Skip to content

Commit 6c71f3f

Browse files
committed
Merging changes synced from https://github.com/MicrosoftDocs/azure-docs-pr (branch live)
2 parents 4c5020f + b55c580 commit 6c71f3f

File tree

243 files changed

+3864
-2570
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

243 files changed

+3864
-2570
lines changed

.openpublishing.redirection.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -22823,6 +22823,11 @@
2282322823
"redirect_url": "/azure/scheduler/migrate-from-scheduler-to-logic-apps",
2282422824
"redirect_document_id": ""
2282522825
},
22826+
{
22827+
"source_path_from_root": "/articles/search/search-blob-ai-integration.md",
22828+
"redirect_url": "/azure/search/cognitive-search-concept-intro",
22829+
"redirect_document_id": false
22830+
},
2282622831
{
2282722832
"source_path_from_root": "/articles/search/search-monitor-usage.md",
2282822833
"redirect_url": "/azure/search/monitor-azure-cognitive-search",

articles/active-directory-b2c/billing.md

Lines changed: 22 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -8,22 +8,22 @@ manager: CelesteDG
88
ms.service: active-directory
99
ms.topic: reference
1010
ms.workload: identity
11-
ms.date: 11/16/2021
11+
ms.date: 01/14/2022
1212
ms.author: kengaderdus
1313
ms.subservice: B2C
1414
ms.custom: fasttrack-edit
1515
---
1616

1717
# Billing model for Azure Active Directory B2C
1818

19-
Azure Active Directory B2C (Azure AD B2C) pricing is based on monthly active users (MAU), which is the count of unique users with authentication activity within a calendar month. This billing model applies to both Azure AD B2C tenants and [Azure AD guest user collaboration (B2B)](../active-directory/external-identities/external-identities-pricing.md). MAU billing helps you reduce costs by offering a free tier and flexible, predictable pricing. In this article, learn about MAU billing, linking your Azure AD B2C tenants to a subscription, and changing your pricing tier.
19+
Azure Active Directory B2C (Azure AD B2C) pricing is based on monthly active users (MAU), which is the count of unique users with authentication activity within a calendar month. This billing model applies to both Azure AD B2C tenants and [Azure AD guest user collaboration (B2B)](../active-directory/external-identities/external-identities-pricing.md). MAU billing helps you reduce costs by offering a free tier and flexible, predictable pricing. In this article, learn about MAU billing, linking Azure AD B2C tenants to a subscription, and changing the pricing tier.
2020

2121
## MAU overview
2222

2323
A monthly active user (MAU) is a unique user that performs an authentication within a given month. A user that authenticates multiple times within a given month is counted as one MAU. Customers are not charged for a MAU’s subsequent authentications during the month, nor for inactive users. Authentications may include:
2424

25-
- Active, interactive sign-in by the user, for example through [sign-up or sign-in](add-sign-up-and-sign-in-policy.md), [self-service password reset](add-password-reset-policy.md), [profile editing](add-profile-editing-policy.md), or any type of [user flow](user-flow-overview.md) or [custom policy](custom-policy-overview.md).
26-
- Passive, non-interactive sign-in such as [single sign-on (SSO)](session-behavior.md), or any type of token acquisition, such as authorization code flow, token refresh, or [resource owner password credentials (ROPC)](add-ropc-policy.md).
25+
- Active, interactive sign-in by the user. For example, [sign-up or sign-in](add-sign-up-and-sign-in-policy.md), [self-service password reset](add-password-reset-policy.md), or any type of [user flow](user-flow-overview.md) or [custom policy](custom-policy-overview.md).
26+
- Passive, non-interactive sign-in such as [single sign-on (SSO)](session-behavior.md), or any type of token acquisition. For example, authorization code flow, token refresh, or [resource owner password credentials flow](add-ropc-policy.md).
2727

2828
If you choose to provide higher levels of assurance using Multi-factor Authentication (MFA) for Voice and SMS, you will continue to be charged a worldwide flat fee for each MFA attempt that month, whether the sign-in is successful or unsuccessful.
2929

@@ -44,14 +44,18 @@ To take advantage of MAU billing, your Azure AD B2C tenant must be linked to an
4444

4545
## About the monthly active users (MAU) billing model
4646

47-
MAU billing went into effect for Azure AD B2C tenants on **November 1, 2019**. Any Azure AD B2C tenants that you created and linked to a subscription on or after that date have been billed on a per-MAU basis. If you have an Azure AD B2C tenant that hasn't been linked to a subscription, you'll need to do so now. If you have an existing Azure AD B2C tenant that was linked to a subscription before November 1, 2019, we recommend you upgrade to the monthly active users (MAU) billing model, or you can stay on the per-authentication billing model.
47+
MAU billing went into effect for Azure AD B2C tenants on **November 1, 2019**. Any Azure AD B2C tenants that you created and linked to a subscription on or after that date have been billed on a per-MAU basis.
48+
49+
- If you have an Azure AD B2C tenant that hasn't been linked to a subscription, link it now.
50+
- If you have an existing Azure AD B2C tenant that was linked to a subscription before November 1, 2019, upgrade to the monthly active users (MAU) billing model. You can also choose to stay on the per-authentication billing model.
4851

