Skip to content

Commit 7890b52

Browse files
committed
Merge branch 'master' of https://github.com/MicrosoftDocs/azure-docs-pr into 1598802-seo-role-based-access-control-title-length
2 parents 5287d3a + 8957104 commit 7890b52

File tree

693 files changed

+7527
-5005
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

693 files changed

+7527
-5005
lines changed

.openpublishing.redirection.json

Lines changed: 329 additions & 234 deletions
Large diffs are not rendered by default.

CODEOWNERS

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -8,6 +8,9 @@ articles/chef/ @TomArcherMsft
88
articles/jenkins/ @TomArcherMsft
99
articles/terraform/ @TomArcherMsft
1010

11+
# Requires Internal Review
12+
articles/best-practices-availability-paired-regions.md @jpconnock @arob98 @syntaxc4 @tysonn @snoviking
13+
1114
# Governance
1215
articles/governance/ @DCtheGeek
1316

articles/active-directory-b2c/TOC.yml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -382,6 +382,7 @@
382382
href: https://azure.microsoft.com/resources/samples/?service=active-directory-b2c
383383
- name: Cookie definitions
384384
href: cookie-definitions.md
385+
displayName: cookies, SameSite
385386
- name: Error codes
386387
href: error-codes.md
387388
- name: Region availability & data residency

articles/active-directory-b2c/cookie-definitions.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -26,7 +26,10 @@ To safeguard access to sites, web browsers will introduce a new secure-by-defaul
2626

2727
Developers must use the new cookie setting, `SameSite=None`, to designate cookies for cross-site access. When the `SameSite=None` attribute is present, an additional `Secure` attribute must be used so cross-site cookies can only be accessed over HTTPS connections. Validate and test all your applications, including those applications that use Azure AD B2C.
2828

29-
For more information, see [Effect on customer websites and Microsoft services and products in Chrome version 80 or later](https://support.microsoft.com/help/4522904/potential-disruption-to-customer-websites-in-latest-chrome).
29+
For more information, see:
30+
31+
* [Handle SameSite cookie changes in Chrome browser](../active-directory/develop/howto-handle-samesite-cookie-changes-chrome-browser.md)
32+
* [Effect on customer websites and Microsoft services and products in Chrome version 80 or later](https://support.microsoft.com/help/4522904/potential-disruption-to-customer-websites-in-latest-chrome)
3033

3134
## Cookies
3235

articles/active-directory-b2c/customize-ui-overview.md

Lines changed: 58 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: celestedg
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: conceptual
12-
ms.date: 09/25/2019
12+
ms.date: 01/30/2020
1313
ms.author: marsma
1414
ms.subservice: B2C
1515
---
@@ -28,6 +28,9 @@ If you use [user flows](user-flow-overview.md), you can change the look of your
2828

2929
You use the [Azure portal](tutorial-customize-ui.md) to configure the UI customization for user flows.
3030

31+
> [!TIP]
32+
> If you want to modify only the banner logo, background image, and background color of your user flow pages, you can try the [Company branding (preview)](#company-branding-preview) feature described later in this article.
33+
3134
### Custom policies
3235

3336
If you're using [custom policies](custom-policy-overview.md) to provide sign-up or sign-in, password reset, or profile-editing in your application, use [policy files to customize the UI](custom-policy-ui-customization.md).
@@ -146,6 +149,60 @@ The following table lists the HTML fragments that Azure AD B2C merges into the `
146149
| Multi-factor authentication | Customers can verify their phone numbers (using text or voice) during sign-up or sign-in. |
147150
| Error | Provides error information to the customer. |
148151

