You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
- Added support for user input validation according to the predicate rules defined in the policy.
30
-
31
-
## 2.0.0
32
-
33
-
- Self-asserted page (`selfasserted`)
34
-
- Added support for [display controls](display-controls.md) in custom policies.
35
-
36
-
## 1.2.0
37
-
38
-
- All pages
39
-
- Accessibility fixes
40
-
- You can now add the `data-preload="true"` attribute [in your HTML tags](custom-policy-ui-customization.md#guidelines-for-using-custom-page-content) to control the load order for CSS and JavaScript.
41
-
- Load linked CSS files at the same time as your HTML template so it doesn't 'flicker' between loading the files.
42
-
- Control the order in which your `script` tags are fetched and executed before the page load.
43
-
- Email field is now `type=email` and mobile keyboards will provide the correct suggestions
44
-
- Support for Chrome translate
45
-
- Unified and self-asserted pages
46
-
- The username/email and password fields now use the `form` HTML element to allow Edge and Internet Explorer (IE) to properly save this information.
47
-
- Self-asserted page
48
-
- Added a configurable user input validation delay for improved user experience.
49
-
50
-
## 1.1.0
51
-
52
-
- Exception page (globalexception)
53
-
- Accessibility fix
54
-
- Removed the default message when there is no contact from the policy
55
-
- Default CSS removed
56
-
- MFA page (multifactor)
57
-
- 'Confirm Code' button removed
58
-
- The input field for the code now only takes input up to six (6) characters
59
-
- The page will automatically attempt to verify the code entered when a 6-digit code is entered, without any button having to be clicked
60
-
- If the code is wrong, the input field is automatically cleared
61
-
- After three (3) attempts with an incorrect code, B2C sends an error back to the relying party
62
-
- Accessibility fixes
63
-
- Default CSS removed
64
-
- Self-asserted page (selfasserted)
65
-
- Removed cancel alert
66
-
- CSS class for error elements
67
-
- Show/hide error logic improved
68
-
- Default CSS removed
69
-
- Unified SSP (unifiedssp)
70
-
- Added keep me signed in (KMSI) control
71
-
72
-
## 1.0.0
23
+
## Self-asserted page (selfasserted)
24
+
25
+
**2.1.0**
26
+
27
+
- Localization and accessibility fixes.
28
+
29
+
**2.0.0**
30
+
31
+
- Added support for [display controls](display-controls.md) in custom policies.
32
+
33
+
**1.2.0**
34
+
35
+
- The username/email and password fields now use the `form` HTML element to allow Edge and Internet Explorer (IE) to properly save this information.
36
+
- Added a configurable user input validation delay for improved user experience.
37
+
- Accessibility fixes
38
+
- You can now add the `data-preload="true"` attribute [in your HTML tags](custom-policy-ui-customization.md#guidelines-for-using-custom-page-content) to control the load order for CSS and JavaScript.
39
+
- Load linked CSS files at the same time as your HTML template so it doesn't 'flicker' between loading the files.
40
+
- Control the order in which your `script` tags are fetched and executed before the page load.
41
+
- Email field is now `type=email` and mobile keyboards will provide the correct suggestions
42
+
- Support for Chrome translate
43
+
44
+
**1.1.0**
45
+
46
+
- Removed cancel alert
47
+
- CSS class for error elements
48
+
- Show/hide error logic improved
49
+
- Default CSS removed
50
+
51
+
**1.0.0**
52
+
53
+
- Initial release
54
+
55
+
## Unified sign-in sign-up page with password reset link (unifiedssp)
56
+
57
+
**2.1.0**
58
+
59
+
- Added support for multiple sign-up links.
60
+
- Added support for user input validation according to the predicate rules defined in the policy.
61
+
62
+
**1.2.0**
63
+
64
+
- The username/email and password fields now use the `form` HTML element to allow Edge and Internet Explorer (IE) to properly save this information.
65
+
- Accessibility fixes
66
+
- You can now add the `data-preload="true"` attribute [in your HTML tags](custom-policy-ui-customization.md#guidelines-for-using-custom-page-content) to control the load order for CSS and JavaScript.
67
+
- Load linked CSS files at the same time as your HTML template so it doesn't 'flicker' between loading the files.
68
+
- Control the order in which your `script` tags are fetched and executed before the page load.
