Skip to content

Commit a8c883c

Browse files
authored
Merge pull request #177363 from kengaderdus/address-verbatims
[Azure AD B2C] Address October verbatims
2 parents f0ac8cf + 3da49e5 commit a8c883c

14 files changed

+54
-37
lines changed

articles/active-directory-b2c/access-tokens.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -62,7 +62,7 @@ If the **response_type** parameter in an `/authorize` request includes `token`,
6262

6363
To request an access token, you need an authorization code. Below is an example of a request to the `/authorize` endpoint for an authorization code. Custom domains are not supported for use with access tokens. Use your tenant-name.onmicrosoft.com domain in the request URL.
6464

65-
In the following example, you replace these values:
65+
In the following example, you replace these values in the query string:
6666

6767
- `<tenant-name>` - The name of your Azure AD B2C tenant.
6868
- `<policy-name>` - The name of your custom policy or user flow.
@@ -86,7 +86,7 @@ The response with the authorization code should be similar to this example:
8686
https://jwt.ms/?code=eyJraWQiOiJjcGltY29yZV8wOTI1MjAxNSIsInZlciI6IjEuMC...
8787
```
8888

89-
After successfully receiving the authorization code, you can use it to request an access token:
89+
After successfully receiving the authorization code, you can use it to request an access token. Note that the parameters are in the body of the HTTP POST request:
9090

9191
```http
9292
POST <tenant-name>.b2clogin.com/<tenant-name>.onmicrosoft.com/<policy-name>/oauth2/v2.0/token HTTP/1.1
@@ -100,7 +100,7 @@ grant_type=authorization_code
100100
&redirect_uri=https://jwt.ms
101101
&client_secret=2hMG2-_:y12n10vwH...
102102
```
103-
103+
104104
You should see something similar to the following response:
105105

106106
```json

articles/active-directory-b2c/add-ropc-policy.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -37,7 +37,7 @@ The following flows are not supported:
3737

3838
When using the ROPC flow, consider the following:
3939

40-
- ROPC doesn’t work when there is any interruption to the authentication flow that needs user interaction. For example, when a password has expired or needs to be changed, [multi-factor authentication](multi-factor-authentication.md) is required, or when more information needs to be collected during sign-in (for example, user consent).
40+
- ROPC doesn’t work when there is any interruption to the authentication flow that needs user interaction. For example, when a password has expired or needs to be changed, [multifactor authentication](multi-factor-authentication.md) is required, or when more information needs to be collected during sign-in (for example, user consent).
4141
- ROPC supports local accounts only. Users can’t sign in with [federated identity providers](add-identity-provider.md) like Microsoft, Google+, Twitter, AD-FS, or Facebook.
4242
- [Session Management](session-behavior.md), including [keep me signed-in (KMSI)](session-behavior.md#enable-keep-me-signed-in-kmsi), is not applicable.
4343

@@ -67,6 +67,9 @@ When using the ROPC flow, consider the following:
6767

6868
::: zone pivot="b2c-custom-policy"
6969

70+
## Pre-requisite
71+
If you've not done so, learn about custom policy starter pack in [Get started with custom policies in Active Directory B2C](tutorial-create-user-flows.md).
72+
7073
## Create a resource owner policy
7174

7275
1. Open the *TrustFrameworkExtensions.xml* file.

articles/active-directory-b2c/configure-authentication-sample-spa-app.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ manager: CelesteDG
77
ms.service: active-directory
88
ms.workload: identity
99
ms.topic: reference
10-
ms.date: 09/15/2021
10+
ms.date: 10/25/2021
1111
ms.author: kengaderdus
1212
ms.subservice: B2C
1313
ms.custom: "b2c-support"

articles/active-directory-b2c/configure-user-input.md

Lines changed: 7 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: CelesteDG
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: how-to
12-
ms.date: 10/15/2021
12+
ms.date: 10/22/2021
1313
ms.custom: project-no-code
1414
ms.author: kengaderdus
1515
ms.subservice: B2C
@@ -32,6 +32,10 @@ In this article, you collect a new attribute during your sign-up journey in Azur
3232

