You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory-b2c/active-directory-b2c-custom-rest-api-netfw-secure-basic.md
+8-6Lines changed: 8 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -298,17 +298,19 @@ After your RESTful service is protected by the client ID (username) and secret,
298
298
299
299
## Step 5: Upload the policy to your tenant
300
300
301
-
1. In the [Azure portal](https://portal.azure.com), switch to the [context of your Azure AD B2C tenant](active-directory-b2c-navigate-to-b2c-context.md), and then open **Azure AD B2C**.
301
+
1. In the [Azure portal](https://portal.azure.com), select the **Directory + Subscription** icon in the portal toolbar, and then select the directory that contains your Azure AD B2C tenant.
302
302
303
-
2. Select **Identity Experience Framework**.
303
+
1. In the Azure portal, search for and select **Azure AD B2C**.
304
304
305
-
3. Open **All Policies**.
305
+
1. Select **Identity Experience Framework**.
306
306
307
-
4. Select **Upload Policy**.
307
+
1. Open **All Policies**.
308
308
309
-
5. Select the **Overwrite the policy if it exists** check box.
309
+
1. Select **Upload Policy**.
310
310
311
-
6. Upload the *TrustFrameworkExtensions.xml* file, and then ensure that it passes validation.
311
+
1. Select the **Overwrite the policy if it exists** check box.
312
+
313
+
1. Upload the *TrustFrameworkExtensions.xml* file, and then ensure that it passes validation.
312
314
313
315
## Step 6: Test the custom policy by using Run Now
Copy file name to clipboardExpand all lines: articles/active-directory-b2c/active-directory-b2c-custom-rest-api-netfw-secure-cert.md
+8-6Lines changed: 8 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -96,17 +96,19 @@ To support client certificate authentication in your custom policy, change the t
96
96
97
97
## Step 4: Upload the policy to your tenant
98
98
99
-
1. In the [Azure portal](https://portal.azure.com), switch to the [context of your Azure AD B2C tenant](active-directory-b2c-navigate-to-b2c-context.md), and then select **Azure AD B2C**.
99
+
1. In the [Azure portal](https://portal.azure.com), select the **Directory + Subscription** icon in the portal toolbar, and then select the directory that contains your Azure AD B2C tenant.
100
100
101
-
2. Select **Identity Experience Framework**.
101
+
1. In the Azure portal, search for and select **Azure AD B2C**.
102
102
103
-
3. Select **All Policies**.
103
+
1. Select **Identity Experience Framework**.
104
104
105
-
4. Select **Upload Policy**.
105
+
1. Select **All Policies**.
106
106
107
-
5. Select the **Overwrite the policy if it exists** check box.
107
+
1. Select **Upload Policy**.
108
108
109
-
6. Upload the *TrustFrameworkExtensions.xml* file, and then ensure that it passes validation.
109
+
1. Select the **Overwrite the policy if it exists** check box.
110
+
111
+
1. Upload the *TrustFrameworkExtensions.xml* file, and then ensure that it passes validation.
110
112
111
113
## Step 5: Test the custom policy by using Run Now
112
114
1. Open **Azure AD B2C Settings**, and then select **Identity Experience Framework**.
Copy file name to clipboardExpand all lines: articles/active-directory-b2c/active-directory-b2c-custom-rest-api-netfw.md
+3-1Lines changed: 3 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -333,7 +333,9 @@ After you add the new claim, the relying party code looks like this:
333
333
334
334
## Step 7: Upload the policy to your tenant
335
335
336
-
1. Inthe [Azureportal](https://portal.azure.com), switch to the [context of your Azure AD B2C tenant](active-directory-b2c-navigate-to-b2c-context.md), and then open **Azure AD B2C**.
336
+
1. Inthe [Azureportal](https://portal.azure.com), Select the **Directory + Subscription** icon in the portal toolbar, and then select the directory that contains your Azure AD B2C tenant.
Copy file name to clipboardExpand all lines: articles/active-directory-b2c/active-directory-b2c-how-to-enable-billing.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -130,7 +130,7 @@ The management of Azure AD B2C using role-based access control is not affected b
130
130
131
131
Azure AD B2C tenants can be moved to another subscription if the source and destination subscriptions exist within the same Azure Active Directory tenant.
132
132
133
-
To learn how to move Azure resources like your Azure AD B2C tenant to another subscription, see [Move resources to new resource group or subscription](../azure-resource-manager/resource-group-move-resources.md).
133
+
To learn how to move Azure resources like your Azure AD B2C tenant to another subscription, see [Move resources to new resource group or subscription](../azure-resource-manager/management/move-resource-group-and-subscription.md).
134
134
135
135
Before you initiate the move, be sure to read the entire article to fully understand the limitations and requirements for such a move. In addition to instructions for moving resources, it includes critical information like a pre-move checklist and how to validate the move operation.
1. Inthe [Azureportal](https://portal.azure.com), switch to the [context of your Azure AD B2C tenant](active-directory-b2c-navigate-to-b2c-context.md), and then select **Azure AD B2C**.
