Skip to content

Commit 75a2776

Browse files
authored
Merge branch 'MicrosoftDocs:main' into acs-teams-display-name-changed
2 parents 1a86e4c + f17ff17 commit 75a2776

File tree

2,040 files changed

+4829
-1759
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

2,040 files changed

+4829
-1759
lines changed

.openpublishing.publish.config.json

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -757,6 +757,12 @@
757757
"url": "https://github.com/AzureADQuickStarts/WebApp-OpenIdConnect-DotNet",
758758
"branch": "GuidedSetup",
759759
"branch_mapping": {}
760+
},
761+
{
762+
"path_to_root": "azure-policy-autogen-docs",
763+
"url": "https://github.com/MicrosoftDocs/azure-policy-autogen-docs",
764+
"branch": "main",
765+
"branch_mapping": {}
760766
}
761767
],
762768
"branch_target_mapping": {

articles/active-directory-b2c/add-password-reset-policy.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -157,7 +157,7 @@ A claims transformation technical profile accesses the `isForgotPassword` claim.
157157

158158
The **SelfAsserted-LocalAccountSignin-Email** technical profile **setting.forgotPasswordLinkOverride** defines the password reset claims exchange that executes in your user journey.
159159

160-
The **LocalAccountWritePasswordUsingObjectId** technical profile **UseTechnicalProfileForSessionManagement** `SM-AAD` session manager is required for the user to preform subsequent logins successfully under [SSO](./custom-policy-reference-sso.md) conditions.
160+
The **LocalAccountWritePasswordUsingObjectId** technical profile **UseTechnicalProfileForSessionManagement** `SM-AAD` session manager is required for the user to perform subsequent logins successfully under [SSO](./custom-policy-reference-sso.md) conditions.
161161

162162
### Add the password reset sub journey
163163

articles/active-directory-b2c/best-practices.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -84,7 +84,7 @@ Manage your Azure AD B2C environment.
8484
| Use the Microsoft Graph API to automate the management of your B2C tenants | Microsoft Graph APIs:<br/>Manage [Identity Experience Framework](/graph/api/resources/trustframeworkpolicy?preserve-view=true&view=graph-rest-beta) (custom policies)<br/>[Keys](/graph/api/resources/trustframeworkkeyset?preserve-view=true&view=graph-rest-beta)<br/>[User Flows](/graph/api/resources/identityuserflow?preserve-view=true&view=graph-rest-beta) |
8585
| Integrate with Azure DevOps | A [CI/CD pipeline](deploy-custom-policies-devops.md) makes moving code between different environments easy and ensures production readiness always. |
8686
| Deploy custom policy | Azure AD B2C relies on caching to deliver performance to your end users. When you deploy a custom policy using whatever method, expect a delay of up to **30 minutes** for your users to see the changes. As a result of this behavior, consider the following practices when you deploy your custom policies: <br> - If you're deploying to a development environment, set the `DeploymentMode` attribute in your custom policy file's `<TrustFrameworkPolicy>` element to `Production`. <br> - Deploy your updated policy files to a production environment when traffic in your app is low. <br> - When you deploy to a production environment to update existing policy files, upload the updated files with new names, which act as new versions of the policies. Then, update your app references to the new names/versions. You can remove the old policy files afterward or keep them as your last known good configuration for easy rollback.<br> - If you need to deploy to a production environment to update existing policy files without versioning, make the new policy backward compatible with the old policy by following some simple rules. If you need to change a technical profile, claim, or [SubJourney](subjourneys.md), create a new version of it, publish the policy, and wait for 30 minutes for Azure AD B2C caches to pick up the new version. Then, in a subsequent update, make changes to use the new version and perform another policy update. Wait for another 30 minutes, then you can delete the old version of the elements if needed. Ensure all of your business logic is inside SubJourneys.<br> - You can set the `DeploymentMode` to `Development` in a production environment to bypass the caching behavior. However, we don't recommend this practice. If you [Collect Azure AD B2C logs with Application Insights](troubleshoot-with-application-insights.md), all claims sent to and from identity providers are collected, which is a security and performance risk. |
87-
| Deploy app registration updates | When you modify your application registration in your Azure AD B2C tenant, such as updating the application's redirect URI, expect a delay of up to **2 hours (3600s)** for the changes to take effect in the production environment. We recommend that you modify your application registration in your production environment when traffic in your app is low.|
87+
| Deploy app registration updates | When you modify your application registration in your Azure AD B2C tenant, such as updating the application's redirect URI, expect a delay of up to **2 hours (7200s)** for the changes to take effect in the production environment. We recommend that you modify your application registration in your production environment when traffic in your app is low.|
8888
| Integrate with Azure Monitor | [Audit log events](view-audit-logs.md) are only retained for seven days. [Integrate with Azure Monitor](azure-monitor.md) to retain the logs for long-term use, or integrate with third-party security information and event management (SIEM) tools to gain insights into your environment. |
8989
| Setup active alerting and monitoring | [Track user behavior](./analytics-with-application-insights.md) in Azure AD B2C using Application Insights. |
9090

