Skip to content

Commit b9c500a

Browse files
authored
Merge pull request #214433 from kengaderdus/improve-azure-ad-b2c-docs-fy23q2
[Azure AD B2C] Azure AD B2C docs improvements fy23q2 work
2 parents 9de1641 + 98c1207 commit b9c500a

File tree

62 files changed

+3776
-171
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

62 files changed

+3776
-171
lines changed

.openpublishing.redirection.active-directory.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -10906,6 +10906,11 @@
1090610906
"redirect_url": "/azure/active-directory-b2c/enable-authentication-in-node-web-app-with-api",
1090710907
"redirect_document_id": false
1090810908
},
10909+
{
10910+
"source_path_from_root": "/articles/active-directory-b2c/tenant-management.md",
10911+
"redirect_url": "/azure/active-directory-b2c/tenant-management-add-administrator",
10912+
"redirect_document_id": false
10913+
},
1090910914
{
1091010915
"source_path": "articles/active-directory/managed-identities-azure-resources/how-to-manage-ua-identity-arm.md",
1091110916
"redirect_url": "/azure/active-directory/managed-identities-azure-resources/how-manage-user-assigned-managed-identities?pivots=identity-mi-methods-arm",

articles/active-directory-b2c/TOC.yml

Lines changed: 36 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -37,8 +37,17 @@
3737
# What keywords users are searching in TOC: https://review.docs.microsoft.com/en-us/help/contribute/kusto/samples/discoverability-toc-filter?branch=main
3838
# href:tutorial-create-user-flows.md
3939
- name: 4 - Manage your tenant
40-
href: tenant-management.md
41-
displayName: break glass account, emergence account
40+
items:
41+
- name: Add administrator (work account)
42+
href: tenant-management-manage-administrator.md
43+
- name: Manage emergency access
44+
href: tenant-management-emergency-access-account.md
45+
displayName: break glass account, emergence account
46+
- name: Check tenant creation permission
47+
href: tenant-management-check-tenant-creation-permission.md
48+
- name: Find tenant name and ID
49+
href: tenant-management-read-tenant-name.md
50+
displayName: tenant name, tenant ID, tenant details
4251
- name: 5 - Clean up and delete tenant
4352
href: tutorial-delete-tenant.md
4453
# Node Samples
@@ -462,8 +471,32 @@
462471
- name: Integrate with our technology partners
463472
items:
464473
- name: Azure AD B2C partner gallery
465-
href: partner-gallery.md
474+
href: partner-gallery.md
466475
displayName: marketplace, integration, extensibility, extend, customization, customisation
476+
- name: Custom policies guide series
477+
items:
478+
- name: 1 - Overview
479+
href: custom-policies-series-overview.md
480+
- name: 2 - Create Hello World custom policies
481+
href: custom-policies-series-hello-world.md
482+
- name: 3 - Collect user input using custom policy
483+
href: custom-policies-series-collect-user-input.md
484+
- name: 4 - Validate user input custom policy
485+
href: custom-policies-series-validate-user-input.md
486+
- name: 5 - Create branching in user journeys
487+
href: custom-policies-series-branch-user-journey.md
488+
- name: 6 - Validate custom policy files
489+
href: custom-policies-series-install-xml-extensions.md
490+
- name: 7 - Make HTTP call from custom policy
491+
href: custom-policies-series-call-rest-api.md
492+
displayName: call rest api, http call, http request
493+
- name: 8 - Create and read user record custom policy
494+
href: custom-policies-series-store-user.md
495+
displayName: CRUD, store user, create user account, read user, update user
496+
- name: 9 - Sign up and sign in (local account)
497+
href: custom-policies-series-sign-up-or-sign-in.md
498+
- name: 10 - Sign up and sign in (social account)
499+
href: custom-policies-series-sign-up-or-sign-in-federation.md
467500
# Secure
468501
- name: Secure
469502
items:

articles/active-directory-b2c/access-tokens.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -64,7 +64,7 @@ To request an access token, you need an authorization code. Below is an example
6464

