You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory-b2c/active-directory-technical-profile.md
+6-6Lines changed: 6 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -9,7 +9,7 @@ manager: celestedg
9
9
ms.service: active-directory
10
10
ms.workload: identity
11
11
ms.topic: reference
12
-
ms.date: 03/05/2020
12
+
ms.date: 03/09/2020
13
13
ms.author: mimart
14
14
ms.subservice: B2C
15
15
---
@@ -54,13 +54,13 @@ The following example shows the **AAD-Common** technical profile:
54
54
55
55
## Input claims
56
56
57
-
The following technical profiles include **InputClaims** for social and local accounts:
57
+
The InputClaims element contains a claim, which is used to look up an account in the directory, or create a new one. There must be exactly one InputClaim element in the input claims collection for all Azure AD technical profiles. You may need to map the name of the claim defined in your policy to the name defined in Azure Active Directory.
58
58
59
-
- The social account technical profiles **AAD-UserReadUsingAlternativeSecurityId** and **AAD-UserWriteUsingAlternativeSecurityId** includes the **AlternativeSecurityId** claim. This claim contains the social account user identifier.
60
-
- The local account technical profiles **AAD-UserReadUsingEmailAddress** and **AAD-UserWriteUsingLogonEmail** includes the **email** claim. This claim contains the sign-in name of the local account.
61
-
- The unified (local and social) technical profiles **AAD-UserReadUsingObjectId**, **AAD-UserWritePasswordUsingObjectId**, **AAD-UserWriteProfileUsingObjectId**, and **AAD-UserWritePhoneNumberUsingObjectId** includes the **objectId** claim. The unique identifier of an account.
59
+
To read, update, or delete an existing user account, the input claim is a key that uniquely identifies the account in Azure AD directory. For example, **objectId**, **userPrincipalName**, **signInNames.emailAddress**, **signInNames.userName**, or **alternativeSecurityId**.
62
60
63
-
The **InputClaimsTransformations** element may contain a collection of **InputClaimsTransformation** elements that are used to modify the input claims or generate new ones.
61
+
To create a new user account, the input claim is a key that uniquely identifies a local or federated account. For example, local account: **signInNames.emailAddress**, or **signInNames.userName**. For a federated account: the **alternativeSecurityId**.
62
+
63
+
The InputClaimsTransformations element may contain a collection of input claims transformation elements that are used to modify the input claim or generate new one.
<LocalizedStringElementType="UxElement"StringId="verification_control_fail_send_code">Failed to send the code, please try again later.</LocalizedString>
223
+
<LocalizedStringElementType="UxElement"StringId="verification_control_fail_verify_code">Failed to verify the code, please try again later.</LocalizedString>
<LocalizedStringElementType="UxElement"StringId="verification_control_code_sent">Verification code has been sent. Please copy it to the input box below.</LocalizedString>
228
+
</LocalizedStrings>
229
+
</LocalizedResources>
230
+
```
214
231
215
232
## One time password error messages
216
233
The following are the IDs for a [one time password technical profile](one-time-password-technical-profile.md) error messages
@@ -222,6 +239,18 @@ The following are the IDs for a [one time password technical profile](one-time-p
222
239
|UserMessageIfSessionConflict |One time password verification session has conflict |
223
240
|UserMessageIfInvalidCode |One time password provided for verification is incorrect |
Copy file name to clipboardExpand all lines: articles/active-directory-b2c/localization.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,7 +8,7 @@ manager: celestedg
8
8
ms.service: active-directory
9
9
ms.workload: identity
10
10
ms.topic: reference
11
-
ms.date: 08/27/2019
11
+
ms.date: 03/09/2020
12
12
ms.author: mimart
13
13
ms.subservice: B2C
14
14
---
@@ -142,7 +142,7 @@ The **LocalizedString** element contains the following attributes:
142
142
143
143
| Attribute | Required | Description |
144
144
| --------- | -------- | ----------- |
145
-
| ElementType | Yes | A reference to a claim type element or a user interface element in the policy. Possible values: `ClaimType`, `UxElement`, `ErrorMessage`, `Predicate`, or . The `ClaimType` value is used to localize one of the claim attributes, as specified in the StringId. The `UxElement` value is used to localize one of the user interface elements as specified in the StringId. The `ErrorMessage` value is used to localize one of the system error messages as specified in the StringId. The `Predicate` value is used to localize one of the [Predicate](predicates.md) error messages, as specified in the StringId. The `InputValidation` value is used to localize one of the [PredicateValidation](predicates.md) group error messages as specified in the StringId. |
145
+
