Skip to content

Commit bdd2d11

Browse files
authored
Merge pull request #288184 from MicrosoftDocs/main
10/10/2024 AM Publish
2 parents 050e3bb + e084aba commit bdd2d11

File tree

44 files changed

+957
-221
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

44 files changed

+957
-221
lines changed

.github/policies/disallow-edits.yml

Lines changed: 35 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -12,74 +12,109 @@ configuration:
1212
action: Opened
1313
- or:
1414
- filesMatchPattern:
15+
matchAny: true
1516
pattern: articles/aks/*
1617
- filesMatchPattern:
18+
matchAny: true
1719
pattern: articles/defender-for-cloud/*
1820
- filesMatchPattern:
21+
matchAny: true
1922
pattern: articles/attestation/*
2023
- filesMatchPattern:
24+
matchAny: true
2125
pattern: articles/confidential-ledger/*
2226
- filesMatchPattern:
27+
matchAny: true
2328
pattern: articles/dedicated-hsm/*
2429
- filesMatchPattern:
30+
matchAny: true
2531
pattern: articles/key-vault/*
2632
- filesMatchPattern:
33+
matchAny: true
2734
pattern: articles/payment-hsm/*
2835
- filesMatchPattern:
36+
matchAny: true
2937
pattern: articles/postgresql/*
3038
- filesMatchPattern:
39+
matchAny: true
3140
pattern: articles/cosmos-db/*
3241
- filesMatchPattern:
42+
matchAny: true
3343
pattern: articles/dms/*
3444
- filesMatchPattern:
45+
matchAny: true
3546
pattern: articles/mariadb/*
3647
- filesMatchPattern:
48+
matchAny: true
3749
pattern: articles/mysql/*
3850
- filesMatchPattern:
51+
matchAny: true
3952
pattern: articles/managed-instance-apache-cassandra/*
4053
- filesMatchPattern:
54+
matchAny: true
4155
pattern: articles/virtual-machines/*
4256
- filesMatchPattern:
57+
matchAny: true
4358
pattern: articles/virtual-machines-scale-sets/*
4459
- filesMatchPattern:
60+
matchAny: true
4561
pattern: articles/container-instances/*
4662
- filesMatchPattern:
63+
matchAny: true
4764
pattern: articles/service-fabric/*
4865
- filesMatchPattern:
66+
matchAny: true
4967
pattern: articles/machine-learning/*
5068
- filesMatchPattern:
69+
matchAny: true
5170
pattern: articles/ai-studio/*
5271
- filesMatchPattern:
72+
matchAny: true
5373
pattern: articles/ai-services/*
5474
- filesMatchPattern:
75+
matchAny: true
5576
pattern: articles/genomics/*
5677
- filesMatchPattern:
78+
matchAny: true
5779
pattern: articles/open-datasets/*
5880
- filesMatchPattern:
81+
matchAny: true
5982
pattern: articles/search/*
6083
- filesMatchPattern:
84+
matchAny: true
6185
pattern: articles/azure-monitor/*
6286
- filesMatchPattern:
87+
matchAny: true
6388
pattern: articles/advisor/*
6489
- filesMatchPattern:
90+
matchAny: true
6591
pattern: articles/chaos-studio/*
6692
- filesMatchPattern:
93+
matchAny: true
6794
pattern: articles/service-health/*
6895
- filesMatchPattern:
96+
matchAny: true
6997
pattern: articles/azure-arc/*
7098
- filesMatchPattern:
99+
matchAny: true
71100
pattern: articles/azure-linux/*
72101
- filesMatchPattern:
102+
matchAny: true
73103
pattern: articles/azure-portal/*
74104
- filesMatchPattern:
105+
matchAny: true
75106
pattern: articles/copilot/*
76107
- filesMatchPattern:
108+
matchAny: true
77109
pattern: articles/lighthouse/*
78110
- filesMatchPattern:
111+
matchAny: true
79112
pattern: articles/quotas/*
80113
- filesMatchPattern:
114+
matchAny: true
81115
pattern: articles/container-registry/*
82116
- filesMatchPattern:
117+
matchAny: true
83118
pattern: articles/kubernetes-fleet/*
84119
then:
85120
- addReply:

articles/active-directory-b2c/partner-n8identity.md

Lines changed: 12 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -29,7 +29,7 @@ Use this solution for the following scenarios:
2929

3030
## Prerequisites
3131

32-
To get started, you'll need:
32+
To get started, you need:
3333

3434
* An Azure subscription
3535

@@ -55,11 +55,11 @@ The TheAccessHub Admin Tool runs in the N8ID Azure subscription or the customer
5555
6. TheAccessHub Admin Tool syncs user records with Azure AD B2C.
5656
7. Based on TheAccessHub Admin Tool response, Azure AD B2C sends a customized welcome email to users.
5757

58-
## Create a Global Administrator in your Azure AD B2C tenant
58+
## Create an External Identity Provider Administrator and B2C User Flow Administrator in your Azure AD B2C tenant
5959

60-
TheAccessHub Admin Tool permissions act on behalf of a Global Administrator to read user information and conduct changes in your Azure AD B2C tenant. Changes to your regular administrators won't affect TheAccessHub Admin Tool interaction with the tenant.
60+
TheAccessHub Admin Tool permissions act on behalf of an External Identity Provider Administrator and B2C User Flow Administrator to read user information and conduct changes in your Azure AD B2C tenant. Changes to your regular administrators don't affect TheAccessHub Admin Tool interaction with the tenant.
6161

