Skip to content

Commit 9964fd9

Browse files
authored
Merge pull request #286445 from MicrosoftDocs/main
Publish to live, Tuesday 4 AM PST, 9/10
2 parents cd2b171 + 3ff7227 commit 9964fd9

File tree

47 files changed

+250
-726
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

47 files changed

+250
-726
lines changed

.openpublishing.redirection.app-service.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1980,6 +1980,11 @@
19801980
"redirect_url": "/azure/app-service/tutorial-java-spring-cosmosdb",
19811981
"redirect_document_id": false
19821982
},
1983+
{
1984+
"source_path_from_root": "/articles/app-service/tutorial-java-quarkus-postgresql-app.md",
1985+
"redirect_url": "/azure/app-service/tutorial-java-spring-cosmosdb",
1986+
"redirect_document_id": false
1987+
},
19831988
{
19841989
"source_path_from_root": "/articles/app-service/containers/tutorial-java-spring-cosmosdb.md",
19851990
"redirect_url": "/azure/app-service/tutorial-java-spring-cosmosdb",

articles/active-directory-b2c/add-ropc-policy.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: CelesteDG
99
ms.service: active-directory
1010

1111
ms.topic: how-to
12-
ms.date: 01/11/2024
12+
ms.date: 09/11/2024
1313
ms.author: kengaderdus
1414
ms.subservice: B2C
1515
zone_pivot_groups: b2c-policy-type
@@ -55,7 +55,7 @@ When using the ROPC flow, consider the following limitations:
5555

5656
## Create a resource owner user flow
5757

58-
1. Sign in to the [Azure portal](https://portal.azure.com) as the **global administrator** of your Azure AD B2C tenant.
58+
1. Sign in to the [Azure portal](https://portal.azure.com) as the [External ID User Flow Administrator](/entra/identity/role-based-access-control/permissions-reference#external-id-user-flow-administrator) of your Azure AD B2C tenant.
5959
1. If you have access to multiple tenants, select the **Settings** icon in the top menu to switch to your Azure AD B2C tenant from the **Directories + subscriptions** menu.
6060
1. In the Azure portal, search for and select **Azure AD B2C**.
6161
1. Select **User flows**, and select **New user flow**.

articles/active-directory-b2c/azure-monitor.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ ms.service: active-directory
1111
ms.topic: how-to
1212
ms.author: kengaderdus
1313
ms.subservice: B2C
14-
ms.date: 01/11/2024
14+
ms.date: 09/11/2024
1515
ms.custom: "b2c-support"
1616

1717

@@ -56,13 +56,13 @@ The following diagram depicts the components you'll configure in your Microsoft
5656

5757
![Resource group projection](./media/azure-monitor/resource-group-projection.png)
5858

59-
During this deployment, you'll configure your Azure AD B2C tenant where logs are generated. You'll also configure Microsoft Entra tenant where the Log Analytics workspace will be hosted. The Azure AD B2C accounts used (such as your admin account) should be assigned the [Global Administrator](../active-directory/roles/permissions-reference.md#global-administrator) role on the Azure AD B2C tenant. The Microsoft Entra account you'll use to run the deployment must be assigned the [Owner](../role-based-access-control/built-in-roles.md#owner) role in the Microsoft Entra subscription. It's also important to make sure you're signed in to the correct directory as you complete each step as described.
59+
During this deployment, you'll configure your Azure AD B2C tenant where logs are generated. You'll also configure Microsoft Entra tenant where the Log Analytics workspace will be hosted. The Azure AD B2C accounts used (such as your admin account) should be assigned the [Global Administrator](/entra/identity/role-based-access-control/permissions-reference#global-administrator) role on the Azure AD B2C tenant. The Microsoft Entra account you'll use to run the deployment must be assigned the [Owner](../role-based-access-control/built-in-roles.md#owner) role in the Microsoft Entra subscription. It's also important to make sure you're signed in to the correct directory as you complete each step as described.
6060

6161
In summary, you'll use Azure Lighthouse to allow a user or group in your Azure AD B2C tenant to manage a resource group in a subscription associated with a different tenant (the Microsoft Entra tenant). After this authorization is completed, the subscription and log analytics workspace can be selected as a target in the Diagnostic settings in Azure AD B2C.
6262

6363
## Prerequisites
6464

65-
- An Azure AD B2C account with [Global Administrator](../active-directory/roles/permissions-reference.md#global-administrator) role on the Azure AD B2C tenant.
65+
- An Azure AD B2C account with [Global Administrator](/entra/identity/role-based-access-control/permissions-reference#global-administrator) role on the Azure AD B2C tenant.
6666

