Skip to content

Commit a69ea3a

Browse files
committed
merging @msmimart suggestions
1 parent 74f955e commit a69ea3a

File tree

4 files changed

+31
-32
lines changed

4 files changed

+31
-32
lines changed

articles/active-directory-b2c/application-insights-technical-profile.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: celestedg
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: reference
12-
ms.date: 03/18/2020
12+
ms.date: 03/20/2020
1313
ms.author: mimart
1414
ms.subservice: B2C
1515
---
@@ -19,7 +19,7 @@ ms.subservice: B2C
1919

2020
[!INCLUDE [active-directory-b2c-advanced-audience-warning](../../includes/active-directory-b2c-advanced-audience-warning.md)]
2121

22-
Azure Active Directory B2C (Azure AD B2C) provides support sending event data directly to [Application Insights](../azure-monitor/app/app-insights-overview.md) by using the instrumentation key provided to Azure AD B2C. With Application Insights technical profile, can get detailed and customized event logs for your user journeys, such as:
22+
Azure Active Directory B2C (Azure AD B2C) supports sending event data directly to [Application Insights](../azure-monitor/app/app-insights-overview.md) by using the instrumentation key provided to Azure AD B2C. With an Application Insights technical profile, you can get detailed and customized event logs for your user journeys to:
2323

2424
* Gain insights on user behavior.
2525
* Troubleshoot your own policies in development or in production.
@@ -29,10 +29,10 @@ Azure Active Directory B2C (Azure AD B2C) provides support sending event data di
2929

3030
## Protocol
3131

32-
The **Name** attribute of the **Protocol** element needs to be set to `Proprietary`. The **handler** attribute must contain the fully qualified name of the protocol handler assembly that is used by Azure AD B2C, for application insights:
32+
The **Name** attribute of the **Protocol** element needs to be set to `Proprietary`. The **handler** attribute must contain the fully qualified name of the protocol handler assembly that is used by Azure AD B2C for Application Insights:
3333
`Web.TPEngine.Providers.AzureApplicationInsightsProvider, Web.TPEngine, Version=1.0.0.0, Culture=neutral, PublicKeyToken=null`
3434

35-
The following example shows the common application insights technical profile. Other application insights technical profiles include the AzureInsights-Common to leverage its configuration.
35+
The following example shows the common Application Insights technical profile. Other Application Insights technical profiles include the AzureInsights-Common to leverage its configuration.
3636