216
+
1. Inthe [Azureportal](https://portal.azure.com), select the **Directory + Subscription** icon in the portal toolbar, and then select the directory that contains your Azure AD B2C tenant.
| x-ms-cpim-admin | main.b2cadmin.ext.azure.com | End of [browser session](active-directory-b2c-token-session-sso.md)| Holds user membership data across tenants. The tenants a user is a member of and level of membership (Admin or User). |
23
-
| x-ms-cpim-slice | login.microsoftonline.com, b2clogin.com, branded domain | End of [browser session](active-directory-b2c-token-session-sso.md)| Used to route requests to the appropriate production instance. |
24
-
| x-ms-cpim-trans | login.microsoftonline.com, b2clogin.com, branded domain | End of [browser session](active-directory-b2c-token-session-sso.md)| Used for tracking the transactions (number of authentication requests to Azure AD B2C) and the current transaction. |
25
-
| x-ms-cpim-sso:{Id} | login.microsoftonline.com, b2clogin.com, branded domain | End of [browser session](active-directory-b2c-token-session-sso.md)| Used for maintaining the SSO session. |
26
-
| x-ms-cpim-cache:{id}_n | login.microsoftonline.com, b2clogin.com, branded domain | End of [browser session](active-directory-b2c-token-session-sso.md), successful authentication | Used for maintaining the request state. |
27
-
| x-ms-cpim-csrf | login.microsoftonline.com, b2clogin.com, branded domain | End of [browser session](active-directory-b2c-token-session-sso.md)| Cross-Site Request Forgery token used for CRSF protection. |
28
-
| x-ms-cpim-dc | login.microsoftonline.com, b2clogin.com, branded domain | End of [browser session](active-directory-b2c-token-session-sso.md)| Used for Azure AD B2C network routing. |
29
-
| x-ms-cpim-ctx | login.microsoftonline.com, b2clogin.com, branded domain | End of [browser session](active-directory-b2c-token-session-sso.md)| Context |
30
-
| x-ms-cpim-rp | login.microsoftonline.com, b2clogin.com, branded domain | End of [browser session](active-directory-b2c-token-session-sso.md)| Used for storing membership data for the resource provider tenant. |
31
-
| x-ms-cpim-rc | login.microsoftonline.com, b2clogin.com, branded domain | End of [browser session](active-directory-b2c-token-session-sso.md)| Used for storing the relay cookie. |
32
-
22
+
| x-ms-cpim-admin | main.b2cadmin.ext.azure.com | End of [browser session](session-behavior.md)| Holds user membership data across tenants. The tenants a user is a member of and level of membership (Admin or User). |
23
+
| x-ms-cpim-slice | login.microsoftonline.com, b2clogin.com, branded domain | End of [browser session](session-behavior.md)| Used to route requests to the appropriate production instance. |
24
+
| x-ms-cpim-trans | login.microsoftonline.com, b2clogin.com, branded domain | End of [browser session](session-behavior.md)| Used for tracking the transactions (number of authentication requests to Azure AD B2C) and the current transaction. |
25
+
| x-ms-cpim-sso:{Id} | login.microsoftonline.com, b2clogin.com, branded domain | End of [browser session](session-behavior.md)| Used for maintaining the SSO session. |
26
+
| x-ms-cpim-cache:{id}_n | login.microsoftonline.com, b2clogin.com, branded domain | End of [browser session](session-behavior.md), successful authentication | Used for maintaining the request state. |
27
+
| x-ms-cpim-csrf | login.microsoftonline.com, b2clogin.com, branded domain | End of [browser session](session-behavior.md)| Cross-Site Request Forgery token used for CRSF protection. |
28
+
| x-ms-cpim-dc | login.microsoftonline.com, b2clogin.com, branded domain | End of [browser session](session-behavior.md)| Used for Azure AD B2C network routing. |
29
+
| x-ms-cpim-ctx | login.microsoftonline.com, b2clogin.com, branded domain | End of [browser session](session-behavior.md)| Context |
30
+
| x-ms-cpim-rp | login.microsoftonline.com, b2clogin.com, branded domain | End of [browser session](session-behavior.md)| Used for storing membership data for the resource provider tenant. |
31
+
| x-ms-cpim-rc | login.microsoftonline.com, b2clogin.com, branded domain | End of [browser session](session-behavior.md)| Used for storing the relay cookie. |
Copy file name to clipboardExpand all lines: articles/active-directory-b2c/relyingparty.md
+1-3Lines changed: 1 addition & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -204,7 +204,7 @@ The **OutputClaim** element contains the following attributes:
204
204
### SubjectNamingInfo
205
205
206
206
With the **SubjectNameingInfo** element, you control the value of the token subject:
207
-
-**JWT token** - the `sub` claim. This is a principal about which the token asserts information, such as the user of an application. This value is immutable and cannot be reassigned or reused. It can be used to perform safe authorization checks, such as when the token is used to access a resource. By default, the subject claim is populated with the object ID of the user in the directory. For more information, see [Token, session and single sign-on configuration](active-directory-b2c-token-session-sso.md).
207
+
-**JWT token** - the `sub` claim. This is a principal about which the token asserts information, such as the user of an application. This value is immutable and cannot be reassigned or reused. It can be used to perform safe authorization checks, such as when the token is used to access a resource. By default, the subject claim is populated with the object ID of the user in the directory. For more information, see [Token, session and single sign-on configuration](session-behavior.md).
208
208
-**SAML token** - the `<Subject><NameID>` element which identifies the subject element.
209
209
210
210
The **SubjectNamingInfo** element contains the following attribute:
@@ -242,5 +242,3 @@ The JWT token includes the `sub` claim with the user objectId:
0 commit comments