Skip to content

Commit 9b77148

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into WI58556-naming-restrictions
2 parents 4a684e3 + 0a4295c commit 9b77148

File tree

821 files changed

+12565
-15603
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

821 files changed

+12565
-15603
lines changed

.openpublishing.publish.config.json

Lines changed: 7 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -32,6 +32,12 @@
3232
"need_preview_pull_request": true,
3333
"contribution_branch_mappings": {},
3434
"dependent_repositories": [
35+
{
36+
"path_to_root": "azure-docs-snippets-pr",
37+
"url": "https://github.com/MicrosoftDocs/azure-docs-snippets-pr",
38+
"branch": "main",
39+
"branch_mapping": {}
40+
},
3541
{
3642
"path_to_root": "azure-dev-docs-pr",
3743
"url": "https://github.com/MicrosoftDocs/azure-dev-docs-pr",
@@ -928,7 +934,7 @@
928934
".openpublishing.redirection.active-directory.json",
929935
".openpublishing.redirection.api-management.json",
930936
".openpublishing.redirection.azure-attestation.json",
931-
".openpublishing.redirection.azure-blob.json",
937+
".openpublishing.redirection.storage.json",
932938
"articles/data-factory/.openpublishing.redirection.data-factory.json",
933939
".openpublishing.redirection.defender-for-cloud.json",
934940
".openpublishing.redirection.defender-for-iot.json",

.openpublishing.redirection.active-directory.json

Lines changed: 20 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,15 @@
11
{
22
"redirections": [
3+
{
4+
"source_path_from_root": "/articles/active-directory/develop/active-directory-claims-mapping.md",
5+
"redirect_url": "/azure/active-directory/develop/active-directory-saml-claims-customization",
6+
"redirect_document_id": false
7+
},
8+
{
9+
"source_path_from_root": "/articles/active-directory/develop/configure-token-lifetimes.md",
10+
"redirect_url": "/azure/active-directory/develop/active-directory-saml-claims-customization",
11+
"redirect_document_id": false
12+
},
313
{
414
"source_path_from_root": "/articles/active-directory/authentication/how-to-mfa-microsoft-managed.md",
515
"redirect_url": "/azure/active-directory/authentication/concept-authentication-default-enablement",
@@ -50,6 +60,11 @@
5060
"redirect_url": "/azure/active-directory/saas-apps/safety-culture-tutorial",
5161
"redirect_document_id": false
5262
},
63+
{
64+
"source_path_from_root": "/articles/active-directory/saas-apps/firstbird-tutorial.md",
65+
"redirect_url": "/azure/active-directory/saas-apps/radancys-employee-referrals-tutorial",
66+
"redirect_document_id": false
67+
},
5368
{
5469
"source_path_from_root": "/articles/active-directory/saas-apps/icertisicm-tutorial.md",
5570
"redirect_url": "/azure/active-directory/saas-apps/tutorial-list",
@@ -11035,6 +11050,11 @@
1103511050
"source_path_from_root": "/articles/active-directory/cloud-infrastructure-entitlement-management/permissions-management-trial-playbook.md",
1103611051
"redirect_url": "/azure/active-directory/cloud-infrastructure-entitlement-management/permissions-management-trial-user-guide",
1103711052
"redirect_document_id": false
11053+
},
11054+
{
11055+
"source_path_from_root": "/articles/active-directory/develop/microsoft-graph-intro.md",
11056+
"redirect_url": "/graph/overview?toc=/azure/active-directory/develop/toc.json&bc=/azure/active-directory/develop/breadcrumb/toc.json",
11057+
"redirect_document_id": false
1103811058
}
1103911059
]
1104011060
}

.openpublishing.redirection.azure-blob.json

Lines changed: 0 additions & 19 deletions
This file was deleted.

