Skip to content

Commit 6b9f3e9

Browse files
authored
Merge pull request #102241 from mmacy/release-b2c-prefix-removal-007B
[b2c][seo] remove filename prefix 007
2 parents 7452e3c + d87b657 commit 6b9f3e9

39 files changed

+118
-65
lines changed

.openpublishing.redirection.json

Lines changed: 50 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -5456,6 +5456,56 @@
54565456
"redirect_url": "/azure/active-directory-b2c/custom-policy-multi-factor-authentication",
54575457
"redirect_document_id": true
54585458
},
5459+
{
5460+
"source_path": "articles/active-directory-b2c/active-directory-b2c-guide-troubleshooting-custom.md",
5461+
"redirect_url": "/azure/active-directory-b2c/troubleshoot-custom-policies",
5462+
"redirect_document_id": true
5463+
},
5464+
{
5465+
"source_path": "articles/active-directory-b2c/active-directory-b2c-reference-threat-management.md",
5466+
"redirect_url": "/azure/active-directory-b2c/threat-management",
5467+
"redirect_document_id": true
5468+
},
5469+
{
5470+
"source_path": "articles/active-directory-b2c/active-directory-b2c-reference-tokens.md",
5471+
"redirect_url": "/azure/active-directory-b2c/tokens-overview",
5472+
"redirect_document_id": true
5473+
},
5474+
{
5475+
"source_path": "articles/active-directory-b2c/active-directory-b2c-troubleshoot-custom.md",
5476+
"redirect_url": "/azure/active-directory-b2c/troubleshoot-with-application-insights",
5477+
"redirect_document_id": true
5478+
},
5479+
{
5480+
"source_path": "articles/active-directory-b2c/active-directory-b2c-tutorials-desktop-app-webapi.md",
5481+
"redirect_url": "/azure/active-directory-b2c/tutorial-desktop-app-webapi",
5482+
"redirect_document_id": true
5483+
},
5484+
{
5485+
"source_path": "articles/active-directory-b2c/active-directory-b2c-tutorials-desktop-app.md",
5486+
"redirect_url": "/azure/active-directory-b2c/tutorial-desktop-app",
5487+
"redirect_document_id": true
5488+
},
5489+
{
5490+
"source_path": "articles/active-directory-b2c/active-directory-b2c-tutorials-spa-webapi.md",
5491+
"redirect_url": "/azure/active-directory-b2c/tutorial-single-page-app-webapi",
5492+
"redirect_document_id": true
5493+
},
5494+
{
5495+
"source_path": "articles/active-directory-b2c/active-directory-b2c-tutorials-spa.md",
5496+
"redirect_url": "/azure/active-directory-b2c/tutorial-single-page-app",
5497+
"redirect_document_id": true
5498+
},
5499+
{
5500+
"source_path": "articles/active-directory-b2c/active-directory-b2c-tutorials-web-api.md",
5501+
"redirect_url": "/azure/active-directory-b2c/tutorial-web-api-dotnet",
5502+
"redirect_document_id": true
5503+
},
5504+
{
5505+
"source_path": "articles/active-directory-b2c/active-directory-b2c-tutorials-web-app.md",
5506+
"redirect_url": "/azure/active-directory-b2c/tutorial-web-app-dotnet",
5507+
"redirect_document_id": true
5508+
},
54595509
{
54605510
"source_path": "articles/active-directory-b2c/active-directory-b2c-custom-rest-api-netfw-secure-basic.md",
54615511
"redirect_url": "/azure/active-directory-b2c/secure-rest-api-dotnet-basic-auth",

articles/active-directory-b2c/TOC.yml

Lines changed: 14 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -31,19 +31,19 @@
3131
- name: Authenticate users
3232
items:
3333
- name: ASP.NET
34-
href: active-directory-b2c-tutorials-web-app.md
34+
href: tutorial-web-app-dotnet.md
3535
- name: Desktop
36-
href: active-directory-b2c-tutorials-desktop-app.md
36+
href: tutorial-desktop-app.md
3737
- name: Single page
38-
href: active-directory-b2c-tutorials-spa.md
38+
href: tutorial-single-page-app.md
3939
- name: Grant API access
4040
items:
4141
- name: ASP.NET
42-
href: active-directory-b2c-tutorials-web-api.md
42+
href: tutorial-web-api-dotnet.md
4343
- name: Desktop
44-
href: active-directory-b2c-tutorials-desktop-app-webapi.md
44+
href: tutorial-desktop-app-webapi.md
4545
- name: Single page
46-
href: active-directory-b2c-tutorials-spa-webapi.md
46+
href: tutorial-single-page-app-webapi.md
4747
- name: Samples
4848
href: code-samples.md
4949
- name: Concepts
@@ -61,7 +61,7 @@
6161
- name: Implicit flow
6262
href: implicit-flow-single-page-application.md
6363
- name: Tokens
64-
href: active-directory-b2c-reference-tokens.md
64+
href: tokens-overview.md
6565
- name: Request access token
6666
href: access-tokens.md
6767
- name: User flow and policy
@@ -243,9 +243,11 @@
243243
- name: Troubleshooting
244244
items:
245245
- name: Collect logs using Application Insights
246-
href: active-directory-b2c-troubleshoot-custom.md
246+
href: troubleshoot-with-application-insights.md
247+
displayName: troubleshooting
247248
- name: Policy validation
248-
href: active-directory-b2c-guide-troubleshooting-custom.md
249+
href: troubleshoot-custom-policies.md
250+
displayName: troubleshooting
249251
- name: Usage analytics
250252
href: analytics-with-application-insights.md
251253
- name: Reference
@@ -387,7 +389,8 @@
387389
- name: Enable billing
388390
href: billing.md
389391
- name: Threat management
390-
href: active-directory-b2c-reference-threat-management.md
392+
href: threat-management.md
393+
displayName: security
391394
- name: Extensions app
392395
href: extensions-app.md
393396
- name: User flow versions
@@ -414,4 +417,4 @@
414417
href: support-options.md
415418
displayName: technical
416419
- name: Videos
417-
href: https://azure.microsoft.com/documentation/videos/index/?services=active-directory-b2c
420+
href: https://azure.microsoft.com/documentation/videos/index/?services=active-directory-b2c