78.3 KB
Loading

articles/active-directory-b2c/partner-nok-nok.md

Lines changed: 22 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -40,7 +40,7 @@ To enable passkey authentication for your users, enable Nok Nok as an identity p
4040

4141
The following diagram illustrates the Nok Nok solution as an IdP for Azure AD B2C by using OpenID Connect (OIDC) for passkey authentication.
4242

43-
![Diagram of Nok Nok as IdP for Azure AD B2C using OpenID Connect (OIDC) for passkey authentication.](./media/partner-nok-nok/nok-nok-architecture-diagram.png)
43+
![Diagram for passkey authentication with Nok Nok as an IdP.](./media/partner-nok-nok/nok-nok-architecture-diagram.png)
4444

4545
### Scenario 1: Passkey registration
4646
1. The user navigates to the Nok Nok tutorial web app using the link provided by Nok Nok.
@@ -52,9 +52,11 @@ The following diagram illustrates the Nok Nok solution as an IdP for Azure AD B2
5252
### Scenario 2: Passkey authentication
5353
1. The user selects the sign-in with Nok Nok Cloud button on the Azure AD B2C sign-in page.
5454
2. Azure AD B2C redirects the user to the Nok Nok sign-in app.
55-
3. The user authenticates with their passkey.
56-
4. The Nok Nok server validates the passkey assertion and sends an OIDC authentication response to Azure AD B2C.
57-
5. Based on the authentication result, Azure AD B2C either grants or denies access to the target application.
55+
3. The user requests passkey authentication
56+
4. The user authenticates with their passkey.
57+
5. The Nok Nok Cloud validates the passkey assertion
58+
6. The Nok Nok Cloud sends an OIDC authentication response to Azure AD B2C.
59+
7. Based on the authentication result, Azure AD B2C either grants or denies access to the target application.
5860

5961
## Get started with Nok Nok
6062

@@ -125,6 +127,22 @@ For the following instructions, Nok Nok is a new OIDC IdP in the B2C identity pr
125127

126128
If the flow is incomplete, confirm the user is or isn't saved in the directory.
127129

130+
## Alternate flow for Authentication
131+
132+
The following diagram illustrates an alternate passkey sign in or sign up flow using the ID Token Hint feature of Azure AD B2C. With this approach, an Azure custom policy verifies the ID Token Hint produced by the Nok Nok Cloud. For more details, please refer to the article, [Define an ID token hint technical profile in an Azure Active Directory B2C custom policy](./id-token-hint.md). Please contact Nok Nok support for help with integrated the required Azure custom policy.
133+
134+
![Diagram for passkey authentication using ID Token Hint from Nok Nok.](./media/partner-nok-nok/nok-nok-id-token-hint-architecture-diagram.png)
135+
136+
The following are the steps
137+
1. The user selects the sign-in with Nok Nok Cloud button.
138+
2. The Nok Nok Cloud request passkey authentication.
139+
3. The user authenticates with their passkey.
140+
4. The Nok Nok Cloud validates the passkey assertion.
141+
5. The ID Token Hint is returned.
142+
6. The App posts an OIDC request with the ID Token Hint to Azure AD B2C.
143+
7. Azure AD B2C Custom Policy verifies the ID Token Hint.
144+
8. Based on the authentication result, Azure AD B2C either grants or denies access to the target application.
145+
128146
## Next steps
129147