69
+
- Email field is now `type=email` and mobile keyboards will provide the correct suggestions
70
+
- Support for Chrome translate
71
+
72
+
**1.1.0**
73
+
74
+
- Added keep me signed in (KMSI) control
75
+
76
+
**1.0.0**
77
+
78
+
- Initial release
79
+
80
+
## MFA page (multifactor)
81
+
82
+
**1.2.1**
83
+
84
+
- Accessibility fixes on default templates
85
+
86
+
**1.2.0**
87
+
88
+
- Accessibility fixes
89
+
- You can now add the `data-preload="true"` attribute [in your HTML tags](custom-policy-ui-customization.md#guidelines-for-using-custom-page-content) to control the load order for CSS and JavaScript.
90
+
- Load linked CSS files at the same time as your HTML template so it doesn't 'flicker' between loading the files.
91
+
- Control the order in which your `script` tags are fetched and executed before the page load.
92
+
- Email field is now `type=email` and mobile keyboards will provide the correct suggestions
93
+
- Support for Chrome translate
94
+
95
+
**1.1.0**
96
+
97
+
- 'Confirm Code' button removed
98
+
- The input field for the code now only takes input up to six (6) characters
99
+
- The page will automatically attempt to verify the code entered when a 6-digit code is entered, without any button having to be clicked
100
+
- If the code is wrong, the input field is automatically cleared
101
+
- After three (3) attempts with an incorrect code, B2C sends an error back to the relying party
102
+
- Accessibility fixes
103
+
- Default CSS removed
104
+
105
+
**1.0.0**
106
+
107
+
- Initial release
108
+
109
+
## Exception Page (globalexception)
110
+
111
+
**1.2.0**
112
+
113
+
- Accessibility fixes
114
+
- You can now add the `data-preload="true"` attribute [in your HTML tags](custom-policy-ui-customization.md#guidelines-for-using-custom-page-content) to control the load order for CSS and JavaScript.
115
+
- Load linked CSS files at the same time as your HTML template so it doesn't 'flicker' between loading the files.
116
+
- Control the order in which your `script` tags are fetched and executed before the page load.
117
+
- Email field is now `type=email` and mobile keyboards will provide the correct suggestions
118
+
- Support for Chrome translate
119
+
120
+
**1.1.0**
121
+
122
+
- Accessibility fix
123
+
- Removed the default message when there is no contact from the policy
124
+
- Default CSS removed
125
+
126
+
**1.0.0**
127
+
128
+
- Initial release
129
+
130
+
## Other pages (ProviderSelection, ClaimsConsent, UnifiedSSD)
131
+
132
+
**1.2.0**
133
+
134
+
- Accessibility fixes
135
+
- You can now add the `data-preload="true"` attribute [in your HTML tags](custom-policy-ui-customization.md#guidelines-for-using-custom-page-content) to control the load order for CSS and JavaScript.
136
+
- Load linked CSS files at the same time as your HTML template so it doesn't 'flicker' between loading the files.
137
+
- Control the order in which your `script` tags are fetched and executed before the page load.
138
+
- Email field is now `type=email` and mobile keyboards will provide the correct suggestions
Copy file name to clipboardExpand all lines: articles/active-directory/develop/active-directory-certificate-credentials.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -32,7 +32,7 @@ To compute the assertion, you can use one of the many JWT libraries in the langu
32
32
| --- | --- |
33
33
|`alg`| Should be **RS256**|
34
34
|`typ`| Should be **JWT**|
35
-
|`x5t`| The X.509 certificate hash (also known as the cert's SHA-1 *thumbprint*) encoded as a Base64 string value. For example, given an X.509 certificate hash of `84E05C1D98BCE3A5421D225B140B36E86A3D5534`, the `x5t` claim would be `hOBcHZi846VCHSJbFAs26Go9VTQ`. |
35
+
|`x5t`| The X.509 certificate hash's (also known as the cert's SHA-1 *thumbprint*) Hex representation encoded as a Base64 string value. For example, given an X.509 certificate hash of `84E05C1D98BCE3A5421D225B140B36E86A3D5534` (Hex), the `x5t` claim would be `hOBcHZi846VCHSJbFAs26Go9VTQ=` (Base64). |
Copy file name to clipboardExpand all lines: articles/active-directory/develop/active-directory-claims-mapping.md
+32-33Lines changed: 32 additions & 33 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -7,10 +7,10 @@ author: rwike77
7
7
manager: CelesteDG
8
8
ms.service: active-directory
9
9
ms.subservice: develop
10
-
ms.custom: aaddev
10
+
ms.custom: aaddev
11
11
ms.workload: identity
12
12
ms.topic: how-to
13
-
ms.date: 08/06/2020
13
+
ms.date: 08/25/2020
14
14
ms.author: ryanwi
15
15
ms.reviewer: paulgarn, hirsin, jeedes, luleon
16
16
---
@@ -138,7 +138,6 @@ There are certain sets of claims that define how and when they're used in tokens
138
138
| onprem_sid |
139
139
| openid2_id |
140
140
| password |
141
-
| platf |
142
141
| polids |
143
142
| pop_jwk |
144
143
| preferred_username |
@@ -243,11 +242,11 @@ To control what claims are emitted and where the data comes from, use the proper
