Skip to content

Commit 98a5a67

Browse files
authored
Merge pull request #104924 from MicrosoftDocs/master
2/19 PM Publish
2 parents 970db77 + c5fa131 commit 98a5a67

File tree

243 files changed

+5700
-4074
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

243 files changed

+5700
-4074
lines changed

.openpublishing.redirection.json

Lines changed: 102 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -5872,8 +5872,13 @@
58725872
},
58735873
{
58745874
"source_path": "articles/active-directory-b2c/active-directory-b2c-social-migration.md",
5875-
"redirect_url": "/azure/active-directory-b2c/migrate-social-identities",
5876-
"redirect_document_id": true
5875+
"redirect_url": "/azure/active-directory-b2c/user-migration",
5876+
"redirect_document_id": false
5877+
},
5878+
{
5879+
"source_path": "articles/active-directory-b2c/migrate-social-identities.md",
5880+
"redirect_url": "/azure/active-directory-b2c/user-migration",
5881+
"redirect_document_id": false
58775882
},
58785883
{
58795884
"source_path": "articles/active-directory-b2c/active-directory-b2c-custom-setup-goog-idp.md",
@@ -36480,6 +36485,11 @@
3648036485
"redirect_url": "/azure/active-directory/app-provisioning/application-provisioning-config-problem",
3648136486
"redirect_document_id": false
3648236487
},
36488+
{
36489+
"source_path": "articles/active-directory/manage-apps/application-provisioning-config-problem-scim-compatibility.md",
36490+
"redirect_url": "/azure/active-directory/app-provisioning/application-provisioning-config-problem-scim-compatibility",
36491+
"redirect_document_id": false
36492+
},
3648336493
{
3648436494
"source_path": "articles/active-directory/manage-apps/application-provisioning-configure-api.md",
3648536495
"redirect_url": "/azure/active-directory/app-provisioning/application-provisioning-configure-api",
@@ -48536,6 +48546,96 @@
4853648546
"redirect_url": "/azure/cognitive-services/speech-service/quickstarts/setup-platform?pivots=programming-language-python",
4853748547
"redirect_document_id": false
4853848548
},
48549+
{
48550+
"source_path": "articles/virtual-machines/windows/sizes-general.md",
48551+
"redirect_url": "/azure/virtual-machines/sizes-general",
48552+
"redirect_document_id": false
48553+
},
48554+
{
48555+
"source_path": "articles/virtual-machines/linux/sizes-general.md",
48556+
"redirect_url": "/azure/virtual-machines/sizes-general",
48557+
"redirect_document_id": false
48558+
},
48559+
{
48560+
"source_path": "articles/virtual-machines/windows/sizes-compute.md",
48561+
"redirect_url": "/azure/virtual-machines/sizes-compute",
48562+
"redirect_document_id": false
48563+
},
48564+
{
48565+
"source_path": "articles/virtual-machines/linux/sizes-compute.md",
48566+
"redirect_url": "/azure/virtual-machines/sizes-compute",
48567+
"redirect_document_id": false
48568+
},
48569+
{
48570+
"source_path": "articles/virtual-machines/windows/sizes-memory.md",
48571+
"redirect_url": "/azure/virtual-machines/sizes-memory",
48572+
"redirect_document_id": false
48573+
},
48574+
{
48575+
"source_path": "articles/virtual-machines/linux/sizes-memory.md",
48576+
"redirect_url": "/azure/virtual-machines/sizes-memory",
48577+
"redirect_document_id": false
48578+
},
48579+
{
48580+
"source_path": "articles/virtual-machines/windows/sizes-storage.md",
48581+
"redirect_url": "/azure/virtual-machines/sizes-storage",
48582+
"redirect_document_id": false
48583+
},
48584+
{
48585+
"source_path": "articles/virtual-machines/linux/sizes-storage.md",
48586+
"redirect_url": "/azure/virtual-machines/sizes-storage",
48587+
"redirect_document_id": false
48588+
},
48589+
{
48590+
"source_path": "articles/virtual-machines/windows/sizes-gpu.md",
48591+
"redirect_url": "/azure/virtual-machines/sizes-gpu",
48592+
"redirect_document_id": false
48593+
},
48594+
{
48595+
"source_path": "articles/virtual-machines/linux/sizes-gpu.md",
48596+
"redirect_url": "/azure/virtual-machines/sizes-gpu",
48597+
"redirect_document_id": false
48598+
},
48599+
{
48600+
"source_path": "articles/virtual-machines/windows/sizes-hpc.md",
48601+
"redirect_url": "/azure/virtual-machines/sizes-hpc",
48602+
"redirect_document_id": false
48603+
},
48604+
{
48605+
"source_path": "articles/virtual-machines/linux/sizes-hpc.md",
48606+
"redirect_url": "/azure/virtual-machines/sizes-hpc",
48607+
"redirect_document_id": false
48608+
},
48609+
{
48610+
"source_path": "articles/virtual-machines/windows/sizes-previous-gen.md",
48611+
"redirect_url": "/azure/virtual-machines/sizes-previous-gen",
48612+
"redirect_document_id": false
48613+
},
48614+
{
48615+
"source_path": "articles/virtual-machines/linux/sizes-previous-gen.md",
48616+
"redirect_url": "/azure/virtual-machines/sizes-previous-gen",
48617+
"redirect_document_id": false
48618+
},
48619+
{
48620+
"source_path": "articles/virtual-machines/windows/acu.md",
48621+
"redirect_url": "/azure/virtual-machines/acu",
48622+
"redirect_document_id": false
48623+
},
48624+
{
48625+
"source_path": "articles/virtual-machines/linux/acu.md",
48626+
"redirect_url": "/azure/virtual-machines/acu",
48627+
"redirect_document_id": false
48628+
},
48629+
{
48630+
"source_path": "articles/virtual-machines/windows/b-series-burstable.md",
48631+
"redirect_url": "/azure/virtual-machines/sizes-b-series-burstable",
48632+
"redirect_document_id": false
48633+
},
48634+
{
48635+
"source_path": "articles/virtual-machines/linux/b-series-burstable.md",
48636+
"redirect_url": "/azure/virtual-machines/sizes-b-series-burstable",
48637+
"redirect_document_id": false
48638+
},
4853948639
{
4854048640
"source_path": "articles/cognitive-services/Bing-News-Search/vs-bing-news-search-connected-service.md",
4854148641
"redirect_url": "/azure/cognitive-services/bing-news-search/search-the-web",

