Skip to content

Commit c223275

Browse files
authored
Merge pull request #94585 from MicrosoftDocs/master
Ignite Keynote Publish
2 parents 3486e2d + 31bcede commit c223275

File tree

2,421 files changed

+73438
-20547
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

2,421 files changed

+73438
-20547
lines changed

.openpublishing.publish.config.json

Lines changed: 11 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -194,7 +194,7 @@
194194
{
195195
"path_to_root": "samples-cognitive-services-speech-sdk",
196196
"url": "https://github.com/Azure-Samples/cognitive-services-speech-sdk",
197-
"branch": "docs-201809"
197+
"branch": "rhurey/quickstart.refactor"
198198
},
199199
{
200200
"path_to_root": "media-services-v3-dotnet-quickstarts",
@@ -297,6 +297,16 @@
297297
"branch": "master",
298298
"branch_mapping": {}
299299
},
300+
{
301+
"path_to_root": "cosmos-dotnet-v4-getting-started",
302+
"url": "https://github.com/Azure-Samples/cosmos-dotnet-v4-getting-started",
303+
"branch": "master"
304+
},
305+
{
306+
"path_to_root": "cosmos-dotnet-bulk-import",
307+
"url": "https://github.com/Azure-Samples/cosmos-dotnet-bulk-import-throughput-optimizer",
308+
"branch": "master"
309+
},
300310
{
301311
"path_to_root": "samples-cosmosdb-dotnet-web-app",
302312
"url": "https://github.com/Azure-Samples/cosmos-dotnet-todo-app",

.openpublishing.redirection.json

Lines changed: 337 additions & 10 deletions
Large diffs are not rendered by default.

articles/active-directory-b2c/active-directory-b2c-devquickstarts-android.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -34,7 +34,9 @@ Next, register an application in your Azure AD B2C tenant. This gives Azure AD t
3434

3535
[!INCLUDE [active-directory-b2c-appreg-native](../../includes/active-directory-b2c-appreg-native.md)]
3636

37-
Record the **APPLICATION ID** for use in a later step. Next, select the application in the list and record the **Custom Redirect URI**, also for use in a later step. For example, `com.onmicrosoft.contosob2c.exampleapp://oauth/redirect`.
37+
Record the **Application (client) ID** for use in a later step.
38+
39+
Also record your custom redirect URI for use in a later step. For example, `com.onmicrosoft.contosob2c.exampleapp://oauth/redirect`.
3840

3941
## Create your user flows
4042

articles/active-directory-b2c/active-directory-b2c-devquickstarts-ios.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -33,7 +33,9 @@ Next, register an application in your Azure AD B2C tenant. This gives Azure AD t
3333

3434
[!INCLUDE [active-directory-b2c-appreg-native](../../includes/active-directory-b2c-appreg-native.md)]
3535

36-
Record the **APPLICATION ID** for use in a later step. Next, select the application in the list and record the **Custom Redirect URI**, also for use in a later step. For example, `com.onmicrosoft.contosob2c.exampleapp://oauth/redirect`.
36+
Record the **Application (client) ID** for use in a later step.
37+
38+
Also record your custom redirect URI for use in a later step. For example, `com.onmicrosoft.contosob2c.exampleapp://oauth/redirect`.
3739

3840
## Create your user flows
3941
In Azure AD B2C, every user experience is defined by a [user flow](active-directory-b2c-reference-policies.md). This application contains one identity experience: a combined sign-in and sign-up. When you create the user flow, be sure to:

articles/active-directory-b2c/active-directory-b2c-faqs.md

Lines changed: 32 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ manager: celestedg
88
ms.service: active-directory
99
ms.workload: identity
1010
ms.topic: conceptual
11-
ms.date: 08/31/2019
11+
ms.date: 10/14/2019
1212
ms.author: marsma
1313
ms.subservice: B2C
1414
---
@@ -126,15 +126,20 @@ Not currently. This feature is on our roadmap. Verifying your domain in the **Do
126126

127127
### How do I delete my Azure AD B2C tenant?
128128

129-
Follow these steps to delete your Azure AD B2C tenant:
129+
Follow these steps to delete your Azure AD B2C tenant.
130130