6565
In the following example, you replace these values in the query string:
6666

67-
- `<tenant-name>` - The name of your [Azure AD B2C tenant](tenant-management.md#get-your-tenant-name). If you're using a custom domain, replace `tenant-name.b2clogin.com` with your domain, such as `contoso.com`.
67+
- `<tenant-name>` - The name of your [Azure AD B2C tenant](tenant-management-read-tenant-name.md#get-your-tenant-name). If you're using a custom domain, replace `tenant-name.b2clogin.com` with your domain, such as `contoso.com`.
6868
- `<policy-name>` - The name of your custom policy or user flow.
6969
- `<application-ID>` - The application identifier of the web application that you registered to support the user flow.
7070
- `<application-ID-URI>` - The application identifier URI that you set under **Expose an API** blade of the client application.

articles/active-directory-b2c/active-directory-technical-profile.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -11,6 +11,7 @@ ms.workload: identity
1111
ms.topic: reference
1212
ms.date: 12/29/2022
1313
ms.author: kengaderdus
14+
ms.reviewer: yoelhor
1415
ms.subservice: B2C
1516
---
1617

articles/active-directory-b2c/client-credentials-grant-flow.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -141,7 +141,7 @@ There are no specific actions to enable the client credentials for user flows or
141141

142142
`https://<tenant-name>.b2clogin.com/<tenant-name>.onmicrosoft.com/<policy>/oauth2/v2.0/token`
143143

144-
- Replace `<tenant-name>` with the [name](tenant-management.md#get-your-tenant-name) of your Azure AD B2C tenant. For example, `contoso.b2clogin.com`.
144+
- Replace `<tenant-name>` with the [name]( tenant-management-read-tenant-name.md#get-your-tenant-name) of your Azure AD B2C tenant. For example, `contoso.b2clogin.com`.
145145
- Replace `<policy>` with the full name of your user flow, or custom policy. Note, all types of user flows and custom policies support client credentials flow. You can use any user flow or custom policy you have, or create a new one, such as sign-up or sign-in.
146146

147147
| Key | Value |

articles/active-directory-b2c/configure-a-sample-node-web-app.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -108,7 +108,7 @@ Open your web app in a code editor such as Visual Studio Code. Under the project
108108
|---------|---------|
109109
|`APP_CLIENT_ID`|The **Application (client) ID** for the web app you registered in [step 2.1](#step-2-register-a-web-application). |
110110
|`APP_CLIENT_SECRET`|The client secret value for the web app you created in [step 2.2](#step-22-create-a-web-app-client-secret) |
111-
|`SIGN_UP_SIGN_IN_POLICY_AUTHORITY`|The **Sign in and sign up** user flow authority such as `https://<your-tenant-name>.b2clogin.com/<your-tenant-name>.onmicrosoft.com/<sign-in-sign-up-user-flow-name>`. Replace `<your-tenant-name>` with the name of your tenant and `<sign-in-sign-up-user-flow-name>` with the name of your Sign in and Sign up user flow such as `B2C_1_susi`. Learn how to [Get your tenant name](tenant-management.md#get-your-tenant-name). |
111+
|`SIGN_UP_SIGN_IN_POLICY_AUTHORITY`|The **Sign in and sign up** user flow authority such as `https://<your-tenant-name>.b2clogin.com/<your-tenant-name>.onmicrosoft.com/<sign-in-sign-up-user-flow-name>`. Replace `<your-tenant-name>` with the name of your tenant and `<sign-in-sign-up-user-flow-name>` with the name of your Sign in and Sign up user flow such as `B2C_1_susi`. Learn how to [Get your tenant name]( tenant-management-read-tenant-name.md#get-your-tenant-name). |
112112
|`RESET_PASSWORD_POLICY_AUTHORITY`| The **Reset password** user flow authority such as `https://<your-tenant-name>.b2clogin.com/<your-tenant-name>.onmicrosoft.com/<reset-password-user-flow-name>`. Replace `<your-tenant-name>` with the name of your tenant and `<reset-password-user-flow-name>` with the name of your Reset password user flow such as `B2C_1_reset_password_node_app`.|
113113
|`EDIT_PROFILE_POLICY_AUTHORITY`|The **Profile editing** user flow authority such as `https://<your-tenant-name>.b2clogin.com/<your-tenant-name>.onmicrosoft.com/<profile-edit-user-flow-name>`. Replace `<your-tenant-name>` with the name of your tenant and `<reset-password-user-flow-name>` with the name of your reset password user flow such as `B2C_1_edit_profile_node_app`. |
114114
|`AUTHORITY_DOMAIN`| The Azure AD B2C authority domain such as `https://<your-tenant-name>.b2clogin.com`. Replace `<your-tenant-name>` with the name of your tenant.|