4952
Your Azure AD B2C tenant must also be linked to the appropriate Azure pricing tier based on the features you want to use. Premium features require Azure AD B2C [Premium P1 or P2 pricing](https://azure.microsoft.com/pricing/details/active-directory-b2c/). You might need to upgrade your pricing tier as you use new features. For example, for risk-based Conditional Access policies, you’ll need to select the Azure AD B2C Premium P2 pricing tier for your tenant.
5053
> [!NOTE]
5154
> Your first 50,000 MAUs per month are free for both Premium P1 and Premium P2 features, but the **free tier doesn’t apply to free trial, credit-based, or sponsorship subscriptions**. Once the free trial period or credits expire for these types of subscriptions, you'll begin to be charged for Azure AD B2C MAUs. To determine the total number of MAUs, we combine MAUs from all your tenants (both Azure AD and Azure AD B2C) that are linked to the same subscription.
55+
5256
## Link an Azure AD B2C tenant to a subscription
5357

54-
Usage charges for Azure Active Directory B2C (Azure AD B2C) are billed to an Azure subscription. You need to explicitly link an Azure AD B2C tenant to an Azure subscription by creating an Azure AD B2C *resource* within the target Azure subscription. Several Azure AD B2C resources can be created in a single Azure subscription, along with other Azure resources like virtual machines, Storage accounts, and Logic Apps. You can see all of the resources within a subscription by going to the Azure Active Directory (Azure AD) tenant that the subscription is associated with.
58+
Usage charges for Azure Active Directory B2C (Azure AD B2C) are billed to an Azure subscription. You need to explicitly link an Azure AD B2C tenant to an Azure subscription by creating an Azure AD B2C *resource* within the target Azure subscription. Several Azure AD B2C resources can be created in a single Azure subscription, along with other Azure resources like virtual machines, and storage accounts. You can see all of the resources within a subscription by going to the Azure Active Directory (Azure AD) tenant that the subscription is associated with.
5559

5660
A subscription linked to an Azure AD B2C tenant can be used for the billing of Azure AD B2C usage or other Azure resources, including additional Azure AD B2C resources. It can't be used to add other Azure license-based services or Office 365 licenses within the Azure AD B2C tenant.
5761

@@ -82,9 +86,11 @@ After you complete these steps for an Azure AD B2C tenant, your Azure subscripti
8286

8387
## Change your Azure AD pricing tier
8488

85-
A tenant must be linked to the appropriate Azure pricing tier based on the features you want to use with your Azure AD B2C tenant. Premium features require Azure AD B2C Premium P1 or P2, as described in the [Azure Active Directory B2C pricing](https://azure.microsoft.com/pricing/details/active-directory-b2c/). In some cases, you'll need to upgrade your pricing tier as you use new features. For example, if you want to use Identity Protection, risk-based Conditional Access policies, and any future Premium P2 capabilities with Azure AD B2C, you’ll need to select the Azure AD B2C Premium P2 pricing tier for your tenant.
89+
A tenant must be linked to the appropriate Azure pricing tier based on the features you want to use with your Azure AD B2C tenant. Premium features require Azure AD B2C Premium P1 or P2, as described in the [Azure Active Directory B2C pricing](https://azure.microsoft.com/pricing/details/active-directory-b2c/).
90+
91+
In some cases, you'll need to upgrade your pricing tier as you use new features. For example, if you want to use [Identity Protection](conditional-access-identity-protection-overview.md), risk-based Conditional Access policies, and any future Premium P2 capabilities with Azure AD B2C.
8692

87-
To change your pricing tier, follow these steps.
93+
To change your pricing tier, follow these steps:
8894

8995
1. Sign in to the Azure portal.
9096

@@ -93,14 +99,16 @@ To change your pricing tier, follow these steps.
9399
1. On the **Portal settings | Directories + subscriptions** page, find your Azure AD directory in the **Directory name** list, and then select **Switch**.
94100

95101
1. In the search box at the top of the portal, enter the name of your Azure AD B2C tenant. Then select the tenant in the search results under **Resources**.
102+
103+
![Screenshot that shows how to select an Azure AD B2C tenant in Azure portal.](media/billing/select-azure-ad-b2c-tenant.png)
96104

97105
1. On the resource **Overview** page, under **Pricing tier**, select **change**.
98106

99-
![Change pricing tier](media/billing/change-pricing-tier.png)
107+
![Screenshot that shows how to change the pricing tier.](media/billing/change-pricing-tier.png)
100108