.openpublishing.redirection.json

Lines changed: 480 additions & 2065 deletions
Large diffs are not rendered by default.

articles/active-directory-b2c/TOC.yml

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -35,7 +35,7 @@
3535
# - name: 4 - Create custom policies
3636
# Create this file (tutorial-create-custom-policies.md), and content into it. You also need to update the index.yml's card, Customize, to reflect the new file name
3737
# What keywords users are searching in TOC: https://review.docs.microsoft.com/en-us/help/contribute/kusto/samples/discoverability-toc-filter?branch=main
38-
# href: tutorial-create-user-flows.md
38+
# href:tutorial-create-user-flows.md
3939
- name: 4 - Manage your tenant
4040
href: tenant-management.md
4141
displayName: break glass account, emergence account
@@ -106,6 +106,7 @@
106106
href: user-flow-overview.md
107107
- name: Custom policy overview
108108
href: custom-policy-overview.md
109+
displayName: extend, extensibility
109110
- name: API Connectors
110111
href: api-connectors-overview.md
111112
displayName: REST API, web API, API connectors, Dynamic data retrieval, external data sources, external identity data source, outbound webhooks, third-party integration
@@ -461,7 +462,8 @@
461462
- name: Integrate with our technology partners
462463
items:
463464
- name: Azure AD B2C partner gallery
464-
href: partner-gallery.md
465+
href: partner-gallery.md
466+
displayName: marketplace, integration, extensibility, extend, customization, customisation
465467
# Secure
466468
- name: Secure
467469
items:

articles/active-directory-b2c/add-identity-provider.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -2,11 +2,11 @@
22
title: Add an identity provider - Azure Active Directory B2C
33
description: Learn how to add an identity provider to your Active Directory B2C tenant.
44
services: active-directory-b2c
5-
author: kengaderdus
5+
author: garrodonnell
66
manager: CelesteDG
77

8-
ms.author: kengaderdus
9-
ms.date: 04/08/2022
8+
ms.author: godonnell
9+
ms.date: 01/19/2022
1010
ms.custom: mvc
1111
ms.topic: how-to
1212
ms.service: active-directory
@@ -19,9 +19,9 @@ You can configure Azure AD B2C to allow users to sign in to your application wit
1919

2020
With external identity provider federation, you can offer your consumers the ability to sign in with their existing social or enterprise accounts, without having to create a new account just for your application.
2121

22-
On the sign-up or sign-in page, Azure AD B2C presents a list of external identity providers the user can choose for sign-in. Once they select one of the external identity providers, they're taken (redirected) to the selected provider's website to complete the sign in process. After the user successfully signs in, they're returned to Azure AD B2C for authentication of the account in your application.
22+
On the sign-up or sign-in page, Azure AD B2C presents a list of external identity providers the user can choose for sign-in. Once they select one of the external identity providers, they're taken (redirected) to the selected provider's website to complete the sign-in process. After the user successfully signs in, they're returned to Azure AD B2C for authentication of the account in your application.
2323

24-
![Mobile sign-in example with a social account (Facebook)](media/add-identity-provider/external-idp.png)
24+
![Diagram showing mobile sign-in example with a social account (Facebook).](media/add-identity-provider/external-idp.png)
2525

2626
You can add identity providers that are supported by Azure Active Directory B2C (Azure AD B2C) to your [user flows](user-flow-overview.md) using the Azure portal. You can also add identity providers to your [custom policies](user-flow-overview.md).
2727

articles/active-directory-b2c/best-practices.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -39,6 +39,8 @@ Define your application and service architecture, inventory current systems, and
3939
| Usability vs. security | Your solution must strike the right balance between application usability and your organization's acceptable level of risk. |
4040
| Move on-premises dependencies to the cloud | To help ensure a resilient solution, consider moving existing application dependencies to the cloud. |
4141
| Migrate existing apps to b2clogin.com | The deprecation of login.microsoftonline.com will go into effect for all Azure AD B2C tenants on 04 December 2020. [Learn more](b2clogin.md). |
42+
| Use Identity Protection and Conditional Access | Use these capabilities for significantly greater control over risky authentications and access policies. Azure AD B2C Premium P2 is required. [Learn more](conditional-access-identity-protection-overview.md). |
43+
|Tenant size | You need to plan with Azure AD B2C tenant size in mind. By default, Azure AD B2C tenant can accommodate 1.25 million objects (user accounts and applications). You can increase this limit to 5.25 million objects by adding a custom domain to your tenant, and verifying it. If you need a bigger tenant size, you need to contact [Support](find-help-open-support-ticket.md).|
4244
| Use Identity Protection and Conditional Access | Use these capabilities for greater control over risky authentications and access policies. Azure AD B2C Premium P2 is required. [Learn more](conditional-access-identity-protection-overview.md). |
4345

