Skip to content

Commit a851923

Browse files
committed
Merge branch 'master' of https://github.com/MicrosoftDocs/azure-docs-pr into normesta-migrate-gen1
2 parents 4a50f98 + 1777db6 commit a851923

File tree

940 files changed

+12641
-7848
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

940 files changed

+12641
-7848
lines changed

.openpublishing.publish.config.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -277,6 +277,11 @@
277277
"url": "https://github.com/Azure/pcs-remote-monitoring-webui.git",
278278
"branch": "master"
279279
},
280+
{
281+
"path_to_root": "MachineLearningNotebooks",
282+
"url": "https://github.com/Azure/MachineLearningNotebooks",
283+
"branch": "master"
284+
},
280285
{
281286
"path_to_root": "aml-sdk-samples",
282287
"url": "https://github.com/Azure/MachineLearningNotebooks",

.openpublishing.redirection.json

Lines changed: 90 additions & 42 deletions
Large diffs are not rendered by default.

articles/active-directory-b2c/TOC.yml

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -182,9 +182,13 @@
182182
- name: Customize the UI
183183
href: custom-policy-ui-customization.md
184184
displayName: ux, input, cors, html, css
185+
- name: Customize language
186+
href: custom-policy-localization.md
185187
- name: Custom email
186188
href: custom-email.md
187189
displayName: verification
190+
- name: Disable email verification
191+
href: custom-policy-disable-email-verification.md
188192
- name: Enable JavaScript
189193
href: javascript-samples.md
190194
- name: Password complexity

articles/active-directory-b2c/best-practices.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -47,7 +47,7 @@ During the implementation phase, consider the following recommendations.
4747

4848
| | |
4949
|--|--|
50-
| Edit custom policies with the Azure AD B2C extension for Visual Studio Code | Download Visual Studio Code and this community-built [extension from the Visual Studio Code Marketplace]((https://marketplace.visualstudio.com/items?itemName=AzureADB2CTools.aadb2c)). While not an official Microsoft product, the Azure AD B2C extension for Visual Studio Code includes several features that help make working with custom policies easier. |
50+
| Edit custom policies with the Azure AD B2C extension for Visual Studio Code | Download Visual Studio Code and this community-built [extension from the Visual Studio Code Marketplace](https://marketplace.visualstudio.com/items?itemName=AzureADB2CTools.aadb2c). While not an official Microsoft product, the Azure AD B2C extension for Visual Studio Code includes several features that help make working with custom policies easier. |
5151
| Learn how to troubleshoot Azure AD B2C | Learn how to [troubleshoot custom policies](https://docs.microsoft.com/azure/active-directory-b2c/troubleshoot-custom-policies?tabs=applications) during development. Learn what a normal authentication flow looks like and use tools for discovering anomalies and errors. For example, use [Application Insights](troubleshoot-with-application-insights.md) to review output logs of user journeys. |
5252
| Leverage our library of proven custom policy patterns | Find [samples](https://github.com/azure-ad-b2c/samples) for several enhanced Azure AD B2C customer identity and access management (CIAM) user journeys. |
5353

Lines changed: 59 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,59 @@
1+
---
2+
title: Disable email verification during customer sign-up with a custom policy
3+
titleSuffix: Azure AD B2C
4+
description: Learn how to disable email verification during customer sign-up in Azure Active Directory B2C.
5+
services: active-directory-b2c
6+
author: msmimart
7+
manager: celestedg
8+
9+
ms.service: active-directory
10+
ms.workload: identity
11+
ms.topic: conceptual
12+
ms.date: 03/11/2020
13+
ms.author: mimart
14+
ms.subservice: B2C
15+
---
16+
17+
# Disable email verification during customer sign-up using a custom policy in Azure Active Directory B2C
18+
19+
[!INCLUDE [disable email verification intro](../../includes/active-directory-b2c-disable-email-verification.md)]
20+
21+
## Prerequisites
22+
23+
Complete the steps in [Get started with custom policies](custom-policy-get-started.md). You should have a working custom policy for sign-up and sign-in with social and local accounts.
24+
25+
## Add the metadata to the self-asserted technical profile
26+
27+
The **LocalAccountSignUpWithLogonEmail** technical profile is a [self-asserted](self-asserted-technical-profile.md), which is invoked during the sign-up flow. To disable the email verification, set the `EnforceEmailVerification` metadata to false. Override the LocalAccountSignUpWithLogonEmail technical profiles in the extension file.
28+
29+
1. Open the extensions file of your policy. For example, <em>`SocialAndLocalAccounts/`**`TrustFrameworkExtensions.xml`**</em>.
30+
1. Find the `ClaimsProviders` element. If the element doesn't exist, add it.
31+
1. Add the following claims provider to the `ClaimsProviders` element:
32+
33+
```XML
34+
<ClaimsProvider>
35+
<DisplayName>Local Account</DisplayName>
36+
<TechnicalProfiles>
37+
<TechnicalProfile Id="SelfAsserted-LocalAccountSignin-Email">
38+
<Metadata>
39+
<Item Key="EnforceEmailVerification">false</Item>
40+
</Metadata>
41+
</TechnicalProfile>
42+
</TechnicalProfiles>
43+
</ClaimsProvider>
44+
```
45+
46+
## Test the custom policy
47+
48+
1. Sign in to the [Azure portal](https://portal.azure.com).
49+
2. Make sure you're using the directory that contains your Azure AD tenant by selecting the **Directory + subscription** filter in the top menu and choosing the directory that contains your Azure AD tenant.
50+
3. Choose **All services** in the top-left corner of the Azure portal, and then search for and select **App registrations**.
51+
4. Select **Identity Experience Framework**.
52+
5. Select **Upload Custom Policy**, and then upload the two policy files that you changed.
53+
2. Select the sign-up or sign-in policy that you uploaded, and click the **Run now** button.
54+
3. You should be able to sign up using an email address without the validation.
55+
56+
57+
## Next steps
58+
59+
- Learn more about the [self-asserted technical profile](self-asserted-technical-profile.md) in the IEF reference.

0 commit comments

Comments
 (0)