Skip to content

Commit 7a1d282

Browse files
Merge branch 'master' of https://github.com/MicrosoftDocs/azure-docs-pr into us1679050p
2 parents 519eb2d + 73d1ee1 commit 7a1d282

File tree

1,929 files changed

+23465
-12945
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

1,929 files changed

+23465
-12945
lines changed

.openpublishing.redirection.json

Lines changed: 491 additions & 29 deletions
Large diffs are not rendered by default.

.vscode/settings.json

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,7 @@
11
{
2+
"markdown.docsetName": "azure",
3+
"markdown.docsetRootFolderName": "articles",
4+
"markdown.omitDefaultJsonProperties": true,
25
"markdown.docsetLanguages": [
36
".NET Core CLI",
47
"Apache",

articles/active-directory-b2c/TOC.yml

Lines changed: 4 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -233,18 +233,16 @@
233233
href: direct-signin.md
234234
- name: Add your own business logic
235235
items:
236+
- name: Integrate REST API
237+
href: custom-policy-rest-api-intro.md
236238
- name: Validate user input
237239
href: custom-policy-rest-api-claims-validation.md
238240
displayName: rest claims validation, validate
239241
- name: Obtain additional claims
240242
href: custom-policy-rest-api-claims-exchange.md
241243
displayName: rest claims exchange
242-
- name: Add your own RESTful API
243-
href: rest-api-claims-exchange-dotnet.md
244-
- name: Secure RESTful APIs with basic auth
245-
href: secure-rest-api-dotnet-basic-auth.md
246-
- name: Secure RESTful APIs with certificate auth
247-
href: secure-rest-api-dotnet-certificate-auth.md
244+
- name: Secure REST API
245+
href: secure-rest-api.md
248246
- name: Define custom attributes
249247
href: custom-policy-custom-attributes.md
250248
- name: Troubleshooting

articles/active-directory-b2c/active-directory-technical-profile.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: celestedg
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: reference
12-
ms.date: 03/16/2020
12+
ms.date: 03/26/2020
1313
ms.author: mimart
1414
ms.subservice: B2C
1515
---
@@ -251,7 +251,7 @@ The following technical profile deletes a social user account using **alternativ
251251
| ClientId | No | The client identifier for accessing the tenant as a third party. For more information, see [Use custom attributes in a custom profile edit policy](custom-policy-custom-attributes.md) |
252252
| IncludeClaimResolvingInClaimsHandling  | No | For input and output claims, specifies whether [claims resolution](claim-resolver-overview.md) is included in the technical profile. Possible values: `true`, or `false` (default). If you want to use a claims resolver in the technical profile, set this to `true`. |
253253

254-
## Error messages
254+
### UI elements
255255

256256
The following settings can be used to configure the error message displayed upon failure. The metadata should be configured in the [self-asserted](self-asserted-technical-profile.md) technical profile. The error messages can be [localized](localization.md).
257257

articles/active-directory-b2c/analytics-with-application-insights.md

Lines changed: 88 additions & 90 deletions
Large diffs are not rendered by default.

articles/active-directory-b2c/custom-policy-keep-me-signed-in.md

Lines changed: 31 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ manager: celestedg
88
ms.service: active-directory
99
ms.workload: identity
1010
ms.topic: conceptual
11-
ms.date: 02/27/2020
11+
ms.date: 03/26/2020
1212
ms.author: mimart
1313
ms.subservice: B2C
1414
---
@@ -48,9 +48,27 @@ To enable KMSI, set the content definition `DataUri` element to [page identifier
4848
</BuildingBlocks>
4949
```
5050

51-
1. Save the extensions file.
51+
## Add the metadata to the self-asserted technical profile
52+
53+
To add the KMSI checkbox to the sign-up and sign-in page, set the `setting.enableRememberMe` metadata to false. Override the SelfAsserted-LocalAccountSignin-Email technical profiles in the extension file.
5254

55+
1. Find the ClaimsProviders element. If the element doesn't exist, add it.
56+
1. Add the following claims provider to the ClaimsProviders element:
57+
58+
```XML
59+
<ClaimsProvider>
60+
<DisplayName>Local Account</DisplayName>
61+
<TechnicalProfiles>
62+
<TechnicalProfile Id="SelfAsserted-LocalAccountSignin-Email">
63+
<Metadata>
64+
<Item Key="setting.enableRememberMe">True</Item>
65+
</Metadata>
66+
</TechnicalProfile>
67+
</TechnicalProfiles>
68+
</ClaimsProvider>
69+
```
5370

71+
1. Save the extensions file.
5472

5573
## Configure a relying party file
5674

@@ -103,7 +121,15 @@ We recommend that you set the value of SessionExpiryInSeconds to be a short peri
103121
</RelyingParty>
104122
```
105123

106-
4. Save your changes and then upload the file.
107-
5. To test the custom policy that you uploaded, in the Azure portal, go to the policy page, and then select **Run now**.
124+
## Test your policy
125+
126+
1. Save your changes, and then upload the file.
127+
1. To test the custom policy you uploaded, in the Azure portal, go to the policy page, and then select **Run now**.
128+
1. Type your **username** and **password**, select **Keep me signed in**, and then click **sign-in**.
129+
1. Go back to the Azure portal. Go to the policy page, and then select **Copy** to copy the sign-in URL.
130+
1. In the browser address bar, remove the `&prompt=login` query string parameter, which forces the user to enter their credentials on that request.
131+
1. In the browser, click **Go**. Now Azure AD B2C will issue an access token without prompting you to sign-in again.
132+
133+
## Next steps
108134

109-
You can find the sample policy [here](https://github.com/Azure-Samples/active-directory-b2c-custom-policy-starterpack/tree/master/scenarios/keep%20me%20signed%20in).
135+
Find the sample policy [here](https://github.com/Azure-Samples/active-directory-b2c-custom-policy-starterpack/tree/master/scenarios/keep%20me%20signed%20in).

0 commit comments

Comments
 (0)