Skip to content

Commit 8d35250

Browse files
committed
Merge branch 'master' of https://github.com/MicrosoftDocs/azure-docs-pr into feature-flags
2 parents 1c81e65 + 192d060 commit 8d35250

File tree

830 files changed

+16033
-56755
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

830 files changed

+16033
-56755
lines changed

.openpublishing.redirection.json

Lines changed: 2171 additions & 45931 deletions
Large diffs are not rendered by default.

articles/active-directory-b2c/active-directory-b2c-setup-goog-app.md

Lines changed: 5 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -18,11 +18,14 @@ ms.subservice: B2C
1818

1919
## Create a Google application
2020

21-
To use a Google account as an [identity provider](active-directory-b2c-reference-oauth-code.md) in Azure Active Directory B2C (Azure AD B2C), you need to create an application in your tenant that represents it. If you don't already have a Google account you can sign up at [https://accounts.google.com/SignUp](https://accounts.google.com/SignUp).
21+
To use a Google account as an [identity provider](active-directory-b2c-reference-oauth-code.md) in Azure Active Directory B2C (Azure AD B2C), you need to create an application in your Google Developers Console. If you don't already have a Google account you can sign up at [https://accounts.google.com/SignUp](https://accounts.google.com/SignUp).
2222

2323
1. Sign in to the [Google Developers Console](https://console.developers.google.com/) with your Google account credentials.
2424
1. In the upper-left corner of the page, select the project list, and then select **New Project**.
25-
1. Enter a **Project Name**, click **Create**, and then make sure you are using the new project.
25+
1. Enter a **Project Name**, select **Create**.
26+
1. Make sure you are using the new project by selecting the project drop-down in the top-left of the screen, select your project by name, then select **Open**.
27+
1. Select **OAuth consent screen** in the left menu, select **External**, and then select **Create**.
28+
Enter a **Name** for your application. Enter *b2clogin.com* in the **Authorized domains** section and select **Save**.
2629
1. Select **Credentials** in the left menu, and then select **Create credentials** > **Oauth client ID**.
2730
1. Under **Application type**, select **Web application**.
2831
1. Enter a **Name** for your application, enter `https://your-tenant-name.b2clogin.com` in **Authorized JavaScript origins**, and `https://your-tenant-name.b2clogin.com/your-tenant-name.onmicrosoft.com/oauth2/authresp` in **Authorized redirect URIs**. Replace `your-tenant-name` with the name of your tenant. You need to use all lowercase letters when entering your tenant name even if the tenant is defined with uppercase letters in Azure AD B2C.

articles/active-directory-b2c/active-directory-b2c-ui-customization-custom.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -141,19 +141,19 @@ To configure UI customization, you copy the **ContentDefinition** and its child
141141

142142
1. Save the extensions file.
143143

144-
## Upload your updated custom policy
144+
## Upload and test your updated custom policy
145+
146+
### Upload the custom policy
145147

146148
1. Make sure you're using the directory that contains your Azure AD B2C tenant by selecting the **Directory + subscription** filter in the top menu and choosing the directory that contains your tenant.
147-
1. Choose **All services** in the top-left corner of the Azure portal, and then search for and select **Azure AD B2C**.
148-
1. Select **Identity Experience Framework**.
149-
1. Click **All Policies**.
150-
1. Click **Upload Policy**.
149+
1. Search for and select **Azure AD B2C**.
150+
1. Under **Policies**, select **Identity Experience Framework**.
151+
1. Select **Upload custom policy**.
151152
1. Upload the extensions file that you previously changed.
152153

153-
## Test the custom policy by using **Run now**
154+
### Test the custom policy by using **Run now**
154155

155-
1. On the **Azure AD B2C** page, go to **All policies**.
156-
1. Select the custom policy that you uploaded, and click the **Run now** button.
156+
1. Select the policy that you uploaded, and then select **Run now**.
157157
1. You should be able to sign up by using an email address.
158158