articles/active-directory-b2c/TOC.yml

Lines changed: 6 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -81,6 +81,9 @@
8181
- name: Register a SAML service provider
8282
href: connect-with-saml-service-providers.md
8383
displayName: SP, RP, service provider, connect
84+
- name: Register a Graph application
85+
href: microsoft-graph-get-started.md
86+
displayName: migrate, migration, microsoft graph
8487
- name: Add a web API application
8588
href: add-web-application.md
8689
- name: Add a native client application
@@ -377,8 +380,6 @@
377380
items:
378381
- name: Migrate users
379382
href: user-migration.md
380-
- name: Migrate users with external identities
381-
href: migrate-social-identities.md
382383
- name: Reference
383384
items:
384385
- name: Identity Experience Framework release notes
@@ -392,9 +393,11 @@
392393
displayName: cookies, SameSite
393394
- name: Error codes
394395
href: error-codes.md
396+
- name: Microsoft Graph API operations
397+
href: microsoft-graph-operations.md
395398
- name: Region availability & data residency
396399
href: data-residency.md
397-
- name: Enable billing
400+
- name: Billing model
398401
href: billing.md
399402
- name: Threat management
400403
href: threat-management.md

articles/active-directory-b2c/application-types.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -121,7 +121,7 @@ To set up client credential flow, see [Azure Active Directory v2.0 and the OAuth
121121

