You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
In Azure Active Directory B2C (Azure AD B2C), you can send event data directly to [Application Insights](/azure/azure-monitor/app/app-insights-overview) by using the instrumentation key provided to Azure AD B2C. With an Application Insights technical profile, you can get detailed and customized event logs for your user journeys to:
34
+
In Azure Active Directory B2C (Azure AD B2C), you can send event data directly to [Application Insights](/azure/azure-monitor/app/app-insights-overview) by using the connection string provided to Azure AD B2C. With an Application Insights technical profile, you can get detailed and customized event logs for your user journeys to:
35
35
36
36
- Gain insights on user behavior.
37
37
- Troubleshoot your own policies in development or in production.
@@ -42,7 +42,7 @@ In Azure Active Directory B2C (Azure AD B2C), you can send event data directly t
42
42
43
43
## Overview
44
44
45
-
To enable custom event logs, add an Application Insights technical profile. In the technical profile, you define the Application Insights instrumentation key, the event name, and the claims to record. To post an event, add the technical profile as an orchestration step in a [user journey](userjourneys.md).
45
+
To enable custom event logs, add an Application Insights technical profile. In the technical profile, you define the Application Insights connection string, the event name, and the claims to record. To post an event, add the technical profile as an orchestration step in a [user journey](userjourneys.md).
46
46
47
47
When you use Application Insights, consider the following:
48
48
@@ -57,7 +57,7 @@ When you use Application Insights, consider the following:
57
57
58
58
## Create an Application Insights resource
59
59
60
-
When you use Application Insights with Azure AD B2C, all you need to do is create a resource and get the instrumentation key. For information, see [Create an Application Insights resource](/previous-versions/azure/azure-monitor/app/create-new-resource).
60
+
When you use Application Insights with Azure AD B2C, all you need to do is create a resource and get the connection string. For information, see [Create an Application Insights resource](/previous-versions/azure/azure-monitor/app/create-new-resource).
61
61
62
62
1. Sign in to the [Azure portal](https://portal.azure.com/).
63
63
1. If you have access to multiple tenants, select the **Settings** icon in the top menu to switch to your Microsoft Entra ID tenant from the **Directories + subscriptions** menu.
@@ -67,9 +67,9 @@ When you use Application Insights with Azure AD B2C, all you need to do is creat
67
67
1. For **Application Type**, select **ASP.NET web application**.
68
68
1. For **Resource Group**, select an existing group or enter a name for a new group.
69
69
1. Select **Create**.
70
-
1. Open the new Application Insights resource, expand **Essentials**, and copy the instrumentation key.
70
+
1. Open the new Application Insights resource, expand **Essentials**, and copy the connection string.
71
71
72
-

72
+

73
73
74
74
## Define claims
75
75
@@ -122,7 +122,7 @@ Technical profiles can be considered functions in the custom policy. These funct
122
122
123
123
| Technical profile | Task |
124
124
| ----------------- | -----|
125
-
| AppInsights-Common | The common technical profile with typical configuration. It includes the Application Insights instrumentation key, a collection of claims to record, and developer mode. The other technical profiles include the common technical profile and add more claims, such as the event name. |
125
+
| AppInsights-Common | The common technical profile with typical configuration. It includes the Application Insights connection string, a collection of claims to record, and developer mode. The other technical profiles include the common technical profile and add more claims, such as the event name. |
126
126
| AppInsights-SignInRequest | Records a **SignInRequest** event with a set of claims when a sign-in request has been received. |
127
127
| AppInsights-UserSignUp | Records a **UserSignUp** event when the user triggers the sign-up option in a sign-up or sign-in journey. |
128
128
| AppInsights-SignInComplete | Records a **SignInComplete** event upon successful authentication, when a token has been sent to the relying party application. |
@@ -137,8 +137,8 @@ Open the *TrustFrameworkExtensions.xml* file from the starter pack. Add the tech
@@ -143,7 +143,7 @@ The **UserJourneyBehaviors** element contains the following elements:
143
143
| SingleSignOn | 0:1 | The scope of the single sign-on (SSO) session behavior of a user journey. |
144
144
| SessionExpiryType |0:1 | The authentication behavior of the session. Possible values: `Rolling` or `Absolute`. The `Rolling` value (default) indicates that the user remains signed in as long as the user is continually active in the application. The `Absolute` value indicates that the user is forced to reauthenticate after the time period specified by application session lifetime. |
145
145
| SessionExpiryInSeconds | 0:1 | The lifetime of Azure AD B2C's session cookie specified as an integer stored on the user's browser upon successful authentication. The default is 86,400 seconds (24 hours). The minimum is 900 seconds (15 minutes). The maximum is 86,400 seconds (24 hours). |
146
-
| JourneyInsights | 0:1 | The Azure Application Insights instrumentation key to be used. |
146
+
| JourneyInsights | 0:1 | The Azure Application Insights connection string to be used. |
147
147
| ContentDefinitionParameters | 0:1 | The list of key value pairs to be appended to the content definition load URI. |
148
148
| JourneyFraming | 0:1| Allows the user interface of this policy to be loaded in an iframe. |
149
149
| ScriptExecution| 0:1| The supported [JavaScript](javascript-and-page-layout.md) execution modes. Possible values: `Allow` or `Disallow` (default).
