Skip to content

Commit b28e9f4

Browse files
authored
Merge pull request #153817 from MicrosoftDocs/master
4/08 PM Publish
2 parents c3739cb + 9e9a65b commit b28e9f4

File tree

106 files changed

+1900
-777
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

106 files changed

+1900
-777
lines changed

.openpublishing.redirection.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -870,6 +870,11 @@
870870
"redirect_url": "/azure/active-directory-b2c/custom-policy-ui-customization",
871871
"redirect_document_id": false
872872
},
873+
{
874+
"source_path_from_root": "/articles/active-directory-b2c/custom-policy-trust-frameworks.md",
875+
"redirect_url": "/azure/active-directory-b2c/custom-policy-overview",
876+
"redirect_document_id": false
877+
},
873878
{
874879
"source_path_from_root": "/articles/active-directory-b2c/active-directory-b2c-ui-customization-custom-dynamic.md",
875880
"redirect_url": "/azure/active-directory-b2c/custom-policy-ui-customization-dynamic",

articles/active-directory-b2c/TOC.yml

Lines changed: 6 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -79,20 +79,21 @@
7979
href: tokens-overview.md
8080
- name: Request access token
8181
href: access-tokens.md
82-
- name: Policy keys
83-
href: policy-keys-overview.md
84-
- name: User flow and policy
82+
- name: User experience
83+
expanded: true
8584
items:
86-
- name: User flows
85+
- name: User flows and custom policies
8786
href: user-flow-overview.md
88-
- name: Custom policies
87+
- name: Custom policy overview
8988
href: custom-policy-overview.md
9089
- name: User accounts
9190
href: user-overview.md
9291
- name: User profile attributes
9392
href: user-profile-attributes.md
9493
- name: Identity Protection and Conditional Access
9594
href: conditional-access-identity-protection-overview.md
95+
- name: Policy keys
96+
href: policy-keys-overview.md
9697
- name: How-to guides
9798
items:
9899
- name: App integration
@@ -268,8 +269,6 @@
268269
href: add-api-connector.md
269270
- name: Custom policy
270271
items:
271-
- name: Custom policy overview
272-
href: custom-policy-trust-frameworks.md
273272
- name: Get started with custom policies
274273
href: custom-policy-get-started.md
275274
- name: Custom email verification

articles/active-directory-b2c/analytics-with-application-insights.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -248,7 +248,7 @@ To fit your business needs, you might want to record more claims. To add a claim
248248

249249
### Manipulate claims
250250

251-
You can use [input claims transformations](custom-policy-trust-frameworks.md#manipulating-your-claims) to modify the input claims or generate new ones before sending them to Application Insights. In the following example, the technical profile includes the `CheckIsAdmin` input claims transformation.
251+
You can use [input claims transformations](custom-policy-overview.md#manipulating-your-claims) to modify the input claims or generate new ones before sending them to Application Insights. In the following example, the technical profile includes the `CheckIsAdmin` input claims transformation.
252252

253253
```xml
254254
<TechnicalProfile Id="AppInsights-SignInComplete">
@@ -265,7 +265,7 @@ You can use [input claims transformations](custom-policy-trust-frameworks.md#man
265265

266266
### Add events
267267

268-
To add an event, create a new technical profile that includes the `AppInsights-Common` technical profile. Then add the new technical profile as an orchestration step to the [user journey](custom-policy-trust-frameworks.md#orchestration-steps). Use the [Precondition](userjourneys.md#preconditions) element to trigger the event when you're ready. For example, report the event only when users run through multifactor authentication.
268+
To add an event, create a new technical profile that includes the `AppInsights-Common` technical profile. Then add the new technical profile as an orchestration step to the [user journey](custom-policy-overview.md#orchestration-steps). Use the [Precondition](userjourneys.md#preconditions) element to trigger the event when you're ready. For example, report the event only when users run through multifactor authentication.
269269

270270
```xml
271271
<TechnicalProfile Id="AppInsights-MFA-Completed">

articles/active-directory-b2c/best-practices.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,7 @@ The following best practices and recommendations cover some of the primary aspec
2222

2323
| Best practice | Description |
2424
|--|--|
25-
| Choose user flows for most scenarios | The Identity Experience Framework of Azure AD B2C is the core strength of the service. Policies fully describe identity experiences such as sign-up, sign-in, or profile editing. To help you set up the most common identity tasks, the Azure AD B2C portal includes predefined, configurable policies called user flows. With user flows, you can create great user experiences in minutes, with just a few clicks. [Learn when to use user flows vs. custom policies](custom-policy-overview.md#comparing-user-flows-and-custom-policies).|
25+
| Choose user flows for most scenarios | The Identity Experience Framework of Azure AD B2C is the core strength of the service. Policies fully describe identity experiences such as sign-up, sign-in, or profile editing. To help you set up the most common identity tasks, the Azure AD B2C portal includes predefined, configurable policies called user flows. With user flows, you can create great user experiences in minutes, with just a few clicks. [Learn when to use user flows vs. custom policies](user-flow-overview.md#comparing-user-flows-and-custom-policies).|
2626
| App registrations | Every application (web, native) and API that is being secured must be registered in Azure AD B2C. If an app has both a web and native version of iOS and Android, you can register them as one application in Azure AD B2C with the same client ID. Learn how to [register OIDC, SAML, web, and native apps](./tutorial-register-applications.md?tabs=applications). Learn more about [application types that can be used in Azure AD B2C](./application-types.md). |
2727
| Move to monthly active users billing | Azure AD B2C has moved from monthly active authentications to monthly active users (MAU) billing. Most customers will find this model cost-effective. [Learn more about monthly active users billing](https://azure.microsoft.com/updates/mau-billing/). |
2828

0 commit comments

Comments
 (0)