You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Record the **APPLICATION ID** for use in a later step. Next, select the application in the list and record the **Custom Redirect URI**, also for use in a later step. For example, `com.onmicrosoft.contosob2c.exampleapp://oauth/redirect`.
37
+
Record the **Application (client) ID** for use in a later step.
38
+
39
+
Also record your custom redirect URI for use in a later step. For example, `com.onmicrosoft.contosob2c.exampleapp://oauth/redirect`.
Record the **APPLICATION ID** for use in a later step. Next, select the application in the list and record the **Custom Redirect URI**, also for use in a later step. For example, `com.onmicrosoft.contosob2c.exampleapp://oauth/redirect`.
36
+
Record the **Application (client) ID** for use in a later step.
37
+
38
+
Also record your custom redirect URI for use in a later step. For example, `com.onmicrosoft.contosob2c.exampleapp://oauth/redirect`.
37
39
38
40
## Create your user flows
39
41
In Azure AD B2C, every user experience is defined by a [user flow](active-directory-b2c-reference-policies.md). This application contains one identity experience: a combined sign-in and sign-up. When you create the user flow, be sure to:
Copy file name to clipboardExpand all lines: articles/active-directory-b2c/active-directory-b2c-faqs.md
+32-5Lines changed: 32 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,7 +8,7 @@ manager: celestedg
8
8
ms.service: active-directory
9
9
ms.workload: identity
10
10
ms.topic: conceptual
11
-
ms.date: 08/31/2019
11
+
ms.date: 10/14/2019
12
12
ms.author: marsma
13
13
ms.subservice: B2C
14
14
---
@@ -126,15 +126,20 @@ Not currently. This feature is on our roadmap. Verifying your domain in the **Do
126
126
127
127
### How do I delete my Azure AD B2C tenant?
128
128
129
-
Follow these steps to delete your Azure AD B2C tenant:
129
+
Follow these steps to delete your Azure AD B2C tenant.
130
130
131
+
You can use the current **Applications** experience or our new unified **App registrations (Preview)** experience. [Learn more about the preview experience](http://aka.ms/b2cappregintro).
132
+
133
+
#### [Applications](#tab/applications/)
134
+
135
+
1. Sign in to the [Azure portal](https://portal.azure.com/) as the *Subscription Administrator*. Use the same work or school account or the same Microsoft account that you used to sign up for Azure.
136
+
1. Select the **Directory + subscription** filter in the top menu, and then select the directory that contains your Azure AD B2C tenant.
137
+
1. In the left menu, select **Azure AD B2C**. Or, select **All services** and search for and select **Azure AD B2C**.
131
138
1. Delete all the **User flows (policies)** in your Azure AD B2C tenant.
132
139
1. Delete all the **Applications** you registered in your Azure AD B2C tenant.
133
-
1. Next, sign in to the [Azure portal](https://portal.azure.com/) as the Subscription Administrator. Use the same work or school account or the same Microsoft account that you used to sign up for Azure.
134
-
1. Switch to the Azure AD B2C tenant you want to delete.
135
140
1. Select **Azure Active Directory** on the left-hand menu.
136
141
1. Under **Manage**, select **Users**.
137
-
1. Select each user in turn (exclude the Subscription Administrator user you are currently signed in as). Select **Delete** at the bottom of the page and select **YES** when prompted.
142
+
1. Select each user in turn (exclude the *Subscription Administrator* user you are currently signed in as). Select **Delete** at the bottom of the page and select **YES** when prompted.
138
143
1. Under **Manage**, select **App registrations** (or **App registrations (Legacy)**).
139
144
1. Select **View all applications**
140
145
1. Select the application named **b2c-extensions-app**, select **Delete**, and then select **Yes** when prompted.
@@ -146,6 +151,28 @@ Follow these steps to delete your Azure AD B2C tenant:
146
151
1. Select **Azure Active Directory** on the left-hand menu.
147
152
1. On the **Overview** page, select **Delete directory**. Follow the on-screen instructions to complete the process.
1. Sign in to the [Azure portal](https://portal.azure.com/) as the *Subscription Administrator*. Use the same work or school account or the same Microsoft account that you used to sign up for Azure.
157
+
1. Select the **Directory + subscription** filter in the top menu, and then select the directory that contains your Azure AD B2C tenant.
158
+
1. In the left menu, select **Azure AD B2C**. Or, select **All services** and search for and select **Azure AD B2C**.
159
+
1. Delete all **User flows (policies)** in your Azure AD B2C tenant.
160
+
1. Select **App registrations (Preview)**, then select the **All applications** tab.
161
+
1. Delete all applications that you registered.
162
+
1. Delete the **b2c-extensions-app**.
163
+
1. Under **Manage**, select **Users**.
164
+
1. Select each user in turn (exclude the *Subscription Administrator* user you are currently signed in as). Select **Delete** at the bottom of the page and select **Yes** when prompted.