122122
#### Web API chains (on-behalf-of flow)
123123

124-
Many architectures include a web API that needs to call another downstream web API, where both are secured by Azure AD B2C. This scenario is common in native clients that have a Web API back-end and calls a Microsoft online service such as the Microsoft Graph API or Azure AD Graph API.
124+
Many architectures include a web API that needs to call another downstream web API, where both are secured by Azure AD B2C. This scenario is common in native clients that have a Web API back-end and calls a Microsoft online service such as the Microsoft Graph API.
125125

126126
This chained web API scenario can be supported by using the OAuth 2.0 JWT bearer credential grant, also known as the on-behalf-of flow. However, the on-behalf-of flow is not currently implemented in the Azure AD B2C.
127127

articles/active-directory-b2c/custom-policy-custom-attributes.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -29,7 +29,7 @@ Your Azure AD B2C directory comes with a built-in set of attributes. Examples ar
2929
* An identity provider has a unique user identifier like **uniqueUserGUID** that must be saved.
3030
* A custom user journey needs to persist for a state of a user like **migrationStatus**.
3131

32-
Azure AD B2C extends the set of attributes stored on each user account. You can also read and write these attributes by using the [Azure AD Graph API](manage-user-accounts-graph-api.md).
32+
Azure AD B2C extends the set of attributes stored on each user account. You can also read and write these attributes by using the [Microsoft Graph API](manage-user-accounts-graph-api.md).
3333

3434
Extension properties extend the schema of the user objects in the directory. The terms *extension property*, *custom attribute*, and *custom claim* refer to the same thing in the context of this article. The name varies depending on the context, such as application, object, or policy.
3535

@@ -292,7 +292,7 @@ The ID token sent back to your application includes the new extension property a
292292

293293
## Reference
294294

295-
For more information on extension properties, see the article [Directory schema extensions | Graph API concepts](/previous-versions/azure/ad/graph/howto/azure-ad-graph-api-directory-schema-extensions).
295+
For more information on extension properties, see the article [Add custom data to resources using extensions](https://docs.microsoft.com/graph/extensibility-overview).
296296

297297
> [!NOTE]
298298
> * A **TechnicalProfile** is an element type, or function, that defines an endpoint’s name, metadata, and protocol. The **TechnicalProfile** details the exchange of claims that the Identity Experience Framework performs. When this function is called in an orchestration step or from another **TechnicalProfile**, the **InputClaims** and **OutputClaims** are provided as parameters by the caller.

articles/active-directory-b2c/deploy-custom-policies-devops.md

Lines changed: 4 additions & 39 deletions
Original file line numberDiff line numberDiff line change
@@ -31,6 +31,7 @@ There are three primary steps required for enabling Azure Pipelines to manage cu
3131

3232
* [Azure AD B2C tenant](tutorial-create-tenant.md), and credentials for a user in the directory with the [B2C IEF Policy Administrator](../active-directory/users-groups-roles/directory-assign-admin-roles.md#b2c-ief-policy-administrator) role
3333
* [Custom policies](custom-policy-get-started.md) uploaded to your tenant
34+
* [Management app](microsoft-graph-get-started.md) registered in your tenant with the Microsoft Graph API permission *Policy.ReadWrite.TrustFramework*
3435
* [Azure Pipeline](https://azure.microsoft.com/services/devops/pipelines/), and access to an [Azure DevOps Services project][devops-create-project]
3536

3637
## Client credentials grant flow
@@ -39,47 +40,11 @@ The scenario described here makes use of service-to-service calls between Azure
3940

4041
## Register an application for management tasks
4142

42-
Start by creating an application registration that your PowerShell scripts executed by Azure Pipelines will use to communicate with Azure AD B2C. If you already have an application registration that you use for automation tasks, you can skip to the [Grant permissions](#grant-permissions) section.
43+
As mentioned in [Prerequisites](#prerequisites), you need an application registration that your PowerShell scripts--executed by Azure Pipelines--can use for accessing the resources in your tenant.
4344

44-
### Register application
45+
If you already have an application registration that you use for automation tasks, ensure it's been granted the **Microsoft Graph** > **Policy** > **Policy.ReadWrite.TrustFramework** permission within the **API Permissions** of the app registration.
4546