articles/active-directory-b2c/configure-authentication-in-azure-static-app.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -120,7 +120,7 @@ Once you've added the app ID and secrete, use the following steps to add the Azu
120120
}
121121
```
122122

123-
1. Replace `<TENANT_NAME>` with the first part of your Azure AD B2C [tenant name](tenant-management.md#get-your-tenant-name) (for example, `https://contoso.b2clogin.com/contoso.onmicrosoft.com`).
123+
1. Replace `<TENANT_NAME>` with the first part of your Azure AD B2C [tenant name]( tenant-management-read-tenant-name.md#get-your-tenant-name) (for example, `https://contoso.b2clogin.com/contoso.onmicrosoft.com`).
124124
1. Replace `<POLICY_NAME>` with the user flows or custom policy you created in [step 1](#step-1-configure-your-user-flow).
125125

126126
## Step 4: Check the Azure Static Web APP

articles/active-directory-b2c/configure-authentication-in-azure-web-app-file-based.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -118,7 +118,7 @@ Once you've the added the app ID and secret, use the following steps to add the
118118
}
119119
```
120120

121-
1. Replace `<TENANT_NAME>` with the first part of your Azure AD B2C [tenant name](tenant-management.md#get-your-tenant-name) (for example, `https://contoso.b2clogin.com/contoso.onmicrosoft.com`).
121+
1. Replace `<TENANT_NAME>` with the first part of your Azure AD B2C [tenant name]( tenant-management-read-tenant-name.md#get-your-tenant-name) (for example, `https://contoso.b2clogin.com/contoso.onmicrosoft.com`).
122122
1. Replace `<POLICY_NAME>` with the user flows or custom policy you created in [step 1](#step-1-configure-your-user-flow).
123123