165
+
1. Select **Azure Active Directory** on the left-hand menu.
166
+
1. Under **Manage**, select **User settings**.
167
+
1. If present, under **LinkedIn account connections**, select **No**, then select **Save**.
168
+
1. Under **Manage**, select **Properties**
169
+
1. Under **Access management for Azure resources**, select **Yes**, and then select **Save**.
170
+
1. Sign out of the Azure portal and then sign back in to refresh your access.
171
+
1. Select **Azure Active Directory** on the left-hand menu.
172
+
1. On the **Overview** page, select **Delete directory**. Follow the on-screen instructions to complete the process.
173
+
174
+
* * *
175
+
149
176
### Can I get Azure AD B2C as part of Enterprise Mobility Suite?
150
177
151
178
No, Azure AD B2C is a pay-as-you-go Azure service and is not part of Enterprise Mobility Suite.
Azure AD B2C requires you to register two applications that are used to sign up and sign in users: IdentityExperienceFramework (a web app), and ProxyIdentityExperienceFramework (a native app) with delegated permission from the IdentityExperienceFramework app. Local accounts exist only in your tenant. Your users sign up with a unique email address/password combination to access your tenant-registered applications.
66
+
Azure AD B2C requires you to register two applications that it uses to sign up and sign in users with local accounts: *IdentityExperienceFramework*, a web API, and *ProxyIdentityExperienceFramework*, a native app with delegated permission to the IdentityExperienceFramework app. Your users can sign up with an email address or username and a password to access your tenant-registered applications, which creates a "local account." Local accounts exist only in your Azure AD B2C tenant.
67
+
68
+
You need to register these two applications in your Azure AD B2C tenant only once.
67
69
68
70
### Register the IdentityExperienceFramework application
69
71
72
+
To register an application in your Azure AD B2C tenant, you can use the current **Applications** experience, or our new unified **App registrations (Preview)** experience. [Learn more about the preview experience](https://aka.ms/b2cappregintro).
73
+
74
+
#### [Applications](#tab/applications/)
75
+
70
76
1. Select **All services** in the top-left corner of the Azure portal.
71
77
1. In the search box, enter `Azure Active Directory`.
72
78
1. Select **Azure Active Directory** in the search results.
@@ -77,8 +83,32 @@ Azure AD B2C requires you to register two applications that are used to sign up
77
83
1. For **Sign-on URL**, enter `https://your-tenant-name.b2clogin.com/your-tenant-name.onmicrosoft.com`, where `your-tenant-name` is your Azure AD B2C tenant domain name. All URLs should now be using [b2clogin.com](b2clogin.md).
78
84
1. Select **Create**. After it's created, copy the application ID and save it to use later.
1. Select **App registrations (Preview)**, and then select **New registration**.
89
+
1. For **Name**, enter `IdentityExperienceFramework`.
90
+
1. Under **Supported account types**, select **Accounts in this organizational directory only**.
91
+
1. Under **Redirect URI**, select **Web**, and then enter `https://your-tenant-name.b2clogin.com/your-tenant-name.onmicrosoft.com`, where `your-tenant-name` is your Azure AD B2C tenant domain name.
92
+
1. Under **Permissions**, select the *Grant admin consent to openid and offline_access permissions* check box.
93
+
1. Select **Register**.
94
+
1. Record the **Application (client) ID** for use in a later step.
95
+
96
+
Next, expose the API by adding a scope:
97
+
98
+
1. Under **Manage**, select **Expose an API**.
99
+
1. Select **Add a scope**, then select **Save and continue** to accept the default application ID URI.
100
+
1. Enter the following values to create a scope that allows custom policy execution in your Azure AD B2C tenant:
1. Select **App registrations (Preview)**, and then select **New registration**.
125
+
1. For **Name**, enter `ProxyIdentityExperienceFramework`.
126
+
1. Under **Supported account types**, select **Accounts in this organizational directory only**.
127
+
1. Under **Redirect URI**, use the drop-down to select **Public client/native (mobile & desktop)**.
128
+
1. For **Redirect URI**, enter `https://your-tenant-name.b2clogin.com/your-tenant-name.onmicrosoft.com`, where `your-tenant-name` is your Azure AD B2C tenant.