131+
You can use the current **Applications** experience or our new unified **App registrations (Preview)** experience. [Learn more about the preview experience](http://aka.ms/b2cappregintro).
132+
133+
#### [Applications](#tab/applications/)
134+
135+
1. Sign in to the [Azure portal](https://portal.azure.com/) as the *Subscription Administrator*. Use the same work or school account or the same Microsoft account that you used to sign up for Azure.
136+
1. Select the **Directory + subscription** filter in the top menu, and then select the directory that contains your Azure AD B2C tenant.
137+
1. In the left menu, select **Azure AD B2C**. Or, select **All services** and search for and select **Azure AD B2C**.
131138
1. Delete all the **User flows (policies)** in your Azure AD B2C tenant.
132139
1. Delete all the **Applications** you registered in your Azure AD B2C tenant.
133-
1. Next, sign in to the [Azure portal](https://portal.azure.com/) as the Subscription Administrator. Use the same work or school account or the same Microsoft account that you used to sign up for Azure.
134-
1. Switch to the Azure AD B2C tenant you want to delete.
135140
1. Select **Azure Active Directory** on the left-hand menu.
136141
1. Under **Manage**, select **Users**.
137-
1. Select each user in turn (exclude the Subscription Administrator user you are currently signed in as). Select **Delete** at the bottom of the page and select **YES** when prompted.
142+
1. Select each user in turn (exclude the *Subscription Administrator* user you are currently signed in as). Select **Delete** at the bottom of the page and select **YES** when prompted.
138143
1. Under **Manage**, select **App registrations** (or **App registrations (Legacy)**).
139144
1. Select **View all applications**
140145
1. Select the application named **b2c-extensions-app**, select **Delete**, and then select **Yes** when prompted.
@@ -146,6 +151,28 @@ Follow these steps to delete your Azure AD B2C tenant:
146151
1. Select **Azure Active Directory** on the left-hand menu.
147152
1. On the **Overview** page, select **Delete directory**. Follow the on-screen instructions to complete the process.
148153

154+
#### [App registrations (Preview)](#tab/app-reg-preview/)
155+
156+
1. Sign in to the [Azure portal](https://portal.azure.com/) as the *Subscription Administrator*. Use the same work or school account or the same Microsoft account that you used to sign up for Azure.
157+
1. Select the **Directory + subscription** filter in the top menu, and then select the directory that contains your Azure AD B2C tenant.
158+
1. In the left menu, select **Azure AD B2C**. Or, select **All services** and search for and select **Azure AD B2C**.
159+
1. Delete all **User flows (policies)** in your Azure AD B2C tenant.
160+
1. Select **App registrations (Preview)**, then select the **All applications** tab.
161+
1. Delete all applications that you registered.
162+
1. Delete the **b2c-extensions-app**.
163+
1. Under **Manage**, select **Users**.
164+
1. Select each user in turn (exclude the *Subscription Administrator* user you are currently signed in as). Select **Delete** at the bottom of the page and select **Yes** when prompted.
165+
1. Select **Azure Active Directory** on the left-hand menu.
166+
1. Under **Manage**, select **User settings**.
167+
1. If present, under **LinkedIn account connections**, select **No**, then select **Save**.
168+
1. Under **Manage**, select **Properties**
169+
1. Under **Access management for Azure resources**, select **Yes**, and then select **Save**.
170+
1. Sign out of the Azure portal and then sign back in to refresh your access.
171+
1. Select **Azure Active Directory** on the left-hand menu.
172+
1. On the **Overview** page, select **Delete directory**. Follow the on-screen instructions to complete the process.
173+
174+
* * *
175+
149176
### Can I get Azure AD B2C as part of Enterprise Mobility Suite?
150177

151178
No, Azure AD B2C is a pay-as-you-go Azure service and is not part of Enterprise Mobility Suite.

articles/active-directory-b2c/active-directory-b2c-get-started-custom.md

Lines changed: 64 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ manager: celestedg
88
ms.service: active-directory
99
ms.workload: identity
1010
ms.topic: conceptual
11-
ms.date: 09/26/2019
11+
ms.date: 10/18/2019
1212
ms.author: marsma
1313
ms.subservice: B2C
1414
---
@@ -63,10 +63,16 @@ Add your Facebook application's [App Secret](active-directory-b2c-setup-fb-app.m
6363

6464
## Register Identity Experience Framework applications
6565

66-
Azure AD B2C requires you to register two applications that are used to sign up and sign in users: IdentityExperienceFramework (a web app), and ProxyIdentityExperienceFramework (a native app) with delegated permission from the IdentityExperienceFramework app. Local accounts exist only in your tenant. Your users sign up with a unique email address/password combination to access your tenant-registered applications.
66+
Azure AD B2C requires you to register two applications that it uses to sign up and sign in users with local accounts: *IdentityExperienceFramework*, a web API, and *ProxyIdentityExperienceFramework*, a native app with delegated permission to the IdentityExperienceFramework app. Your users can sign up with an email address or username and a password to access your tenant-registered applications, which creates a "local account." Local accounts exist only in your Azure AD B2C tenant.
67+
68+
You need to register these two applications in your Azure AD B2C tenant only once.
6769