6767
- A Microsoft Entra account with the [Owner](../role-based-access-control/built-in-roles.md#owner) role in the Microsoft Entra subscription. See how to [Assign a user as an administrator of an Azure subscription](../role-based-access-control/role-assignments-portal-subscription-admin.yml).
6868

articles/active-directory-b2c/billing.md

Lines changed: 4 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -1,19 +1,15 @@
11
---
22
title: Billing model for Azure Active Directory B2C
33
description: Learn about Azure AD B2C's monthly active users (MAU) billing model, how to link an Azure AD B2C tenant to an Azure subscription, and how to select the appropriate premium tier pricing.
4-
54
author: kengaderdus
65
manager: CelesteDG
7-
86
ms.service: active-directory
97
ms.topic: reference
10-
11-
ms.date: 01/11/2024
8+
ms.date: 09/11/2024
129
ms.author: kengaderdus
1310
ms.subservice: B2C
1411
ms.custom: fasttrack-edit
1512

16-
1713
#Customer intent: As a business decision maker managing an Azure AD B2C tenant, I want to understand the billing model based on monthly active users (MAU), so that I can determine the cost and pricing structure for my Azure AD B2C tenant.
1814

1915
---
@@ -33,7 +29,7 @@ A monthly active user (MAU) is a unique user that performs an authentication wit
3329

3430
If Azure AD B2C [Go-Local add-on](data-residency.md#go-local-add-on) is available in your country/region, and you enable it, you'll be charged per MAU, which is an added charge to your Azure AD B2C [Premium P1 or P2 pricing](https://azure.microsoft.com/pricing/details/active-directory-b2c/) license. Learn more [About Local Data Residency add-on](#about-go-local-add-on)
3531

36-
Also, if you choose to provide higher levels of assurance by using Multi-factor Authentication (MFA) for Voice and SMS, you'll be charged a worldwide flat fee for each MFA attempt that month, whether the sign in is successful or unsuccessful.
32+
Also, if you choose to provide higher levels of assurance by using multifactor authentication (MFA) for Voice and SMS, you'll be charged a worldwide flat fee for each MFA attempt that month, whether the sign in is successful or unsuccessful.
3733

3834

3935
> [!IMPORTANT]
@@ -93,7 +89,7 @@ A subscription linked to an Azure AD B2C tenant can be used for the billing of A
9389
1. Select **Create a resource**, and then, in the **Search services and Marketplace** field, search for and select **Azure Active Directory B2C**.
9490
1. Select **Create**.
9591
1. Select **Link an existing Azure AD B2C Tenant to my Azure subscription**.
96-
1. Select an **Azure AD B2C Tenant** from the dropdown. Only tenants for which you're a global administrator and that aren't already linked to a subscription are shown. The **Azure AD B2C Resource name** field is populated with the domain name of the Azure AD B2C tenant you select.
92+
1. Select an **Azure AD B2C Tenant** from the dropdown. Only tenants for which you're a Global Administrator and that aren't already linked to a subscription are shown. The **Azure AD B2C Resource name** field is populated with the domain name of the Azure AD B2C tenant you select.
9793
1. Select an active Azure **Subscription** of which you're an owner.
9894
1. Under **Resource group**, select **Create new**, and then specify the **Resource group location**. The resource group settings here have no impact on your Azure AD B2C tenant location, performance, or billing status.
9995
1. Select **Create**.
@@ -214,7 +210,7 @@ Before you start the move, be sure to read the entire article to fully understan
214210

215211
If the source and destination subscriptions are associated with different Microsoft Entra tenants, you can't perform the move via Azure Resource Manager as explained above. However, you can still achieve the same result by unlinking the Azure AD B2C tenant from the source subscription and relinking it to the destination subscription. This method is safe because the only object you delete is the *billing link*, not the Azure AD B2C tenant itself. None of the users, apps, user flows, etc. will be affected.
216212

217-
1. In the Azure AD B2C directory itself, [invite a guest user](user-overview.md#guest-user) from the destination Microsoft Entra tenant (the one that the destination Azure subscription is linked to) and ensure this user has the **Global administrator** role in Azure AD B2C.
213+
1. In the Azure AD B2C directory itself, [invite a guest user](user-overview.md#guest-user) from the destination Microsoft Entra tenant (the one that the destination Azure subscription is linked to) and ensure this user has the *Global Administrator* role in Azure AD B2C.
218214
1. Navigate to the *Azure resource* representing Azure AD B2C in your source Azure subscription as explained in the [Manage your Azure AD B2C tenant resources](#manage-your-azure-ad-b2c-tenant-resources) section above. Don't switch to the actual Azure AD B2C tenant.
219215
1. Select the **Delete** button on the **Overview** page. This action *doesn't* delete the related Azure AD B2C tenant's users or applications. It merely removes the billing link from the source subscription.
220216
1. Sign in to the Azure portal with the user account that was added as an administrator in Azure AD B2C in step 1. Then navigate to the destination Azure subscription, which is linked to the destination Microsoft Entra tenant.

