Skip to content

Commit 96f1f93

Browse files
Learn Build Service GitHub AppLearn Build Service GitHub App
authored andcommitted
Merging changes synced from https://github.com/MicrosoftDocs/azure-docs-pr (branch live)
2 parents 98ad3d1 + 002ddfe commit 96f1f93

File tree

222 files changed

+3045
-1156
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

222 files changed

+3045
-1156
lines changed

articles/active-directory-b2c/add-api-connector-token-enrichment.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -258,8 +258,7 @@ Repeat this step for the **ProfileEdit.xml**, and **PasswordReset.xml** user jou
258258
Save the files you changed: *TrustFrameworkBase.xml*, and *TrustFrameworkExtensions.xml*, *SignUpOrSignin.xml*, *ProfileEdit.xml*, and *PasswordReset.xml*.
259259
## Test the custom policy
260260
1. Sign in to the [Azure portal](https://portal.azure.com).
261-
1. Make sure you're using the directory that contains your Microsoft Entra tenant by selecting the **Directories + subscriptions** icon in the portal toolbar.
262-
1. On the **Portal settings | Directories + subscriptions** page, find your Microsoft Entra directory in the **Directory name** list, and then select **Switch**.
261+
1. If you have access to multiple tenants, select the **Settings** icon in the top menu to switch to your Azure AD B2C tenant from the **Directories + subscriptions** menu.
263262
1. Choose **All services** in the top-left corner of the Azure portal, and then search for and select **App registrations**.
264263
1. Select **Identity Experience Framework**.
265264
1. Select **Upload Custom Policy**, and then upload the policy files that you changed: *TrustFrameworkBase.xml*, and *TrustFrameworkExtensions.xml*, *SignUpOrSignin.xml*, *ProfileEdit.xml*, and *PasswordReset.xml*.

articles/active-directory-b2c/add-api-connector.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -574,8 +574,7 @@ To return the promo code claim back to the relying party application, add an out
574574
## Test the custom policy
575575

576576
1. Sign in to the [Azure portal](https://portal.azure.com).
577-
1. Make sure you're using the directory that contains your Microsoft Entra tenant by selecting the **Directories + subscriptions** icon in the portal toolbar.
578-
1. On the **Portal settings | Directories + subscriptions** page, find your Microsoft Entra directory in the **Directory name** list, and then select **Switch**.
577+
1. If you have access to multiple tenants, select the **Settings** icon in the top menu to switch to your Microsoft Entra ID tenant from the **Directories + subscriptions** menu.
579578
1. Choose **All services** in the top-left corner of the Azure portal, and then search for and select **App registrations**.
580579
1. Select **Identity Experience Framework**.
581580
1. Select **Upload Custom Policy**, and then upload the policy files that you changed: *TrustFrameworkExtensions.xml*, and *SignUpOrSignin.xml*.

articles/active-directory-b2c/add-password-change-policy.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -147,8 +147,7 @@ The password change flow involves the following steps:
147147
## Upload and test the policy
148148

149149
1. Sign in to the [Azure portal](https://portal.azure.com/).
150-
1. Make sure you're using the directory that contains your Azure AD B2C tenant by selecting the **Directories + subscriptions** icon in the portal toolbar.
151-
1. On the **Portal settings | Directories + subscriptions** page, find your Azure AD B2C directory in the **Directory name** list, and then select **Switch**.
150+
1. If you have access to multiple tenants, select the **Settings** icon in the top menu to switch to your Azure AD B2C tenant from the **Directories + subscriptions** menu.
152151
1. Choose **All services** in the top-left corner of the Azure portal, and then search for and select **Azure AD B2C**.
153152
1. Select **Identity Experience Framework**.
154153
1. In **Custom Policies**, select **Upload Policy**.

articles/active-directory-b2c/add-password-reset-policy.md

Lines changed: 2 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -65,8 +65,7 @@ The self-service password reset experience can be configured for the Sign in (Re
6565
To set up self-service password reset for the sign-up or sign-in user flow:
6666

6767
1. Sign in to the [Azure portal](https://portal.azure.com).
68-
1. In the portal toolbar, select the **Directories + Subscriptions** icon.
69-
1. In the **Portal settings | Directories + subscriptions** pane, find your Azure AD B2C directory in the **Directory name** list, and then select **Switch**.
68+
1. If you have access to multiple tenants, select the **Settings** icon in the top menu to switch to your Azure AD B2C tenant from the **Directories + subscriptions** menu.
7069
1. In the Azure portal, search for and select **Azure AD B2C**.
7170
1. Select **User flows**.
7271
1. Select a sign-up or sign-in user flow (of type **Recommended**) that you want to customize.
@@ -283,8 +282,7 @@ Your application might need to detect whether the user signed in by using the Fo
283282
### Upload the custom policy
284283

