Skip to content

Commit b26872d

Browse files
authored
Merge pull request #103116 from MicrosoftDocs/master
2/03 AM Publish
2 parents ca96eec + 2412e2f commit b26872d

File tree

100 files changed

+239
-195
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

100 files changed

+239
-195
lines changed

articles/active-directory-b2c/claimsproviders.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ manager: celestedg
88
ms.service: active-directory
99
ms.workload: identity
1010
ms.topic: reference
11-
ms.date: 09/10/2018
11+
ms.date: 01/29/2020
1212
ms.author: marsma
1313
ms.subservice: B2C
1414
---
@@ -48,7 +48,7 @@ The **ClaimsProvider** element contains the following child elements:
4848
| Element | Occurrences | Description |
4949
| ------- | ---------- | ----------- |
5050
| Domain | 0:1 | A string that contains the domain name for the claim provider. For example, if your claims provider includes the Facebook technical profile, the domain name is Facebook.com. This domain name is used for all technical profiles defined in the claims provider unless overridden by the technical profile. The domain name can also be referenced in a **domain_hint**. For more information, see the **Redirect sign-in to a social provider** section of [Set up direct sign-in using Azure Active Directory B2C](direct-signin.md). |
51-
| DisplayName | 1:1 | A string that contains the name of the claims provider that can be displayed to users. |
51+
| DisplayName | 1:1 | A string that contains the name of the claims provider. |
5252
| [TechnicalProfiles](technicalprofiles.md) | 0:1 | A set of technical profiles supported by the claim provider |
5353

5454
**ClaimsProvider** organizes how your technical profiles relate to the claims provider. The following example shows the Azure Active Directory claims provider with the Azure Active Directory technical profiles:

articles/active-directory-b2c/claimsschema.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ manager: celestedg
88
ms.service: active-directory
99
ms.workload: identity
1010
ms.topic: reference
11-
ms.date: 09/10/2018
11+
ms.date: 03/02/2020
1212
ms.author: marsma
1313
ms.subservice: B2C
1414
---
@@ -46,8 +46,8 @@ The **ClaimType** element contains the following elements:
4646

4747
| Element | Occurrences | Description |
4848
| ------- | ----------- | ----------- |
49-
| DisplayName | 0:1 | The title that's displayed to users on various screens. The value can be [localized](localization.md). |
50-
| DataType | 0:1 | The type of the claim. The data types of boolean, date, dateTime, int, long, string, stringCollection, alternativeSecurityIdCollection can be used. |
49+
| DisplayName | 1:1 | The title that's displayed to users on various screens. The value can be [localized](localization.md). |
50+
| DataType | 1:1 | The type of the claim. The data types of boolean, date, dateTime, int, long, string, stringCollection can be used. Primitive data type represents the equivalent of C# variable data type. stringCollection represents a collection of strings. For more information see [C# Types and variables](https://docs.microsoft.com/dotnet/csharp/tour-of-csharp/types-and-variables). Date follows ISO 8601 convention. |
5151
| DefaultPartnerClaimTypes | 0:1 | The partner default claim types to use for a specified protocol. The value can be overwritten in the **PartnerClaimType** specified in the **InputClaim** or **OutputClaim** elements. Use this element to specify the default name for a protocol. |
5252
| Mask | 0:1 | An optional string of masking characters that can be applied when displaying the claim. For example, the phone number 324-232-4343 can be masked as XXX-XXX-4343. |
5353
| UserHelpText | 0:1 | A description of the claim type that can be helpful for users to understand its purpose. The value can be [localized](localization.md). |
@@ -61,7 +61,7 @@ The **DefaultPartnerClaimTypes** may contain the following element:
6161

6262
| Element | Occurrences | Description |
6363
| ------- | ----------- | ----------- |
64-
| Protocol | 0:n | List of protocols with their default partner claim type name. |
64+
| Protocol | 1:n | List of protocols with their default partner claim type name. |
6565

6666
The **Protocol** element contains the following attributes:
6767

articles/active-directory-b2c/code-samples.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ author: mmacy
66
manager: celestedg
77