3333
## Add user attributes your user flow
3434

35+
1. Sign in to the [Azure portal](https://portal.azure.com/).
36+
1. Make sure you're using the directory that contains your Azure AD B2C tenant. Select the **Directories + subscriptions** icon in the portal toolbar.
37+
1. On the **Portal settings | Directories + subscriptions** page, find your Azure AD B2C directory in the **Directory name** list, and then select **Switch**.
38+
1. Under **Azure services**, select **Azure AD B2C**. Or use the search box to find and select **Azure AD B2C**.
3539
1. In your Azure AD B2C tenant, select **User flows**.
3640
1. Select your policy (for example, "B2C_1_SignupSignin") to open it.
3741
1. Select **User attributes** and then select the user attribute (for example, "City").
@@ -63,7 +67,7 @@ To provide a set list of values for the city attribute:
6367
1. [Enable language customization on the user flow](language-customization.md#support-requested-languages-for-ui_locales)
6468
1. Select your policy (for example, "B2C_1_SignupSignin") to open it.
6569
1. On the **Languages** page for the user flow, select the language that you want to customize.
66-
1. Under **Page-level-resources files**, select **Local account sign up page**.
70+
1. Under **Page-level resources files**, select **Local account sign up page**.
6771
1. Select **Download defaults** (or **Download overrides** if you have previously edited this language).
6872
1. Create a `LocalizedCollections` attribute.
6973

@@ -107,7 +111,7 @@ The `LocalizedCollections` is an array of `Name` and `Value` pairs. The order fo
107111
1. Select **User flows** and select your policy (for example, "B2C_1_SignupSignin") to open it.
108112
1. Select **Languages**.
109113
1. Select the language that you want to translate to.
110-
1. Select the **Local account sign up page**.
114+
1. Under **Page-level-resources files**, select **Local account sign up page**.
111115
1. Select the folder icon, and select the JSON file to upload. The changes are saved to your user flow automatically.
112116

113117
## Test your user flow

articles/active-directory-b2c/identity-provider-azure-ad-single-tenant.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -47,10 +47,10 @@ To enable sign-in for users with an Azure AD account from a specific Azure AD or
4747
1. Sign in to the [Azure portal](https://portal.azure.com).
4848
1. Make sure you're using the directory that contains your organizational Azure AD tenant (for example, Contoso). Select the **Directories + subscriptions** icon in the portal toolbar.
4949
1. On the **Portal settings | Directories + subscriptions** page, find your Azure AD directory in the **Directory name** list, and then select **Switch**.
50-
1. Choose **All services** in the top-left corner of the Azure portal, and then search for and select **App registrations**.
50+
1. Under **Azure services**, select **App registrations** or search for and select **App registrations**.
5151
1. Select **New registration**.
5252
1. Enter a **Name** for your application. For example, `Azure AD B2C App`.
53-
1. Accept the default selection of **Accounts in this organizational directory only** for this application.
53+
1. Accept the default selection of **Accounts in this organizational directory only (Default Directory only - Single tenant)** for this application.
5454
1. For the **Redirect URI**, accept the value of **Web**, and enter the following URL in all lowercase letters, where `your-B2C-tenant-name` is replaced with the name of your Azure AD B2C tenant.
5555