| ElementType | Yes | A reference to a claim type element or a user interface element in the policy. Possible values: `ClaimType`, `UxElement`, `ErrorMessage`, `Predicate`, or `GetLocalizedStringsTransformationClaimType`. The `ClaimType` value is used to localize one of the claim attributes, as specified in the StringId. The `UxElement` value is used to localize one of the user interface elements as specified in the StringId. The `ErrorMessage` value is used to localize one of the system error messages as specified in the StringId. The `Predicate` value is used to localize one of the [Predicate](predicates.md) error messages, as specified in the StringId. The `InputValidation` value is used to localize one of the [PredicateValidation](predicates.md) group error messages as specified in the StringId. The `GetLocalizedStringsTransformationClaimType` value is used to copy localized strings into claims. For more information, see [GetLocalizedStringsTransformation claims transformation](string-transformations.md#getlocalizedstringstransformation) |
146
146
| ElementId | Yes | If **ElementType** is set to `ClaimType`, `Predicate`, or `InputValidation`, this element contains a reference to a claim type already defined in the ClaimsSchema section. |
147
147
| StringId | Yes | If **ElementType** is set to `ClaimType`, this element contains a reference to an attribute of a claim type. Possible values: `DisplayName`, `AdminHelpText`, or `PatternHelpText`. The `DisplayName` value is used to set the claim display name. The `AdminHelpText` value is used to set the help text name of the claim user. The `PatternHelpText` value is used to set the claim pattern help text. If **ElementType** is set to `UxElement`, this element contains a reference to an attribute of a user interface element. If **ElementType** is set to `ErrorMessage`, this element specifies the identifier of an error message. See [Localization string IDs](localization-string-ids.md) for a complete list of the `UxElement` identifiers.|
Copy file name to clipboardExpand all lines: articles/active-directory-b2c/one-time-password-technical-profile.md
+40-41Lines changed: 40 additions & 41 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -9,7 +9,7 @@ manager: celestedg
9
9
ms.service: active-directory
10
10
ms.workload: identity
11
11
ms.topic: reference
12
-
ms.date: 02/10/2020
12
+
ms.date: 03/09/2020
13
13
ms.author: mimart
14
14
ms.subservice: B2C
15
15
---
@@ -65,15 +65,15 @@ The **OutputClaimsTransformations** element may contain a collection of **Output
65
65
66
66
### Metadata
67
67
68
-
The following settings can be used to configure code generation and maintenance:
68
+
The following settings can be used to configure code generation mode:
69
69
70
70
| Attribute | Required | Description |
71
71
| --------- | -------- | ----------- |
72
72
| CodeExpirationInSeconds | No | Time in seconds until code expiration. Minimum: `60`; Maximum: `1200`; Default: `600`. |
73
73
| CodeLength | No | Length of the code. The default value is `6`. |
74
74
| CharacterSet | No | The character set for the code, formatted for use in a regular expression. For example, `a-z0-9A-Z`. The default value is `0-9`. The character set must include a minimum of 10 different characters in the set specified. |
75
75
| NumRetryAttempts | No | The number of verification attempts before the code is considered invalid. The default value is `5`. |
76
-
| Operation | Yes | The operation to be performed. Possible values: `GenerateCode`, or `VerifyCode`. |
76
+
| Operation | Yes | The operation to be performed. Possible value: `GenerateCode`. |
77
77
| ReuseSameCode | No | Whether a duplicate code should be given rather than generating a new code when given code has not expired and is still valid. The default value is `false`. |
78
78
79
79
### Returning error message
@@ -86,22 +86,22 @@ The following example `TechnicalProfile` is used for generating a code:
@@ -128,46 +128,45 @@ The **OutputClaimsTransformations** element may contain a collection of **Output
128
128
129
129
### Metadata
130
130
131
-
The following settings can be used to configure the error message displayed upon code verification failure:
131
+
The following settings can be used to code verification mode:
132
132
133
133
| Attribute | Required | Description |
134
134
| --------- | -------- | ----------- |
135
-
| UserMessageIfSessionDoesNotExist | No | The message to display to the user if the code verification session has expired. It is either the code has expired or the code has never been generated for a given identifier. |
136
-
| UserMessageIfMaxRetryAttempted | No | The message to display to the user if they've exceeded the maximum allowed verification attempts. |
137
-
| UserMessageIfInvalidCode | No | The message to display to the user if they've provided an invalid code. |
135
+
| Operation | Yes | The operation to be performed. Possible value: `VerifyCode`. |
138
136
139
-
### Returning error message
140
137
141
-
As described in [Metadata](#metadata), you can customize error message shown to the user for different error cases. You can further localize those messages by prefixing the locale, for example:
138
+
### Error messages
142
139
143
-
```XML
144
-
<ItemKey="en.UserMessageIfInvalidCode">Wrong code has been entered.</Item>
145
-
```
140
+
The following settings can be used to configure the error messages displayed upon code verification failure. The metadata should be configured in the [self-asserted](self-asserted-technical-profile.md) technical profile. The error messages can be [localized](localization-string-ids.md#one-time-password-error-messages).