88
ms.author: marsma
9-
ms.date: 01/23/2018
9+
ms.date: 01/29/2020
1010
ms.custom: mvc
1111
ms.topic: sample
1212
ms.service: active-directory
@@ -37,6 +37,7 @@ The following tables provide links to samples for applications including iOS, An
3737
| [openidconnect-nodejs](https://github.com/AzureADQuickStarts/B2C-WebApp-OpenIDConnect-NodeJS) | A Node.js app that provides a quick and easy way to set up a Web application with Express using OpenID Connect. |
3838
| [javascript-nodejs-webapp](https://github.com/AzureADQuickStarts/active-directory-b2c-javascript-nodejs-webapp) | A node.js server that provides a quick and easy way to set up a REST API service using the OAuth2 protocol. |
3939
| [javascript-nodejs-webapi](https://github.com/Azure-Samples/active-directory-b2c-javascript-nodejs-webapi) | A small node.js Web API for Azure AD B2C that shows how to protect your web api and accept B2C access tokens using passport.js. |
40+
| [ms-identity-python-webapp](https://github.com/Azure-Samples/ms-identity-python-webapp/blob/master/README_B2C.md) | Demonstrate how to Integrate B2C of Microsoft identity platform with a Python web application. |
4041

4142
## Single page apps
4243

articles/active-directory-b2c/one-time-password-technical-profile.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: celestedg
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: reference
12-
ms.date: 12/10/2019
12+
ms.date: 02/03/2020
1313
ms.author: marsma
1414
ms.subservice: B2C
1515
---
@@ -73,6 +73,7 @@ The following settings can be used to configure code generation and maintenance:
7373
| CodeLength | No | Length of the code. The default value is `6`. |
7474
| CharacterSet | No | The character set for the code, formatted for use in a regular expression. For example, `a-z0-9A-Z`. The default value is `0-9`. The character set must include a minimum of 10 different characters in the set specified. |
7575
| NumRetryAttempts | No | The number of verification attempts before the code is considered invalid. The default value is `5`. |
76+
| Operation | Yes | The operation to be performed. Possible values: `GenerateCode`, or `VerifyCode`. |
7677
| ReuseSameCode | No | Whether a duplicate code should be given rather than generating a new code when given code has not expired and is still valid. The default value is `false`. |
7778

7879
### Returning error message
@@ -162,4 +163,4 @@ The following example `TechnicalProfile` is used for verifying a code:
162163
<InputClaim ClaimTypeReferenceId="otpGenerated" PartnerClaimType="otpToVerify" />
163164
</InputClaims>
164165
</TechnicalProfile>
165-
```
166+
```

articles/active-directory-b2c/relyingparty.md

Lines changed: 7 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ manager: celestedg
88
ms.service: active-directory
99
ms.workload: identity
1010
ms.topic: reference
11-
ms.date: 01/25/2019
11+
ms.date: 02/02/2020
1212
ms.author: marsma
1313
ms.subservice: B2C
1414
---
@@ -122,6 +122,8 @@ The **SingleSignOn** element contains in the following attribute:
122122
| --------- | -------- | ----------- |
123123
| Scope | Yes | The scope of the single sign-on behavior. Possible values: `Suppressed`, `Tenant`, `Application`, or `Policy`. The `Suppressed` value indicates that the behavior is suppressed. For example, in the case of a single sign-on session, no session is maintained for the user and the user is always prompted for an identity provider selection. The `TrustFramework` value indicates that the behavior is applied for all policies in the trust framework. For example, a user navigating through two policy journeys for a trust framework is not prompted for an identity provider selection. The `Tenant` value indicates that the behavior is applied to all policies in the tenant. For example, a user navigating through two policy journeys for a tenant is not prompted for an identity provider selection. The `Application` value indicates that the behavior is applied to all policies for the application making the request. For example, a user navigating through two policy journeys for an application is not prompted for an identity provider selection. The `Policy` value indicates that the behavior only applies to a policy. For example, a user navigating through two policy journeys for a trust framework is prompted for an identity provider selection when switching between policies. |
124124
| KeepAliveInDays | Yes | Controls how long the user remains signed in. Setting the value to 0 turns off KMSI functionality. For more information, see [Keep me signed in](custom-policy-keep-me-signed-in.md). |
125+
|EnforceIdTokenHintOnLogout| No| Force to pass a previously issued ID token to the logout endpoint as a hint about the end user's current authenticated session with the client. Possible values: `false` (default), or `true`. For more infomation, see [Web sign-in with OpenID Connect](openid-connect.md). |
126+
125127

126128
## JourneyInsights
127129

@@ -172,12 +174,12 @@ The **TechnicalProfile** contains the following elements:
172174