4446
## Implementation
@@ -86,5 +88,6 @@ Stay up to date with the state of the service and find support options.
8688
| Best practice | Description |
8789
|--|--|
8890
| [Service updates](https://azure.microsoft.com/updates/?product=active-directory-b2c) | Stay up to date with Azure AD B2C product updates and announcements. |
89-
| [Microsoft Support](support-options.md) | File a support request for Azure AD B2C technical issues. Billing and subscription management support is provided at no cost. |
91+
| [Microsoft Support](find-help-open-support-ticket.md) | File a support request for Azure AD B2C technical issues. Billing and subscription management support is provided at no cost. |
9092
| [Azure status](https://azure.status.microsoft/status) | View the current health status of all Azure services. |
93+

articles/active-directory-b2c/custom-domain.md

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: CelesteDG
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: how-to
12-
ms.date: 07/26/2022
12+
ms.date: 11/3/2022
1313
ms.author: kengaderdus
1414
ms.subservice: B2C
1515
ms.custom: "b2c-support"
@@ -20,7 +20,11 @@ zone_pivot_groups: b2c-policy-type
2020

2121
[!INCLUDE [active-directory-b2c-choose-user-flow-or-custom-policy](../../includes/active-directory-b2c-choose-user-flow-or-custom-policy.md)]
2222

23-
This article describes how to enable custom domains in your redirect URLs for Azure Active Directory B2C (Azure AD B2C). Using a custom domain with your application provides a more seamless user experience. From the user's perspective, they remain in your domain during the sign in process rather than redirecting to the Azure AD B2C default domain *<tenant-name>.b2clogin.com*.
23+
This article describes how to enable custom domains in your redirect URLs for Azure Active Directory B2C (Azure AD B2C). By using a verified custom domain, you've benefits such as:
24+
25+
- It provides a more seamless user experience. From the user's perspective, they remain in your domain during the sign in process rather than redirecting to the Azure AD B2C default domain *<tenant-name>.b2clogin.com*.
26+
27+
- You increase the number of objects (user accounts and applications) you can create in your Azure AD B2C tenant from the default 1.25 million to 5.25 million.
2428

2529
![Screenshot demonstrates an Azure AD B2C custom domain user experience.](./media/custom-domain/custom-domain-user-experience.png)
2630

articles/active-directory-b2c/faq.yml

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -43,7 +43,10 @@ sections:
4343
In an Azure AD B2C tenant, most apps want the user to sign-in with any arbitrary email address (for example, [email protected], [email protected], [email protected], or [email protected]). This type of account is a local account. We also support arbitrary user names as local accounts (for example, joe, bob, sarah, or jim). You can choose one of these two local account types when configuring identity providers for Azure AD B2C in the Azure portal. In your Azure AD B2C tenant, select **Identity providers**, select **Local account**, and then select **Username**.
4444
4545
User accounts for applications can be created through a sign-up user flow, sign-up or sign-in user flow, the Microsoft Graph API, or in the Azure portal.
46-
46+
- question: |
47+
How many users can an Azure AD B2C tenant accommodate?
48+
answer: |
49+
- By default, each tenant can accommodate a total of **1.25 million** objects (user accounts and applications), but you can increase this limit to **5.25 million** objects when you [add and verify a custom domain](custom-domain.md). If you want to increase this limit, please contact [Microsoft Support](find-help-open-support-ticket.md). However, if you created your tenant before **September 2022**, this limit doesn't affect you, and your tenant will retain the size allocated to it at creation, that's, **50 million** objects.
4750
- question: |
4851
Which social identity providers do you support now? Which ones do you plan to support in the future?
4952
answer: |

