Skip to content

Commit a4c4778

Browse files
authored
Merge branch 'master' into master
2 parents 8b78f42 + 9b68296 commit a4c4778

File tree

3,596 files changed

+47621
-22581
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

3,596 files changed

+47621
-22581
lines changed

.openpublishing.redirection.json

Lines changed: 342 additions & 247 deletions
Large diffs are not rendered by default.

articles/active-directory-b2c/TOC.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -261,6 +261,8 @@
261261
href: https://azure.microsoft.com/roadmap/?category=security-identity
262262
- name: Frequently asked questions
263263
href: active-directory-b2c-faqs.md
264+
- name: Getting help
265+
href: /azure/active-directory/develop/developer-support-help-options
264266
- name: Pricing
265267
href: https://azure.microsoft.com/pricing/details/active-directory-b2c/
266268
- name: Pricing calculator

articles/active-directory-b2c/active-directory-b2c-reference-threat-management.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -24,4 +24,4 @@ Azure AD B2C uses detection and mitigation techniques like SYN cookies, and rate
2424

2525
Azure AD B2C also has mitigation techniques in place for password attacks. Mitigation includes brute-force password attacks and dictionary password attacks. Passwords that are set by users are required to be reasonably complex. By using various signals, Azure AD B2C analyzes the integrity of requests. Azure AD B2C is designed to intelligently differentiate intended users from hackers and botnets. Azure AD B2C provides a sophisticated strategy to lock accounts based on the passwords entered, in the likelihood of an attack.
2626

27-
For more information, visit the [Microsoft Trust Center](https://www.microsoft.com/en-us/trustcenter/default.aspx).
27+
For more information, visit the [Microsoft Trust Center](https://www.microsoft.com/trustcenter/default.aspx).

articles/active-directory-b2c/active-directory-b2c-setup-aad-custom.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ manager: mtillman
88
ms.service: active-directory
99
ms.workload: identity
1010
ms.topic: conceptual
11-
ms.date: 04/04/2017
11+
ms.date: 08/15/2018
1212
ms.author: davidmu
1313
ms.component: B2C
1414
---
@@ -109,7 +109,7 @@ You can define Azure AD as a claims provider by adding Azure AD to the `<ClaimsP
109109
<OutputClaim ClaimTypeReferenceId="givenName" PartnerClaimType="given_name" />
110110
<OutputClaim ClaimTypeReferenceId="surName" PartnerClaimType="family_name" />
111111
<OutputClaim ClaimTypeReferenceId="displayName" PartnerClaimType="name" />
112-
<OutputClaim ClaimTypeReferenceId="authenticationSource" DefaultValue="contosoAuthentication" />
112+
<OutputClaim ClaimTypeReferenceId="authenticationSource" DefaultValue="socialIdpAuthentication" />
113113
<OutputClaim ClaimTypeReferenceId="identityProvider" DefaultValue="AzureADContoso" />
114114
</OutputClaims>
115115
<OutputClaimsTransformations>

articles/active-directory-b2c/active-directory-b2c-setup-sf-app-custom.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ manager: mtillman
88
ms.service: active-directory
99
ms.workload: identity
1010
ms.topic: conceptual
11-
ms.date: 06/11/2017
11+
ms.date: 08/15/2018
1212
ms.author: davidmu
1313
ms.component: B2C
1414
---
@@ -146,7 +146,7 @@ You need to define Salesforce as a claims provider so users can sign in by using
146146
<OutputClaim ClaimTypeReferenceId="surname" PartnerClaimType="family_name"/>
147147
<OutputClaim ClaimTypeReferenceId="email" PartnerClaimType="email"/>
148148
<OutputClaim ClaimTypeReferenceId="displayName" PartnerClaimType="username"/>
149-
<OutputClaim ClaimTypeReferenceId="authenticationSource" DefaultValue="externalIdp"/>
149+
<OutputClaim ClaimTypeReferenceId="authenticationSource" DefaultValue="socialIdpAuthentication"/>
150150
<OutputClaim ClaimTypeReferenceId="identityProvider" DefaultValue="SAMLIdp" />
151151
</OutputClaims>
152152
<OutputClaimsTransformations>

articles/active-directory-b2c/active-directory-b2c-user-migration.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -359,7 +359,7 @@ You can view and monitor logging information in near-real time.
359359
After you complete the [Get started with custom policies][B2C-GetStartedCustom] walkthrough, we recommend that you build your scenario by using your own custom policy files. For your reference, we have provided [Sample policy files][UserMigrationSample].
360360

361361
[AD-PasswordPolicies]: https://docs.microsoft.com/azure/active-directory/active-directory-passwords-policy
362-
[AD-Powershell]: https://docs.microsoft.com/en-us/powershell/azure/active-directory/install-adv2
362+
[AD-Powershell]: https://docs.microsoft.com/powershell/azure/active-directory/install-adv2
363363
[AppService-Deploy]: https://docs.microsoft.com/aspnet/core/tutorials/publish-to-azure-webapp-using-vs
364364
[B2C-AppRegister]: https://docs.microsoft.com/azure/active-directory-b2c/active-directory-b2c-app-registration
365365
[B2C-GetStarted]: https://docs.microsoft.com/azure/active-directory-b2c/active-directory-b2c-get-started

articles/active-directory-b2c/manage-user-access.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -42,7 +42,7 @@ Depending on application regulation, parental consent might need to be granted b
4242

4343
The following is an example of a user flow for gathering parental consent:
4444

45-
1. An [Azure Active Directory Graph API](https://msdn.microsoft.com/en-us/library/azure/ad/graph/api/api-catalog) operation identifies the user as a minor and returns the user data to the application in the form of an unsigned JSON token.
45+
1. An [Azure Active Directory Graph API](https://msdn.microsoft.com/library/azure/ad/graph/api/api-catalog) operation identifies the user as a minor and returns the user data to the application in the form of an unsigned JSON token.
4646