173175
| Element | Occurrences | Description |
174176
| ------- | ----------- | ----------- |
175-
| DisplayName | 0:1 | The string that contains the name of the technical profile that is displayed to users. |
176-
| Description | 0:1 | The string that contains the description of the technical profile that is displayed to users. |
177+
| DisplayName | 1:1 | The string that contains the name of the technical profile. |
178+
| Description | 0:1 | The string that contains the description of the technical profile. |
177179
| Protocol | 1:1 | The protocol used for the federation. |
178180
| Metadata | 0:1 | The collection of *Item* of key/value pairs utilized by the protocol for communicating with the endpoint in the course of a transaction to configure interaction between the relying party and other community participants. |
179-
| OutputClaims | 0:1 | A list of claim types that are taken as output in the technical profile. Each of these elements contains reference to a **ClaimType** already defined in the **ClaimsSchema** section or in a policy from which this policy file inherits. |
180-
| SubjectNamingInfo | 0:1 | The subject name used in tokens. |
181+
| OutputClaims | 1:1 | A list of claim types that are taken as output in the technical profile. Each of these elements contains reference to a **ClaimType** already defined in the **ClaimsSchema** section or in a policy from which this policy file inherits. |
182+
| SubjectNamingInfo | 1:1 | The subject name used in tokens. |
181183

182184
The **Protocol** element contains the following attribute:
183185

articles/active-directory-b2c/technical-profiles-overview.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: celestedg
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: reference
12-
ms.date: 09/10/2018
12+
ms.date: 03/02/2020
1313
ms.author: marsma
1414
ms.subservice: B2C
1515
---
@@ -36,6 +36,7 @@ A technical profile enables these types of scenarios:
3636
- [Self-Asserted](self-asserted-technical-profile.md) - Interact with the user. For example, collect the user's credential to sign in, render the sign-up page, or password reset.
3737
- [Session management](custom-policy-reference-sso.md) - Handle different types of sessions.
3838
- **Application insights**
39+
- [One time password](one-time-password-technical-profile.md) - Provides support for managing the generation and verification of a one-time password.
3940

4041
## Technical profile flow
4142

articles/active-directory-b2c/technicalprofiles.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: celestedg
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: reference
12-
ms.date: 12/10/2019
12+
ms.date: 01/29/2020
1313
ms.author: marsma
1414
ms.subservice: B2C
1515
---
@@ -80,7 +80,7 @@ The **TechnicalProfile** contains the following elements:
8080
| Element | Occurrences | Description |
8181
| ------- | ----------- | ----------- |
8282
| Domain | 0:1 | The domain name for the technical profile. For example, if your technical profile specifies the Facebook identity provider, the domain name is Facebook.com. |
83-
| DisplayName | 0:1 | The name of the technical profile that can be displayed to users. |
83+
| DisplayName | 1:1 | The name of the technical profile that can be displayed to users. |
8484
| Description | 0:1 | The description of the technical profile that can be displayed to users. |
8585
| Protocol | 0:1 | The protocol used for the communication with the other party. |
8686
| Metadata | 0:1 | A collection of key/value pairs that are utilized by the protocol for communicating with the endpoint in the course of a transaction. |

articles/active-directory-b2c/trustframeworkpolicy.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ manager: celestedg
88
ms.service: active-directory
99
ms.workload: identity
1010
ms.topic: reference
11-
ms.date: 09/10/2018
11+
ms.date: 01/31/2020
1212
ms.author: marsma
1313
ms.subservice: B2C
1414
---
@@ -41,7 +41,7 @@ The **TrustFrameworkPolicy** element contains the following attributes:
4141
| TenantId | Yes | The unique identifier of the tenant to which this policy belongs. |
4242
| PolicyId | Yes | The unique identifier for the policy. This identifier must be prefixed by *B2C_1A_* |
4343
| PublicPolicyUri | Yes | The URI for the policy, which is combination of the tenant ID and the policy ID. |
44-
| DeploymentMode | No | Possible values: `Production`, `Debugging`, or `Development`. `Production` is the default. Use this property to debug your policy. For more information, see [Collecting Logs](troubleshoot-with-application-insights.md). |
44+
| DeploymentMode | No | Possible values: `Production`, or `Development`. `Production` is the default. Use this property to debug your policy. For more information, see [Collecting Logs](troubleshoot-with-application-insights.md). |
4545
| UserJourneyRecorderEndpoint | No | The endpoint that is used when **DeploymentMode** is set to `Development`. The value must be `urn:journeyrecorder:applicationinsights`. For more information, see [Collecting Logs](troubleshoot-with-application-insights.md). |
4646

