Skip to content

Commit 709420e

Browse files
committed
Merge branch 'master' of https://github.com/MicrosoftDocs/azure-docs-pr into quickstarts6
2 parents 532a2a3 + c7ef01a commit 709420e

File tree

1,153 files changed

+22644
-12874
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

1,153 files changed

+22644
-12874
lines changed

.openpublishing.redirection.json

Lines changed: 359 additions & 234 deletions
Large diffs are not rendered by default.

CODEOWNERS

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -8,6 +8,9 @@ articles/chef/ @TomArcherMsft
88
articles/jenkins/ @TomArcherMsft
99
articles/terraform/ @TomArcherMsft
1010

11+
# Requires Internal Review
12+
articles/best-practices-availability-paired-regions.md @jpconnock @arob98 @syntaxc4 @tysonn @snoviking
13+
1114
# Governance
1215
articles/governance/ @DCtheGeek
1316

articles/active-directory-b2c/TOC.yml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -382,6 +382,7 @@
382382
href: https://azure.microsoft.com/resources/samples/?service=active-directory-b2c
383383
- name: Cookie definitions
384384
href: cookie-definitions.md
385+
displayName: cookies, SameSite
385386
- name: Error codes
386387
href: error-codes.md
387388
- name: Region availability & data residency

articles/active-directory-b2c/access-tokens.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -68,7 +68,7 @@ GET https://<tenant-name>.b2clogin.com/tfp/<tenant-name>.onmicrosoft.com/<policy
6868
client_id=<application-ID>
6969
&nonce=anyRandomValue
7070
&redirect_uri=https://jwt.ms
71-
&scope=https://tenant-name>.onmicrosoft.com/api/read
71+
&scope=https://<tenant-name>.onmicrosoft.com/api/read
7272
&response_type=code
7373
```
7474

articles/active-directory-b2c/claimsproviders.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ manager: celestedg
88
ms.service: active-directory
99
ms.workload: identity
1010
ms.topic: reference
11-
ms.date: 09/10/2018
11+
ms.date: 01/29/2020
1212
ms.author: marsma
1313
ms.subservice: B2C
1414
---
@@ -48,7 +48,7 @@ The **ClaimsProvider** element contains the following child elements:
4848
| Element | Occurrences | Description |
4949
| ------- | ---------- | ----------- |
5050
| Domain | 0:1 | A string that contains the domain name for the claim provider. For example, if your claims provider includes the Facebook technical profile, the domain name is Facebook.com. This domain name is used for all technical profiles defined in the claims provider unless overridden by the technical profile. The domain name can also be referenced in a **domain_hint**. For more information, see the **Redirect sign-in to a social provider** section of [Set up direct sign-in using Azure Active Directory B2C](direct-signin.md). |
51-
| DisplayName | 1:1 | A string that contains the name of the claims provider that can be displayed to users. |
51+
| DisplayName | 1:1 | A string that contains the name of the claims provider. |
5252
| [TechnicalProfiles](technicalprofiles.md) | 0:1 | A set of technical profiles supported by the claim provider |
5353

5454
**ClaimsProvider** organizes how your technical profiles relate to the claims provider. The following example shows the Azure Active Directory claims provider with the Azure Active Directory technical profiles:

articles/active-directory-b2c/claimsschema.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ manager: celestedg
88
ms.service: active-directory
99
ms.workload: identity
1010
ms.topic: reference
11-
ms.date: 09/10/2018
11+
ms.date: 03/02/2020
1212
ms.author: marsma
1313
ms.subservice: B2C
1414
---
@@ -46,8 +46,8 @@ The **ClaimType** element contains the following elements:
4646

4747
| Element | Occurrences | Description |
4848
| ------- | ----------- | ----------- |
49-
| DisplayName | 0:1 | The title that's displayed to users on various screens. The value can be [localized](localization.md). |
50-
| DataType | 0:1 | The type of the claim. The data types of boolean, date, dateTime, int, long, string, stringCollection, alternativeSecurityIdCollection can be used. |
49+
| DisplayName | 1:1 | The title that's displayed to users on various screens. The value can be [localized](localization.md). |
50+
| DataType | 1:1 | The type of the claim. The data types of boolean, date, dateTime, int, long, string, stringCollection can be used. Primitive data type represents the equivalent of C# variable data type. stringCollection represents a collection of strings. For more information see [C# Types and variables](https://docs.microsoft.com/dotnet/csharp/tour-of-csharp/types-and-variables). Date follows ISO 8601 convention. |
5151
| DefaultPartnerClaimTypes | 0:1 | The partner default claim types to use for a specified protocol. The value can be overwritten in the **PartnerClaimType** specified in the **InputClaim** or **OutputClaim** elements. Use this element to specify the default name for a protocol. |
5252
| Mask | 0:1 | An optional string of masking characters that can be applied when displaying the claim. For example, the phone number 324-232-4343 can be masked as XXX-XXX-4343. |
5353
| UserHelpText | 0:1 | A description of the claim type that can be helpful for users to understand its purpose. The value can be [localized](localization.md). |
@@ -61,7 +61,7 @@ The **DefaultPartnerClaimTypes** may contain the following element:
6161

6262
| Element | Occurrences | Description |
6363
| ------- | ----------- | ----------- |
64-
| Protocol | 0:n | List of protocols with their default partner claim type name. |
64+
| Protocol | 1:n | List of protocols with their default partner claim type name. |
6565

6666
The **Protocol** element contains the following attributes:
6767

articles/active-directory-b2c/code-samples.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ author: mmacy
66
manager: celestedg
77

88
ms.author: marsma
9-
ms.date: 01/23/2018
9+
ms.date: 01/29/2020
1010
ms.custom: mvc
1111
ms.topic: sample
1212
ms.service: active-directory
@@ -37,6 +37,7 @@ The following tables provide links to samples for applications including iOS, An
3737
| [openidconnect-nodejs](https://github.com/AzureADQuickStarts/B2C-WebApp-OpenIDConnect-NodeJS) | A Node.js app that provides a quick and easy way to set up a Web application with Express using OpenID Connect. |
3838
| [javascript-nodejs-webapp](https://github.com/AzureADQuickStarts/active-directory-b2c-javascript-nodejs-webapp) | A node.js server that provides a quick and easy way to set up a REST API service using the OAuth2 protocol. |
3939
| [javascript-nodejs-webapi](https://github.com/Azure-Samples/active-directory-b2c-javascript-nodejs-webapi) | A small node.js Web API for Azure AD B2C that shows how to protect your web api and accept B2C access tokens using passport.js. |
40+
| [ms-identity-python-webapp](https://github.com/Azure-Samples/ms-identity-python-webapp/blob/master/README_B2C.md) | Demonstrate how to Integrate B2C of Microsoft identity platform with a Python web application. |
4041

4142
## Single page apps
4243