6870
### Register the IdentityExperienceFramework application
6971

72+
To register an application in your Azure AD B2C tenant, you can use the current **Applications** experience, or our new unified **App registrations (Preview)** experience. [Learn more about the preview experience](https://aka.ms/b2cappregintro).
73+
74+
#### [Applications](#tab/applications/)
75+
7076
1. Select **All services** in the top-left corner of the Azure portal.
7177
1. In the search box, enter `Azure Active Directory`.
7278
1. Select **Azure Active Directory** in the search results.
@@ -77,8 +83,32 @@ Azure AD B2C requires you to register two applications that are used to sign up
7783
1. For **Sign-on URL**, enter `https://your-tenant-name.b2clogin.com/your-tenant-name.onmicrosoft.com`, where `your-tenant-name` is your Azure AD B2C tenant domain name. All URLs should now be using [b2clogin.com](b2clogin.md).
7884
1. Select **Create**. After it's created, copy the application ID and save it to use later.
7985

86+
#### [App registrations (Preview)](#tab/app-reg-preview/)
87+
88+
1. Select **App registrations (Preview)**, and then select **New registration**.
89+
1. For **Name**, enter `IdentityExperienceFramework`.
90+
1. Under **Supported account types**, select **Accounts in this organizational directory only**.
91+
1. Under **Redirect URI**, select **Web**, and then enter `https://your-tenant-name.b2clogin.com/your-tenant-name.onmicrosoft.com`, where `your-tenant-name` is your Azure AD B2C tenant domain name.
92+
1. Under **Permissions**, select the *Grant admin consent to openid and offline_access permissions* check box.
93+
1. Select **Register**.
94+
1. Record the **Application (client) ID** for use in a later step.
95+
96+
Next, expose the API by adding a scope:
97+
98+
1. Under **Manage**, select **Expose an API**.
99+
1. Select **Add a scope**, then select **Save and continue** to accept the default application ID URI.
100+
1. Enter the following values to create a scope that allows custom policy execution in your Azure AD B2C tenant:
101+
* **Scope name**: `user_impersonation`
102+
* **Admin consent display name**: `Access IdentityExperienceFramework`
103+
* **Admin consent description**: `Allow the application to access IdentityExperienceFramework on behalf of the signed-in user.`
104+
1. Select **Add scope**
105+
106+
* * *
107+
80108
### Register the ProxyIdentityExperienceFramework application
81109

110+
#### [Applications](#tab/applications/)
111+
82112
1. In **App registrations (Legacy)**, select **New application registration**.
83113
1. For **Name**, enter `ProxyIdentityExperienceFramework`.
84114
1. For **Application type**, choose **Native**.
@@ -89,6 +119,38 @@ Azure AD B2C requires you to register two applications that are used to sign up
89119
1. Select the check box next to **Access IdentityExperienceFramework**, click **Select**, and then click **Done**.
90120
1. Select **Grant permissions**, and then confirm by selecting **Yes**.
91121

122+
#### [App registrations (Preview)](#tab/app-reg-preview/)
123+
124+
1. Select **App registrations (Preview)**, and then select **New registration**.
125+
1. For **Name**, enter `ProxyIdentityExperienceFramework`.
126+
1. Under **Supported account types**, select **Accounts in this organizational directory only**.
127+
1. Under **Redirect URI**, use the drop-down to select **Public client/native (mobile & desktop)**.
128+
1. For **Redirect URI**, enter `https://your-tenant-name.b2clogin.com/your-tenant-name.onmicrosoft.com`, where `your-tenant-name` is your Azure AD B2C tenant.
129+
1. Under **Permissions**, select the *Grant admin consent to openid and offline_access permissions* check box.
130+
1. Select **Register**.
131+
1. Record the **Application (client) ID** for use in a later step.
132+
133+
Next, specify that the application should be treated as a public client:
134+
135+
1. Under **Manage**, select **Authentication**.
136+
1. Select **Try out the new experience** (if shown).
137+
1. Under **Advanced settings**, enable **Treat application as a public client** (select **Yes**).
138+
1. Select **Save**.
139+
140+
Now, grant permissions to the API scope you exposed earlier in the *IdentityExperienceFramework* registration:
141+
142+
1. Under **Manage**, select **API permissions**.
143+
1. Under **Configured permissions**, select **Add a permission**.
144+
1. Select the **My APIs** tab, then select the **IdentityExperienceFramework** application.
145+
1. Under **Permission**, select the **user_impersonation** scope that you defined earlier.
146+
1. Select **Add permissions**. As directed, wait a few minutes before proceeding to the next step.
147+
1. Select **Grant admin consent for (your tenant name)**.
148+
1. Select your currently signed-in administrator account, or sign in with an account in your Azure AD B2C tenant that's been assigned at least the *Cloud application administrator* role.
149+
1. Select **Accept**.
150+
1. Select **Refresh**, and then verify that "Granted for ..." appears under **STATUS** for both scopes. It might take a few minutes for the permissions to propagate.
151+
152+
* * *
153+
92154
## Custom policy starter pack
93155