@@ -168,7 +168,7 @@ The **JourneyInsights** element contains the following attributes:
168
168
| Attribute | Required | Description |
169
169
| --------- | -------- | ----------- |
170
170
| TelemetryEngine | Yes | The value must be `ApplicationInsights`. |
171
-
|InstrumentationKey| Yes | The string that contains the instrumentation key for the application insights element. |
171
+
|ConnectionString| Yes | The string that contains the connection string for the application insights element. |
172
172
| DeveloperMode | Yes | Possible values: `true` or `false`. If `true`, Application Insights expedites the telemetry through the processing pipeline. This setting is good for development, but constrained at high volumes. The detailed activity logs are designed only to aid in development of custom policies. Do not use development mode in production. Logs collect all claims sent to and from the identity providers during development. If used in production, the developer assumes responsibility for personal data collected in the App Insights log that they own. These detailed logs are only collected when this value is set to `true`.|
173
173
| ClientEnabled | Yes | Possible values: `true` or `false`. If `true`, sends the Application Insights client-side script for tracking page view and client-side errors. |
174
174
| ServerEnabled | Yes | Possible values: `true` or `false`. If `true`, sends the existing UserJourneyRecorder JSON as a custom event to Application Insights. |
@@ -343,4 +343,4 @@ The following example shows how to define a SAML relying party. The subject name
Copy file name to clipboardExpand all lines: articles/active-directory-b2c/tenant-management-manage-administrator.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -7,7 +7,7 @@ manager: CelesteDG
7
7
ms.service: azure-active-directory
8
8
ms.topic: tutorial
9
9
ms.custom: b2c-docs-improvements
10
-
ms.date: 09/11/2024
10
+
ms.date: 04/18/2025
11
11
ms.reviewer: yoelh
12
12
ms.author: kengaderdus
13
13
ms.subservice: b2c
@@ -48,9 +48,10 @@ To create a new administrative account, follow these steps:
48
48
1. On the **User** page, enter information for this user:
49
49
50
50
51
-
-**User name**. *Required*. The user name of the new user. For example, `[email protected]`.
51
+
-**User principal name**. *Required*. The user name of the new user. For example, `[email protected]`.
52
52
The domain part of the user name must use either the initial default domain name, *\<tenant name>.onmicrosoft.com* or your [custom domain](custom-domain.md) such as `contoso.com`.
53
-
-**Name**. *Required*. The first and last name of the new user. For example, *Mary Parker*.
53
+
-**Display Name**. *Required*. The first and last name of the new user. For example, *Mary Parker*.
54
+
-**Password**. *Required*. The default setting is to auto-generate a password, but you have the option to enter your desired password.
54
55
-**Groups**. *Optional*. You can add the user to one or more existing groups. You can also add the user to groups at a later time.
55
56
-**Directory role**: If you require Microsoft Entra administrative permissions for the user, you can add them to a Microsoft Entra role. You can assign the user to be a Global administrator or one or more of the limited administrator roles in Microsoft Entra ID. For more information about assigning roles, see [Use roles to control resource access](roles-resource-access-control.md).
56
57
-**Job info**: You can add more information about the user here, or do it later.
@@ -73,7 +74,6 @@ To invite a user, follow these steps:
73
74
1. Select **New guest account**.
74
75
1. On the **User** page, enter information for this user:
75
76
76
-
-**Name**. *Required*. The first and last name of the new user. For example, *Mary Parker*.