5656
```
275 Bytes
Loading

articles/active-directory-b2c/secure-rest-api.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: CelesteDG
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: how-to
12-
ms.date: 09/20/2021
12+
ms.date: 10/25/2021
1313
ms.author: kengaderdus
1414
ms.subservice: B2C
1515
zone_pivot_groups: b2c-policy-type
@@ -39,7 +39,7 @@ HTTP basic authentication is defined in [RFC 2617](https://tools.ietf.org/html/r
3939
To configure an API Connector with HTTP basic authentication, follow these steps:
4040

4141
1. Sign in to the [Azure portal](https://portal.azure.com/).
42-
2. Under **Azure services**, select **Azure AD B2C**.
42+
2. Under **Azure services**, select **Azure AD B2C** or search for and select **Azure AD B2C**.
4343
3. Select **API connectors**, and then select the **API Connector** you want to configure.
4444
4. For the **Authentication type**, select **Basic**.
4545
5. Provide the **Username**, and **Password** of your REST API endpoint.

articles/active-directory-b2c/technical-overview.md

Lines changed: 10 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -77,7 +77,7 @@ Learn more about [sign-in options](sign-in-options.md) or how to [set up the loc
7777

7878
Azure AD B2C lets you manage common attributes of consumer account profiles. For example display name, surname, given name, city, and others.
7979

80-
You can also extend the Azure AD schema to store additional information about your users. For example, their country/region of residency, preferred language, and preferences like whether they want to subscribe to a newsletter or enable multi-factor authentication. For more information, see:
80+
You can also extend the Azure AD schema to store additional information about your users. For example, their country/region of residency, preferred language, and preferences like whether they want to subscribe to a newsletter or enable multifactor authentication. For more information, see:
8181

8282
* [User profile attributes](user-profile-attributes.md)
8383
* [Add user attributes and customize user input in](configure-user-input.md)
@@ -208,21 +208,21 @@ Multiple applications can use the same user flow or custom policy. A single appl
208208

209209
For example, to sign in to an application, the application uses the *sign up or sign in* user flow. After the user has signed in, they may want to edit their profile, so the application initiates another authorization request, this time using the *profile edit* user flow.
210210

211-
## Multi-factor authentication (MFA)
211+
## Multifactor authentication (MFA)
212212

213-
Azure AD B2C multi-factor authentication (MFA) helps safeguard access to data and applications while maintaining simplicity for your users. It provides extra security by requiring a second form of authentication, and delivers strong authentication by offering a range of easy-to-use authentication methods.
213+
Azure AD B2C Multi-Factor Authentication (MFA) helps safeguard access to data and applications while maintaining simplicity for your users. It provides extra security by requiring a second form of authentication, and delivers strong authentication by offering a range of easy-to-use authentication methods.
214214

215215
Your users may or may not be challenged for MFA based on configuration decisions that you can make as an administrator.
216216

217-
See how to enable MFA in user flows in [Enable multi-factor authentication in Azure Active Directory B2C](multi-factor-authentication.md).
217+
See how to enable MFA in user flows in [Enable multifactor authentication in Azure Active Directory B2C](multi-factor-authentication.md).
218218

219219
## Conditional Access
220220

221221
Azure AD Identity Protection risk-detection features, including risky users and risky sign-ins, are automatically detected and displayed in your Azure AD B2C tenant. You can create Conditional Access policies that use these risk detections to determine remediation actions and enforce organizational policies.
222222

223223
![Conditional access flow](media/technical-overview/conditional-access-flow.png)
224224

225-
Azure AD B2C evaluates each sign-in event and ensures that all policy requirements are met before granting the user access. Risky users or sign-ins may be blocked, or challenged with a specific remediation like multi-factor authentication (MFA). For more information, see [Identity Protection and Conditional Access](conditional-access-identity-protection-overview.md).
225+
Azure AD B2C evaluates each sign-in event and ensures that all policy requirements are met before granting the user access. Risky users or sign-ins may be blocked, or challenged with a specific remediation like multifactor authentication (MFA). For more information, see [Identity Protection and Conditional Access](conditional-access-identity-protection-overview.md).
226226

227227
## Password complexity
228228

@@ -296,6 +296,11 @@ By integrating Azure Application Insights into Azure AD B2C custom policies, you
296296

297297
For more information, see [Track user behavior in Azure Active Directory B2C using Application Insights](analytics-with-application-insights.md).
298298

299+
## Region availability and data residency
300+
Azure AD B2C service is generally available worldwide, for availability, with the option for data residency in regions as specified in [Products available by region](https://azure.microsoft.com/regions/services/). Data residency is determined by the country/region you select when you [create your tenant](tutorial-create-tenant.md).
301+
302+
Learn more about [Azure Active Directory B2C service Region availability & data residency](data-residency.md).
303+
299304
## Automation using Microsoft Graph API
300305

301306
Use MS graph API to manage your Azure AD B2C directory. You can also create the Azure AD B2C directory itself. You can manage users, identity providers, user flows, custom policies and many more.

articles/active-directory-b2c/tenant-management.md

Lines changed: 12 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: CelesteDG
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: tutorial
12-
ms.date: 10/04/2021
12+
ms.date: 10/25/2021
1313
ms.custom: project-no-code
1414
ms.author: kengaderdus
1515
ms.subservice: B2C
@@ -35,19 +35,21 @@ To create a new administrative account, follow these steps:
3535
1. Under **Azure services**, select **Azure AD B2C**. Or use the search box to find and select **Azure AD B2C**.
3636
1. Under **Manage**, select **Users**.
3737
1. Select **New user**.
38+
1. Select **Create user** (you can create many users at once by selecting **I want to create users in bulk**).