articles/active-directory-b2c/access-tokens.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ ms.subservice: B2C
1717

1818
An *access token* contains claims that you can use in Azure Active Directory B2C (Azure AD B2C) to identify the granted permissions to your APIs. When calling a resource server, an access token must be present in the HTTP request. An access token is denoted as **access_token** in the responses from Azure AD B2C.
1919

20-
This article shows you how to request an access token for a web application and web API. For more information about tokens in Azure AD B2C, see the [overview of tokens in Azure Active Directory B2C](active-directory-b2c-reference-tokens.md).
20+
This article shows you how to request an access token for a web application and web API. For more information about tokens in Azure AD B2C, see the [overview of tokens in Azure Active Directory B2C](tokens-overview.md).
2121

2222
> [!NOTE]
2323
> **Web API chains (On-Behalf-Of) is not supported by Azure AD B2C.** - Many architectures include a web API that needs to call another downstream web API, both secured by Azure AD B2C. This scenario is common in clients that have a web API back end, which in turn calls a another service. This chained web API scenario can be supported by using the OAuth 2.0 JWT Bearer Credential grant, otherwise known as the On-Behalf-Of flow. However, the On-Behalf-Of flow is not currently implemented in Azure AD B2C.

articles/active-directory-b2c/active-directory-b2c-reference-policies.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -27,7 +27,7 @@ A user flow enables you to control behaviors in your applications by configuring
2727
- Customization of the user interface
2828
- Information that the application receives as claims in a token
2929

30-
You can create many user flows of different types in your tenant and use them in your applications as needed. User flows can be reused across applications. This flexibility enables you to define and modify identity experiences with minimal or no changes to your code. Your application triggers a user flow by using a standard HTTP authentication request that includes a user flow parameter. A customized [token](active-directory-b2c-reference-tokens.md) is received as a response.
30+
You can create many user flows of different types in your tenant and use them in your applications as needed. User flows can be reused across applications. This flexibility enables you to define and modify identity experiences with minimal or no changes to your code. Your application triggers a user flow by using a standard HTTP authentication request that includes a user flow parameter. A customized [token](tokens-overview.md) is received as a response.
3131

3232
The following examples show the "p" query string parameter that specifies the user flow to be used:
3333

articles/active-directory-b2c/application-types.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -53,7 +53,7 @@ eyJ0eXAiOiJKV1QiLCJhbGciOiJSUzI1NiIsIng1dCI6ImtyaU1QZG1Cd...
5353
}
5454
```
5555

56-
Learn more about the types of tokens and claims available to an application in the [Azure AD B2C token reference](active-directory-b2c-reference-tokens.md).
56+
Learn more about the types of tokens and claims available to an application in the [Azure AD B2C token reference](tokens-overview.md).
5757

5858
In a web application, each execution of a [policy](active-directory-b2c-reference-policies.md) takes these high-level steps:
5959

@@ -83,7 +83,7 @@ Accept: application/json
8383
...
8484
```
8585

86-
The web API can then use the token to verify the API caller's identity and to extract information about the caller from claims that are encoded in the token. Learn more about the types of tokens and claims available to an app in the [Azure AD B2C token reference](active-directory-b2c-reference-tokens.md).
86+
The web API can then use the token to verify the API caller's identity and to extract information about the caller from claims that are encoded in the token. Learn more about the types of tokens and claims available to an app in the [Azure AD B2C token reference](tokens-overview.md).
8787

