Skip to content

Commit 74244a2

Browse files
authored
Merge pull request #201975 from MicrosoftDocs/main
6/17 AM Publish
2 parents 26373e8 + d7bbf73 commit 74244a2

File tree

230 files changed

+5009
-2338
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

230 files changed

+5009
-2338
lines changed

articles/active-directory-b2c/add-api-connector.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -72,7 +72,7 @@ Content-type: application/json
7272
}
7373
],
7474
"displayName": "John Smith",
75-
"objectId": "11111111-0000-0000-0000-000000000000"
75+
"objectId": "11111111-0000-0000-0000-000000000000",
7676
"givenName":"John",
7777
"surname":"Smith",
7878
"jobTitle":"Supplier",

articles/active-directory-b2c/tutorial-create-user-flows.md

Lines changed: 20 additions & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ manager: CelesteDG
88
ms.service: active-directory
99
ms.workload: identity
1010
ms.topic: tutorial
11-
ms.date: 03/30/2022
11+
ms.date: 06/17/2022
1212
ms.author: kengaderdus
1313
ms.subservice: B2C
1414
zone_pivot_groups: b2c-policy-type
@@ -21,7 +21,7 @@ zone_pivot_groups: b2c-policy-type
2121
In your applications you may have user flows that enable users to sign up, sign in, or manage their profile. You can create multiple user flows of different types in your Azure Active Directory B2C (Azure AD B2C) tenant and use them in your applications as needed. User flows can be reused across applications.
2222

2323
::: zone pivot="b2c-user-flow"
24-
A user flow lets you determine how users interact with your application when they do things like sign in, sign up, edit a profile, or reset a password. In this article, you learn how to:
24+
A user flow lets you determine how users interact with your application when they do things like sign-in, sign-up, edit a profile, or reset a password. In this article, you learn how to:
2525
::: zone-end
2626

2727
::: zone pivot="b2c-custom-policy"
@@ -68,31 +68,32 @@ The sign-up and sign-in user flow handles both sign-up and sign-in experiences w
6868

6969
1. On the **Create a user flow** page, select the **Sign up and sign in** user flow.
7070

71-
![Select a user flow page with Sign up and sign in flow highlighted](./media/tutorial-create-user-flows/select-user-flow-type.png)
71+
![Select a user flow page with Sign-up and sign-in flow highlighted](./media/tutorial-create-user-flows/select-user-flow-type.png)
7272

7373
1. Under **Select a version**, select **Recommended**, and then select **Create**. ([Learn more](user-flow-versions.md) about user flow versions.)
7474

7575
![Create user flow page in Azure portal with properties highlighted](./media/tutorial-create-user-flows/select-version.png)
7676

7777
1. Enter a **Name** for the user flow. For example, *signupsignin1*.
7878
1. For **Identity providers**, select **Email signup**.
79-
1. For **User attributes and claims**, choose the claims and attributes that you want to collect and send from the user during sign-up. For example, select **Show more**, and then choose attributes and claims for **Country/Region**, **Display Name**, and **Postal Code**. Click **OK**.
79+
1. For **User attributes and claims**, choose the claims and attributes that you want to collect and send from the user during sign-up. For example, select **Show more**, and then choose attributes and claims for **Country/Region**, **Display Name**, and **Postal Code**. Select **OK**.
8080

8181
![Attributes and claims selection page with three claims selected](./media/tutorial-create-user-flows/signup-signin-attributes.png)
8282

83-
1. Click **Create** to add the user flow. A prefix of *B2C_1* is automatically prepended to the name.
83+
1. Select **Create** to add the user flow. A prefix of *B2C_1_* is automatically prepended to the name.
8484

8585
### Test the user flow
8686

87-
1. Select the user flow you created to open its overview page, then select **Run user flow**.
87+
1. Select the user flow you created to open its overview page.
88+
1. At the top of the user flow overview page, select **Run user flow**. A pane opens at the right side of the page.
8889
1. For **Application**, select the web application named *webapp1* that you previously registered. The **Reply URL** should show `https://jwt.ms`.
89-
1. Click **Run user flow**, and then select **Sign up now**.
90+
1. Select **Run user flow**, and then select **Sign up now**.
9091