articles/active-directory-b2c/cookie-definitions.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -26,7 +26,10 @@ To safeguard access to sites, web browsers will introduce a new secure-by-defaul
2626

2727
Developers must use the new cookie setting, `SameSite=None`, to designate cookies for cross-site access. When the `SameSite=None` attribute is present, an additional `Secure` attribute must be used so cross-site cookies can only be accessed over HTTPS connections. Validate and test all your applications, including those applications that use Azure AD B2C.
2828

29-
For more information, see [Effect on customer websites and Microsoft services and products in Chrome version 80 or later](https://support.microsoft.com/help/4522904/potential-disruption-to-customer-websites-in-latest-chrome).
29+
For more information, see:
30+
31+
* [Handle SameSite cookie changes in Chrome browser](../active-directory/develop/howto-handle-samesite-cookie-changes-chrome-browser.md)
32+
* [Effect on customer websites and Microsoft services and products in Chrome version 80 or later](https://support.microsoft.com/help/4522904/potential-disruption-to-customer-websites-in-latest-chrome)
3033

3134
## Cookies
3235

articles/active-directory-b2c/customize-ui-overview.md

Lines changed: 58 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: celestedg
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: conceptual
12-
ms.date: 09/25/2019
12+
ms.date: 01/30/2020
1313
ms.author: marsma
1414
ms.subservice: B2C
1515
---
@@ -28,6 +28,9 @@ If you use [user flows](user-flow-overview.md), you can change the look of your
2828

2929
You use the [Azure portal](tutorial-customize-ui.md) to configure the UI customization for user flows.
3030

31+
> [!TIP]
32+
> If you want to modify only the banner logo, background image, and background color of your user flow pages, you can try the [Company branding (preview)](#company-branding-preview) feature described later in this article.
33+
3134
### Custom policies
3235

3336
If you're using [custom policies](custom-policy-overview.md) to provide sign-up or sign-in, password reset, or profile-editing in your application, use [policy files to customize the UI](custom-policy-ui-customization.md).
@@ -146,6 +149,60 @@ The following table lists the HTML fragments that Azure AD B2C merges into the `
146149
| Multi-factor authentication | Customers can verify their phone numbers (using text or voice) during sign-up or sign-in. |
147150
| Error | Provides error information to the customer. |
148151

152+
## Company branding (preview)
153+
154+
You can customize your user flow pages with a banner logo, background image, and background color by using Azure Active Directory [Company branding](../active-directory/fundamentals/customize-branding.md).
155+
156+
To customize your user flow pages, you first configure company branding in Azure Active Directory, then you enable it in the page layouts of your user flows in Azure AD B2C.
157+
158+
[!INCLUDE [preview note](../../includes/active-directory-b2c-public-preview.md)]
159+
160+
### Configure company branding
161+
162+
Start by setting the banner logo, background image, and background color within **Company branding**.
163+
164+
1. Sign in to the [Azure portal](https://portal.azure.com).
165+
1. Select the **Directory + subscription** filter in the top menu, and then select the directory that contains your Azure AD B2C tenant.
166+
1. In the Azure portal, search for and select **Azure AD B2C**.
167+
1. Under **Manage**, select **Company branding**.
168+
1. Follow the steps in [Add branding to your organization's Azure Active Directory sign-in page](../active-directory/fundamentals/customize-branding.md).
169+
170+
Keep these things in mind when you configure company branding in Azure AD B2C:
171+
172+
* Company branding in Azure AD B2C is currently limited to **background image**, **banner logo**, and **background color** customization. The other properties in the company branding pane, for example those in **Advanced settings**, are *not supported*.
173+
* In your user flow pages, the background color is shown before the background image is loaded. We recommended you choose a background color that closely matches the colors in your background image for a smoother loading experience.
174+
* The banner logo appears in the verification emails sent to your users when they initiate a sign-up user flow.
175+
176+
### Enable branding in user flow pages
177+
178+
Once you've configured company branding, enable it in your user flows.
179+
180+
1. In the left menu of the Azure portal, select **Azure AD B2C**.
181+
1. Under **Policies**, select **User flows (policies)**.
182+
1. Select the user flow for which you'd like to enable company branding. Company branding is **not supported** for the *Sign in v1* and *Profile editing v1* user flow types.
183+
1. Under **Customize**, select **Page layouts**, and then select the layout you'd like to brand. For example, select **Unified sign up or sign in page**.
184+
1. For the **Page Layout Version (Preview)**, choose version **1.2.0** or above.
185+
1. Select **Save**.
186+
187+
If you'd like to brand all pages in the user flow, set the page layout version for each page layout in the user flow.
188+
189+
![Page layout selection in Azure AD B2C in the Azure portal](media/customize-ui-overview/portal-02-page-layout-select.png)
190+
191+
This annotated example shows a custom banner logo and background image on a *Sign up and sign in* user flow page that uses the Ocean Blue template:
192+
193+
![Branded sign-up/sign-in page served by Azure AD B2C](media/customize-ui-overview/template-ocean-blue-branded.png)
194+
195+
### Use company branding assets in custom HTML
196+
197+
To use your company branding assets in custom HTML, add the following tags outside the `<div id="api">` tag:
198+
199+
```HTML
200+
<img data-tenant-branding-background="true" />
201+
<img data-tenant-branding-logo="true" alt="Company Logo" />
202+
```
203+
204+
The image source is replaced with that of the background image and banner logo. As described in the [Get started with custom HTML and CSS](#get-started-with-custom-html-and-css) section, use CSS classes to style and position the assets on the page .
205+
149206
## Localize content
150207

151208
You localize your HTML content by enabling [language customization](user-flow-language-customization.md) in your Azure AD B2C tenant. Enabling this feature allows Azure AD B2C to forward the OpenID Connect parameter `ui-locales` to your endpoint. Your content server can use this parameter to provide language-specific HTML pages.

articles/active-directory-b2c/localization-string-ids.md

Lines changed: 27 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ manager: celestedg
88
ms.service: active-directory
99
ms.workload: identity
1010
ms.topic: reference
11-
ms.date: 09/10/2018
11+
ms.date: 02/03/2020
1212
ms.author: marsma
1313
ms.subservice: B2C
1414
---
@@ -75,7 +75,7 @@ The following example localizes the Facebook identity provider to Arabic:
7575
<LocalizedString ElementType="ClaimsProvider" StringId="FacebookExchange">فيس بوك</LocalizedString>
7676
```
7777