77
77
-**Email address**. *Required*. The email address of the user you would like to invite, which must be a Microsoft account. For example, `[email protected]`.
78
78
-**Personal message**: You add a personal message that will be included in the invite email.
79
79
-**Groups**. *Optional*. You can add the user to one or more existing groups. You can also add the user to groups at a later time.
Copy file name to clipboardExpand all lines: articles/active-directory-b2c/troubleshoot-with-application-insights.md
+8-8Lines changed: 8 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ author: kengaderdus
6
6
manager: CelesteDG
7
7
ms.service: azure-active-directory
8
8
ms.topic: troubleshooting
9
-
ms.date: 01/22/2024
9
+
ms.date: 04/17/2025
10
10
ms.author: kengaderdus
11
11
ms.subservice: b2c
12
12
zone_pivot_groups: b2c-policy-type
@@ -49,7 +49,7 @@ To use an existing instance of Application Insights in your subscription, follow
49
49
1. Make sure you're using the Microsoft Entra directory that has your Azure subscription, and not your Azure AD B2C directory. Select the **Directories + subscriptions** icon in the portal toolbar.
50
50
1. On the **Portal settings | Directories + subscriptions** page, find your Microsoft Entra directory in the **Directory name** list, and then select **Switch**.
51
51
1. Open the Application Insights resource that you created earlier.
52
-
1. On the **Overview** page, and record the **Instrumentation Key**
52
+
1. On the **Overview** page, and record the **Connection String**
53
53
54
54
To create an instance of Application Insights in your subscription, follow these steps:
55
55
@@ -61,7 +61,7 @@ To create an instance of Application Insights in your subscription, follow these
61
61
1. Complete the form, select **Review + create**, and then select **Create**.
62
62
1. Once the deployment completes, select **Go to resource**.
63
63
1. Under **Configure** in Application Insights menu, select **Properties**.
64
-
1. Record the **INSTRUMENTATION KEY** for use in a later step.
64
+
1. Record the **CONNECTION STRING** for use in a later step.
65
65
66
66
## Configure the custom policy
67
67
@@ -74,10 +74,10 @@ To create an instance of Application Insights in your subscription, follow these
74
74
```
75
75
76
76
1. If it doesn't already exist, add a `<UserJourneyBehaviors>` child node to the `<RelyingParty>` node. It must be located after `<DefaultUserJourney ReferenceId="UserJourney Id" from your extensions policy, or equivalent (for example:SignUpOrSigninWithAAD" />`. See [RelyingParty schema reference](./relyingparty.md) for a complete order of the **RelyingParty** child elements.
77
-
1. Add the following node as a child of the `<UserJourneyBehaviors>` element. Make sure to replace `{Your Application Insights Key}` with the Application Insights **Instrumentation Key** that you recorded earlier.
77
+
1. Add the following node as a child of the `<UserJourneyBehaviors>` element. Make sure to replace `{Your Application Insights Key}` with the Application Insights **Connection String** that you recorded earlier.
* `DeveloperMode="true"` tells ApplicationInsights to expedite the telemetry through the processing pipeline. Good for development, but constrained at high volumes. In production, set the `DeveloperMode` to `false`.
@@ -102,7 +102,7 @@ To create an instance of Application Insights in your subscription, follow these
@@ -144,7 +144,7 @@ We recommend you to install the [Azure AD B2C extension](https://marketplace.vis
144
144
After you set up the Application Insights, and configure the custom policy, you need to get your Application Insights **API ID**, and create **API Key**. Both the API ID and API key are used by Azure AD B2C extension to read the Application Insights events (telemetries). Your API keys should be managed like passwords. Keep it secret.
145
145
146
146
> [!NOTE]
147
-
> Application Insights instrumentation key that your create earlier is used by Azure AD B2C to send telemetries to Application Insights. You use the instrumentation key only in your Azure AD B2C policy, not in the VS Code extension.
147
+
> Application Insights connection string that your create earlier is used by Azure AD B2C to send telemetries to Application Insights. You use the connection string only in your Azure AD B2C policy, not in the VS Code extension.
148
148
149
149
To get Application Insights ID and key:
150
150
@@ -195,7 +195,7 @@ To improve your production environment performance and better user experience, i
0 commit comments