130148
* [Azure AD B2C custom policy overview](./custom-policy-overview.md)

articles/active-directory-b2c/whats-new-docs.md

Lines changed: 10 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: "What's new in Azure Active Directory business-to-customer (B2C)"
33
description: "New and updated documentation for the Azure Active Directory business-to-customer (B2C)."
4-
ms.date: 04/01/2025
4+
ms.date: 07/03/2025
55
ms.service: azure-active-directory
66
ms.subservice: b2c
77
ms.topic: whats-new
@@ -18,6 +18,15 @@ manager: CelesteDG
1818

1919
Welcome to what's new in Azure Active Directory B2C documentation. This article lists new and significantly updated docs from the past three months. To learn what's new with the B2C service, see [What's new in Microsoft Entra ID](../active-directory/fundamentals/whats-new.md), [Azure AD B2C developer release notes](custom-policy-developer-notes.md) and [What's new in Microsoft Entra External ID](/entra/external-id/whats-new-docs).
2020

21+
## June 2025
22+
23+
### Updated articles
24+
25+
- [Configure Cloudflare Web Application Firewall with Azure Active Directory B2C](partner-cloudflare.md) - Added a note about Azure Front Door-managed certificates
26+
- [Azure AD B2C: Frequently asked questions (FAQ)](faq.yml) - Updated the note in the Azure AD B2C end-of-sale section
27+
- [Page layout versions](page-layout.md) - Added updates related to CAPTCHA
28+
- [Securing phone-based multifactor authentication](phone-based-mfa.md) - Added information on preventing fraudulent sign-ups
29+
2130
## April 2025
2231

2332
### Updated articles
@@ -32,12 +41,3 @@ This month, we added an important note to our articles stating that starting May
3241
### Updated articles
3342
- [Error codes: Azure Active Directory B2C](error-codes.md) - Updated error messages
3443

35-
## February 2025
36-
37-
### Updated articles
38-
39-
- [Enable multifactor authentication in Azure Active Directory B2C](multi-factor-authentication.md) - Added SMS pricing
40-
- [Page layout versions](page-layout.md) - Updated the latest versions of the self-asserted and MFA pages
41-
- [Azure AD B2C: Frequently asked questions (FAQ)](faq.yml) - Added billing name change for SMS phone
42-
- [Enable CAPTCHA in Azure Active Directory B2C](add-captcha.md) - Added CAPTCHA feature flag
43-

articles/api-management/api-management-gateways-overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -81,7 +81,7 @@ The following tables compare features available in the following API Management
8181
| [Outbound virtual network integration](integrate-vnet-outbound.md) || Standard v2, Premium v2 ||| ✔️ |
8282
| [Availability zones](zone-redundancy.md) | Premium | ✔️<sup>3</sup> || ✔️<sup>1</sup> | ✔️<sup>3</sup> |
8383
| [Multi-region deployment](api-management-howto-deploy-multi-region.md) | Premium ||| ✔️<sup>1</sup> ||
84-
| [CA root certificates](api-management-howto-ca-certificates.md) for certificate validation | ✔️ | ✔️ || ✔️<sup>4</sup> ||
84+
| [CA root certificates](api-management-howto-ca-certificates.md) for certificate validation | ✔️ | || ✔️<sup>4</sup> ||
8585
| [Managed domain certificates](configure-custom-domain.md?tabs=managed#domain-certificate-options) | Developer, Basic, Standard, Premium || ✔️ |||
8686
| [TLS settings](api-management-howto-manage-protocols-ciphers.md) | ✔️ | ✔️ | ✔️ | ✔️ ||
8787
| **HTTP/2** (Client-to-gateway) | ✔️<sup>5</sup> | ✔️<sup>5</sup> || ✔️ ||

articles/api-management/api-management-get-started-publish-versions.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.topic: tutorial
99
ms.date: 03/26/2025
1010
ms.author: danlep
1111

12-
#customer intent: As a developer, I want to publish mutliple versions of an API so that all callers to the API don't need to use the same version.
12+
#customer intent: As a developer, I want to publish multiple versions of an API so that all callers to the API don't need to use the same version.
1313
---
1414