articles/active-directory-b2c/identity-verification-proofing.md

Lines changed: 30 additions & 21 deletions
Original file line numberDiff line numberDiff line change
@@ -4,43 +4,52 @@ titleSuffix: Azure AD B2C
44
description: Learn about our partners who integrate with Azure AD B2C to provide identity proofing and verification solutions
55
services: active-directory-b2c
66
author: gargi-sinha
7-
manager: CelesteDG
7+
manager: martinco
88
ms.reviewer: kengaderdus
9-
109
ms.service: active-directory
1110
ms.workload: identity
1211
ms.topic: how-to
13-
ms.date: 09/13/2022
12+
ms.date: 01/18/2023
1413
ms.author: gasinh
15-
ms.subservice: B2C
1614
---
1715

1816
# Identity verification and proofing partners
1917

20-
With Azure AD B2C partners, customers can enable identity verification and proofing of their end users before allowing account registration or access. Identity verification and proofing can check document, knowledge-based information and liveness.
18+
With Azure Active Directory B2C (Azure AD B2C) and solutions from software-vendor partners, customers can enable end-user identity verification and proofing for account registration. Identity verification and proofing can check documents, knowledge-based information, and liveness.
19+
20+
## Architecture diagram
21+
22+
The following architecture diagram illustrates the verification and proofing flow.
2123

22-
A high-level architecture diagram explains the flow.
24+
![Diagram of of the identity proofing flow, from registration to access approval.](./media/partner-gallery/third-party-identity-proofing.png)
2325

24-
![Diagram shows the identity proofing flow](./media/partner-gallery/third-party-identity-proofing.png)
26+
1. User begins registration with a device.
27+
2. User enters information.
28+
3. Digital-risk score is assessed, then third-party identity proofing and identity validation occurs.
29+
4. Identity is validated or rejected.
30+
5. User attributes are passed to Azure Active Directory B2C.
31+
6. If user verification is successful, a user account is created in Azure AD B2C during sign-in.
32+
7. Based on the verification result, the user receives an access-approved or -denied message.
2533

26-
Microsoft partners with the following ISV partners.
34+
## Software vendors and integration documentation
2735

28-
| ISV partner | Description and integration walkthroughs |
29-
|:-------------------------|:--------------|
30-
| ![Screenshot of a deduce logo.](./media/partner-gallery/deduce-logo.png) | [Deduce](./partner-deduce.md) is an identity verification and proofing provider focused on stopping account takeover and registration fraud. It helps combat identity fraud and creates a trusted user experience. |
31-
| ![Screenshot of a eid-me logo](./media/partner-gallery/eid-me-logo.png) | [eID-Me](./partner-eid-me.md) is an identity verification and decentralized digital identity solution for Canadian citizens. It enables organizations to meet Identity Assurance Level (IAL) 2 and Know Your Customer (KYC) requirements. |
32-
|![Screenshot of an Experian logo.](./media/partner-gallery/experian-logo.png) | [Experian](./partner-experian.md) is an Identity verification and proofing provider that performs risk assessments based on user attributes to prevent fraud. |
33-
|![Screenshot of an IDology logo.](./media/partner-gallery/idology-logo.png) | [IDology](./partner-idology.md) is an Identity verification and proofing provider with ID verification solutions, fraud prevention solutions, compliance solutions, and others.|
34-
|![Screenshot of a Jumio logo.](./media/partner-gallery/jumio-logo.png) | [Jumio](./partner-jumio.md) is an ID verification service, which enables real-time automated ID verification, safeguarding customer data. |
35-
| ![Screenshot of a LexisNexis logo.](./media/partner-gallery/lexisnexis-logo.png) | [LexisNexis](./partner-lexisnexis.md) is a profiling and identity validation provider that verifies user identification and provides comprehensive risk assessment based on user’s device. |
36-
| ![Screenshot of a Onfido logo](./media/partner-gallery/onfido-logo.png) | [Onfido](./partner-onfido.md) is a document ID and facial biometrics verification solution that allows companies to meet *Know Your Customer* and identity requirements in real time. |
36+
Microsoft partners with independent software vendors (ISVs). Use the following table to locate an ISV and related integration documentation.
3737

