Skip to content

Commit b65d8d7

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into tamram22-0623a
2 parents f547945 + 973d204 commit b65d8d7

File tree

921 files changed

+11323
-5747
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

921 files changed

+11323
-5747
lines changed

.openpublishing.redirection.azure-monitor.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -146,6 +146,11 @@
146146
"redirect_url": "https://docs.microsoft.com/troubleshoot/azure/azure-monitor/app-insights/auto-instrumentation-troubleshoot",
147147
"redirect_document_id": false
148148
},
149+
{
150+
"source_path_from_root": "/articles/azure-monitor/app/java-on-premises.md",
151+
"redirect_url": "/azure/azure-monitor/app/java-in-process-agent",
152+
"redirect_document_id": false
153+
},
149154
{
150155
"source_path_from_root": "/articles/azure-monitor/app/change-analysis-troubleshoot.md",
151156
"redirect_url": "/azure/azure-monitor/change/change-analysis-troubleshoot",

.openpublishing.redirection.json

Lines changed: 11 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -11116,6 +11116,17 @@
1111611116
"redirect_url": "/azure/azure-resource-manager/management/move-resources-overview",
1111711117
"redirect_document_id": false
1111811118
},
11119+
{
11120+
"source_path_from_root": "/articles/azure-resource-manager/management/create-private-link-access-rest.md",
11121+
"redirect_url": "/azure/azure-resource-manager/management/create-private-link-access-commands",
11122+
"redirect_document_id": false
11123+
},
11124+
{
11125+
"source_path_from_root": "/articles/azure-resource-manager/management/manage-private-link-access-rest.md",
11126+
"redirect_url": "/azure/azure-resource-manager/management/manage-private-link-access-commands",
11127+
"redirect_document_id": false
11128+
},
11129+
1111911130
{
1112011131
"source_path_from_root": "/articles/azure-resource-manager/resource-group-move-resources.md",
1112111132
"redirect_url": "/azure/azure-resource-manager/management/move-resource-group-and-subscription",

articles/active-directory-b2c/TOC.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -183,7 +183,7 @@
183183
href: enable-authentication-web-api.md
184184
- name: Secure API Management API
185185
href: secure-api-management.md
186-
displayName: apim, api management, migrate, b2clogin.com
186+
displayName: api, api management, migrate, b2clogin.com
187187
- name: Microsoft Power Apps
188188
href: /powerapps/maker/portals/configure/configure-azure-ad-b2c-provider
189189
- name: SAML application

articles/active-directory-b2c/application-types.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -67,7 +67,7 @@ In a web application, each execution of a [policy](user-flow-overview.md) takes
6767

6868
Validation of the `id_token` by using a public signing key that is received from Azure AD is sufficient to verify the identity of the user. This process also sets a session cookie that can be used to identify the user on subsequent page requests.
6969

70-
To see this scenario in action, try one of the web application sign in code samples in our [Getting started section](overview.md).
70+
To see this scenario in action, try one of the web application sign-in code samples in our [Getting started section](overview.md).
7171

7272
In addition to facilitating simple sign in, a web server application might also need to access a back-end web service. In this case, the web application can perform a slightly different [OpenID Connect flow](openid-connect.md) and acquire tokens by using authorization codes and refresh tokens. This scenario is depicted in the following [Web APIs section](#web-apis).
7373

@@ -134,7 +134,7 @@ In this flow, the application executes [policies](user-flow-overview.md) and rec
134134

135135
Applications that contain long-running processes or that operate without the presence of a user also need a way to access secured resources such as web APIs. These applications can authenticate and get tokens by using their identities (rather than a user's delegated identity) and by using the OAuth 2.0 client credentials flow. Client credential flow isn't the same as on-behalf-flow and on-behalf-flow shouldn't be used for server-to-server authentication.
136136