9192
![Run user flow page in portal with Run user flow button highlighted](./media/tutorial-create-user-flows/signup-signin-run-now.PNG)
9293

93-
1. Enter a valid email address, click **Send verification code**, enter the verification code that you receive, then select **Verify code**.
94+
1. Enter a valid email address, select **Send verification code**, enter the verification code that you receive, then select **Verify code**.
9495
1. Enter a new password and confirm the password.
95-
1. Select your country and region, enter the name that you want displayed, enter a postal code, and then click **Create**. The token is returned to `https://jwt.ms` and should be displayed to you.
96+
1. Select your country and region, enter the name that you want displayed, enter a postal code, and then select **Create**. The token is returned to `https://jwt.ms` and should be displayed to you.
9697
1. You can now run the user flow again and you should be able to sign in with the account that you created. The returned token includes the claims that you selected of country/region, name, and postal code.
9798

9899
> [!NOTE]
@@ -124,16 +125,17 @@ If you want to enable users to edit their profile in your application, you use a
124125
1. On the **Create a user flow** page, select the **Profile editing** user flow.
125126
1. Under **Select a version**, select **Recommended**, and then select **Create**.
126127
1. Enter a **Name** for the user flow. For example, *profileediting1*.
127-
1. For **Identity providers**, select **Local Account SignIn**.
128-
2. For **User attributes**, choose the attributes that you want the customer to be able to edit in their profile. For example, select **Show more**, and then choose both attributes and claims for **Display name** and **Job title**. Click **OK**.
129-
3. Click **Create** to add the user flow. A prefix of *B2C_1* is automatically appended to the name.
128+
1. For **Identity providers**, under **Local accounts**, select **Email signup**.
129+
2. For **User attributes**, choose the attributes that you want the customer to be able to edit in their profile. For example, select **Show more**, and then choose both attributes and claims for **Display name** and **Job title**. Select **OK**.
130+
3. Select **Create** to add the user flow. A prefix of *B2C_1_* is automatically appended to the name.
130131

131132
### Test the user flow
132133

133-
1. Select the user flow you created to open its overview page, then select **Run user flow**.
134+
1. Select the user flow you created to open its overview page.
135+
1. At the top of the user flow overview page, select **Run user flow**. A pane opens at the right side of the page.
134136
1. For **Application**, select the web application named *webapp1* that you previously registered. The **Reply URL** should show `https://jwt.ms`.
135-
1. Click **Run user flow**, and then sign in with the account that you previously created.
136-
1. You now have the opportunity to change the display name and job title for the user. Click **Continue**. The token is returned to `https://jwt.ms` and should be displayed to you.
137+
1. Select **Run user flow**, and then sign in with the account that you previously created.
138+
1. You now have the opportunity to change the display name and job title for the user. Select **Continue**. The token is returned to `https://jwt.ms` and should be displayed to you.
137139
::: zone-end
138140

139141
::: zone pivot="b2c-custom-policy"
@@ -274,11 +276,11 @@ Add the application IDs to the extensions file *TrustFrameworkExtensions.xml*.
274276

275277
## Add Facebook as an identity provider
276278

277-
The **SocialAndLocalAccounts** starter pack includes Facebook social sign in. Facebook is *not* required for using custom policies, but we use it here to demonstrate how you can enable federated social login in a custom policy. If you don't need to enable federated social login, use the **LocalAccounts** starter pack instead, and skip [Add Facebook as an identity provider](tutorial-create-user-flows.md?pivots=b2c-custom-policy#add-facebook-as-an-identity-provider) section.
279+
The **SocialAndLocalAccounts** starter pack includes Facebook social sign in. Facebook isn't required for using custom policies, but we use it here to demonstrate how you can enable federated social login in a custom policy. If you don't need to enable federated social login, use the **LocalAccounts** starter pack instead, and skip [Add Facebook as an identity provider](tutorial-create-user-flows.md?pivots=b2c-custom-policy#add-facebook-as-an-identity-provider) section.
278280