152+
## Company branding (preview)
153+
154+
You can customize your user flow pages with a banner logo, background image, and background color by using Azure Active Directory [Company branding](../active-directory/fundamentals/customize-branding.md).
155+
156+
To customize your user flow pages, you first configure company branding in Azure Active Directory, then you enable it in the page layouts of your user flows in Azure AD B2C.
157+
158+
[!INCLUDE [preview note](../../includes/active-directory-b2c-public-preview.md)]
159+
160+
### Configure company branding
161+
162+
Start by setting the banner logo, background image, and background color within **Company branding**.
163+
164+
1. Sign in to the [Azure portal](https://portal.azure.com).
165+
1. Select the **Directory + subscription** filter in the top menu, and then select the directory that contains your Azure AD B2C tenant.
166+
1. In the Azure portal, search for and select **Azure AD B2C**.
167+
1. Under **Manage**, select **Company branding**.
168+
1. Follow the steps in [Add branding to your organization's Azure Active Directory sign-in page](../active-directory/fundamentals/customize-branding.md).
169+
170+
Keep these things in mind when you configure company branding in Azure AD B2C:
171+
172+
* Company branding in Azure AD B2C is currently limited to **background image**, **banner logo**, and **background color** customization. The other properties in the company branding pane, for example those in **Advanced settings**, are *not supported*.
173+
* In your user flow pages, the background color is shown before the background image is loaded. We recommended you choose a background color that closely matches the colors in your background image for a smoother loading experience.
174+
* The banner logo appears in the verification emails sent to your users when they initiate a sign-up user flow.
175+
176+
### Enable branding in user flow pages
177+
178+
Once you've configured company branding, enable it in your user flows.
179+
180+
1. In the left menu of the Azure portal, select **Azure AD B2C**.
181+
1. Under **Policies**, select **User flows (policies)**.
182+
1. Select the user flow for which you'd like to enable company branding. Company branding is **not supported** for the *Sign in v1* and *Profile editing v1* user flow types.
183+
1. Under **Customize**, select **Page layouts**, and then select the layout you'd like to brand. For example, select **Unified sign up or sign in page**.
184+
1. For the **Page Layout Version (Preview)**, choose version **1.2.0** or above.
185+
1. Select **Save**.
186+
187+
If you'd like to brand all pages in the user flow, set the page layout version for each page layout in the user flow.
188+
189+
![Page layout selection in Azure AD B2C in the Azure portal](media/customize-ui-overview/portal-02-page-layout-select.png)
190+
191+
This annotated example shows a custom banner logo and background image on a *Sign up and sign in* user flow page that uses the Ocean Blue template:
192+
193+
![Branded sign-up/sign-in page served by Azure AD B2C](media/customize-ui-overview/template-ocean-blue-branded.png)
194+
195+
### Use company branding assets in custom HTML
196+
197+
To use your company branding assets in custom HTML, add the following tags outside the `<div id="api">` tag:
198+
199+
```HTML
200+
<img data-tenant-branding-background="true" />
201+
<img data-tenant-branding-logo="true" alt="Company Logo" />
202+
```
203+
204+
The image source is replaced with that of the background image and banner logo. As described in the [Get started with custom HTML and CSS](#get-started-with-custom-html-and-css) section, use CSS classes to style and position the assets on the page .
205+
149206
## Localize content
150207

151208
You localize your HTML content by enabling [language customization](user-flow-language-customization.md) in your Azure AD B2C tenant. Enabling this feature allows Azure AD B2C to forward the OpenID Connect parameter `ui-locales` to your endpoint. Your content server can use this parameter to provide language-specific HTML pages.

articles/active-directory-b2c/localization-string-ids.md

Lines changed: 26 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ manager: celestedg
88
ms.service: active-directory
99
ms.workload: identity
1010
ms.topic: reference
11-
ms.date: 09/10/2018
11+
ms.date: 01/31/2020
1212
ms.author: marsma
1313
ms.subservice: B2C
1414
---
@@ -75,7 +75,7 @@ The following example localizes the Facebook identity provider to Arabic:
7575
<LocalizedString ElementType="ClaimsProvider" StringId="FacebookExchange">فيس بوك</LocalizedString>
7676
```
7777

78-
## Sign-up or sign-in error messages
78+
### Sign-up or sign-in error messages
7979

8080
| ID | Default value |
8181
| -- | ------------- |
@@ -128,7 +128,7 @@ The following are the IDs for a content definition with an ID of `api.localaccou
128128
| **ver_intro_msg** | Verification is necessary. Please click Send button. |
129129
| **ver_input** | Verification code |
130130

131-
## Sign-up and self asserted pages error messages
131+
### Sign-up and self asserted pages error messages
132132

133133
| ID | Default value |
134134
| -- | ------------- |
@@ -199,6 +199,29 @@ The following example shows the use of some of the user interface elements in th
199199

200200
![Sign-up page email verification UX elements](./media/localization-string-ids/localization-mfa2.png)
201201

202+
## Verification display control user interface elements
203+
204+
The following are the IDs for a [Verification display control](display-control-verification.md)
205+
206+
| ID | Default value |
207+
| -- | ------------- |
208+
|verification_control_but_change_claims |Change |
209+
|verification_control_fail_send_code |Failed to send the code, please try again later. |
210+
|verification_control_fail_verify_code |Failed to verify the code, please try again later. |
211+
|verification_control_but_send_code |Send Code |
212+
|verification_control_but_send_new_code |Send New Code |
213+
|verification_control_but_verify_code |Verify Code |
214+
215+
### Verification display control error messages
216+
217+
| ID | Default value |
218+
| -- | ------------- |
219+
|UserMessageIfMaxRetryAttempted |One time password provided verification has exceeded maximum number of attempts |
220+
|UserMessageIfSessionDoesNotExist |One time password verification session has expired |
221+
|UserMessageIfSessionConflict |One time password verification session has conflict |
222+
|UserMessageIfInvalidCode |One time password provided for verification is incorrect |
223+
224+
202225

203226

204227

156 KB
Loading
58.6 KB
Loading
183 KB
Loading

articles/active-directory-domain-services/TOC.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -79,6 +79,8 @@
7979
href: delete-aadds.md
8080
- name: Migrate from a Classic deployment (preview)
8181
href: migrate-from-classic-vnet.md
82+
- name: Change SKU
83+
href: change-sku.md
8284
- name: Secure Azure AD DS
8385
items:
8486
- name: Secure your managed domain

0 commit comments

Comments
 (0)