285284
1. Sign in to the [Azure portal](https://portal.azure.com).
286-
1. In the portal toolbar, select the **Directories + Subscriptions** icon.
287-
1. In the **Portal settings | Directories + subscriptions** pane, find your Azure AD B2C directory in the **Directory name** list, and then select **Switch**.
285+
1. If you have access to multiple tenants, select the **Settings** icon in the top menu to switch to the Azure AD B2C tenant from the **Directories + subscriptions** menu.
288286
1. In the Azure portal, search for and select **Azure AD B2C**.
289287
1. In the menu under **Policies**, select **Identity Experience Framework**.
290288
1. Select **Upload custom policy**. In the following order, upload the policy files that you changed:

articles/active-directory-b2c/add-ropc-policy.md

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -54,9 +54,7 @@ When using the ROPC flow, consider the following:
5454
## Create a resource owner user flow
5555

5656
1. Sign in to the [Azure portal](https://portal.azure.com) as the **global administrator** of your Azure AD B2C tenant.
57-
2. Make sure you're using the directory that contains your Azure AD B2C tenant:
58-
1. Select the **Directories + subscriptions** icon in the portal toolbar.
59-
1. On the **Portal settings | Directories + subscriptions** page, find your Azure AD B2C directory in the **Directory name** list, and then select **Switch**.
57+
1. If you have access to multiple tenants, select the **Settings** icon in the top menu to switch to your Azure AD B2C tenant from the **Directories + subscriptions** menu.
6058
1. In the Azure portal, search for and select **Azure AD B2C**.
6159
1. Select **User flows**, and select **New user flow**.
6260
1. Select **Sign in using resource owner password credentials (ROPC)**.

articles/active-directory-b2c/add-sign-in-policy.md

Lines changed: 2 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -43,8 +43,7 @@ The sign-in policy lets users:
4343
To add sign-in policy:
4444

4545
1. Sign in to the [Azure portal](https://portal.azure.com).
46-
1. Select the **Directories + Subscriptions** icon in the portal toolbar.
47-
1. On the **Portal settings | Directories + subscriptions** page, find your Azure AD B2C directory in the **Directory name** list, and then select **Switch**.
46+
1. If you have access to multiple tenants, select the **Settings** icon in the top menu to switch to your Azure AD B2C tenant from the **Directories + subscriptions** menu.
4847
1. In the Azure portal, search for and select **Azure AD B2C**.
4948
1. Under **Policies**, select **User flows**, and then select **New user flow**.
5049
1. On the **Create a user flow** page, select the **Sign in** user flow.
@@ -114,8 +113,7 @@ The **SelfAsserted-LocalAccountSignin-Email** technical profile is a [self-asser
114113
## Update and test your policy
115114

116115
1. Sign in to the [Azure portal](https://portal.azure.com).
117-
1. Make sure you're using the directory that contains your Azure AD B2C tenant by selecting the **Directories + subscriptions** icon in the portal toolbar.
118-
1. On the **Portal settings | Directories + subscriptions** page, find your Azure AD B2C directory in the **Directory name** list, and then select **Switch**.
116+
1. If you have access to multiple tenants, select the **Settings** icon in the top menu to switch to your Azure AD B2C tenant from the **Directories + subscriptions** menu.
119117
1. Choose **All services** in the top-left corner of the Azure portal, and then search for and select **App registrations**.
120118
1. Select **Identity Experience Framework**.
121119
1. Select **Upload Custom Policy**, and then upload the policy file that you changed, *TrustFrameworkExtensions.xml*.

articles/active-directory-b2c/add-sign-up-and-sign-in-policy.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -47,8 +47,7 @@ Watch this video to learn how the user sign-up and sign-in policy works.
4747
The sign-up and sign-in user flow handles both sign-up and sign-in experiences with a single configuration. Users of your application are led down the right path depending on the context.
4848