137-
The [OAuth 2.0 client credentials flow](./client-credentials-grant-flow.md) is currently in public preview. You can also set up client credential flow using Azure AD and the Microsoft identity platform /token endpoint (`https://login.microsoftonline.com/your-tenant-name.onmicrosoft.com/oauth2/v2.0/token`) for a [Microsoft Graph application](microsoft-graph-get-started.md) or your own application. For more information, check out the [Azure AD token reference](../active-directory/develop/id-tokens.md) article.
137+
For Azure AD B2C, the [OAuth 2.0 client credentials flow](./client-credentials-grant-flow.md) is currently in public preview. However, you can set up client credential flow using Azure AD and the Microsoft identity platform `/token` endpoint (`https://login.microsoftonline.com/your-tenant-name.onmicrosoft.com/oauth2/v2.0/token`) for a [Microsoft Graph application](microsoft-graph-get-started.md) or your own application. For more information, check out the [Azure AD token reference](../active-directory/develop/id-tokens.md) article.
138138

139139
## Unsupported application types
140140

articles/active-directory-b2c/client-credentials-grant-flow.md

Lines changed: 15 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: CelesteDG
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: how-to
12-
ms.date: 06/15/2022
12+
ms.date: 06/21/2022
1313
ms.custom: project-no-code
1414
ms.author: kengaderdus
1515
ms.subservice: B2C
@@ -24,6 +24,8 @@ The OAuth 2.0 client credentials grant flow permits an app (confidential client)
2424

2525
In the client credentials flow, permissions are granted directly to the application itself by an administrator. When the app presents a token to a resource, the resource enforces that the app itself has authorization to perform an action since there's no user involved in the authentication. This article covers the steps needed to authorize an application to call an API, and how to get the tokens needed to call that API.
2626

27+
**This feature is in public preview.**
28+
2729
## App registration overview
2830

2931
To enable your app to sign in with client credentials and call a web API, you register two applications in the Azure AD B2C directory.
@@ -82,7 +84,17 @@ can't contain spaces. The following example demonstrates two app roles, read and
8284

8385
## Step 2. Register an application
8486

85-
To enable your app to sign in with Azure AD B2C using client credentials flow, register your applications (**App 1**). To create the web API app registration, follow these steps:
87+
To enable your app to sign in with Azure AD B2C using client credentials flow, you can use an existing application or register a new one (**App 1**).
88+
89+
If you're using an existing app, make sure the app's `accessTokenAcceptedVersion` is set to `2`:
90+
91+
1. In the Azure portal, search for and select **Azure AD B2C**.
92+
1. Select **App registrations**, and then select the your existing app from the list.
93+
1. In the left menu, under **Manage**, select **Manifest** to open the manifest editor.
94+
1. Locate the `accessTokenAcceptedVersion` element, and set its value to `2`.
95+
1. At the top of the page, select **Save** to save the changes.
96+
97+
To create a new web app registration, follow these steps:
8698

8799
1. In the Azure portal, search for and select **Azure AD B2C**
88100
1. Select **App registrations**, and then select **New registration**.
@@ -178,7 +190,7 @@ $appId = "<client ID>"
178190
$secret = "<client secret>"
179191
$endpoint = "https://<tenant-name>.b2clogin.com/<tenant-name>.onmicrosoft.com/<policy>/oauth2/v2.0/token"
180192
$scope = "<Your API id uri>/.default"
181-
$body = "granttype=client_credentials&scope=" + $scope + "&client_id=" + $appId + "&client_secret=" + $secret
193+
$body = "grant_type=client_credentials&scope=" + $scope + "&client_id=" + $appId + "&client_secret=" + $secret
182194
183195
$token = Invoke-RestMethod -Method Post -Uri $endpoint -Body $body
184196
```

articles/active-directory-b2c/enable-authentication-web-api.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -126,7 +126,7 @@ npm install passport-azure-ad
126126
npm install morgan
127127
```
128128

129-
The [morgen package](https://www.npmjs.com/package/morgan) is an HTTP request logger middleware for Node.js.
129+
The [morgan package](https://www.npmjs.com/package/morgan) is an HTTP request logger middleware for Node.js.
130130

131131
---
132132

articles/active-directory-b2c/identity-provider-swissid.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -44,8 +44,8 @@ To enable sign-in for users with a SwissID account in Azure AD B2C, you need to
4444

