Skip to content

Commit bed7c5f

Browse files
committed
Merge branch 'master' of https://github.com/MicrosoftDocs/azure-docs-pr into heidist-fresh3
2 parents e29f50b + a28dd8b commit bed7c5f

File tree

214 files changed

+4215
-1407
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

214 files changed

+4215
-1407
lines changed

articles/active-directory-b2c/date-transformations.md

Lines changed: 37 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -197,8 +197,43 @@ Use this claims transformation to determine if first date plus the `timeSpanInSe
197197
- **operator**: later than
198198
- **timeSpanInSeconds**: 7776000 (90 days)
199199
- Output claims:
200-
- **result**: true
201-
200+
- **result**: true
201+
202+
## IsTermsOfUseConsentRequired
203+
204+
Determine whether a `dateTime` claim type is earlier or greater than a specific date. The result is a new Boolean claim with a value of `true` or `false`.
205+
206+
| Item | TransformationClaimType | Data type | Notes |
207+
| ---- | ----------------------- | --------- | ----- |
208+
| InputClaim | termsOfUseConsentDateTime | dateTime | The `dateTime` claim type to check whether it is earlier or later than the `termsOfUseTextUpdateDateTime` input parameter. Undefined value returns `true` result. |
209+
| InputParameter | termsOfUseTextUpdateDateTime | dateTime | The `dateTime` claim type to check whether it is earlier or later than the `termsOfUseConsentDateTime` input claim. The time part of the date is optional. |
210+
| OutputClaim | result | boolean | The claim type that's produced after this claims transformation has been invoked. |
211+
212+
Use this claims transformation to determine whether a `dateTime` claim type is earlier or greater than a specific date. For example, check whether a user has consented to the latest version of your terms of use (TOU) or terms of service. To check the last time a user consented, store the last time the user accepted the TOU in an [extension attribute](user-profile-attributes.md#extension-attributes). When your TOU wording changes, update the `termsOfUseTextUpdateDateTime` input parameter with the time of the change. Then, call this claims transformation to compare the dates. If the claims transformation returns `true`, the `termsOfUseConsentDateTime` value is earlier than the `termsOfUseTextUpdateDateTime` value, and you can ask the user to accept the updated TOU.
213+
214+
```xml
215+
<ClaimsTransformation Id="IsTermsOfUseConsentRequired" TransformationMethod="IsTermsOfUseConsentRequired">
216+
<InputClaims>
217+
<InputClaim ClaimTypeReferenceId="extension_termsOfUseConsentDateTime" TransformationClaimType="termsOfUseConsentDateTime" />
218+
</InputClaims>
219+
<InputParameters>
220+
<InputParameter Id="termsOfUseTextUpdateDateTime" DataType="dateTime" Value="2021-11-15T00:00:00" />
221+
</InputParameters>
222+
<OutputClaims>
223+
<OutputClaim ClaimTypeReferenceId="termsOfUseConsentRequired" TransformationClaimType="result" />
224+
</OutputClaims>
225+
</ClaimsTransformation>
226+
```
227+
228+
### IsTermsOfUseConsentRequired example
229+
230+
- Input claims:
231+
- **termsOfUseConsentDateTime**: 2020-03-09T09:15:00
232+
- Input parameters:
233+
- **termsOfUseTextUpdateDateTime**: 2021-11-15
234+
- Output claims:
235+
- **result**: true
236+
202237
## GetCurrentDateTime
203238

204239
Get the current UTC date and time and add the value to a claim type.

articles/active-directory-b2c/faq.yml

Lines changed: 14 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,9 +9,10 @@ metadata:
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: conceptual
12-
ms.date: 12/9/2021
12+
ms.date: 01/03/2022
1313
ms.author: kengaderdus
1414
ms.subservice: B2C
15+
ms.custom: "b2c-support"
1516

1617
title: 'Azure AD B2C: Frequently asked questions (FAQ)'
1718
summary: This page answers frequently asked questions about the Azure Active Directory B2C (Azure AD B2C). Keep checking back for updates.
@@ -227,6 +228,18 @@ sections:
227228
* API connectors
228229
* Conditional Access
229230
231+
- question: |
232+
I have revoked the refresh token using Microsoft Graph invalidateAllRefreshTokens, or Azure AD PowerShell, Revoke-AzureADUserAllRefreshToken. Why is Azure AD B2C still accepting the old refresh token?
233+
answer: |
234+
In Azure AD B2C, if the time difference between `refreshTokensValidFromDateTime` and `refreshTokenIssuedTime` is less than or equal to 5 minutes, the refresh token is still considered as valid. However, if the `refreshTokenIssuedTime` is greater than the `refreshTokensValidFromDateTime`, then the refresh token is revoked.
235+
Follow the following steps to check if the refresh token is valid or revoked:
236+
1. Retrieve the `RefreshToken` and the `AccessToken` by redeeming `authorization_code`.
237+
1. Wait for 7 minutes.
238+
1. Use PowerShell cmdlet [Revoke-AzureADUserAllRefreshToken](https://docs.microsoft.com/powershell/module/azuread/revoke-azureaduserallrefreshtoken?view=azureadps-2.0) or Microsoft Graph API [invalidateAllRefreshTokens](https://docs.microsoft.com/graph/api/user-invalidateallrefreshtokens?view=graph-rest-beta&tabs=http) to run the `RevokeAllRefreshToken` command.
239+
1. Wait for 10 minutes.
240+
241+
1. Retrieve the `RefreshToken` again.
242+
230243
- question: |
231244
How do I report issues with Azure AD B2C?
232245
answer: |

articles/active-directory/develop/TOC.yml

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -513,6 +513,8 @@
513513
href: howto-create-service-principal-portal.md
514514
- name: Configure an app to trust a GitHub repo
515515
href: workload-identity-federation-create-trust-github.md
516+
- name: Access Azure AD protected resources from Google Cloud
517+
href: workload-identity-federation-create-trust-gcp.md
516518
- name: Configure an app to trust an external identity provider
517519
href: workload-identity-federation-create-trust.md
518520
- name: Accept sign-ins from multiple tenants
@@ -558,7 +560,7 @@
558560
- name: Publish to App Source
559561
href: v2-howto-get-appsource-certified.md
560562
- name: Publish to Azure AD App Gallery
561-
href: v2-howto-app-gallery-listing.md
563+
href: ../manage-apps/v2-howto-app-gallery-listing.md?toc=/azure/active-directory/develop/toc.json&bc=/azure/active-directory/develop/breadcrumb/toc.json
562564
- name: Publish to the Office 365 Seller Dashboard
563565
href: /office/dev/store/add-in-submission-guide
564566
- name: Remove an app registration
14 KB
Loading
Loading

articles/active-directory/develop/userinfo.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -73,6 +73,7 @@ Authorization: Bearer eyJ0eXAiOiJKV1QiLCJub25jZSI6Il…
7373
"name": "Mikah Ollenburg", // names all require the “profile” scope.
7474
"family_name": " Ollenburg",
7575
"given_name": "Mikah",
76+
"picture": "https://graph.microsoft.com/v1.0/me/photo/$value",
7677
"email": "[email protected]" //requires the “email” scope.
7778
}
7879
```

0 commit comments

Comments
 (0)