141
+
142
+
| Attribute | Required | Description |
143
+
| --------- | -------- | ----------- |
144
+
| UserMessageIfSessionDoesNotExist | No | The message to display to the user if the code verification session has expired. It is either the code has expired or the code has never been generated for a given identifier. |
145
+
| UserMessageIfMaxRetryAttempted | No | The message to display to the user if they've exceeded the maximum allowed verification attempts. |
146
+
| UserMessageIfInvalidCode | No | The message to display to the user if they've provided an invalid code. |
147
+
|UserMessageIfSessionConflict|No| The message to display to the user if the code cannot be verified.|
146
148
147
149
### Example
148
150
149
151
The following example `TechnicalProfile` is used for verifying a code:
Copy file name to clipboardExpand all lines: articles/active-directory/app-provisioning/use-scim-to-provision-users-and-groups.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -12,7 +12,7 @@ ms.workload: identity
12
12
ms.tgt_pltfrm: na
13
13
ms.devlang: na
14
14
ms.topic: conceptual
15
-
ms.date: 03/01/2020
15
+
ms.date: 03/07/2020
16
16
ms.author: mimart
17
17
ms.reviewer: arvinh
18
18
ms.custom: aaddev;it-pro;seohack1
@@ -30,7 +30,7 @@ SCIM is a standardized definition of two endpoints: a /Users endpoint and a /Gro
30
30
31
31
The standard user object schema and rest APIs for management defined in SCIM 2.0 (RFC [7642](https://tools.ietf.org/html/rfc7642), [7643](https://tools.ietf.org/html/rfc7643), [7644](https://tools.ietf.org/html/rfc7644)) allow identity providers and apps to more easily integrate with each other. Application developers that build a SCIM endpoint can integrate with any SCIM-compliant client without having to do custom work.
32
32
33
-
Automating provisioning to an application requires building and integrating a SCIM endpoint with the Azure AD SCIM compliant. Perform the following steps to start provisioning users and groups into your application.
33
+
Automating provisioning to an application requires building and integrating a SCIM endpoint with the Azure AD SCIM client. Perform the following steps to start provisioning users and groups into your application.
34
34
35
35
***[Step 1: Design your user and group schema.](#step-1-design-your-user-and-group-schema)** Identify the objects and attributes your application needs, and determine how they map to the user and group schema supported by the Azure AD SCIM implementation.
36
36
@@ -754,7 +754,7 @@ TLS 1.2 Cipher Suites minimum bar:
754
754
755
755
## Step 3: Build a SCIM endpoint
756
756
757
-
Now that you have desidned your schema and understood the Azure AD SCIM implementation, you can get started developing your SCIM endpoint. Rather than starting from scratch and building the implementation completely on your own, you can rely on a number of open source SCIM libraries published by the SCIM commuinty.
757
+
Now that you have designed your schema and understood the Azure AD SCIM implementation, you can get started developing your SCIM endpoint. Rather than starting from scratch and building the implementation completely on your own, you can rely on a number of open source SCIM libraries published by the SCIM commuinty.
758
758
The open source .NET Core [reference code](https://aka.ms/SCIMReferenceCode) published by the Azure AD provisioning team is one such resource that can jump start your development. Once you've built your SCIM endpoint, you'll want to test it out. You can use the collection of [postman tests](https://github.com/AzureAD/SCIMReferenceCode/wiki/Test-Your-SCIM-Endpoint) provided as part of the reference code or run through the sample requests / responses provided [above](https://docs.microsoft.com/azure/active-directory/app-provisioning/use-scim-to-provision-users-and-groups#user-operations).
759
759
760
760
Note: The reference code is intended to help you get started building your SCIM endpoint and is provided "AS IS." Contributions from the community are welcome to help build and maintain the code.
0 commit comments