files
8381

8482
1. Sign in to the [Azure portal](https://portal.azure.com/).
85-
2. Make sure you're using the directory that contains your Azure AD B2C tenant by clicking the **Directory and subscription filter** in the top menu and choosing the directory that contains your tenant.
83+
2. Make sure you're using the directory that contains your Azure AD B2C tenant by clicking the **Directory + subscription** filter in the top menu and choosing the directory that contains your tenant.
8684
3. Choose **All services** in the top-left corner of the Azure portal, and then search for and select **Azure AD B2C**.
8785
4. Select **Identity Experience Framework**.
8886
5. On the Custom Policies page, click **Upload Policy**.
8987
6. Select **Overwrite the policy if it exists**, and then search for and select the *TrustframeworkExtensions.xml* file.
90-
7. Click **Upload**.
88+
7. Select **Upload**.
9189
8. Repeat steps 5 through 7 for the relying party file, such as *SignUpOrSignIn.xml*.
9290

9391
### Run the policy
9492

9593
1. Open the policy that you changed. For example, *B2C_1A_signup_signin*.
9694
2. For **Application**, select your application that you previously registered. To see the token in the example below, the **Reply URL** should show `https://jwt.ms`.
97-
3. Click **Run now**.
95+
3. Select **Run now**.
9896

9997
You should see something similar to the following example:
10098

10199
![Decoded token in jwt.ms with idp_access_token block highlighted](./media/idp-pass-through-custom/idp-pass-through-custom-token.PNG)
102100

103101
## Next steps
104102

105-
Learn more about tokens in the [Azure Active Directory token reference](active-directory-b2c-reference-tokens.md).
103+
Learn more about tokens in the [Azure Active Directory B2C token reference](active-directory-b2c-reference-tokens.md).

articles/active-directory-b2c/idp-pass-through-user-flow.md

Lines changed: 6 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -1,31 +1,28 @@
11
---
2-
title: Pass an access token through a user flow to your application - Azure Active Directory B2C | Microsoft Docs
3-
description: Learn how you can pass through an access token for OAuth2.0 identity providers as a claim in a user flow in Azure Active Directory B2C.
2+
title: Pass an access token through a user flow to your application - Azure Active Directory B2C
3+
description: Learn how to pass an access token for OAuth 2.0 identity providers as a claim in a user flow in Azure Active Directory B2C.
44
services: active-directory-b2c
55
author: mmacy
66
manager: celestedg
77

88
ms.service: active-directory
99
ms.workload: identity
1010
ms.topic: conceptual
11-
ms.date: 04/16/2019
11+
ms.date: 08/17/2019
1212
ms.author: marsma
1313
ms.subservice: B2C
1414
---
1515

1616
# Pass an access token through a user flow to your application in Azure Active Directory B2C
1717

18-
> [!NOTE]
19-
> This feature is currently in public preview.
20-
21-
A [user flow](active-directory-b2c-reference-policies.md) in Azure Active Directory (Azure AD) B2C provides users of your application an opportunity to sign up or sign in with an identity provider. When the journey starts, Azure AD B2C receives an [access token](active-directory-b2c-reference-tokens.md) from the identity provider. Azure AD B2C uses that token to retrieve information about the user. You enable a claim in your user flow to pass the token through to the applications that you register in Azure AD B2C.
18+
A [user flow](active-directory-b2c-reference-policies.md) in Azure Active Directory B2C (Azure AD B2C) provides users of your application an opportunity to sign up or sign in with an identity provider. When the journey starts, Azure AD B2C receives an [access token](active-directory-b2c-reference-tokens.md) from the identity provider. Azure AD B2C uses that token to retrieve information about the user. You enable a claim in your user flow to pass the token through to the applications that you register in Azure AD B2C.
2219

2320
Azure AD B2C currently only supports passing the access token of [OAuth 2.0](active-directory-b2c-reference-oauth-code.md) identity providers, which include [Facebook](active-directory-b2c-setup-fb-app.md) and [Google](active-directory-b2c-setup-goog-app.md). For all other identity providers, the claim is returned blank.
2421

2522
## Prerequisites
2623

27-
- Your application must be using a [v2 user flow](user-flow-versions.md).
28-
- Your user flow is configured with an OAuth 2.0 identity provider.
24+
* Your application must be using a [v2 user flow](user-flow-versions.md).
25+
* Your user flow is configured with an OAuth 2.0 identity provider.
2926

3027
## Enable the claim
3128

articles/active-directory-b2c/tutorial-add-identity-providers.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -94,7 +94,7 @@ After you create the application for the identity provider that you want to add,
9494
1. Choose **All services** in the top-left corner of the Azure portal, and then search for and select **Azure AD B2C**.
9595
1. Select **Identity providers**, and then select **Add**.
9696
1. Enter a **Name**. For example, enter *Contoso Azure AD*.
97-
1. Select **Identity provider type**, select **OpenID Connect (Preview)**, and then click **OK**.
97+
1. Select **Identity provider type**, select **OpenID Connect**, and then click **OK**.
9898
1. Click **Set up this identity provider**
9999
1. For **Metadata url**, enter the following URL, replacing `your-AD-tenant-domain` with the domain name of your Azure AD tenant.
100100

articles/active-directory/b2b/licensing-guidance.md

Lines changed: 5 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: B2B
88
ms.topic: conceptual
9-
ms.date: 10/04/2018
9+
ms.date: 08/15/2019
1010

1111
ms.author: mimart
1212
author: msmimart
@@ -18,7 +18,10 @@ ms.collection: M365-identity-device-management
1818

1919
# Azure Active Directory B2B collaboration licensing guidance
2020

21-
With Azure Active Directory (Azure AD) business-to-business (B2B) collaboration, you can invite External Users (or "guest users") to use your paid Azure AD services. For each paid Azure AD license that you assign to a user, you can invite up to five guest users under the External User Allowance.
21+
With Azure Active Directory (Azure AD) business-to-business (B2B) collaboration, you can invite External Users (or "guest users") to use your paid Azure AD services. Some features are free, but for any paid Azure AD features, you can invite up to five guest users for each Azure AD edition license that you own for an employee or a non-guest user in your tenant.
22+
23+
> [!NOTE]
24+
> Refer to [Azure Active Directory pricing](https://azure.microsoft.com/pricing/details/active-directory/) for details about Azure AD pricing and B2B collaboration features.
2225
2326
B2B guest user licensing is automatically calculated and reported based on the 1:5 ratio. Currently, it’s not possible to assign B2B guest user licenses directly to guest users.
2427

0 commit comments

Comments
 (0)