46-
[!INCLUDE [active-directory-b2c-appreg-mgmt](../../includes/active-directory-b2c-appreg-mgmt.md)]
47-
48-
### Grant permissions
49-
50-
Next, grant the application permission to use the Microsoft Graph API to read and write custom policies in your Azure AD B2C tenant.
51-
52-
#### [Applications](#tab/applications/)
53-
54-
1. On the **Registered app** overview page, select **Settings**.
55-
1. Under **API Access**, select **Required permissions**.
56-
1. Select **Add**, then **Select an API**.
57-
1. Select **Microsoft Graph**, then **Select**.
58-
1. Under **Application Permissions**, select **Read and write your organization's trust framework policies**.
59-
1. Select **Select**, then **Done**.
60-
1. Select **Grant permissions**, and then select **Yes**. It might take a few minutes to for the permissions to fully propagate.
61-
62-
#### [App registrations (Preview)](#tab/app-reg-preview/)
63-
64-
1. Select **App registrations (Preview)**, and then select the web application that should have access to the Microsoft Graph API. For example, *managementapp1*.
65-
1. Under **Manage**, select **API permissions**.
66-
1. Under **Configured permissions**, select **Add a permission**.
67-
1. Select the **Microsoft APIs** tab, then select **Microsoft Graph**.
68-
1. Select **Application permissions**.
69-
1. Expand **Policy** and select **Policy.ReadWrite.TrustFramework**.
70-
1. Select **Add permissions**. As directed, wait a few minutes before proceeding to the next step.
71-
1. Select **Grant admin consent for (your tenant name)**.
72-
1. Select your currently signed-in administrator account, or sign in with an account in your Azure AD B2C tenant that's been assigned at least the *Cloud application administrator* role.
73-
1. Select **Accept**.
74-
1. Select **Refresh**, and then verify that "Granted for ..." appears under **Status**. It might take a few minutes for the permissions to propagate.
75-
76-
* * *
77-
78-
### Create client secret
79-
80-
To authenticate with Azure AD B2C, your PowerShell script needs to specify a client secret that you create for the application.
81-
82-
[!INCLUDE [active-directory-b2c-client-secret](../../includes/active-directory-b2c-client-secret.md)]
47+
For instructions on registering a management application, see [Manage Azure AD B2C with Microsoft Graph](microsoft-graph-get-started.md).
8348

8449
## Configure an Azure Repo
8550

articles/active-directory-b2c/faq.md

Lines changed: 5 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -82,15 +82,17 @@ Currently there is no way to change the "From:" field on the email.
8282

8383
### How can I migrate my existing user names, passwords, and profiles from my database to Azure AD B2C?
8484

85-
You can use the Azure AD Graph API to write your migration tool. See the [User migration guide](user-migration.md) for details.
85+
You can use the Microsoft Graph API to write your migration tool. See the [User migration guide](user-migration.md) for details.
8686

8787
### What password user flow is used for local accounts in Azure AD B2C?
8888

89-
The Azure AD B2C password user flow for local accounts is based on the policy for Azure AD. Azure AD B2C's sign-up, sign-up or sign-in and password reset user flows use the "strong" password strength and don't expire any passwords. Read the [Azure AD password policy](/previous-versions/azure/jj943764(v=azure.100)) for more details. For information about account lockouts and passwords, see [Manages threats to resources and data in Azure Active Directory B2C](threat-management.md).
89+
The Azure AD B2C password user flow for local accounts is based on the policy for Azure AD. Azure AD B2C's sign-up, sign-up or sign-in and password reset user flows use the "strong" password strength and don't expire any passwords. For more details, see [Password policies and restrictions in Azure Active Directory](https://docs.microsoft.com/azure/active-directory/authentication/concept-sspr-policy).
90+
91+
For information about account lockouts and passwords, see [Manages threats to resources and data in Azure Active Directory B2C](threat-management.md).
9092

9193
### Can I use Azure AD Connect to migrate consumer identities that are stored on my on-premises Active Directory to Azure AD B2C?
9294