3839
1. On the **User** page, enter information for this user:
3940

40-
- **Name**. Required. The first and last name of the new user. For example, *Mary Parker*.
41-
- **User name**. Required. The user name of the new user. For example, `[email protected]`.
42-
The domain part of the user name must use either the initial default domain name, *\<yourdomainname>.onmicrosoft.com*.
43-
- **Groups**. Optionally, you can add the user to one or more existing groups. You can also add the user to groups at a later time.
41+
42+
- **User name**. *Required*. The user name of the new user. For example, `[email protected]`.
43+
The domain part of the user name must use either the initial default domain name, *\<tenant name>.onmicrosoft.com* or your [custom domain](custom-domain.md) such as `contoso.com`.
44+
- **Name**. *Required*. The first and last name of the new user. For example, *Mary Parker*.
45+
- **Groups**. *Optional*. You can add the user to one or more existing groups. You can also add the user to groups at a later time.
4446
- **Directory role**: If you require Azure AD administrative permissions for the user, you can add them to an Azure AD role. You can assign the user to be a Global administrator or one or more of the limited administrator roles in Azure AD. For more information about assigning roles, see [Use roles to control resource access](roles-resource-access-control.md).
4547
- **Job info**: You can add more information about the user here, or do it later.
4648

4749
1. Copy the autogenerated password provided in the **Password** box. You'll need to give this password to the user to sign in for the first time.
4850
1. Select **Create**.
4951

50-
The user is created and added to your Azure AD B2C tenant. It's preferable to have at least one work account native to your Azure AD B2C tenant assigned the Global Administrator role. This account can be considered a break-glass account.
52+
The user is created and added to your Azure AD B2C tenant. It's preferable to have at least one work account native to your Azure AD B2C tenant assigned the Global Administrator role. This account can be considered a *break-glass account*.
5153

5254
## Invite an administrator (guest account)
5355

@@ -63,10 +65,10 @@ To invite a user, follow these steps:
6365
1. Select **New guest account**.
6466
1. On the **User** page, enter information for this user:
6567

66-
- **Name**. Required. The first and last name of the new user. For example, *Mary Parker*.
67-
- **Email address**. Required. The email address of the user you would like to invite. For example, `[email protected]`.
68+
- **Name**. *Required*. The first and last name of the new user. For example, *Mary Parker*.
69+
- **Email address**. *Required*. The email address of the user you would like to invite, which must be a Microsoft account. For example, `[email protected]`.
6870
- **Personal message**: You add a personal message that will be included in the invite email.
69-
- **Groups**. Optionally, you can add the user to one or more existing groups. You can also add the user to groups at a later time.
71+
- **Groups**. *Optional*. You can add the user to one or more existing groups. You can also add the user to groups at a later time.
7072
- **Directory role**: If you require Azure AD administrative permissions for the user, you can add them to an Azure AD role. You can assign the user to be a Global administrator or one or more of the limited administrator roles in Azure AD. For more information about assigning roles, see [Use roles to control resource access](roles-resource-access-control.md).
7173
- **Job info**: You can add more information about the user here, or do it later.
7274

@@ -133,7 +135,7 @@ The user is deleted and no longer appears on the **Users - All users** page. The
133135

134136
## Protect administrative accounts
135137

136-
It's recommended that you protect all administrator accounts with multi-factor authentication (MFA) for more security. MFA is an identity verification process during sign-in that prompts the user for a more form of identification, such as a verification code on their mobile device or a request in their Microsoft Authenticator app.
138+
It's recommended that you protect all administrator accounts with multifactor authentication (MFA) for more security. MFA is an identity verification process during sign-in that prompts the user for a more form of identification, such as a verification code on their mobile device or a request in their Microsoft Authenticator app.
137139

138140
![Authentication methods in use at the sign-in screenshot](./media/tenant-management/sing-in-with-multi-factor-authentication.png)
139141

articles/active-directory-b2c/tutorial-create-tenant.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ manager: CelesteDG
88
ms.service: active-directory
99
ms.workload: identity
1010
ms.topic: tutorial
11-
ms.date: 09/25/2021
11+
ms.date: 10/26/2021
1212
ms.author: kengaderdus
1313
ms.subservice: B2C
1414
ms.custom: "b2c-support"
@@ -43,7 +43,7 @@ You learn how to register an application in the next tutorial.
4343

4444
1. Sign in to the [Azure portal](https://portal.azure.com/).
4545

46-
1. Select the directory that contains your subscription:
46+
1. Switch to the directory that contains your subscription:
4747
1. In the Azure portal toolbar, select the **Directories + subscriptions** filter icon.
4848

4949
![Directories + subscriptions filter icon](media/tutorial-create-tenant/directories-subscription-filter-icon.png)
@@ -54,8 +54,8 @@ You learn how to register an application in the next tutorial.
5454

5555
1. Add **Microsoft.AzureActiveDirectory** as a resource provider for the Azure subscription your're using ([learn more](../azure-resource-manager/management/resource-providers-and-types.md?WT.mc_id=Portal-Microsoft_Azure_Support#register-resource-provider-1)):
5656

57-
1. On the Azure portal menu or from the **Home** page, select **Subscriptions**.
58-
2. Select your subscription, and then in the left menu, select **Resource providers** .
57+
1. On the Azure portal, search for and select **Subscriptions**.
58+
2. Select your subscription, and then in the left menu, select **Resource providers**. If you do not see the left menu, select the **Show the menu for < name of your subscription >** icon at the top left part of the page to open it.
5959
3. Make sure the **Microsoft.AzureActiveDirectory** row shows a status of **Registered**. If it doesn't, select the row, and then select **Register**.
6060

6161
1. On the Azure portal menu or from the **Home** page, select **Create a resource**.

0 commit comments

Comments
 (0)