4545
|Key |Note |
4646
|---------|---------|
47-
| Environment| The SwissID OpenId well-known configuration endpoint. For example, <https://login.sandbox.pre.swissid.ch/idp/oauth2/.well-known/openid-configuration>. |
48-
| Client ID | The SwissID client ID. For example, 11111111-2222-3333-4444-555555555555. |
47+
| Environment| The SwissID OpenId well-known configuration endpoint. For example, `https://login.sandbox.pre.swissid.ch/idp/oauth2/.well-known/openid-configuration`. |
48+
| Client ID | The SwissID client ID. For example, `11111111-2222-3333-4444-555555555555`. |
4949
| Password| The SwissID client secret.|
5050

5151

articles/active-directory-b2c/implicit-flow-single-page-application.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Single-page application sign-in using the OAuth 2.0 implicit flow in Azure Active Directory B2C
33
titleSuffix: Azure AD B2C
4-
description: Learn how to add single-page sign in using the OAuth 2.0 implicit flow with Azure Active Directory B2C.
4+
description: Learn how to add single-page sign-in using the OAuth 2.0 implicit flow with Azure Active Directory B2C.
55
services: active-directory-b2c
66
author: kengaderdus
77
manager: CelesteDG
@@ -30,7 +30,7 @@ Some frameworks, like [MSAL.js 1.x](https://github.com/AzureAD/microsoft-authent
3030

3131
Azure AD B2C extends the standard OAuth 2.0 implicit flow to more than simple authentication and authorization. Azure AD B2C introduces the [policy parameter](user-flow-overview.md). With the policy parameter, you can use OAuth 2.0 to add policies to your app, such as sign-up, sign-in, and profile management user flows. In the example HTTP requests in this article, we use **{tenant}.onmicrosoft.com** for illustration. Replace `{tenant}` with [the name of your tenant](tenant-management.md#get-your-tenant-name) if you've one. Also, you need to have [created a user flow](tutorial-create-user-flows.md?pivots=b2c-user-flow).
3232

33-
We use the following figure to illustrate implicit sign in flow. Each step is described in detail later in the article.
33+
We use the following figure to illustrate implicit sign-in flow. Each step is described in detail later in the article.
3434

3535
![Swimlane-style diagram showing the OpenID Connect implicit flow](./media/implicit-flow-single-page-application/convergence_scenarios_implicit.png)
3636

@@ -69,7 +69,7 @@ The parameters in the HTTP GET request are explained in the table below.
6969
| scope | Yes | A space-separated list of scopes. A single scope value indicates to Azure AD both of the permissions that are being requested. The `openid` scope indicates a permission to sign in the user and get data about the user in the form of ID tokens. The `offline_access` scope is optional for web apps. It indicates that your app needs a refresh token for long-lived access to resources. |
7070
| state | No | A value included in the request that also is returned in the token response. It can be a string of any content that you want to use. Usually, a randomly generated, unique value is used, to prevent cross-site request forgery attacks. The state is also used to encode information about the user's state in the app before the authentication request occurred, for example, the page the user was on, or the user flow that was being executed. |
7171
| nonce | Yes | A value included in the request (generated by the app) that is included in the resulting ID token as a claim. The app can then verify this value to mitigate token replay attacks. Usually, the value is a randomized, unique string that can be used to identify the origin of the request. |
72-
| prompt | No | The type of user interaction that's required. Currently, the only valid value is `login`. This parameter forces the user to enter their credentials on that request. Single sign-on doesn't take effect. |
72+
| prompt | No | The type of user interaction that's required. Currently, the only valid value is `login`. This parameter forces the user to enter their credentials on that request. Single Sign-On doesn't take effect. |
7373

7474
This is the interactive part of the flow. The user is asked to complete the policy's workflow. The user might have to enter their username and password, sign in with a social identity, sign up for a local account, or any other number of steps. User actions depend on how the user flow is defined.
7575

@@ -238,7 +238,7 @@ ID tokens and access tokens both expire after a short period of time. Your app m
238238

239239
## Send a sign-out request
240240

241-
When you want to sign the user out of the app, redirect the user to Azure AD B2C's sign-out endpoint. You can then clear the user's session in the app. If you don't redirect the user, they might be able to reauthenticate to your app without entering their credentials again because they have a valid single sign-on session with Azure AD B2C.
241+
When you want to sign the user out of the app, redirect the user to Azure AD B2C's sign-out endpoint. You can then clear the user's session in the app. If you don't redirect the user, they might be able to reauthenticate to your app without entering their credentials again because they have a valid Single Sign-On session with Azure AD B2C.
242242