243
242
244
243
**Summary:** This property determines whether the basic claim set is included in tokens affected by this policy.
245
244
246
-
- If set to True, all claims in the basic claim set are emitted in tokens affected by the policy.
245
+
- If set to True, all claims in the basic claim set are emitted in tokens affected by the policy.
247
246
- If set to False, claims in the basic claim set are not in the tokens, unless they are individually added in the claims schema property of the same policy.
248
247
249
-
> [!NOTE]
250
-
> Claims in the core claim set are present in every token, regardless of what this property is set to.
248
+
> [!NOTE]
249
+
> Claims in the core claim set are present in every token, regardless of what this property is set to.
251
250
252
251
### Claims schema
253
252
@@ -262,14 +261,14 @@ For each claim schema entry defined in this property, certain information is req
262
261
263
262
**Value:** The Value element defines a static value as the data to be emitted in the claim.
264
263
265
-
**Source/ID pair:** The Source and ID elements define where the data in the claim is sourced from.
264
+
**Source/ID pair:** The Source and ID elements define where the data in the claim is sourced from.
266
265
267
266
**Source/ExtensionID pair:** The Source and ExtensionID elements define the directory schema extension attribute where the data in the claim is sourced from. For more information, see [Using directory schema extension attributes in claims](active-directory-schema-extensions.md).
268
267
269
-
Set the Source element to one of the following values:
268
+
Set the Source element to one of the following values:
270
269
271
-
- "user": The data in the claim is a property on the User object.
272
-
- "application": The data in the claim is a property on the application (client) service principal.
270
+
- "user": The data in the claim is a property on the User object.
271
+
- "application": The data in the claim is a property on the application (client) service principal.
273
272
- "resource": The data in the claim is a property on the resource service principal.
274
273
- "audience": The data in the claim is a property on the service principal that is the audience of the token (either the client or resource service principal).
275
274
- "company": The data in the claim is a property on the resource tenant's Company object.
@@ -344,7 +343,7 @@ The ID element identifies which property on the source provides the value for th
344
343
345
344
**String:** ClaimsTransformation
346
345
347
-
**Data type:** JSON blob, with one or more transformation entries
346
+
**Data type:** JSON blob, with one or more transformation entries
348
347
349
348
**Summary:** Use this property to apply common transformations to source data, to generate the output data for claims specified in the Claims Schema.
350
349
@@ -363,7 +362,7 @@ Based on the method chosen, a set of inputs and outputs is expected. Define the
363
362
364
363
**InputClaims:** Use an InputClaims element to pass the data from a claim schema entry to a transformation. It has two attributes: **ClaimTypeReferenceId** and **TransformationClaimType**.
365
364
366
-
-**ClaimTypeReferenceId** is joined with ID element of the claim schema entry to find the appropriate input claim.
365
+
-**ClaimTypeReferenceId** is joined with ID element of the claim schema entry to find the appropriate input claim.
367
366
-**TransformationClaimType** is used to give a unique name to this input. This name must match one of the expected inputs for the transformation method.
368
367
369
368
**InputParameters:** Use an InputParameters element to pass a constant value to a transformation. It has two attributes: **Value** and **ID**.
@@ -415,7 +414,7 @@ Based on the method chosen, a set of inputs and outputs is expected. Define the
415
414
416
415
A custom signing key must be assigned to the service principal object for a claims mapping policy to take effect. This ensures acknowledgment that tokens have been modified by the creator of the claims mapping policy and protects applications from claims mapping policies created by malicious actors. In order to add a custom signing key, you can use the Azure PowerShell cmdlet `new-azureadapplicationkeycredential` to create a symmetric key credential for your Application object. For more information on this Azure PowerShell cmdlet, see [New-AzureADApplicationKeyCredential](/powerShell/module/Azuread/New-AzureADApplicationKeyCredential?view=azureadps-2.0).