279281
### Create Facebook application
280282

281-
Use the steps outlined in [Create a Facebook application](identity-provider-facebook.md#create-a-facebook-application) to obtain Facebook *App ID* and *App Secret*. Skip the prerequisites and the rest of the steps in the [Set up sign-up and sign-in with a Facebook account](identity-provider-facebook.md) article.
283+
Use the steps outlined in [Create a Facebook application](identity-provider-facebook.md#create-a-facebook-application) to obtain Facebook *App ID* and *App Secret*. Skip the prerequisites and the rest of the steps in the [Set up sign up and sign in with a Facebook account](identity-provider-facebook.md) article.
282284

283285
### Create the Facebook key
284286

@@ -341,7 +343,7 @@ As you upload the files, Azure adds the prefix `B2C_1A_` to each.
341343
In this article, you learned how to:
342344

343345
> [!div class="checklist"]
344-
> * Create a sign-up and sign-in user flow
346+
> * Create a sig- up and sign in user flow
345347
> * Create a profile editing user flow
346348
> * Create a password reset user flow
347349

articles/active-directory/authentication/concept-registration-mfa-sspr-combined.md

Lines changed: 6 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: conceptual
9-
ms.date: 05/24/2022
9+
ms.date: 06/17/2022
1010

1111
ms.author: justinha
1212
author: justinha
@@ -38,6 +38,8 @@ Azure AD combined security information registration is available for Azure US Go
3838
> [!IMPORTANT]
3939
> Users that are enabled for both the original preview and the enhanced combined registration experience see the new behavior. Users that are enabled for both experiences see only the My Account experience. The *My Account* aligns with the look and feel of combined registration and provides a seamless experience for users. Users can see My Account by going to [https://myaccount.microsoft.com](https://myaccount.microsoft.com).
4040
>
41+
> You can set **Require users to register when signing in** to **Yes** to require all users to register when signing in, ensuring that all users are protected.
42+
>
4143
> You might encounter an error message while trying to access the Security info option, such as, "Sorry, we can't sign you in". Confirm that you don't have any configuration or group policy object that blocks third-party cookies on the web browser.
4244
4345
*My Account* pages are localized based on the language settings of the computer accessing the page. Microsoft stores the most recent language used in the browser cache, so subsequent attempts to access the pages continue to render in the last language used. If you clear the cache, the pages re-render.
@@ -68,7 +70,7 @@ Combined registration supports the following authentication methods and actions:
6870
6971
Users can set one of the following options as the default Multi-Factor Authentication method:
7072

71-
- Microsoft Authenticator – push notification
73+
- Microsoft Authenticator – push notification or passwordless
7274
- Authenticator app or hardware token – code
7375
- Phone call
7476
- Text message
@@ -128,7 +130,7 @@ Users can access manage mode by going to [https://aka.ms/mysecurityinfo](https:/
128130

129131
An admin has enforced registration.
130132

131-
A user has not set up all required security info and goes to the Azure portal. After entering the user name and password, the user is prompted to set up security info. The user then follows the steps shown in the wizard to set up the required security info. If your settings allow it, the user can choose to set up methods other than those shown by default. After completing the wizard, users review the methods they set up and their default method for Multi-Factor Authentication. To complete the setup process, the user confirms the info and continues to the Azure portal.
133+
A user has not set up all required security info and goes to the Azure portal. After the user enters the user name and password, the user is prompted to set up security info. The user then follows the steps shown in the wizard to set up the required security info. If your settings allow it, the user can choose to set up methods other than those shown by default. After users complete the wizard, they review the methods they set up and their default method for Multi-Factor Authentication. To complete the setup process, the user confirms the info and continues to the Azure portal.
132134

133135
### Set up security info from My Account
134136

@@ -151,7 +153,7 @@ In addition, users who access a resource tenant may be confused when they change
151153

152154
For example, a user sets Microsoft Authenticator app push notification as the primary authentication to sign-in to home tenant and also has SMS/Text as another option.
153155
This user is also configured with SMS/Text option on a resource tenant.
154-
If this user removes SMS/Text as one of the authentication option on their home tenant, they get confused when access to the resource tenant asks them to respond to SMS/Text message.
156+
If this user removes SMS/Text as one of the authentication options on their home tenant, they get confused when access to the resource tenant asks them to respond to SMS/Text message.
155157

156158
To switch the directory in the Azure portal, click the user account name in the upper right corner and click **Switch directory**.
157159

0 commit comments

Comments
 (0)