159159
## Reference

articles/active-directory-b2c/connect-with-saml-service-providers.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,6 +12,7 @@ ms.topic: reference
1212
ms.date: 12/10/2019
1313
ms.author: marsma
1414
ms.subservice: B2C
15+
ms.custom: fasttrack-edit
1516
---
1617

1718
# Register a SAML application in Azure AD B2C
@@ -173,7 +174,7 @@ Now that your tenant can issue SAML assertions, you need to create the SAML rely
173174
PublicPolicyUri="http://tenant-name.onmicrosoft.com/B2C_1A_signup_signin_saml">
174175
```
175176

176-
1. Add following XML snippet just before the `<RelyingParty>` element. This XML overwrites orchestration step number 7 of the _SignUpOrSignIn_ user journey. If you customized your user journey by adding or removing orchestration steps, make sure the number (in the `order` element) is aligned with the one specified in the user journey for the token issuer step.
177+
1. Add following XML snippet just before the `<RelyingParty>` element. This XML overwrites orchestration step number 7 of the _SignUpOrSignIn_ user journey. If you started from a different folder in the starter pack, or customized your user journey by adding or removing orchestration steps, make sure the number (in the `order` element) is aligned with the one specified in the user journey for the token issuer step (for example, in the other starter pack folders it's step number 4 for `LocalAccounts`, 6 for `SocialAccounts` and 9 for `SocialAndLocalAccountsWithMfa`).
177178

178179
```XML
179180
<UserJourneys>

articles/active-directory-b2c/contentdefinitions.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -33,7 +33,7 @@ The following example shows the content definition identifier and the definition
3333
<Metadata>
3434
<Item Key="DisplayName">Local account sign up page</Item>
3535
</Metadata>
36-
<LoalizedResourcesReferences MergeBehavior="Prepend">
36+
<LocalizedResourcesReferences MergeBehavior="Prepend">
3737
<LocalizedResourcesReference Language="en" LocalizedResourcesReferenceId="api.localaccountsignup.en" />
3838
<LocalizedResourcesReference Language="es" LocalizedResourcesReferenceId="api.localaccountsignup.es" />
3939
...

articles/active-directory-b2c/restful-technical-profile.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -122,10 +122,10 @@ The technical profile also returns claims, that aren't returned by the identity
122122
| --------- | -------- | ----------- |
123123
| ServiceUrl | Yes | The URL of the REST API endpoint. |
124124
| AuthenticationType | Yes | The type of authentication being performed by the RESTful claims provider. Possible values: `None`, `Basic`, `Bearer`, or `ClientCertificate`. The `None` value indicates that the REST API is not anonymous. The `Basic` value indicates that the REST API is secured with HTTP basic authentication. Only verified users, including Azure AD B2C, can access your API. The `ClientCertificate` (recommended) value indicates that the REST API restricts access by using client certificate authentication. Only services that have the appropriate certificates, for example Azure AD B2C, can access your API. The `Bearer` value indicates that the REST API restricts access using client OAuth2 Bearer token. |
125-
| SendClaimsIn | No | Specifies how the input claims are sent to the RESTful claims provider. Possible values: `Body` (default), `Form`, `Header`, or `QueryString`. The `Body` value is the input claim that is sent in the request body in JSON format. The `Form` value is the input claim that is sent in the request body in an ampersand '&' separated key value format. The `Header` value is the input claim that is sent in the request header. The `QueryString` value is the input claim that is sent in the request query string. |
125+
| SendClaimsIn | No | Specifies how the input claims are sent to the RESTful claims provider. Possible values: `Body` (default), `Form`, `Header`, or `QueryString`. The `Body` value is the input claim that is sent in the request body in JSON format. The `Form` value is the input claim that is sent in the request body in an ampersand '&' separated key value format. The `Header` value is the input claim that is sent in the request header. The `QueryString` value is the input claim that is sent in the request query string. The HTTP verbs invoked by each are as follows:<br /><ul><li>`Body`: POST</li><li>`Form`: POST</li><li>`Header`: GET</li><li>`QueryString`: GET</li></ul> |
126126
| ClaimsFormat | No | Specifies the format for the output claims. Possible values: `Body` (default), `Form`, `Header`, or `QueryString`. The `Body` value is the output claim that is sent in the request body in JSON format. The `Form` value is the output claim that is sent in the request body in an ampersand '&' separated key value format. The `Header` value is the output claim that is sent in the request header. The `QueryString` value is the output claim that is sent in the request query string. |
127127
| ClaimUsedForRequestPayload| No | Name of a string claim that contains the payload to be sent to the REST API. |
128-
| DebugMode | No | Runs the technical profile in debug mode. In debug mode, the REST API can return more information. See the returning error message section. |
128+
| DebugMode | No | Runs the technical profile in debug mode. Possible values: `true`, or `false` (default). In debug mode, the REST API can return more information. See the [Returning error message](#returning-error-message) section. |
129129