38-
## Additional information
38+
| ISV logo | ISV link and description| Integration documentation|
39+
|---|---|---|
40+
| ![Screenshot of the Deduce logo.](./media/partner-gallery/deduce-logo.png) | [Deduce](https://www.deduce.com/): Identity verification and proofing provider that helps stop account takeover and registration fraud. Use it to combat identity fraud and create a trusted user experience. |[Configure Azure AD B2C with Deduce to combat identity fraud and create a trusted user experience](partner-deduce.md)|
41+
| ![Screenshot of the eID-Me logo.](./media/partner-gallery/eid-me-logo.png) | [Bluink, Ltd.](https://bluink.ca/): eID-Me is an identity verification and decentralized digital identity solution for Canadian citizens. Use it to meet Identity Assurance Level (IAL) 2 and Know Your Customer (KYC) requirements. |[Configure eID-Me with Azure AD B2C for identity verification](partner-eid-me.md)|
42+
|![Screenshot of the Experian logo.](./media/partner-gallery/experian-logo.png) | [Experian Information Solutions, Inc.](https://www.experian.com/business/products/crosscore): Identity verification and proofing provider with solutions that perform risk assessments based on user attributes. |[Tutorial: Configure Experian with Azure AD B2C](partner-experian.md)|
43+
|![Screenshot of the IDology logo.](./media/partner-gallery/idology-logo.png) | [IDology, a GBG company](https://www.idology.com/solutions/): Identity verification and proofing provider with ID verification, fraud prevention, and compliance solutions.|[Tutorial for configuring IDology with Azure AD B2C](partner-idology.md)|
44+
|![Screenshot of the Jumio logo.](./media/partner-gallery/jumio-logo.png) | [Jumio](https://www.jumio.com/): Identify verification service with products for real-time, automated ID verification. |[Tutorial for configuring Jumio with Azure AD B2C](partner-jumio.md)|
45+
| ![Screenshot of the LexisNexis logo.](./media/partner-gallery/lexisnexis-logo.png) | [LexisNexis Risk Solutions Group](https://risk.lexisnexis.com/products/threatmetrix): Profiling and identity validation provider that verifies user identification and provides risk assessment based on user devices. See, ThreatMetrix. |[Tutorial for configuring LexisNexis with Azure AD B2C](partner-lexisnexis.md)|
46+
| ![Screenshot of the Onfido logo.](./media/partner-gallery/onfido-logo.png) | [Onfido](https://onfido.com/): Document ID and facial biometrics verification solutions to meet Know Your Customer (KYC) and identity requirements. |[Tutorial for configuring Onfido with Azure AD B2C](partner-onfido.md)|
3947

40-
- [Custom policies in Azure AD B2C](./custom-policy-overview.md)
48+
## Resources
4149

42-
- [Get started with custom policies in Azure AD B2C](./tutorial-create-user-flows.md?pivots=b2c-custom-policy&tabs=applications)
50+
- [Azure AD B2C custom policy overview](custom-policy-overview.md)
51+
- [Tutorial: Create user flows and custom policies in Azure Active Directory B2C](tutorial-create-user-flows.md?pivots=b2c-custom-policy&tabs=applications)
4352

4453
## Next steps
4554

46-
Select a partner in the tables mentioned to learn how to integrate their solution with Azure AD B2C.
55+
Select and contact a partner from the previous table to get started on solution integration with Azure AD B2C. The partners have similar processes to contact them for a product demo.

0 commit comments

Comments
 (0)