articles/active-directory-b2c/conditional-access-user-flow.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ description: Learn how to add Conditional Access to your Azure AD B2C user flows
55
ms.service: active-directory
66
ms.subservice: B2C
77
ms.topic: overview
8-
ms.date: 01/11/2024
8+
ms.date: 09/11/2024
99
ms.author: kengaderdus
1010
author: kengaderdus
1111
manager: CelesteDG
@@ -437,4 +437,4 @@ To review the result of a Conditional Access event:
437437

438438
## Next steps
439439

440-
[Customize the user interface in an Azure AD B2C user flow](customize-ui-with-html.md)
440+
[Customize the user interface in an Azure AD B2C user flow](customize-ui-with-html.md)

articles/active-directory-b2c/custom-policies-series-store-user.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ ms.service: active-directory
1010

1111
ms.topic: how-to
1212
ms.custom: b2c-docs-improvements
13-
ms.date: 06/21/2024
13+
ms.date: 09/11/2024
1414
ms.author: kengaderdus
1515
ms.reviewer: yoelh
1616
ms.subservice: B2C
@@ -263,7 +263,7 @@ Follow the steps in [Test the custom policy](custom-policies-series-validate-use
263263

264264
After the policy finishes execution, and you receive your ID token, check that the user record has been created:
265265

266-
1. Sign in to the [Azure portal](https://portal.azure.com/) as at least Privileged Role Administrator.
266+
1. Sign in to the [Azure portal](https://portal.azure.com/).
267267

268268
1. If you have access to multiple tenants, select the **Settings** icon in the top menu to switch to your Azure AD B2C tenant from the **Directories + subscriptions** menu.
269269

articles/active-directory-b2c/extensions-app.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: CelesteDG
99
ms.service: active-directory
1010

1111
ms.topic: reference
12-
ms.date: 01/11/2024
12+
ms.date: 09/11/2024
1313
ms.author: kengaderdus
1414
ms.subservice: B2C
1515

@@ -55,14 +55,14 @@ To restore the app using Microsoft Graph, you must restore both the application
5555

5656
To restore the application object:
5757
1. Browse to [https://developer.microsoft.com/en-us/graph/graph-explorer](https://developer.microsoft.com/en-us/graph/graph-explorer).
58-
1. Log in to the site as a global administrator for the Azure AD B2C directory that you want to restore the deleted app for. This global administrator must have an email address similar to the following: `username@{yourTenant}.onmicrosoft.com`.
58+
1. Sign in to the site as a [Application Administrator](/entra/identity/role-based-access-control/permissions-reference#application-administrator) for the Azure AD B2C directory that you want to restore the deleted app for.
5959
1. Issue an HTTP GET against the URL `https://graph.microsoft.com/v1.0/directory/deleteditems/microsoft.graph.application`. This operation will list all of the applications that have been deleted within the past 30 days. You can also use the URL `https://graph.microsoft.com/v1.0/directory/deletedItems/microsoft.graph.application?$filter=displayName eq 'b2c-extensions-app. Do not modify. Used by AADB2C for storing user data.'` to filter by the app's **displayName** property.
6060
1. Find the application in the list where the name begins with `b2c-extensions-app` and copy its `id` property value.
61-
1. Issue an HTTP POST against the URL `https://graph.microsoft.com/v1.0/directory/deleteditems/{id}/restore`. Replace the `{id}` portion of the URL with the `id` from the previous step.]
61+
1. Issue an HTTP POST against the URL `https://graph.microsoft.com/v1.0/directory/deleteditems/{id}/restore`. Replace the `{id}` portion of the URL with the `id` from the previous step.
6262

6363
To restore the service principal object:
6464
1. Issue an HTTP GET against the URL `https://graph.microsoft.com/v1.0/directory/deleteditems/microsoft.graph.servicePrincipal`. This operation will list all of the service principals that have been deleted within the past 30 days. You can also use the URL `https://graph.microsoft.com/v1.0/directory/deletedItems/microsoft.graph.servicePrincipal?$filter=displayName eq 'b2c-extensions-app. Do not modify. Used by AADB2C for storing user data.'` to filter by the app's **displayName** property.
6565
1. Find the service principal in the list where the name begins with `b2c-extensions-app` and copy its `id` property value.
6666
1. Issue an HTTP POST against the URL `https://graph.microsoft.com/v1.0/directory/deleteditems/{id}/restore`. Replace the `{id}` portion of the URL with the `id` from the previous step.
6767