129
+
1. Under **Permissions**, select the *Grant admin consent to openid and offline_access permissions* check box.
130
+
1. Select **Register**.
131
+
1. Record the **Application (client) ID** for use in a later step.
132
+
133
+
Next, specify that the application should be treated as a public client:
134
+
135
+
1. Under **Manage**, select **Authentication**.
136
+
1. Select **Try out the new experience** (if shown).
137
+
1. Under **Advanced settings**, enable **Treat application as a public client** (select **Yes**).
138
+
1. Select **Save**.
139
+
140
+
Now, grant permissions to the API scope you exposed earlier in the *IdentityExperienceFramework* registration:
141
+
142
+
1. Under **Manage**, select **API permissions**.
143
+
1. Under **Configured permissions**, select **Add a permission**.
144
+
1. Select the **My APIs** tab, then select the **IdentityExperienceFramework** application.
145
+
1. Under **Permission**, select the **user_impersonation** scope that you defined earlier.
146
+
1. Select **Add permissions**. As directed, wait a few minutes before proceeding to the next step.
147
+
1. Select **Grant admin consent for (your tenant name)**.
148
+
1. Select your currently signed-in administrator account, or sign in with an account in your Azure AD B2C tenant that's been assigned at least the *Cloud application administrator* role.
149
+
1. Select **Accept**.
150
+
1. Select **Refresh**, and then verify that "Granted for ..." appears under **STATUS** for both scopes. It might take a few minutes for the permissions to propagate.
151
+
152
+
* * *
153
+
92
154
## Custom policy starter pack
93
155
94
156
Custom policies are a set of XML files you upload to your Azure AD B2C tenant to define technical profiles and user journeys. We provide starter packs with several pre-built policies to get you going quickly. Each of these starter packs contains the smallest number of technical profiles and user journeys needed to achieve the scenarios described:
Copy file name to clipboardExpand all lines: articles/active-directory-b2c/active-directory-b2c-reference-audit-logs.md
+23-6Lines changed: 23 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,7 +8,7 @@ manager: celestedg
8
8
ms.service: active-directory
9
9
ms.topic: conceptual
10
10
ms.workload: identity
11
-
ms.date: 09/14/2019
11
+
ms.date: 10/16/2019
12
12
ms.author: marsma
13
13
ms.subservice: B2C
14
14
ms.custom: fasttrack-edit
@@ -85,8 +85,7 @@ Audit logs are published to the same pipeline as other activities for Azure Acti
85
85
86
86
To allow script- or application-based access to the Azure AD reporting API, you need an Azure Active Directory application registered in your Azure AD B2C tenant with the following API permissions:
87
87
88
-
* Microsoft Graph
89
-
* Application: Read all audit log data
88
+
* Microsoft Graph > Application permissions > AuditLog.Read.All
90
89
91
90
You can enable these permissions on an existing Azure Active Directory application registration within your B2C tenant, or create a new one specifically for use with audit log automation.
92
91
@@ -98,6 +97,8 @@ Follow these steps register an application, grant it the required Microsoft Grap
98
97
99
98
### Assign API access permissions
100
99
100
+
#### [Applications](#tab/applications/)
101
+
101
102
1. On the **Registered app** overview page, select **Settings**.
102
103
1. Under **API ACCESS**, select **Required permissions**.
103
104
1. Select **Add**, and then **Select an API**.
@@ -106,6 +107,22 @@ Follow these steps register an application, grant it the required Microsoft Grap
106
107
1. Select the **Select** button, and then select **Done**.
107
108
1. Select **Grant permissions**, and then select **Yes**.
1. Under **Configured permissions**, select **Add a permission**.
114
+
1. Select the **Microsoft APIs** tab.
115
+
1. Select **Microsoft Graph**.
116
+
1. Select **Application permissions**.
117
+
1. Expand **AuditLog** and then select the **AuditLog.Read.All** check box.
118
+
1. Select **Add permissions**. As directed, wait a few minutes before proceeding to the next step.
119
+
1. Select **Grant admin consent for (your tenant name)**.
120
+
1. Select your currently signed-in account if it's been assigned the *Global Administrator* role, or sign in with an account in your Azure AD B2C tenant that's been assigned the *Global Administrator* role.
121
+
1. Select **Accept**.
122
+
1. Select **Refresh**, and then verify that "Granted for ..." appears under **STATUS** for the *AuditLog.Read.All* permission. It might take a few minutes for the permissions to propagate.
The following PowerShell script shows an example of how to query the Azure AD reporting API. After querying the API, it prints the logged events to standard output, then writes the JSON output to a file.
126
143
127
-
You can try this script in the [Azure Cloud Shell](../cloud-shell/overview.md). Be sure to update it with your application ID, key, and the name of your Azure AD B2C tenant.
144
+
You can try this script in the [Azure Cloud Shell](../cloud-shell/overview.md). Be sure to update it with your application ID, client secret, and the name of your Azure AD B2C tenant.
128
145
129
146
```powershell
130
147
# This script requires the registration of a Web Application in Azure Active Directory:
0 commit comments