93-
No, Azure AD Connect is not designed to work with Azure AD B2C. Consider using the [Azure AD Graph API](manage-user-accounts-graph-api.md) for user migration. See the [User migration guide](user-migration.md) for details.
95+
No, Azure AD Connect is not designed to work with Azure AD B2C. Consider using the [Microsoft Graph API](manage-user-accounts-graph-api.md) for user migration. See the [User migration guide](user-migration.md) for details.
9496

9597
### Can my app open up Azure AD B2C pages within an iFrame?
9698

articles/active-directory-b2c/identity-provider-microsoft-account-custom.md

Lines changed: 20 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: celestedg
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: conceptual
12-
ms.date: 07/08/2019
12+
ms.date: 02/19/2020
1313
ms.author: marsma
1414
ms.subservice: B2C
1515
---
@@ -25,7 +25,7 @@ This article shows you how to enable sign-in for users from a Microsoft account
2525
- Complete the steps in [Get started with custom policies in Azure Active Directory B2C](custom-policy-get-started.md).
2626
- If you don't already have a Microsoft account, create one at [https://www.live.com/](https://www.live.com/).
2727

28-
## Add an application
28+
## Register an application
2929

3030
To enable sign-in for users with a Microsoft account, you need to register an application within the Azure AD tenant. The Azure AD tenant is not the same as your Azure AD B2C tenant.
3131

@@ -43,6 +43,19 @@ To enable sign-in for users with a Microsoft account, you need to register an ap
4343
1. Enter a **Description** for the secret, for example *MSA Application Client Secret*, and then click **Add**.
4444
1. Record the application password shown in the **Value** column. You use this value in the next section.
4545

46+
## Configuring optional claims
47+
48+
If you want to get the `family_name` and `given_name` claims from Azure AD, you can configure optional claims for your application in the Azure portal UI or application manifest. For more information, see [How to provide optional claims to your Azure AD app](../active-directory/develop/active-directory-optional-claims.md).
49+
50+
1. Sign in to the [Azure portal](https://portal.azure.com). Search for and select **Azure Active Directory**.
51+
1. From the **Manage** section, select **App registrations**.
52+
1. Select the application you want to configure optional claims for in the list.
53+
1. From the **Manage** section, select **Token configuration (preview)**.
54+
1. Select **Add optional claim**.
55+
1. Select the token type you want to configure.
56+
1. Select the optional claims to add.
57+
1. Click **Add**.
58+
4659
## Create a policy key
4760

4861
Now that you've created the application in your Azure AD tenant, you need to store that application's client secret in your Azure AD B2C tenant.
@@ -90,10 +103,12 @@ You can define Azure AD as a claims provider by adding the **ClaimsProvider** el
90103
<Key Id="client_secret" StorageReferenceId="B2C_1A_MSASecret" />
91104
</CryptographicKeys>
92105
<OutputClaims>
93-
<OutputClaim ClaimTypeReferenceId="identityProvider" DefaultValue="live.com" />
94-
<OutputClaim ClaimTypeReferenceId="authenticationSource" DefaultValue="socialIdpAuthentication" />
95-
<OutputClaim ClaimTypeReferenceId="issuerUserId" PartnerClaimType="sub" />
106+
<OutputClaim ClaimTypeReferenceId="issuerUserId" PartnerClaimType="oid" />
107+
<OutputClaim ClaimTypeReferenceId="givenName" PartnerClaimType="given_name" />
108+
<OutputClaim ClaimTypeReferenceId="surName" PartnerClaimType="family_name" />
96109
<OutputClaim ClaimTypeReferenceId="displayName" PartnerClaimType="name" />
110+
<OutputClaim ClaimTypeReferenceId="authenticationSource" DefaultValue="socialIdpAuthentication" />
111+
<OutputClaim ClaimTypeReferenceId="identityProvider" PartnerClaimType="iss" />
97112
<OutputClaim ClaimTypeReferenceId="email" />
98113
</OutputClaims>
99114
<OutputClaimsTransformations>

0 commit comments

Comments
 (0)