3737
```xml
3838
<TechnicalProfile Id="AzureInsights-Common">
@@ -43,7 +43,7 @@ The following example shows the common application insights technical profile. O
4343

4444
## Input claims
4545

46-
The **InputClaims** element contains a list of claims to send to the Application Insights. You can also map the name of your claim to a name you prefer to appear in Application Insights. Following example shows how to send telemetries to Application Insights. Properties of an event are added through the syntax `{property:NAME}`, where NAME is property being added to the event. DefaultValue can be either a static value or a value that's resolved by one of the supported [claim resolvers](claim-resolver-overview.md).
46+
The **InputClaims** element contains a list of claims to send to Application Insights. You can also map the name of your claim to a name you prefer to appear in Application Insights. The following example shows how to send telemetries to Application Insights. Properties of an event are added through the syntax `{property:NAME}`, where NAME is property being added to the event. DefaultValue can be either a static value or a value that's resolved by one of the supported [claim resolvers](claim-resolver-overview.md).
4747

4848
```XML
4949
<InputClaims>
@@ -54,7 +54,7 @@ The **InputClaims** element contains a list of claims to send to the Application
5454
</InputClaims>
5555
```
5656

57-
The **InputClaimsTransformations** element may contain a collection of **InputClaimsTransformation** elements that are used to modify the input claims or generate new ones before sending to the Application Insights.
57+
The **InputClaimsTransformations** element may contain a collection of **InputClaimsTransformation** elements that are used to modify the input claims or generate new ones before sending to Application Insights.
5858

5959
## Persist claims
6060

@@ -74,8 +74,8 @@ The CryptographicKeys element is not used.
7474
| Attribute | Required | Description |
7575
| --------- | -------- | ----------- |
7676
| InstrumentationKey| Yes | The Application Insights [instrumentation key](../azure-monitor/app/create-new-resource.md#copy-the-instrumentation-key), which will be used for logging the events. |
77-
| DeveloperMode| No | A Boolean that indicates whether developer mode is enabled. Possible values: `true`, or `false` (default). This metadata controls how events are buffered. In a development environment with minimal event volume, enabling developer mode results in events being sent immediately to Application Insights.|
78-
|DisableTelemetry |No |A Boolean that indicates whether telemetry should be enabled or not. Possible values: `true`, or `false` (default).|
77+
| DeveloperMode| No | A Boolean that indicates whether developer mode is enabled. Possible values: `true` or `false` (default). This metadata controls how events are buffered. In a development environment with minimal event volume, enabling developer mode results in events being sent immediately to Application Insights.|
78+
|DisableTelemetry |No |A Boolean that indicates whether telemetry should be enabled or not. Possible values: `true` or `false` (default).|
7979

8080

8181
## Next steps

articles/active-directory-b2c/multi-factor-auth-technical-profile.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: celestedg
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: conceptual
12-
ms.date: 03/18/2020
12+
ms.date: 03/20/2020
1313
ms.author: mimart
1414
ms.subservice: B2C
1515
---
@@ -18,12 +18,12 @@ ms.subservice: B2C
1818

1919
[!INCLUDE [active-directory-b2c-advanced-audience-warning](../../includes/active-directory-b2c-advanced-audience-warning.md)]
2020

21-
Azure Active Directory B2C (Azure AD B2C) provides support for verifying a phone number by using Azure Multi-Factor Authentication (MFA). Use this technical profile to generate and send a code to a phone number, and then verify the code. The Azure MFA technical profile may also return an error message. The validation technical profile validates the user-provided data before the user journey continues. With the validation technical profile, an error message is display on a self-asserted page.
21+
Azure Active Directory B2C (Azure AD B2C) provides support for verifying a phone number by using Azure Multi-Factor Authentication (MFA). Use this technical profile to generate and send a code to a phone number, and then verify the code. The Azure MFA technical profile may also return an error message. The validation technical profile validates the user-provided data before the user journey continues. With the validation technical profile, an error message displays on a self-asserted page.
2222

2323
This technical profile:
2424

25-
- Provides doesn't have user interface to interact with the user. Rather it's called from a [self-asserted](self-asserted-technical-profile.md) technical profile, or a [display control](display-controls.md) as a [validation technical profile](validation-technical-profile.md).
26-
- Uses the Azure MFA service to generates and sends a code to a phone number, and then verifies the code.
25+
- Doesn't provide an interface to interact with the user. Instead, the user interface is called from a [self-asserted](self-asserted-technical-profile.md) technical profile, or a [display control](display-controls.md) as a [validation technical profile](validation-technical-profile.md).
26+
- Uses the Azure MFA service to generate and send a code to a phone number, and then verifies the code.
2727
- Validates a phone number via text messages.
2828

2929
[!INCLUDE [b2c-public-preview-feature](../../includes/active-directory-b2c-public-preview.md)]

articles/active-directory-b2c/phone-factor-technical-profile.md

Lines changed: 17 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: celestedg
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: reference
12-
ms.date: 03/16/2020
12+
ms.date: 03/20/2020
1313
ms.author: mimart
1414
ms.subservice: B2C
1515
---
@@ -18,21 +18,21 @@ ms.subservice: B2C
1818

1919
[!INCLUDE [active-directory-b2c-advanced-audience-warning](../../includes/active-directory-b2c-advanced-audience-warning.md)]
2020

21-
Azure Active Directory B2C (Azure AD B2C) provides support for enroll and verify phone number. This technical profile:
21+
Azure Active Directory B2C (Azure AD B2C) provides support for enrolling and verifying phone numbers. This technical profile:
2222

23-
- Provides user interface to interact with the user.
24-
- Uses content definition control the look and feel.
25-
- Uses both phone call and text messages to validate the phone number.
26-
- Supports multiple phone numbers. User can select one of phone numbers to verify.
27-
- If a phone number is provided, the phone factor asks the user to verify the phone number. If not provided, it asks the user to enroll a new phone number.
28-
- Returns a claim indicates whether user provides a new phone number. You can use this claim to decide whether the phone number should be persisted to the Azure AD user profile.
23+
- Provides a user interface to interact with the user.
24+
- Uses content definition to control the look and feel.
25+
- Supports both phone calls and text messages to validate the phone number.
26+
- Supports multiple phone numbers. The user can select one of the phone numbers to verify.
27+
- If a phone number is provided, the phone factor user interface asks the user to verify the phone number. If not provided, it asks the user to enroll a new phone number.
28+
- Returns a claim indicating whether the user provided a new phone number. You can use this claim to decide whether the phone number should be persisted to the Azure AD user profile.
2929

3030
## Protocol
3131

32-
The **Name** attribute of the **Protocol** element needs to be set to `Proprietary`. The **handler** attribute must contain the fully qualified name of the protocol handler assembly that is used by Azure AD B2C, for phone factor:
32+
The **Name** attribute of the **Protocol** element needs to be set to `Proprietary`. The **handler** attribute must contain the fully qualified name of the protocol handler assembly that is used by Azure AD B2C for phone factor:
3333
`Web.TPEngine.Providers.PhoneFactorProtocolProvider, Web.TPEngine, Version=1.0.0.0, Culture=neutral, PublicKeyToken=null`
3434

35-
The following example shows a phone factor technical profile for enroll and validation:
35+
The following example shows a phone factor technical profile for enrollment and validation:
3636

3737
```XML
3838
<TechnicalProfile Id="PhoneFactor-InputOrVerify">
@@ -47,14 +47,14 @@ The InputClaims element must contain following claims. You can also map the name
4747