1515
# Tutorial: Publish multiple versions of your API

articles/api-management/api-management-region-availability.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -37,6 +37,7 @@ Information in the following table is updated regularly. Capacity availability i
3737
| East US 2 |||||
3838
| France Central ||| ||
3939
| Germany West Central |||||
40+
| Italy North ||| | |
4041
| Japan East ||| ||
4142
| Korea Central |||| |
4243
| North Central US ||| ||
@@ -45,7 +46,8 @@ Information in the following table is updated regularly. Capacity availability i
4546
| South Africa North ||| | |
4647
| South Central US ||| | |
4748
| South India ||| | |
48-
| Southeast Asia ||| ||
49+
| Sweden Central ||| | |
50+
| South India ||| | |
4951
| Switzerland North ||| | |
5052
| UK South |||||
5153
| UK West ||| | |

articles/api-management/azure-openai-api-from-specification.md

Lines changed: 8 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
title: Import an Azure OpenAI API as REST API - Azure API Management
3-
description: How to import an Azure OpenAI API as a REST API from the Azure OpenAI in Foundry Models or from an OpenAPI specification.
3+
description: How to import an Azure OpenAI API as a REST API from Azure OpenAI in Foundry Models or from an OpenAPI specification.
44
ms.service: azure-api-management
55
author: dlepow
66
ms.author: danlep
@@ -20,7 +20,8 @@ You can import AI model endpoints deployed in [Azure OpenAI in Foundry Models](/
2020

2121
This article shows two options to import an Azure OpenAI API into an Azure API Management instance as a REST API:
2222

23-
- [Import an Azure OpenAI API directly from Azure OpenAI in Foundry Models](#option-1-import-api-from-azure-openai) (recommended)
23+
- [Import an Azure OpenAI API directly from Azure OpenAI](#option-1-import-api-from-azure-openai) (recommended)
24+
2425
- [Download and add the OpenAPI specification](#option-2-add-an-openapi-specification-to-api-management) for Azure OpenAI and add it to API Management as an OpenAPI API.
2526

2627
Learn more about managing AI APIs in API Management:
@@ -35,12 +36,12 @@ Learn more about managing AI APIs in API Management:
3536
Make a note of the ID (name) of the deployment. You'll need it when you test the imported API in API Management.
3637

3738
> [!NOTE]
38-
> API Management policies such as [azure-openai-token-limit](azure-openai-token-limit-policy.md) and [azure-openai-emit-token-metric](azure-openai-emit-token-metric-policy.md) are supported for certain API endpoints exposed through specific Azure OpenAI models. For more information, see [Supported Azure OpenAI in Foundry Models](azure-openai-token-limit-policy.md).
39+
> API Management policies such as [azure-openai-token-limit](azure-openai-token-limit-policy.md) and [azure-openai-emit-token-metric](azure-openai-emit-token-metric-policy.md) are supported for certain API endpoints exposed through specific Azure OpenAI models. For more information, see [Supported Azure OpenAI models](azure-openai-token-limit-policy.md#supported-azure-openai-in-foundry-models-models).
3940
4041
- Permissions to grant access to the Azure OpenAI resource from the API Management instance.
4142

42-
## Option 1. Import API from Azure OpenAI
43-
43+
## Option 1. Import API from Azure OpenAI
44+
4445
You can import an Azure OpenAI API directly from Azure OpenAI to API Management.
4546

4647
[!INCLUDE [api-management-workspace-availability](../../includes/api-management-workspace-availability.md)]
@@ -135,8 +136,8 @@ To ensure that your Azure OpenAI API is working as expected, test it in the API
135136
1. Select an operation that's compatible with the model you deployed in the Azure OpenAI resource.
136137
The page displays fields for parameters and headers.
137138
1. In **Template parameters**, enter the following values:
138-
* `deployment-id` - the ID of a deployment in the Azure OpenAI
139-
* `api-version` - a valid Azure OpenAI API version, such as the API version you selected when you imported the API.
139+
* `deployment-id` - the ID of a deployment in Azure OpenAI
140+
* `api-version` - a valid Azure OpenAI API version, such as the API version you selected when you imported the API.
140141
:::image type="content" source="media/azure-openai-api-from-specification/test-azure-openai-api.png" alt-text="Screenshot of testing an Azure OpenAI API in the portal." lightbox="media/azure-openai-api-from-specification/test-azure-openai-api.png" :::
141142
1. Enter other parameters and headers as needed. Depending on the operation, you might need to configure or update a **Request body**.
142143
> [!NOTE]

0 commit comments

Comments
 (0)