You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory-b2c/faq.yml
+10Lines changed: 10 additions & 0 deletions
Original file line number
Diff line number
Diff line change
@@ -220,6 +220,16 @@ sections:
220
220
answer: |
221
221
No, Azure AD B2C is a pay-as-you-go Azure service and is not part of Enterprise Mobility Suite.
222
222
223
+
- question: |
224
+
Can I purchase Azure AD Premium P1 and Azure AD Premium P2 licensing for my Azure AD B2C tenant?
225
+
answer: |
226
+
No, Azure AD B2C tenants don't use Azure AD Premium P1 or Azure AD Premium P2 licensing. Azure AD B2C uses [Azure AD B2C Premium P1 or P2](billing.md#change-your-azure-ad-pricing-tier) licenses, which are different from Azure AD Premium P1 or P2 licenses for a Standard Azure AD tenant. Azure AD B2C tenants natively support some features that are similar to Azure AD Premium features, as explained in [Supported Azure AD features](supported-azure-ad-features.md).
227
+
228
+
- question: |
229
+
Can I use group-based assignment for Azure AD Enterprise Applications in my Azure AD B2C tenant?
230
+
answer: |
231
+
No, Azure AD B2C tenants do not support [group-based assignment to Azure AD Enterprise Applications](../active-directory/manage-apps/assign-user-or-group-access-portal.md).
232
+
223
233
- question: |
224
234
What Azure AD B2C features are unavailable in Microsoft Azure Government?
Copy file name to clipboardExpand all lines: articles/active-directory/app-proxy/application-proxy-secure-api-access.md
+61-47Lines changed: 61 additions & 47 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -15,7 +15,7 @@ ms.custom: has-adal-ref
15
15
---
16
16
# Secure access to on-premises APIs with Azure Active Directory Application Proxy
17
17
18
-
You may have business logic APIs running on-premises, or hosted on virtual machines in the cloud. Your native Android, iOS, Mac, or Windowsapps need to interact with the API endpoints to use data or provide user interaction. Azure AD Application Proxy and the [Microsoft Authentication Library (MSAL)](../azuread-dev/active-directory-authentication-libraries.md) let your native apps securely access your on-premises APIs. Azure Active Directory Application Proxy is a faster and more secure solution than opening firewall ports and controlling authentication and authorization at the app layer.
18
+
You may have business logic APIs running on-premises, or hosted on virtual machines in the cloud. Your native Android, iOS, Mac, or Windowsapps need to interact with the API endpoints to use data or provide user interaction. Azure AD Application Proxy and the [Microsoft Authentication Library (MSAL)](../develop/reference-v2-libraries.md) let your native apps securely access your on-premises APIs. Azure Active Directory Application Proxy is a faster and more secure solution than opening firewall ports and controlling authentication and authorization at the app layer.
19
19
20
20
This article walks you through setting up an Azure AD Application Proxy solution for hosting a web API service that native apps can access.
21
21
@@ -29,9 +29,9 @@ The following diagram shows how you can use Azure AD Application Proxy to secure
29
29
30
30

31
31
32
-
The Azure AD Application Proxy forms the backbone of the solution, working as a public endpoint for API access, and providing authentication and authorization. You can access your APIs from a vast array of platforms by using the [Microsoft Authentication Library (MSAL)](../azuread-dev/active-directory-authentication-libraries.md) libraries.
32
+
The Azure AD Application Proxy forms the backbone of the solution, working as a public endpoint for API access, and providing authentication and authorization. You can access your APIs from a vast array of platforms by using the [Microsoft Authentication Library (MSAL)](../develop/reference-v2-libraries.md) libraries.
33
33
34
-
Since Azure AD Application Proxyauthentication and authorization are built on top of Azure AD, you can use Azure AD Conditional Access to ensure only trusted devices can access APIs published through Application Proxy. Use Azure AD Join or Azure AD Hybrid Joined for desktops, and Intune Managed for devices. You can also take advantage of Azure Active Directory Premium features like Azure AD Multi-Factor Authentication, and the machine learning-backed security of [Azure Identity Protection](../identity-protection/overview-identity-protection.md).
34
+
Since Azure AD Application Proxyauthentication and authorization are built on top of Azure AD, you can use Azure AD Conditional Access to ensure only trusted devices can access APIs published through Application Proxy. Use Azure AD Join or Azure AD Hybrid Joined for desktops, and Intune Managed for devices. You can also take advantage of Azure Active Directory Premium features like Azure AD Multi-Factor Authentication, and the machine learning-backed security of [Azure Identity Protection](../identity-protection/overview-identity-protection.md).
35
35
36
36
## Prerequisites
37
37
@@ -52,7 +52,7 @@ To publish the SecretAPI web API through Application Proxy:
52
52
53
53
1. At the top of the **Enterprise applications - All applications** page, select **New application**.
54
54
55
-
1. On the **Add an application** page, select **On-premises applications**. The **Add your own on-premises application** page appears.
55
+
1. On the **Browse Azure AD Gallery** page, locate section **On-premises applications** and select **Add an on-premises application**. The **Add your own on-premises application** page appears.
56
56
57
57
1. If you don't have an Application Proxy Connector installed, you'll be prompted to install it. Select **Download Application Proxy Connector** to download and install the connector.
58
58
@@ -91,7 +91,7 @@ You've published your web API through Azure AD Application Proxy. Now, add users
91
91
1. Back on the **Add Assignment** page, select **Assign**.
92
92
93
93
> [!NOTE]
94
-
> APIs that use integrated Windows authentication might require [additionalsteps](./application-proxy-configure-single-sign-on-with-kcd.md).
94
+
> APIs that use integrated Windows authentication might require [additionalsteps](./application-proxy-configure-single-sign-on-with-kcd.md).
95
95
96
96
## Register the native app and grant access to the API
97
97
@@ -105,9 +105,9 @@ To register the AppProxyNativeAppSample native app:
105
105
106
106
1. Under **Name**, enter *AppProxyNativeAppSample*.
107
107
108
-
1. Under **Supported account types**, select **Accounts in any organizational directory**.
108
+
1. Under **Supported account types**, select **Accounts in this organizational directory only (Contoso only - Single tenant)**.
109
109
110
-
1. Under **Redirect URL**, drop down and select **Public client (mobile & desktop)**, and then enter *https://login.microsoftonline.com/common/oauth2/nativeclient*.
110
+
1. Under **Redirect URL**, drop down and select **Public client/native (mobile & desktop)**, and then enter *https://login.microsoftonline.com/common/oauth2/nativeclient*.
111
111
112
112
1. Select **Register**, and wait for the app to be successfully registered.
113
113
@@ -125,58 +125,72 @@ You've now registered the AppProxyNativeAppSample app in Azure Active Directory.
125
125
126
126
1. On the next **Request API permissions** page, select the check box next to **user_impersonation**, and then select **Add permissions**.
127
127
128
-

