Skip to content

Commit 88dca36

Browse files
committed
Merge branch 'master' of https://github.com/MicrosoftDocs/azure-docs-pr into acifix2
2 parents fefd839 + d71d6ed commit 88dca36

File tree

4,762 files changed

+80265
-57162
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

4,762 files changed

+80265
-57162
lines changed

.markdownlint.json

Lines changed: 20 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,6 +9,7 @@
99
"MD007": false,
1010
"MD009": false,
1111
"MD010": false,
12+
"MD011": true,
1213
"MD012": false,
1314
"MD013": false,
1415
"MD014": false,
@@ -32,10 +33,28 @@
3233
"MD035": false,
3334
"MD036": false,
3435
"MD037": false,
36+
"MD038": true,
37+
"MD039": true,
3538
"MD040": false,
3639
"MD041": false,
3740
"MD042": false,
41+
"MD043": true,
42+
"MD044": {
43+
"code_blocks": false,
44+
"names": [
45+
".NET",
46+
"ASP.NET",
47+
"Azure",
48+
"JavaScript",
49+
"NuGet",
50+
"PowerShell",
51+
"macOS",
52+
"C#",
53+
"CLI"
54+
]
55+
},
3856
"MD045": false,
3957
"MD046": false,
40-
"MD047": false
58+
"MD047": false,
59+
"MD048": true
4160
}

.openpublishing.redirection.json

Lines changed: 1626 additions & 115 deletions
Large diffs are not rendered by default.

articles/active-directory-b2c/TOC.yml

Lines changed: 8 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -163,6 +163,9 @@
163163
href: active-directory-b2c-reference-kmsi-custom.md
164164
- name: Password change
165165
href: active-directory-b2c-reference-password-change-custom.md
166+
- name: Phone sign-up & sign-in
167+
href: phone-authentication.md
168+
displayName: otp, passwordless, phone number
166169
- name: UX customization
167170
items:
168171
- name: Configure user input
@@ -262,6 +265,8 @@
262265
href: integer-transformations.md
263266
- name: JSON
264267
href: json-transformations.md
268+
- name: Phone number
269+
href: phone-number-claims-transformations.md
265270
- name: External accounts
266271
href: social-transformations.md
267272
- name: StringCollection
@@ -285,6 +290,9 @@
285290
items:
286291
- name: About technical profiles
287292
href: technical-profiles-overview.md
293+
- name: Azure Multi-Factor Authentication
294+
href: multi-factor-auth-technical-profile.md
295+
displayName: mfa
288296
- name: Claim resolvers
289297
href: claim-resolver-overview.md
290298
- name: Azure Active Directory

articles/active-directory-b2c/active-directory-b2c-custom-guide-eventlogger-appins.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Track user behavior with Application Insights
33
titleSuffix: Azure AD B2C
4-
description: Learn how to enable event logs in Application Insights from Azure AD B2C user journeys by using custom policies (preview).
4+
description: Learn how to enable event logs in Application Insights from Azure AD B2C user journeys by using custom policies.
55
services: active-directory-b2c
66
author: mmacy
77
manager: celestedg
@@ -29,7 +29,7 @@ When you use Azure Active Directory B2C (Azure AD B2C) together with Azure Appli
2929

3030
The Identity Experience Framework in Azure AD B2C includes the provider `Handler="Web.TPEngine.Providers.AzureApplicationInsightsProvider, Web.TPEngine, Version=1.0.0.0`. It sends event data directly to Application Insights by using the instrumentation key provided to Azure AD B2C.
3131

32-
A technical profile uses this provider to define an event from Azure AD B2C. The profile specifies the name of the event, the claims that are recorded, and the instrumentation key. To post an event, the technical profile is then added as an `orchestration step`, or as a `validation technical profile` in a custom user journey.
32+
A technical profile uses this provider to define an event from Azure AD B2C. The profile specifies the name of the event, the claims that are recorded, and the instrumentation key. To post an event, the technical profile is then added as an `orchestration step` in a custom user journey.
3333

3434
Application Insights can unify the events by using a correlation ID to record a user session. Application Insights makes the event and session available within seconds and presents many visualization, export, and analytical tools.
3535

articles/active-directory-b2c/active-directory-b2c-devquickstarts-graph-dotnet.md