4747

articles/active-directory-b2c/userjourneys.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ manager: celestedg
88
ms.service: active-directory
99
ms.workload: identity
1010
ms.topic: reference
11-
ms.date: 09/10/2018
11+
ms.date: 02/03/2020
1212
ms.author: marsma
1313
ms.subservice: B2C
1414
---
@@ -79,7 +79,7 @@ The **Preconditions** element contains the following element:
7979

8080
| Element | Occurrences | Description |
8181
| ------- | ----------- | ----------- |
82-
| Precondition | 0:n | Depending on the technical profile being used, either redirects the client according to the claims provider selection or makes a server call to exchange claims. |
82+
| Precondition | 1:n | Depending on the technical profile being used, either redirects the client according to the claims provider selection or makes a server call to exchange claims. |
8383

8484

8585
#### Precondition
@@ -162,7 +162,7 @@ The **ClaimsProviderSelection** element contains the following element:
162162

163163
| Element | Occurrences | Description |
164164
| ------- | ----------- | ----------- |
165-
| ClaimsProviderSelection | 0:n | Provides the list of claims providers that can be selected.|
165+
| ClaimsProviderSelection | 1:n | Provides the list of claims providers that can be selected.|
166166

167167
The **ClaimsProviderSelection** element contains the following attributes:
168168

@@ -214,7 +214,7 @@ The **ClaimsExchanges** element contains the following element:
214214

215215
| Element | Occurrences | Description |
216216
| ------- | ----------- | ----------- |
217-
| ClaimsExchange | 0:n | Depending on the technical profile being used, either redirects the client according to the ClaimsProviderSelection that was selected, or makes a server call to exchange claims. |
217+
| ClaimsExchange | 1:n | Depending on the technical profile being used, either redirects the client according to the ClaimsProviderSelection that was selected, or makes a server call to exchange claims. |
218218

219219
The **ClaimsExchange** element contains the following attributes:
220220

articles/active-directory/saas-apps/saml-toolkit-tutorial.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -73,20 +73,20 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
7373

7474
1. In the [Azure portal](https://portal.azure.com/), on the **Azure AD SAML Toolkit** application integration page, find the **Manage** section and select **single sign-on**.
7575
1. On the **Select a single sign-on method** page, select **SAML**.
76-
1. On the **Set up single sign-on with SAML** page, click the edit/pen icon for **Basic SAML Configuration** to edit the settings.
76+
1. On the **Set up single sign-on with SAML** page, click the edit/pen icon for **Basic SAML Configuration** to edit the settings. You can retrieve settings by using the SAML Toolkit SAML Configuration page.
7777

7878
![Edit Basic SAML Configuration](common/edit-urls.png)
7979

8080
1. On the **Basic SAML Configuration** page, enter the values for the following fields:
8181

8282
a. In the **Sign on URL** text box, type a URL:
83-
`https://samltoolkit.azurewebsites.net/`
83+
`https://samltoolkit.azurewebsites.net/SAML/Login/<3digitnumber>`
8484

8585
b. In the **Identifier (Entity ID)** text box, type a URL:
8686
`https://samltoolkit.azurewebsites.net`
8787

8888
c. In the **Reply URL** text box, type a URL:
89-
`https://samltoolkit.azurewebsites.net/SAML/Consume`
89+
`https://samltoolkit.azurewebsites.net/SAML/Consume/<3digitnumber>`
9090

9191
1. On the **Set up single sign-on with SAML** page, in the **SAML Signing Certificate** section, find **Certificate (Raw)** and select **Download** to download the certificate and save it on your computer.
9292

@@ -172,4 +172,4 @@ When you click the Azure AD SAML Toolkit tile in the Access Panel, you should be
172172

173173
- [What is conditional access in Azure Active Directory?](https://docs.microsoft.com/azure/active-directory/conditional-access/overview)
174174

175-
- [Try Azure AD SAML Toolkit with Azure AD](https://aad.portal.azure.com/)
175+
- [Try Azure AD SAML Toolkit with Azure AD](https://aad.portal.azure.com/)

0 commit comments

Comments
 (0)