94156
Custom policies are a set of XML files you upload to your Azure AD B2C tenant to define technical profiles and user journeys. We provide starter packs with several pre-built policies to get you going quickly. Each of these starter packs contains the smallest number of technical profiles and user journeys needed to achieve the scenarios described:

articles/active-directory-b2c/active-directory-b2c-reference-audit-logs.md

Lines changed: 23 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ manager: celestedg
88
ms.service: active-directory
99
ms.topic: conceptual
1010
ms.workload: identity
11-
ms.date: 09/14/2019
11+
ms.date: 10/16/2019
1212
ms.author: marsma
1313
ms.subservice: B2C
1414
ms.custom: fasttrack-edit
@@ -85,8 +85,7 @@ Audit logs are published to the same pipeline as other activities for Azure Acti
8585

8686
To allow script- or application-based access to the Azure AD reporting API, you need an Azure Active Directory application registered in your Azure AD B2C tenant with the following API permissions:
8787

88-
* Microsoft Graph
89-
* Application: Read all audit log data
88+
* Microsoft Graph > Application permissions > AuditLog.Read.All
9089

9190
You can enable these permissions on an existing Azure Active Directory application registration within your B2C tenant, or create a new one specifically for use with audit log automation.
9291

@@ -98,6 +97,8 @@ Follow these steps register an application, grant it the required Microsoft Grap
9897

9998
### Assign API access permissions
10099

100+
#### [Applications](#tab/applications/)
101+
101102
1. On the **Registered app** overview page, select **Settings**.
102103
1. Under **API ACCESS**, select **Required permissions**.
103104
1. Select **Add**, and then **Select an API**.
@@ -106,6 +107,22 @@ Follow these steps register an application, grant it the required Microsoft Grap
106107
1. Select the **Select** button, and then select **Done**.
107108
1. Select **Grant permissions**, and then select **Yes**.
108109

110+
#### [App registrations (Preview)](#tab/app-reg-preview/)
111+
112+
1. Under **Manage**, select **API permissions**.
113+
1. Under **Configured permissions**, select **Add a permission**.
114+
1. Select the **Microsoft APIs** tab.
115+
1. Select **Microsoft Graph**.
116+
1. Select **Application permissions**.
117+
1. Expand **AuditLog** and then select the **AuditLog.Read.All** check box.
118+
1. Select **Add permissions**. As directed, wait a few minutes before proceeding to the next step.
119+
1. Select **Grant admin consent for (your tenant name)**.
120+
1. Select your currently signed-in account if it's been assigned the *Global Administrator* role, or sign in with an account in your Azure AD B2C tenant that's been assigned the *Global Administrator* role.
121+
1. Select **Accept**.
122+
1. Select **Refresh**, and then verify that "Granted for ..." appears under **STATUS** for the *AuditLog.Read.All* permission. It might take a few minutes for the permissions to propagate.
123+
124+
* * *
125+
109126
### Create client secret
110127

111128
[!INCLUDE [active-directory-b2c-client-secret](../../includes/active-directory-b2c-client-secret.md)]
@@ -124,15 +141,15 @@ https://graph.microsoft.com/v1.0/auditLogs/directoryAudits?$filter=loggedByServi
124141

125142
The following PowerShell script shows an example of how to query the Azure AD reporting API. After querying the API, it prints the logged events to standard output, then writes the JSON output to a file.
126143

127-
You can try this script in the [Azure Cloud Shell](../cloud-shell/overview.md). Be sure to update it with your application ID, key, and the name of your Azure AD B2C tenant.
144+
You can try this script in the [Azure Cloud Shell](../cloud-shell/overview.md). Be sure to update it with your application ID, client secret, and the name of your Azure AD B2C tenant.
128145

129146
```powershell
130147
# This script requires the registration of a Web Application in Azure Active Directory:
131148
# https://docs.microsoft.com/azure/active-directory/reports-monitoring/concept-reporting-api
132149
133150
# Constants
134-
$ClientID = "your-client-application-id-here" # Insert your application's Client ID, a GUID (registered by Global Admin)
135-
$ClientSecret = "your-client-application-secret-here" # Insert your application's Client secret/key
151+
$ClientID = "your-client-application-id-here" # Insert your application's client ID, a GUID (registered by Global Admin)
152+
$ClientSecret = "your-client-application-secret-here" # Insert your application's client secret
136153
$tenantdomain = "your-b2c-tenant.onmicrosoft.com" # Insert your Azure AD B2C tenant; for example, contoso.onmicrosoft.com
137154
$loginURL = "https://login.microsoftonline.com"
138155
$resource = "https://graph.microsoft.com" # Microsoft Graph API resource URI

0 commit comments

Comments
 (0)