417
416
418
-
Apps that have claims mapping enabled must validate their token signing keys by appending `appid={client_id}` to their [OpenID Connect metadata requests](v2-protocols-oidc.md#fetch-the-openid-connect-metadata-document). Below is the format of the OpenID Connect metadata document you should use:
417
+
Apps that have claims mapping enabled must validate their token signing keys by appending `appid={client_id}` to their [OpenID Connect metadata requests](v2-protocols-oidc.md#fetch-the-openid-connect-metadata-document). Below is the format of the OpenID Connect metadata document you should use:
2. To see your new policy, and to get the policy ObjectId, run the following command:
468
-
467
+
469
468
``` powershell
470
469
Get-AzureADPolicy
471
470
```
472
471
1. Assign the policy to your service principal. You also need to get the ObjectId of your service principal.
473
472
1. To see all your organization's service principals, you can [query the Microsoft Graph API](/graph/traverse-the-graph). Or, in [Microsoft Graph Explorer](https://developer.microsoft.com/graph/graph-explorer), sign in to your Azure AD account.
474
-
2. When you have the ObjectId of your service principal, run the following command:
475
-
473
+
2. When you have the ObjectId of your service principal, run the following command:
474
+
476
475
``` powershell
477
476
Add-AzureADServicePrincipalPolicy -Id <ObjectId of the ServicePrincipal> -RefObjectId <ObjectId of the Policy>
478
477
```
@@ -482,21 +481,21 @@ In this example, you create a policy that removes the basic claim set from token
482
481
In this example, you create a policy that adds the EmployeeID and TenantCountry to tokens issued to linked service principals. The EmployeeID is emitted as the name claim type in both SAML tokens and JWTs. The TenantCountry is emitted as the country/region claim type in both SAML tokens and JWTs. In this example, we continue to include the basic claims set in the tokens.
483
482
484
483
1. Create a claims mapping policy. This policy, linked to specific service principals, adds the EmployeeID and TenantCountry claims to tokens.
485
-
1. To create the policy, run the following command:
486
-
484
+
1. To create the policy, run the following command:
2. To see your new policy, and to get the policy ObjectId, run the following command:
492
-
493
-
``` powershell
491
+
492
+
``` powershell
494
493
Get-AzureADPolicy
495
494
```
496
-
1. Assign the policy to your service principal. You also need to get the ObjectId of your service principal.
495
+
1. Assign the policy to your service principal. You also need to get the ObjectId of your service principal.
497
496
1. To see all your organization's service principals, you can [query the Microsoft Graph API](/graph/traverse-the-graph). Or, in [Microsoft Graph Explorer](https://developer.microsoft.com/graph/graph-explorer), sign in to your Azure AD account.
498
-
2. When you have the ObjectId of your service principal, run the following command:
499
-
497
+
2. When you have the ObjectId of your service principal, run the following command:
498
+
500
499
``` powershell
501
500
Add-AzureADServicePrincipalPolicy -Id <ObjectId of the ServicePrincipal> -RefObjectId <ObjectId of the Policy>
502
501
```
@@ -507,20 +506,20 @@ In this example, you create a policy that emits a custom claim "JoinedData" to J
507
506
508
507
1. Create a claims mapping policy. This policy, linked to specific service principals, adds the EmployeeID and TenantCountry claims to tokens.
509
508
1. To create the policy, run the following command:
2. To see your new policy, and to get the policy ObjectId, run the following command:
516
-
513
+
514
+
2. To see your new policy, and to get the policy ObjectId, run the following command:
515
+
517
516
``` powershell
518
517
Get-AzureADPolicy
519
518
```
520
-
1. Assign the policy to your service principal. You also need to get the ObjectId of your service principal.
519
+
1. Assign the policy to your service principal. You also need to get the ObjectId of your service principal.
521
520
1. To see all your organization's service principals, you can [query the Microsoft Graph API](/graph/traverse-the-graph). Or, in [Microsoft Graph Explorer](https://developer.microsoft.com/graph/graph-explorer), sign in to your Azure AD account.
522
-
2. When you have the ObjectId of your service principal, run the following command:
523
-
521
+
2. When you have the ObjectId of your service principal, run the following command:
522
+
524
523
``` powershell
525
524
Add-AzureADServicePrincipalPolicy -Id <ObjectId of the ServicePrincipal> -RefObjectId <ObjectId of the Policy>
0 commit comments