243243
You can simply redirect the user to the `end_session_endpoint` that is listed in the same OpenID Connect metadata document described in [Validate the ID token](#validate-the-id-token). For example:
244244

@@ -255,8 +255,8 @@ GET https://{tenant}.b2clogin.com/{tenant}.onmicrosoft.com/{policy}/oauth2/v2.0/
255255

256256

257257
> [!NOTE]
258-
> Directing the user to the `end_session_endpoint` clears some of the user's single sign-on state with Azure AD B2C. However, it doesn't sign the user out of the user's social identity provider session. If the user selects the same identity provider during a subsequent sign in, the user is re-authenticated, without entering their credentials. If a user wants to sign out of your Azure AD B2C application, it doesn't necessarily mean they want to completely sign out of their Facebook account, for example. However, for local accounts, the user's session will be ended properly.
259-
>
258+
> Directing the user to the `end_session_endpoint` clears some of the user's Single Sign-On state with Azure AD B2C. However, it doesn't sign the user out of the user's social identity provider session. If the user selects the same identity provider during a subsequent sign in, the user is re-authenticated, without entering their credentials. If a user wants to sign out of your Azure AD B2C application, it doesn't necessarily mean they want to completely sign out of their Facebook account, for example. However, for local accounts, the user's session will be ended properly.
259+
260260

261261
## Next steps
262262

articles/active-directory-b2c/microsoft-graph-get-started.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: CelesteDG
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: how-to
12-
ms.date: 09/20/2021
12+
ms.date: 06/24/2022
1313
ms.author: kengaderdus
1414
ms.subservice: B2C
1515
---
@@ -36,7 +36,7 @@ There are two modes of communication you can use when working with the Microsoft
3636

3737
You enable the **Automated** interaction scenario by creating an application registration shown in the following sections.
3838

39-
Although the OAuth 2.0 client credentials grant flow is not currently directly supported by the Azure AD B2C authentication service, you can set up client credential flow using Azure AD and the Microsoft identity platform /token endpoint for an application in your Azure AD B2C tenant. An Azure AD B2C tenant shares some functionality with Azure AD enterprise tenants.
39+
Azure AD B2C authentication service directly supports OAuth 2.0 client credentials grant flow (**currently in public preview**), but you can't use it to manage your Azure AD B2C resources via Microsoft Graph API. However, you can set up [client credential flow](../active-directory/develop/v2-oauth2-client-creds-grant-flow.md) using Azure AD and the Microsoft identity platform `/token` endpoint for an application in your Azure AD B2C tenant.
4040

4141
## Register management application
4242

articles/active-directory-b2c/relyingparty.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ manager: CelesteDG
88
ms.service: active-directory
99
ms.workload: identity
1010
ms.topic: reference
11-
ms.date: 11/09/2021
11+
ms.date: 06/26/2022
1212
ms.custom: project-no-code
1313
ms.author: kengaderdus
1414
ms.subservice: B2C
@@ -286,7 +286,7 @@ The **SubjectNamingInfo** element contains the following attribute:
286286

287287
| Attribute | Required | Description |
288288
| --------- | -------- | ----------- |
289-
| ClaimType | Yes | A reference to an output claim's **PartnerClaimType**. The output claims must be defined in the relying party policy **OutputClaims** collection. |
289+
| ClaimType | Yes | A reference to an output claim's **PartnerClaimType**. The output claims must be defined in the relying party policy **OutputClaims** collection with a **PartnerClaimType**. For example, `<OutputClaim ClaimTypeReferenceId="objectId" PartnerClaimType="sub" />`, or `<OutputClaim ClaimTypeReferenceId="signInName" PartnerClaimType="signInName" />`. |
290290
| Format | No | Used for SAML Relying parties to set the **NameId format** returned in the SAML Assertion. |
291291

292292
The following example shows how to define an OpenID Connect relying party. The subject name info is configured as the `objectId`:

0 commit comments

Comments
 (0)