62-
To create a Global Administrator:
62+
To create an External Identity Provider Administrator and B2C User Flow Administrator:
6363

6464
1. In the Azure portal, sign in to your Azure AD B2C tenant as an Administrator.
6565
2. Go to **Microsoft Entra ID** > **Users**.
@@ -70,20 +70,20 @@ To create a Global Administrator:
7070
* Enter the **account name**, such as TheAccessHub Service Account.
7171
7. Select **Show Password**.
7272
8. Copy and save the initial password.
73-
9. To assign the Global Administrator role, for **User**, select the user's current role.
74-
10. Select the **Global Administrator** record.
73+
9. To assign the External Identity Provider Administrator and B2C User Flow Administrator role, for **User**, select the user's current role.
74+
10. Select the **External Identity Provider Administrator** and **B2C User Flow Administrator** records.
7575
11. Select **Create**.
7676

7777
## Connect TheAccessHub Admin Tool to your Azure AD B2C tenant
7878

79-
TheAccessHub Admin Tool uses the Microsoft Graph API to read and make changes to a directory. It acts as a Global Administrator in your tenant. Use the following instructions to add needed permissions.
79+
TheAccessHub Admin Tool uses the Microsoft Graph API to read and make changes to a directory. It acts as an External Identity Provider Administrator and B2C User Flow Administrator in your tenant. Use the following instructions to add needed permissions.
8080

8181
To authorize TheAccessHub Admin Tool to access your directory:
8282

8383
1. Use the credentials N8 Identity provided to sign in to TheAccessHub Admin Tool.
8484
2. Go to **System Admin** > **Azure AD B2C Config**.
8585
3. Select **Authorize Connection**.
86-
4. In the new window, sign in with your Global Administrator account. When you sign in for the first time with the new service account, a prompt to reset your password can appear.
86+
4. In the new window, sign in with your External Identity Provider Administrator and B2C User Flow Administrator account. When you sign in for the first time with the new service account, a prompt to reset your password can appear.
8787
5. Follow the prompts and select **Accept**.
8888

8989
## Configure a new CSR user with your enterprise identity
@@ -189,7 +189,7 @@ With TheAccessHub Admin Tool, you can import data from various databases, LDAPs,
189189

190190
* **Type**: **Database**
191191
* **Database type**: select a supported database
192-
* **Connection URL**: enter a JDBC connection string, such as `jdbc:postgresql://myhost.com:5432/databasename`
192+
* **Connection URL**: enter a Java Database Connectivity (JDBC) connection string, such as `jdbc:postgresql://myhost.com:5432/databasename`
193193
* **Username**: username to access the database
194194
* **Password**: password to access the database
195195
* **Query**: the SQL query to extract customer details, such as `SELECT * FROM mytable;`'
@@ -226,7 +226,7 @@ With TheAccessHub Admin Tool, you can import data from various databases, LDAPs,
226226
8. Select **Next**.
227227
9. In **Search-Mapping configuration**, identify load-record correlation with customers in TheAccessHub Admin Tool.
228228
10. Select source identifying attributes. Match attributes TheAccessHub Admin Tool attributes with the same values. If there's a match, the record is overridden. Otherwise, a new customer is created.
229-
11. Sequence the number of checks. For example, check email first, then first and last name.
229+
11. Sequence the number of checks. For example, check email first, then first and family name.
230230
12. On the left-side menu, select **Data Mapping**.
231231
13. In **Data-Mapping configuration**, assign the TheAccessHub Admin Tool attributes to be populated from your source attributes. Unmapped attributes remain unchanged for customers. If you map the attribute `org_name` with a current organization value, created customers go in the organization.
232232
15. Select **Next**.
@@ -273,7 +273,7 @@ If you occasionally sync TheAccessHub Admin Tool, it might not be up to date wit
273273

274274
For your sign-up custom policies, the following steps enable a secure certificate to notify TheAccessHub Admin Tool of new accounts.
275275

276-
1. Use the credentials N8ID provided to sign in to TheAccessHub Admin Tool.
276+
1. To sign in to TheAccessHub Admin Tool, use the credentials N8ID provided.
277277
2. Go to **System Admin** > **Admin Tools** > **API Security**.
278278
3. Select **Generate**.
279279
4. Copy the **Certificate Password**.
@@ -287,7 +287,7 @@ For your sign-up custom policies, the following steps enable a secure certificat
287287
3. Supply your Azure AD B2C tenant domain and the two Identity Experience Framework IDs from your Identity Experience Framework configuration.
288288
4. Select **Save**.
289289
5. Select **Download** to get a .zip file with basic policies that add customers into TheAccessHub Admin Tool as customers sign up.
290-
6. Use the instructions in [Create user flows](./tutorial-create-user-flows.md?pivots=b2c-custom-policy) to design custom policies in Azure AD B2C.
290+
6. To design custom policies in Azure AD B2C, use the instructions in [Create user flows](./tutorial-create-user-flows.md?pivots=b2c-custom-policy).
291291

292292
## Next steps
293293

0 commit comments

Comments
 (0)