68-
You should now be able to [see the restored app](#verifying-that-the-extensions-app-is-present) in the Azure portal.
68+
You should now be able to [see the restored app](#verifying-that-the-extensions-app-is-present) in the Azure portal.

articles/active-directory-b2c/idp-pass-through-user-flow.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: CelesteDG
99
ms.service: active-directory
1010

1111
ms.topic: how-to
12-
ms.date: 01/11/2024
12+
ms.date: 09/11/2024
1313
ms.author: kengaderdus
1414
ms.subservice: B2C
1515
zone_pivot_groups: b2c-policy-type
@@ -49,7 +49,7 @@ The following diagram shows how an identity provider token returns to your app:
4949

5050
## Enable the claim
5151

52-
1. Sign in to the [Azure portal](https://portal.azure.com/) as the global administrator of your Azure AD B2C tenant.
52+
1. Sign in to the [Azure portal](https://portal.azure.com/) as the [External ID User Flow Administrator](/entra/identity/role-based-access-control/permissions-reference#external-id-user-flow-administrator) of your Azure AD B2C tenant.
5353
1. If you have access to multiple tenants, select the **Settings** icon in the top menu to switch to your Azure AD B2C tenant from the **Directories + subscriptions** menu.
5454
1. Choose **All services** in the top-left corner of the Azure portal, search for and select **Azure AD B2C**.
5555
1. Select **User flows (policies)**, and then select your user flow. For example, **B2C_1_signupsignin1**.

articles/active-directory-b2c/partner-twilio.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: CelesteDG
99
ms.service: active-directory
1010

1111
ms.topic: how-to
12-
ms.date: 01/11/2024
12+
ms.date: 09/11/2024
1313
ms.author: kengaderdus
1414
ms.subservice: B2C
1515

@@ -98,7 +98,7 @@ The following components make up the Twilio solution:
9898

9999
Add the policy files to Azure AD B2C:
100100

101-
1. Sign in to the [Azure portal](https://portal.azure.com/) as the global administrator of your Azure AD B2C tenant.
101+
1. Sign in to the [Azure portal](https://portal.azure.com/) as the [B2C IEF Policy Administrator](/entra/identity/role-based-access-control/permissions-reference#b2c-ief-policy-administrator) of your Azure AD B2C tenant.
102102
1. If you have access to multiple tenants, select the **Settings** icon in the top menu to switch to your Azure AD B2C tenant from the **Directories + subscriptions** menu.
103103
1. Choose **All services** in the top-left corner of the Azure portal, search for and select **Azure AD B2C**.
104104
1. Navigate to **Azure AD B2C** > **Identity Experience Framework** > **Policy Keys**.

articles/active-directory-b2c/phone-based-mfa.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ author: kengaderdus
77
manager: CelesteDG
88
ms.service: active-directory
99
ms.topic: how-to
10-
ms.date: 03/01/2024
10+
ms.date: 09/11/2024
1111
ms.author: kengaderdus
1212
ms.subservice: B2C
1313

@@ -93,7 +93,7 @@ Take the following actions to help mitigate fraudulent sign-ups.
9393

9494
- Remove country codes that aren't relevant to your organization from the drop-down menu where the user verifies their phone number (this change will apply to future sign-ups):
9595

96-
1. Sign in to the [Azure portal](https://portal.azure.com) as the global administrator of your Azure AD B2C tenant.
96+
1. Sign in to the [Azure portal](https://portal.azure.com) as the [External ID User Flow Administrator](/entra/identity/role-based-access-control/permissions-reference#external-id-user-flow-administrator) of your Azure AD B2C tenant.
9797
1. If you have access to multiple tenants, select the **Settings** icon in the top menu to switch to your Azure AD B2C tenant from the **Directories + subscriptions** menu.
9898
1. Choose **All services** in the top-left corner of the Azure portal, search for and select **Azure AD B2C**.
9999
1. Select the user flow, and then select **Languages**. Select the language for your organization's geographic location to open the language details panel. (For this example, we'll select **English en** for the United States). Select **Multifactor authentication page**, and then select **Download defaults (en)**.
@@ -110,8 +110,8 @@ Take the following actions to help mitigate fraudulent sign-ups.
110110

111111
![Country code drop-down](media/phone-based-mfa/country-code-drop-down.png)
112112

113-
## Next steps
113+
## Related content
114114

115115
- Learn about [Identity Protection and Conditional Access for Azure AD B2C](conditional-access-identity-protection-overview.md)
116116

117-
- Apply [Conditional Access to user flows in Azure Active Directory B2C](conditional-access-user-flow.md)
117+
- Apply [Conditional Access to user flows in Azure Active Directory B2C](conditional-access-user-flow.md)

0 commit comments

Comments
 (0)