78-
## Sign-up or sign-in error messages
78+
### Sign-up or sign-in error messages
7979

8080
| ID | Default value |
8181
| -- | ------------- |
@@ -128,7 +128,7 @@ The following are the IDs for a content definition with an ID of `api.localaccou
128128
| **ver_intro_msg** | Verification is necessary. Please click Send button. |
129129
| **ver_input** | Verification code |
130130

131-
## Sign-up and self asserted pages error messages
131+
### Sign-up and self asserted pages error messages
132132

133133
| ID | Default value |
134134
| -- | ------------- |
@@ -199,6 +199,30 @@ The following example shows the use of some of the user interface elements in th
199199

200200
![Sign-up page email verification UX elements](./media/localization-string-ids/localization-mfa2.png)
201201

202+
## Verification display control user interface elements
203+
204+
The following are the IDs for a [Verification display control](display-control-verification.md)
205+
206+
| ID | Default value |
207+
| -- | ------------- |
208+
|verification_control_but_change_claims |Change |
209+
|verification_control_fail_send_code |Failed to send the code, please try again later. |
210+
|verification_control_fail_verify_code |Failed to verify the code, please try again later. |
211+
|verification_control_but_send_code |Send Code |
212+
|verification_control_but_send_new_code |Send New Code |
213+
|verification_control_but_verify_code |Verify Code |
214+
215+
## One time password error messages
216+
The following are the IDs for a [one time password technical profile](one-time-password-technical-profile.md) error messages
217+
218+
| ID | Default value |
219+
| -- | ------------- |
220+
|UserMessageIfMaxRetryAttempted |One time password provided verification has exceeded maximum number of attempts |
221+
|UserMessageIfSessionDoesNotExist |One time password verification session has expired |
222+
|UserMessageIfSessionConflict |One time password verification session has conflict |
223+
|UserMessageIfInvalidCode |One time password provided for verification is incorrect |
224+
225+
202226

203227

204228

0 commit comments

Comments
 (0)