101109
1. Select the pricing tier that includes the features you want to enable.
102110

103-
![Select the pricing tier](media/billing/select-tier.png)
111+
![Screenshot that shows how to select the pricing tier.](media/billing/select-tier.png)
104112

105113
## Switch to MAU billing (pre-November 2019 Azure AD B2C tenants)
106114

@@ -116,15 +124,15 @@ Here's how to make the switch to MAU billing for an existing Azure AD B2C resour
116124
1. In the left menu, select **Azure AD B2C**. Or, select **All services** and search for and select **Azure AD B2C**.
117125
1. On the **Overview** page of the Azure AD B2C tenant, select the link under **Resource name**. You're directed to the Azure AD B2C resource in your Azure AD tenant.<br/>
118126

119-
![Azure AD B2C resource link highlighted in Azure portal](./media/billing/portal-mau-02-b2c-resource-link.png)
127+
![Screenshot that shows how to select the Azure AD B2C resource in Azure portal.](./media/billing/portal-mau-02-b2c-resource-link.png)
120128

121129
1. On the **Overview** page of the Azure AD B2C resource, under **Billable Units**, select the **Per Authentication (Change to MAU)** link.<br/>
122130

123-
![Change to MAU link highlighted in Azure portal](./media/billing/portal-mau-03-change-to-mau-link.png)
131+
![Screenshot that shows how to change to MAU link highlighted in Azure portal.](./media/billing/portal-mau-03-change-to-mau-link.png)
124132

125133
1. Select **Confirm** to complete the upgrade to MAU billing.<br/>
126134

127-
![MAU-based billing confirmation dialog in Azure portal](./media/billing/portal-mau-04-confirm-change-to-mau.png)
135+
![Screenshot that shows the MAU-based billing confirmation dialog in Azure portal.](./media/billing/portal-mau-04-confirm-change-to-mau.png)
128136

129137

130138
### What to expect when you transition to MAU billing from per-authentication billing
@@ -145,7 +153,7 @@ During the billing period of the transition, the subscription owner will likely
145153
* An entry for the usage until the date/time of change that reflects per-authentication.
146154
* An entry for the usage after the change that reflects monthly active users (MAU).
147155

148-
For the latest information about usage billing and pricing for Azure AD B2C, see [Azure Active Directory B2C pricing](https://azure.microsoft.com/pricing/details/active-directory-b2c/).
156+
For the latest information about usage billing and pricing, see [Azure Active Directory B2C pricing](https://azure.microsoft.com/pricing/details/active-directory-b2c/).
149157

150158
## Manage your Azure AD B2C tenant resources
151159

74.5 KB
Loading

articles/active-directory-b2c/multi-factor-authentication.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ manager: CelesteDG
88
ms.service: active-directory
99
ms.workload: identity
1010
ms.topic: how-to
11-
ms.date: 12/09/2021
11+
ms.date: 01/14/2022
1212
ms.custom: project-no-code
1313
ms.author: kengaderdus
1414
ms.subservice: B2C
@@ -79,9 +79,9 @@ A customer account is created in your tenant before the multifactor authenticati
7979

8080
::: zone pivot="b2c-custom-policy"
8181

82-
To enable multifactor authentication, get the custom policy starter packs from GitHub as follows:
82+
To enable multifactor authentication, get the custom policy starter pack from GitHub as follows:
8383

84-
- [Download the .zip file](https://github.com/Azure-Samples/active-directory-b2c-custom-policy-starterpack/archive/master.zip) or clone the repository from `https://github.com/Azure-Samples/active-directory-b2c-custom-policy-starterpack`, and then update the XML files in the **SocialAndLocalAccountsWithMFA** starter pack with your Azure AD B2C tenant name. The **SocialAndLocalAccountsWithMFA** enables social, local, and multifactor authentication options, except the Authenticator app - TOTP MFA option.
84+
- [Download the .zip file](https://github.com/Azure-Samples/active-directory-b2c-custom-policy-starterpack/archive/master.zip) or clone the repository from `https://github.com/Azure-Samples/active-directory-b2c-custom-policy-starterpack`, and then update the XML files in the **SocialAndLocalAccountsWithMFA** starter pack with your Azure AD B2C tenant name. The **SocialAndLocalAccountsWithMFA** enables social and local sign in options, and multifactor authentication options, except for the Authenticator app - TOTP option.
8585
- To support the **Authenticator app - TOTP** MFA option, download the custom policy files from `https://github.com/azure-ad-b2c/samples/tree/master/policies/totp`, and then update the XML files with your Azure AD B2C tenant name. Make sure to include `TrustFrameworkExtensions.xml`, `TrustFrameworkLocalization.xml`, and `TrustFrameworkBase.xml` XML files from the **SocialAndLocalAccounts** starter pack.
8686
- Update your [page layout] to version `2.1.9`. For more information, see [Select a page layout](contentdefinitions.md#select-a-page-layout).
8787