124124
## Step 4: Check the Azure Web app

articles/active-directory-b2c/configure-authentication-in-azure-web-app.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -86,7 +86,7 @@ To register your application, follow these steps:
8686
https://<TENANT_NAME>.b2clogin.com/<TENANT_NAME>.onmicrosoft.com/<POLICY_NAME>/v2.0/.well-known/openid-configuration
8787
```
8888
89-
1. Replace `<TENANT_NAME>` with the first part of your Azure AD B2C [tenant name](tenant-management.md#get-your-tenant-name) (for example, `https://contoso.b2clogin.com/contoso.onmicrosoft.com`). If you have a [custom domains](custom-domain.md) configure, you can use that custom domain. Replace your B2C tenant name, contoso.onmicrosoft.com, in the authentication request URL with your tenant ID GUID. For example, you can change `https://fabrikamb2c.b2clogin.com/contoso.onmicrosoft.com/` to `https://account.contosobank.co.uk/<tenant ID GUID>/`.
89+
1. Replace `<TENANT_NAME>` with the first part of your Azure AD B2C [tenant name]( tenant-management-read-tenant-name.md#get-your-tenant-name) (for example, `https://contoso.b2clogin.com/contoso.onmicrosoft.com`). If you have a [custom domains](custom-domain.md) configure, you can use that custom domain. Replace your B2C tenant name, contoso.onmicrosoft.com, in the authentication request URL with your tenant ID GUID. For example, you can change `https://fabrikamb2c.b2clogin.com/contoso.onmicrosoft.com/` to `https://account.contosobank.co.uk/<tenant ID GUID>/`.
9090
9191
1. Replace the `<POLICY_NAME>` with the user flows or custom policy you created in [step 1](#step-1-configure-your-user-flow).
9292

articles/active-directory-b2c/configure-authentication-in-sample-node-web-app-with-api.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -145,7 +145,7 @@ Open your web app in a code editor such as Visual Studio Code. Under the `call-p
145145
|---------|---------|
146146
|`APP_CLIENT_ID`|The **Application (client) ID** for the web app you registered in [step 2.3](#step-23-register-the-web-app). |
147147
|`APP_CLIENT_SECRET`|The client secret value for the web app you created in [step 2.4](#step-24-create-a-client-secret) |
148-
|`SIGN_UP_SIGN_IN_POLICY_AUTHORITY`|The **Sign in and sign up** user flow authority for the user flow you created in [step 1](#step-1-configure-your-user-flow) such as `https://<your-tenant-name>.b2clogin.com/<your-tenant-name>.onmicrosoft.com/<sign-in-sign-up-user-flow-name>`. Replace `<your-tenant-name>` with the name of your tenant and `<sign-in-sign-up-user-flow-name>` with the name of your Sign in and Sign up user flow such as `B2C_1_susi`. Learn how to [Get your tenant name](tenant-management.md#get-your-tenant-name). |
148+
|`SIGN_UP_SIGN_IN_POLICY_AUTHORITY`|The **Sign in and sign up** user flow authority for the user flow you created in [step 1](#step-1-configure-your-user-flow) such as `https://<your-tenant-name>.b2clogin.com/<your-tenant-name>.onmicrosoft.com/<sign-in-sign-up-user-flow-name>`. Replace `<your-tenant-name>` with the name of your tenant and `<sign-in-sign-up-user-flow-name>` with the name of your Sign in and Sign up user flow such as `B2C_1_susi`. Learn how to [Get your tenant name]( tenant-management-read-tenant-name.md#get-your-tenant-name). |
149149
|`AUTHORITY_DOMAIN`| The Azure AD B2C authority domain such as `https://<your-tenant-name>.b2clogin.com`. Replace `<your-tenant-name>` with the name of your tenant.|
150150
|`APP_REDIRECT_URI`| The application redirect URI where Azure AD B2C will return authentication responses (tokens). It matches the **Redirect URI** you set while registering your app in Azure portal. This URL need to be publicly accessible. Leave the value as is.|
151151
|`LOGOUT_ENDPOINT`| The Azure AD B2C sign out endpoint such as `https://<your-tenant-name>.b2clogin.com/<your-tenant-name>.onmicrosoft.com/<sign-in-sign-up-user-flow-name>/oauth2/v2.0/logout?post_logout_redirect_uri=http://localhost:3000`. Replace `<your-tenant-name>` with the name of your tenant and `<sign-in-sign-up-user-flow-name>` with the name of your Sign in and Sign up user flow such as `B2C_1_susi`.|
@@ -176,7 +176,7 @@ To get the web API sample code, do one of the following:
176176
177177
1. Modify the variable values with the user flow and application registration you created earlier:
178178
179-
- For `tenantName`, use the [name of your tenant name](tenant-management.md#get-your-tenant-name) such as `fabrikamb2c`.
179+
- For `tenantName`, use the [name of your tenant name]( tenant-management-read-tenant-name.md#get-your-tenant-name) such as `fabrikamb2c`.
180180
181181
- For `clientID`, use the **Application (Client) ID** for the web API you created in [step 2.1](#step-21-register-the-web-api-application).
182182

0 commit comments

Comments
 (0)