8888
A web API can receive tokens from many types of clients, including web applications, desktop and mobile applications, single page applications, server-side daemons, and other web APIs. Here's an example of the complete flow for a web application that calls a web API:
8989

articles/active-directory-b2c/authorization-code-flow.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -136,7 +136,7 @@ A successful token response looks like this:
136136
| access_token |The signed JSON Web Token (JWT) that you requested. |
137137
| scope |The scopes that the token is valid for. You also can use scopes to cache tokens for later use. |
138138
| expires_in |The length of time that the token is valid (in seconds). |
139-
| refresh_token |An OAuth 2.0 refresh token. The app can use this token to acquire additional tokens after the current token expires. Refresh tokens are long-lived. You can use them to retain access to resources for extended periods of time. For more information, see the [Azure AD B2C token reference](active-directory-b2c-reference-tokens.md). |
139+
| refresh_token |An OAuth 2.0 refresh token. The app can use this token to acquire additional tokens after the current token expires. Refresh tokens are long-lived. You can use them to retain access to resources for extended periods of time. For more information, see the [Azure AD B2C token reference](tokens-overview.md). |
140140

141141
Error responses look like this:
142142

@@ -202,7 +202,7 @@ A successful token response looks like this:
202202
| access_token |The signed JWT that you requested. |
203203
| scope |The scopes that the token is valid for. You also can use the scopes to cache tokens for later use. |
204204
| expires_in |The length of time that the token is valid (in seconds). |
205-
| refresh_token |An OAuth 2.0 refresh token. The app can use this token to acquire additional tokens after the current token expires. Refresh tokens are long-lived, and can be used to retain access to resources for extended periods of time. For more information, see the [Azure AD B2C token reference](active-directory-b2c-reference-tokens.md). |
205+
| refresh_token |An OAuth 2.0 refresh token. The app can use this token to acquire additional tokens after the current token expires. Refresh tokens are long-lived, and can be used to retain access to resources for extended periods of time. For more information, see the [Azure AD B2C token reference](tokens-overview.md). |
206206

207207
Error responses look like this:
208208

articles/active-directory-b2c/configure-tokens.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.subservice: B2C
1515

1616
# Configure tokens in Azure Active Directory B2C
1717

18-
In this article, you learn how to configure the [lifetime and compatibility of a token](active-directory-b2c-reference-tokens.md) in Azure Active Directory B2C (Azure AD B2C).
18+
In this article, you learn how to configure the [lifetime and compatibility of a token](tokens-overview.md) in Azure Active Directory B2C (Azure AD B2C).
1919

2020
## Prerequisites
2121

articles/active-directory-b2c/faq.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -86,7 +86,7 @@ You can use the Azure AD Graph API to write your migration tool. See the [User m
8686

8787
### What password user flow is used for local accounts in Azure AD B2C?
8888

89-
The Azure AD B2C password user flow for local accounts is based on the policy for Azure AD. Azure AD B2C's sign-up, sign-up or sign-in and password reset user flows use the "strong" password strength and don't expire any passwords. Read the [Azure AD password policy](/previous-versions/azure/jj943764(v=azure.100)) for more details. For information about account lockouts and passwords, see [Manages threats to resources and data in Azure Active Directory B2C](active-directory-b2c-reference-threat-management.md).
89+
The Azure AD B2C password user flow for local accounts is based on the policy for Azure AD. Azure AD B2C's sign-up, sign-up or sign-in and password reset user flows use the "strong" password strength and don't expire any passwords. Read the [Azure AD password policy](/previous-versions/azure/jj943764(v=azure.100)) for more details. For information about account lockouts and passwords, see [Manages threats to resources and data in Azure Active Directory B2C](threat-management.md).
9090

9191
### Can I use Azure AD Connect to migrate consumer identities that are stored on my on-premises Active Directory to Azure AD B2C?
9292

articles/active-directory-b2c/identity-provider-azure-ad-multi-tenant-custom.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -211,4 +211,4 @@ To test the multi-tenant sign-in capability, perform the last two steps using th
211211
212212
When working with custom policies, you might sometimes need additional information when troubleshooting a policy during its development.
213213
214-
To help diagnose issues, you can temporarily put the policy into "developer mode" and collect logs with Azure Application Insights. Find out how in [Azure Active Directory B2C: Collecting Logs](active-directory-b2c-troubleshoot-custom.md).
214+
To help diagnose issues, you can temporarily put the policy into "developer mode" and collect logs with Azure Application Insights. Find out how in [Azure Active Directory B2C: Collecting Logs](troubleshoot-with-application-insights.md).

articles/active-directory-b2c/identity-provider-azure-ad-single-tenant-custom.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -200,4 +200,4 @@ If the sign in process is successful, your browser is redirected to `https://jwt
200200
201201
When working with custom policies, you might sometimes need additional information when troubleshooting a policy during its development.
202202
203-
To help diagnose issues, you can temporarily put the policy into "developer mode" and collect logs with Azure Application Insights. Find out how in [Azure Active Directory B2C: Collecting Logs](active-directory-b2c-troubleshoot-custom.md).
203+
To help diagnose issues, you can temporarily put the policy into "developer mode" and collect logs with Azure Application Insights. Find out how in [Azure Active Directory B2C: Collecting Logs](troubleshoot-with-application-insights.md).

0 commit comments

Comments
 (0)