@@ -97,7 +97,7 @@ When an Azure AD B2C application enables MFA using the TOTP option, end users ne
9797
1. Select **+ Add account**.
9898
1. Select **Other account (Google, Facebook, etc.)**, and then scan the QR code shown in the application (for example, *Contoso webapp*) to enroll your account. If you're unable to scan the QR code, you can add the account manually:
9999
1. In the Microsoft Authenticator app on your phone, select **OR ENTER CODE MANUALLY**.
100-
1. In the application (for example, *Contoso webapp*), select **Still having trouble?** to show **Account Name** and **Secret**.
100+
1. In the application (for example, *Contoso webapp*), select **Still having trouble?**. This displays **Account Name** and **Secret**.
101101
1. Enter the **Account Name** and **Secret** in your Microsoft Authenticator app, and then select **FINISH**.
102102
1. In the application (for example, *Contoso webapp*), select **Continue**.
103103
1. In **Enter your code**, enter the code that appears in your Microsoft Authenticator app.
@@ -108,7 +108,7 @@ Learn about [OATH software tokens](../active-directory/authentication/concept-au
108108

109109
## Delete a user's TOTP authenticator enrollment (for system admins)
110110

111-
In Azure AD B2C, you can delete a user's TOTP authenticator app enrollment. Then the user would be required to re-enroll their account to use TOTP authentication again. To delete a user's TOTP enrollment, you can use either the Azure portal or the Microsoft Graph API.
111+
In Azure AD B2C, you can delete a user's TOTP authenticator app enrollment. Then the user would be required to re-enroll their account to use TOTP authentication again. To delete a user's TOTP enrollment, you can use either the [Azure portal](https://portal.azure.com) or the [Microsoft Graph API](/graph/api/softwareoathauthenticationmethod-delete).
112112

113113
> [!NOTE]
114114
> - Deleting a user's TOTP authenticator app enrollment from Azure AD B2C doesn't remove the user's account in the TOTP authenticator app. The system admin needs to direct the user to manually delete their account from the TOTP authenticator app before trying to enroll again.

articles/active-directory/develop/TOC.yml

Lines changed: 1 addition & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -44,15 +44,7 @@
4444
- name: Node.js Electron
4545
href: quickstart-v2-nodejs-desktop.md
4646
- name: Daemon or back-end service
47-
items:
48-
- name: .NET Core console (daemon)
49-
href: quickstart-v2-netcore-daemon.md
50-
- name: Python console daemon
51-
href: quickstart-v2-python-daemon.md
52-
- name: Node.js console daemon
53-
href: quickstart-v2-nodejs-console.md
54-
- name: Java console daemon
55-
href: quickstart-v2-java-daemon.md
47+
href: console-app-quickstart.md
5648
- name: Tutorials
5749
items:
5850
- name: Single-page app (SPA)
Lines changed: 36 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,36 @@
1+
---
2+
title: "Quickstart: Call Microsoft Graph from a console application | Azure"
3+
titleSuffix: Microsoft identity platform
4+
description: In this quickstart, you learn how a console application can get an access token and call an API protected by Microsoft identity platform, using the app's own identity
5+
services: active-directory
6+
author: Dickson-Mwendia
7+
manager: CelesteDG
8+
9+
ms.service: active-directory
10+
ms.subservice: develop
11+
ms.topic: quickstart
12+
ms.workload: identity
13+
ms.date: 12/06/2021
14+
ms.author: dmwendia
15+
ms.custom: aaddev, identityplatformtop40, devx-track-python, "scenarios:getting-started", "languages:Python", mode-other
16+
zone_pivot_groups: console-app-quickstart
17+
#Customer intent: As an app developer, I want to learn how my console app can get an access token and call an API that's protected by the Microsoft identity platform by using the client credentials flow.
18+
---
19+
20+
# Quickstart: Acquire a token and call the Microsoft Graph API by using a console app's identity
21+
22+
::: zone pivot="devlang-dotnet-core"
23+
[!INCLUDE [.NET Core](./includes/console-app/quickstart-netcore.md)]
24+
::: zone-end
25+
26+
::: zone pivot="devlang-python"
27+
[!INCLUDE [Python](./includes/console-app/quickstart-python.md)]
28+
::: zone-end
29+
30+
::: zone pivot="devlang-nodejs"
31+
[!INCLUDE [Node.js](./includes/console-app/quickstart-nodejs.md)]
32+
::: zone-end
33+
34+
::: zone pivot="devlang-java"
35+
[!INCLUDE [Java](./includes/console-app/quickstart-java.md)]
36+
::: zone-end

0 commit comments

Comments
 (0)