Lines changed: 3 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -26,9 +26,6 @@ For B2C tenants, there are two primary modes of communicating with the Graph API
2626

2727
In this article, you learn how to perform the automated use case. You'll build a .NET 4.5 `B2CGraphClient` that performs user create, read, update, and delete (CRUD) operations. The client will have a Windows command-line interface (CLI) that allows you to invoke various methods. However, the code is written to behave in a non-interactive, automated fashion.
2828

29-
>[!IMPORTANT]
30-
> You **must** use the [Azure AD Graph API](../active-directory/develop/active-directory-graph-api-quickstart.md) to manage users in an Azure AD B2C directory. The Azure AD Graph API is different from the Microsoft Graph API. Learn more in this MSDN blog post: [Microsoft Graph or Azure AD Graph](https://blogs.msdn.microsoft.com/aadgraphteam/2016/07/08/microsoft-graph-or-azure-ad-graph/).
31-
3229
## Prerequisites
3330

3431
Before you can create applications or users, you need an Azure AD B2C tenant. If you don't already have one, [Create an Azure Active Directory B2C tenant](tutorial-create-tenant.md).
@@ -59,8 +56,9 @@ The *Read and write directory data* permission that you granted earlier does **N
5956

6057
If you want to give your application the ability to delete users or update passwords, you need to grant it the *User administrator* role.
6158

62-
1. Sign in to the [Azure portal](https://portal.azure.com) and switch to the directory that contains your Azure AD B2C tenant.
63-
1. Select **Azure AD B2C** in the left menu. Or, select **All services** and then search for and select **Azure AD B2C**.
59+
1. Sign in to the [Azure portal](https://portal.azure.com).
60+
1. Select the **Directory + Subscription** icon in the portal toolbar, and then select the directory that contains your Azure AD B2C tenant.
61+
1. In the Azure portal, search for and select **Azure AD B2C**.
6462
1. Under **Manage**, select **Roles and administrators**.
6563
1. Select the **User administrator** role.
6664
1. Select **Add assignment**.

articles/active-directory-b2c/active-directory-b2c-get-started-custom.md

Lines changed: 7 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -27,10 +27,10 @@ ms.subservice: B2C
2727

2828
## Add signing and encryption keys
2929

30-
1. Sign in to the [Azure portal](https://portal.azure.com)
31-
1. Use the **Directory + subscription** filter in the top menu to select the directory that contains your Azure AD B2C tenant.
32-
1. In the left menu, select **Azure AD B2C**. Or, select **All services** and search for and select **Azure AD B2C**.
33-
1. On the Overview page, select **Identity Experience Framework** from the **Policies** pane.
30+
1. Sign in to the [Azure portal](https://portal.azure.com).
31+
1. Select the **Directory + Subscription** icon in the portal toolbar, and then select the directory that contains your Azure AD B2C tenant.
32+
1. In the Azure portal, search for and select **Azure AD B2C**.
33+
1. On the overview page, under **Policies**, select **Identity Experience Framework**.
3434

3535
### Create the signing key
3636

@@ -73,10 +73,9 @@ To register an application in your Azure AD B2C tenant, you can use the current
7373

7474
#### [Applications](#tab/applications/)
7575

76-
1. Select **All services** in the top-left corner of the Azure portal.
77-
1. In the search box, enter `Azure Active Directory`.
78-
1. Select **Azure Active Directory** in the search results.
79-
1. Under **Manage** in the left-hand menu, select **App registrations (Legacy)**.
76+
1. Sign in to the [Azure portal](https://portal.azure.com).
77+
1. In the Azure portal, search for and select **Azure Active Directory**.
78+
1. In the **Azure Active Directory** overview menu, under **Manage**, select **App registrations (Legacy)**.
8079
1. Select **New application registration**.
8180
1. For **Name**, enter `IdentityExperienceFramework`.
8281
1. For **Application type**, choose **Web app/API**.