130130
## Cryptographic keys
131131

@@ -212,7 +212,7 @@ If the type of authentication is set to `Bearer`, the **CryptographicKeys** elem
212212

213213
## Returning error message
214214

215-
Your REST API may need to return an error message, such as 'The user was not found in the CRM system'. In an error occurs, the REST API should return an HTTP 409 error message (Conflict response status code) with following attributes:
215+
Your REST API may need to return an error message, such as 'The user was not found in the CRM system'. If an error occurs, the REST API should return an HTTP 409 error message (Conflict response status code) with following attributes:
216216

217217
| Attribute | Required | Description |
218218
| --------- | -------- | ----------- |

articles/active-directory/authentication/concept-mfa-authprovider.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -45,11 +45,11 @@ If your MFA provider is not linked to an Azure AD tenant, or you link the new MF
4545
> [!CAUTION]
4646
> There is no confirmation when deleting an authentication provider. Selecting **Delete** is a permanent process.
4747
48-
Authentication providers can be found in the **Azure portal** > **Azure Active Directory** > **MFA** > **Providers**. Click on listed providers to see details and configurations associated with that provider.
48+
Authentication providers can be found in the **Azure portal** > **Azure Active Directory** > **Security** > **MFA** > **Providers**. Click on listed providers to see details and configurations associated with that provider.
4949

5050
Before removing an authentication provider, take note of any customized settings configured in your provider. Decide what settings need to be migrated to general MFA settings from your provider and complete the migration of those settings.
5151

52-
Azure MFA Servers linked to providers will need to be reactivated using credentials generated under **Azure portal** > **Azure Active Directory** > **MFA** > **Server settings**. Before reactivating, the following files must be deleted from the `\Program Files\Multi-Factor Authentication Server\Data\` directory on Azure MFA Servers in your environment:
52+
Azure MFA Servers linked to providers will need to be reactivated using credentials generated under **Azure portal** > **Azure Active Directory** > **Security** > **MFA** > **Server settings**. Before reactivating, the following files must be deleted from the `\Program Files\Multi-Factor Authentication Server\Data\` directory on Azure MFA Servers in your environment:
5353

5454
- caCert
5555
- cert
@@ -61,7 +61,7 @@ Azure MFA Servers linked to providers will need to be reactivated using credenti
6161

6262
![Delete an auth provider from the Azure portal](./media/concept-mfa-authprovider/authentication-provider-removal.png)
6363

64-
When you have confirmed that all settings have been migrated, you can browse to the **Azure portal** > **Azure Active Directory** > **MFA** > **Providers** and select the ellipses **...** and select **Delete**.
64+
When you have confirmed that all settings have been migrated, you can browse to the **Azure portal** > **Azure Active Directory** > **Security** > **MFA** > **Providers** and select the ellipses **...** and select **Delete**.
6565

6666
> [!WARNING]
6767
> Deleting an authentication provider will delete any reporting information associated with that provider. You may want to save activity reports before deleting your provider.