4747
2. The application processes the JSON token and shows a screen to the minor, notifying him or her that parental consent is required and requesting the consent of a parent online.
4848

@@ -52,7 +52,7 @@ The following is an example of a user flow for gathering parental consent:
5252

5353
5. When either the minor or the adult revokes consent, the Azure AD Graph API can be used to change **consentProvidedForMinor** to **denied**. Alternatively, the application may choose to delete a minor whose consent has been revoked. It is optionally possible to customize the user flow so that the authenticated minor (or parent that is using the minor’s account) can revoke consent. Azure AD B2C records **consentProvidedForMinor** as **denied**.
5454

55-
For more information about **legalAgeGroupClassification**, **consentProvidedForMinor**, and **ageGroup**, see [User resource type](https://developer.microsoft.com/en-us/graph/docs/api-reference/beta/resources/user). For more information about custom attributes, see [Use custom attributes to collect information about your consumers](active-directory-b2c-reference-custom-attr.md). When you address extended attributes by using the Azure AD Graph API, you must use the long version of the attribute, such as *extension_18b70cf9bb834edd8f38521c2583cd86_dateOfBirth*: *2011-01-01T00:00:00Z*.
55+
For more information about **legalAgeGroupClassification**, **consentProvidedForMinor**, and **ageGroup**, see [User resource type](https://developer.microsoft.com/graph/docs/api-reference/beta/resources/user). For more information about custom attributes, see [Use custom attributes to collect information about your consumers](active-directory-b2c-reference-custom-attr.md). When you address extended attributes by using the Azure AD Graph API, you must use the long version of the attribute, such as *extension_18b70cf9bb834edd8f38521c2583cd86_dateOfBirth*: *2011-01-01T00:00:00Z*.
5656

5757
## Gather date of birth and country data
5858

@@ -102,7 +102,7 @@ The following steps describe how you can manage terms of use:
102102
You can capture terms of use acceptance under the following scenarios:
103103

104104
- A new user is signing up. The terms of use are displayed, and the acceptance result is stored.
105-
- A user is signing in who has previously accepted the latest or active terms of agreement. The terms of use are not displayed.
105+
- A user is signing in who has previously accepted the latest or active terms of use. The terms of use are not displayed.
106106
- A user is signing in who has not already accepted the latest or active terms of use. The terms of use are displayed, and the acceptance result is stored.
107107
- A user is signing in who has already accepted an older version of the terms of use, which are now updated to the latest version. The terms of use are displayed, and the acceptance result is stored.
108108

articles/active-directory-b2c/manage-user-data.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.component: B2C
1515

1616
# Manage user data in Azure Active Directory B2C
1717

18-
This article discusses how you can manage the user data in Azure Active Directory (Azure AD) B2C by using the operations that are provided by the [Azure Active Directory Graph API](https://msdn.microsoft.com/en-us/library/azure/ad/graph/api/api-catalog). Managing user data includes deleting or exporting data from audit logs.
18+
This article discusses how you can manage the user data in Azure Active Directory (Azure AD) B2C by using the operations that are provided by the [Azure Active Directory Graph API](https://msdn.microsoft.com/library/azure/ad/graph/api/api-catalog). Managing user data includes deleting or exporting data from audit logs.
1919

2020
[!INCLUDE [gdpr-intro-sentence.md](../../includes/gdpr-intro-sentence.md)]
2121

articles/active-directory-domain-services/active-directory-ds-csp.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -83,7 +83,7 @@ The following important considerations apply when administering a managed domain
8383

8484

8585
## Next steps
86-
* [Enroll in the Azure CSP program](https://partnercenter.microsoft.com/partner/programs) and start creating business through Azure CSP.
86+
* [Enroll in the Azure CSP program](https://docs.microsoft.com/partner-center/enrolling-in-the-csp-program) and start creating business through Azure CSP.
8787
* Review the list of [Azure services available in Azure CSP](https://docs.microsoft.com/azure/cloud-solution-provider/overview/azure-csp-available-services).
8888
* [Enable Azure AD Domain Services using PowerShell](active-directory-ds-enable-using-powershell.md)
8989
* [Get started with Azure AD Domain Services](active-directory-ds-getting-started.md)

articles/active-directory-domain-services/active-directory-ds-troubleshooting.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -135,7 +135,7 @@ If one or more users in your Azure AD tenant are unable to sign in to the newly
135135
* **External accounts:** Ensure that the affected user account is not an external account in the Azure AD tenant. Examples of external accounts include Microsoft accounts (for example, '[email protected]') or user accounts from an external Azure AD directory. Since Azure AD Domain Services does not have credentials for such user accounts, these users cannot sign in to the managed domain.
136136
* **Synced accounts:** If the affected user accounts are synchronized from an on-premises directory, verify that:
137137

138-
* You have deployed or updated to the [latest recommended release of Azure AD Connect](https://www.microsoft.com/en-us/download/details.aspx?id=47594).
138+
* You have deployed or updated to the [latest recommended release of Azure AD Connect](https://www.microsoft.com/download/details.aspx?id=47594).
139139
* You have configured Azure AD Connect to [perform a full synchronization](active-directory-ds-getting-started-password-sync.md).
140140
* Depending on the size of your directory, it may take a while for user accounts and credential hashes to be available in Azure AD Domain Services. Ensure you wait long enough before retrying authentication.
141141
* If the issue persists after verifying the preceding steps, try restarting the Microsoft Azure AD Sync Service. From your sync machine, launch a command prompt and execute the following commands:

0 commit comments

Comments
 (0)