articles/active-directory-b2c/active-directory-b2c-quickstarts-desktop-app.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -73,9 +73,9 @@ Azure AD B2C provides functionality to allow users to update their profiles. The
7373
7474
Click **Call API** to make a request to the protected resource.
7575
76-
![Call API](media/active-directory-b2c-quickstarts-desktop-app/call-api-wpf.png)
76+
![Call API](media/active-directory-b2c-quickstarts-desktop-app/call-api-wpf.png)
7777
78-
The application includes the Azure AD access token in the request to the protected web API resource. The web API sends back the display name contained in the access token.
78+
The application includes the Azure AD access token in the request to the protected web API resource. The web API sends back the display name contained in the access token.
7979
8080
You've successfully used your Azure AD B2C user account to make an authorized call an Azure AD B2C protected web API.
8181

articles/active-directory-b2c/active-directory-b2c-reference-oidc.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -271,6 +271,7 @@ GET https://{tenant}.b2clogin.com/{tenant}.onmicrosoft.com/{policy}/oauth2/v2.0/
271271
| {tenant} | Yes | Name of your Azure AD B2C tenant |
272272
| {policy} | Yes | The user flow that you want to use to sign the user out of your application. |
273273
| id_token_hint| No | A previously issued ID token to pass to the logout endpoint as a hint about the end user's current authenticated session with the client. The `id_token_hint` ensures that the `post_logout_redirect_uri` is a registered reply URL in your Azure AD B2C application settings. |
274+
| client_id | No* | The application ID that the [Azure portal](https://portal.azure.com/) assigned to your application.<br><br>\**This is required when using `Application` isolation SSO configuration and _Require ID Token_ in logout request is set to `No`.* |
274275
| post_logout_redirect_uri | No | The URL that the user should be redirected to after successful sign out. If it isn't included, Azure AD B2C shows the user a generic message. Unless you provide an `id_token_hint`, you should not register this URL as a reply URL in your Azure AD B2C application settings. |
275276
| state | No | If a `state` parameter is included in the request, the same value should appear in the response. The application should verify that the `state` values in the request and response are identical. |
276277

articles/active-directory-b2c/active-directory-b2c-reference-password-complexity.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -34,9 +34,9 @@ If you are using custom policies, you can ([configure password complexity in a c
3434
## Configure password complexity
3535

3636
1. Sign in to the [Azure portal](https://portal.azure.com).
37-
2. Make sure you're using the directory that contains your Azure AD B2C tenant by selecting the **Directory + subscription** filter in the top menu and choosing the directory that contains your tenant.
38-
3. Choose **All services** in the top-left corner of the Azure portal, and then search for and select **Azure AD B2C**.
39-
4. Select **User flows**.
37+
2. Select the **Directory + Subscription** icon in the portal toolbar, and then select the directory that contains your Azure AD B2C tenant.
38+
3. In the Azure portal, search for and select **Azure AD B2C**.
39+
4. Select **User flows (policies)**.
4040
2. Select a user flow, and click **Properties**.
4141
3. Under **Password complexity**, change the password complexity for this user flow to **Simple**, **Strong**, or **Custom**.
4242

articles/active-directory-b2c/active-directory-b2c-setup-qq-app.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -43,9 +43,9 @@ To use a QQ account as an identity provider in Azure Active Directory B2C (Azure
4343

4444
## Configure QQ as an identity provider
4545

46-
1. Sign in to the [Azure portal](https://portal.azure.com/) as the global administrator of your Azure AD B2C tenant.
47-
1. Make sure you're using the directory that contains your Azure AD B2C tenant by selecting the **Directory + subscription** filter in the top menu and choosing the directory that contains your tenant.
48-
1. Choose **All services** in the top-left corner of the Azure portal, search for and select **Azure AD B2C**.
46+
1. Sign in to the [Azure portal](https://portal.azure.com/).
47+
1. Select the **Directory + Subscription** icon in the portal toolbar, and then select the directory that contains your Azure AD B2C tenant.
48+
1. In the Azure portal, search for and select **Azure AD B2C**.
4949
1. Select **Identity providers**, then select **QQ (Preview)**.
5050
1. Enter a **Name**. For example, *QQ*.
5151
1. For the **Client ID**, enter the APP ID of the QQ application that you created earlier.

0 commit comments

Comments
 (0)