articles/active-directory/authentication/howto-mfa-adfs.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -83,7 +83,7 @@ The first thing we need to do is to configure the AD FS claims. Create two claim
8383
Now that the claims are in place, we can configure trusted IPs.
8484

8585
1. Sign in to the [Azure portal](https://portal.azure.com).
86-
2. Select **Azure Active Directory** > **Conditional Access** > **Named locations**.
86+
2. Select **Azure Active Directory** > **Security** > **Conditional Access** > **Named locations**.
8787
3. From the **Conditional Access - Named locations** blade, select **Configure MFA trusted IPs**
8888

8989
![Azure AD Conditional Access named locations Configure MFA trusted IPs](./media/howto-mfa-adfs/trustedip6.png)

articles/active-directory/authentication/howto-mfa-getstarted.md

Lines changed: 10 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -82,18 +82,18 @@ We recommend that organizations use Conditional Access to define their network u
8282
### Configuring a named location
8383

8484
1. Open **Azure Active Directory** in the Azure portal
85-
2. Click **Conditional Access**
86-
3. Click **Named Locations**
87-
4. Click **New Location**
85+
2. Select **Security**
86+
3. Under **Manage**, choose **Named Locations**
87+
4. Select **New Location**
8888
5. In the **Name** field, provide a meaningful name
89-
6. Select whether you are defining the location using IP ranges or Countries/Regions
90-
1. If using IP Ranges
91-
1. Decide whether to mark the location as Trusted. Signing in from a trusted location lowers a user's sign-in risk. Only mark this location as trusted if you know the IP ranges entered are established and credible in your organization.
89+
6. Select whether you are defining the location using *IP ranges* or *Countries/Regions*
90+
1. If using *IP Ranges*
91+
1. Decide whether to *Mark as trusted location*. Signing in from a trusted location lowers a user's sign-in risk. Only mark this location as trusted if you know the IP ranges entered are established and credible in your organization.
9292
2. Specify the IP Ranges
93-
2. If using Countries/Regions
93+
2. If using *Countries/Regions*
9494
1. Expand the drop-down menu and select the countries or regions you wish to define for this named location.
95-
2. Decide whether to Include unknown areas. Unknown areas are IP addresses that can't be mapped to a country/region.
96-
7. Click **Create**
95+
2. Decide whether to *Include unknown areas*. Unknown areas are IP addresses that can't be mapped to a country/region.
96+
7. Select **Create**
9797

9898
## Plan authentication methods
9999

@@ -218,7 +218,7 @@ It is important that you prevent being inadvertently locked out of your Azure AD
218218
### Create Conditional Access policy
219219

220220
1. Sign in to the [Azure portal](https://portal.azure.com) using a global administrator account.
221-
1. Browse to **Azure Active Directory**, **Conditional Access**.
221+
1. Browse to **Azure Active Directory** > **Security** > **Conditional Access**.
222222
1. Select **New policy**.
223223
![Create a Conditional Access policy to enable MFA for Azure portal users in pilot group](media/howto-mfa-getstarted/conditionalaccess-newpolicy.png)
224224
1. Provide a meaningful name for your policy.

articles/active-directory/authentication/howto-mfaserver-deploy.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -93,8 +93,8 @@ If you aren't using the Event Confirmation feature, and your users aren't using
9393
Follow these steps to download the Azure Multi-Factor Authentication Server from the Azure portal:
9494

9595
1. Sign in to the [Azure portal](https://portal.azure.com) as an administrator.
96-
2. Search for and select *Azure Active Directory*. Select **MFA Server**.
97-
3. Select **Server settings**.
96+
2. Search for and select *Azure Active Directory*. Select **Security** > **MFA**.
97+
3. Under **Manager MFA Server**, select **Server settings**.
9898
4. Select **Download** and follow the instructions on the download page to save the installer.
9999

100100
![Download MFA Server from the Azure portal](./media/howto-mfaserver-deploy/downloadportal.png)

0 commit comments

Comments
 (0)