4848
```XML
4949
<InputClaims>
50-
<!--A unique identifier of the user. The partner claim type must be set to `UserId` -->
50+
<!--A unique identifier of the user. The partner claim type must be set to `UserId`. -->
5151
<InputClaim ClaimTypeReferenceId="userIdForMFA" PartnerClaimType="UserId" />
52-
<!--A claim that contain the phone number. If the claim is empty, Azure AD B2C asks the user to enroll a new phone number. Otherwise, it asks the user to verify the phone number -->
52+
<!--A claim that contains the phone number. If the claim is empty, Azure AD B2C asks the user to enroll a new phone number. Otherwise, it asks the user to verify the phone number. -->
5353
<InputClaim ClaimTypeReferenceId="strongAuthenticationPhoneNumber" />
5454
</InputClaims>
5555
```
5656

57-
Following example demonstrates using multiple phone numbers. For more information, see [sample policy](https://github.com/azure-ad-b2c/samples/tree/master/policies/mfa-add-secondarymfa)
57+
The following example demonstrates using multiple phone numbers. For more information, see [sample policy](https://github.com/azure-ad-b2c/samples/tree/master/policies/mfa-add-secondarymfa).
5858

5959
```XML
6060
<InputClaims>
@@ -64,17 +64,17 @@ Following example demonstrates using multiple phone numbers. For more informatio
6464
</InputClaims>
6565
```
6666

67-
The InputClaimsTransformations element may contain a collection of InputClaimsTransformation elements that are used to modify the input claims or generate new ones before presenting the phone factor page.
67+
The InputClaimsTransformations element may contain a collection of InputClaimsTransformation elements that are used to modify the input claims or generate new ones before presenting them to the phone factor page.
6868

6969
## Output claims
7070

7171
The OutputClaims element contains a list of claims returned by the phone factor technical profile.
7272

7373
```xml
7474
<OutputClaims>
75-
<!-- The verified phone number. The partner claim type must be set to `Verified.OfficePhone` -->
75+
<!-- The verified phone number. The partner claim type must be set to `Verified.OfficePhone`. -->
7676
<OutputClaim ClaimTypeReferenceId="Verified.strongAuthenticationPhoneNumber" PartnerClaimType="Verified.OfficePhone" />
77-
<!-- An indication whether new phone number has beed entered by the user. The partner claim type must be set to `newPhoneNumberEntered` -->
77+
<!-- Indicates whether the new phone number has been entered by the user. The partner claim type must be set to `newPhoneNumberEntered`. -->
7878
<OutputClaim ClaimTypeReferenceId="newPhoneNumberEntered" PartnerClaimType="newPhoneNumberEntered" />
7979
</OutputClaims>
8080
```
@@ -91,7 +91,7 @@ The **CryptographicKeys** element is not used.
9191
| Attribute | Required | Description |
9292
| --------- | -------- | ----------- |
9393
| ContentDefinitionReferenceId | Yes | The identifier of the [content definition](contentdefinitions.md) associated with this technical profile. |
94-
| ManualPhoneNumberEntryAllowed| No | Specify whether or not a user is allowed to manually enter in a phone number. Possible values: `true`, or `false` (default).|
94+
| ManualPhoneNumberEntryAllowed| No | Specify whether or not a user is allowed to manually enter a phone number. Possible values: `true` or `false` (default).|
9595

9696
## Next steps
9797

articles/active-directory-b2c/technical-profiles-overview.md

Lines changed: 2 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: celestedg
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: reference
12-
ms.date: 03/18/2020
12+
ms.date: 03/20/2020
1313
ms.author: mimart
1414
ms.subservice: B2C
1515
---
@@ -29,12 +29,11 @@ A technical profile enables these types of scenarios:
2929
- [Azure Multi-Factor Authentication](multi-factor-auth-technical-profile.md) - provides support for verifying a phone number by using Azure Multi-Factor Authentication (MFA).
3030
- [Claims transformation](claims-transformation-technical-profile.md) - Call output claims transformations to manipulate claims values, validate claims, or set default values for a set of output claims.
3131
- [JWT token issuer](jwt-issuer-technical-profile.md) - Emits a JWT token that is returned back to the relying party application.
32-
- **Phone factor provider** - Multi-factor authentication.
3332
- [OAuth1](oauth1-technical-profile.md) - Federation with any OAuth 1.0 protocol identity provider.
3433
- [OAuth2](oauth2-technical-profile.md) - Federation with any OAuth 2.0 protocol identity provider.
3534
- [One time password](one-time-password-technical-profile.md) - Provides support for managing the generation and verification of a one-time password.
3635
- [OpenID Connect](openid-connect-technical-profile.md) - Federation with any OpenID Connect protocol identity provider.
37-
- [Phone factor](phone-factor-technical-profile.md) - Support for enroll and verify phone numbers.
36+
- [Phone factor](phone-factor-technical-profile.md) - Support for enrolling and verifying phone numbers.
3837
- [RESTful provider](restful-technical-profile.md) - Call to REST API services, such as validate user input, enrich user data, or integrate with line-of-business applications.
3938
- [SAML2](saml-technical-profile.md) - Federation with any SAML protocol identity provider.
4039
- [SAML token issuer](saml-issuer-technical-profile.md) - Emits a SAML token that is returned back to the relying party application.

0 commit comments

Comments
 (0)