4949
1. Sign in to the [Azure portal](https://portal.azure.com).
50-
1. Select the **Directories + Subscriptions** icon in the portal toolbar.
51-
1. On the **Portal settings | Directories + subscriptions** page, find your Azure AD B2C directory in the **Directory name** list, and then select **Switch**.
50+
1. If you have access to multiple tenants, select the **Settings** icon in the top menu to switch to your Azure AD B2C tenant from the **Directories + subscriptions** menu.
5251
1. In the Azure portal, search for and select **Azure AD B2C**.
5352
1. Under **Policies**, select **User flows**, and then select **New user flow**.
5453

articles/active-directory-b2c/add-web-api-application.md

Lines changed: 2 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -22,8 +22,7 @@ To register an application in your Azure AD B2C tenant, you can use the Azure po
2222
#### [App registrations](#tab/app-reg-ga/)
2323

2424
1. Sign in to the [Azure portal](https://portal.azure.com).
25-
1. Select the **Directories + subscriptions** icon in the portal toolbar.
26-
1. On the **Portal settings | Directories + subscriptions** page, find your Azure AD B2C directory in the **Directory name** list, and then select **Switch**.
25+
1. If you have access to multiple tenants, select the **Settings** icon in the top menu to switch to your Azure AD B2C tenant from the **Directories + subscriptions** menu.
2726
1. In the left menu, select **Azure AD B2C**. Or, select **All services** and search for and select **Azure AD B2C**.
2827
1. Select **App registrations**, and then select **New registration**.
2928
1. Enter a **Name** for the application. For example, *webapi1*.
@@ -35,8 +34,7 @@ To register an application in your Azure AD B2C tenant, you can use the Azure po
3534
#### [Applications (Legacy)](#tab/applications-legacy/)
3635

3736
1. Sign in to the [Azure portal](https://portal.azure.com).
38-
1. Make sure you're using the directory that contains your Azure AD B2C tenant. Select the **Directories + subscriptions** icon in the portal toolbar.
39-
1. On the **Portal settings | Directories + subscriptions** page, find your Azure AD B2C directory in the **Directory name** list, and then select **Switch**.
37+
1. If you have access to multiple tenants, select the **Settings** icon in the top menu to switch to your Azure AD B2C tenant from the **Directories + subscriptions** menu.
4038
1. Choose **All services** in the top-left corner of the Azure portal, and then search for and select **Azure AD B2C**.
4139
1. Select **Applications (Legacy)**, and then select **Add**.
4240
1. Enter a name for the application. For example, *webapi1*.

articles/active-directory-b2c/age-gating.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -40,8 +40,7 @@ Azure AD B2C uses the information that the user enters to identify whether they'
4040
To use age gating in a user flow, you need to configure your tenant to have extra properties.
4141

4242
1. Use [this link](https://portal.azure.com/?Microsoft_AAD_B2CAdmin_agegatingenabled=true#blade/Microsoft_AAD_B2CAdmin/TenantManagementMenuBlade/overview) to try the age gating preview.
43-
1. Make sure you're using the directory that contains your Azure AD B2C tenant by selecting the **Directories + subscriptions** icon in the portal toolbar.
44-
1. On the **Portal settings | Directories + subscriptions** page, find your Azure AD B2C directory in the **Directory name** list, and then select **Switch**.
43+
1. If you have access to multiple tenants, select the **Settings** icon in the top menu to switch to your Azure AD B2C tenant from the **Directories + subscriptions** menu.
4544
1. Select **All services** in the top-left corner of the Azure portal, search for and select **Azure AD B2C**.
4645
1. Select **Properties** for your tenant in the menu on the left.
4746
1. Under the **Age gating**, select **Configure**.

articles/active-directory-b2c/analytics-with-application-insights.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -54,8 +54,7 @@ When you use Application Insights, consider the following:
5454
When you use Application Insights with Azure AD B2C, all you need to do is create a resource and get the instrumentation key. For information, see [Create an Application Insights resource](/previous-versions/azure/azure-monitor/app/create-new-resource).
5555

5656
1. Sign in to the [Azure portal](https://portal.azure.com/).
57-
1. Make sure you're using the directory that has your Microsoft Entra subscription, and not your Azure AD B2C directory. Select the **Directories + subscriptions** icon in the portal toolbar.
58-
1. On the **Portal settings | Directories + subscriptions** page, find the Microsoft Entra directory that has your subscription in the **Directory name** list, and then select **Switch**
57+
1. If you have access to multiple tenants, select the **Settings** icon in the top menu to switch to your Microsoft Entra ID tenant from the **Directories + subscriptions** menu.
5958
1. Choose **Create a resource** in the upper-left corner of the Azure portal, and then search for and select **Application Insights**.
6059
1. Select **Create**.
6160
1. For **Name**, enter a name for the resource.

0 commit comments

Comments
 (0)