128
+

129
129
130
130
1. Back on the **API permissions** page, you can select **Grant admin consent for Contoso** to prevent other users from having to individually consent to the app.
131
131
132
132
## Configure the native app code
133
133
134
-
The last step is to configure the native app. The following snippet from the *Form1.cs* file in the NativeClient sample app causes the MSAL library to acquire the token for requesting the API call, and attach it as bearer to the app header.
135
-
136
-
```csharp
137
-
// Acquire Access Token from AAD for Proxy Application
The last step is to configure the native app. The code snippet that's used in the following steps is based on [Add the Microsoft Authentication Library to your code (.NET C# sample)](application-proxy-configure-native-client-application.md#step-4-add-the-microsoft-authentication-library-to-your-code-net-c-sample). The code is customized for this example. The code must be added to the *Form1.cs* file in the NativeClient sample app where it will cause the [MSAL library](../develop/reference-v2-libraries.md) to acquire the token for requesting the API call and attach it as bearer to the header in the request.
135
+
136
+
> [!NOTE]
137
+
> The sample app uses [Azure Active Directory Authentication Library (ADAL)](../azuread-dev/active-directory-authentication-libraries.md). Read how to [add MSAL to your project](../develop/tutorial-v2-windows-desktop.md#add-msal-to-your-project). Remember to [add the reference to MSAL](../develop/tutorial-v2-windows-desktop.md#add-the-code-to-initialize-msal) to the class and remove the ADAL reference.
138
+
139
+
To configure the native app code:
140
+
141
+
1. In *Form1.cs*, add the namespace `using Microsoft.Identity.Client;` to the code.
142
+
1. Remove the namespace `using Microsoft.IdentityModel.Clients.ActiveDirectory;` from the code.
143
+
1. Remove lines 26 and 30 because they are no longer needed.
144
+
1. Replace the contents of the `GetTodoList()` method with the following code snippet:
145
+
146
+
```csharp
147
+
// Acquire Access Token from Azure AD for Proxy Application
148
+
varclientApp=PublicClientApplicationBuilder
149
+
.Create(clientId)
150
+
.WithDefaultRedirectUri() // Will automatically use the default URI for native app
To configure the native app to connect to Azure Active Directory and call the API App Proxy, update the placeholder values in the *App.config* file of the NativeClient sample app with values from Azure AD:
170
181
171
-
- Paste the **Directory (tenant) ID** in the `<add key="ida:Tenant" value="" />` field. You can find and copy this value (a GUID) from the **Overview** page of either of your apps.
182
+
1. Paste the **Directory (tenant) ID** in the `<add key="ida:Tenant" value="" />` field. You can find and copy this value (a GUID) from the **Overview** page of either of your apps.
172
183
173
-
- Paste the AppProxyNativeAppSample **Application (client) ID** in the `<add key="ida:ClientId" value="" />` field. You can find and copy this value (a GUID) from the AppProxyNativeAppSample's **Overview** page, in the left navigation under **Manage**.
184
+
1. Paste the AppProxyNativeAppSample **Application (client) ID** in the `<add key="ida:ClientId" value="" />` field. You can find and copy this value (a GUID) from the AppProxyNativeAppSample's **Overview** page, in the left navigation under **Manage**.
174
185
175
-
- Paste the AppProxyNativeAppSample **Redirect URI** in the `<add key="ida:RedirectUri" value="" />` field. You can find and copy this value (a URI) from the AppProxyNativeAppSample's **Authentication** page, in the left navigation under **Manage**.
186
+
1.*This step is optional as MSAL uses the method PublicClientApplicationBuilder.WithDefaultRedirectUri() to insert the recommended reply URI.* Paste the AppProxyNativeAppSample **Redirect URI** in the `<add key="ida:RedirectUri" value="" />` field. You can find and copy this value (a URI) from the AppProxyNativeAppSample's **Authentication** page, in the left navigation under **Manage**.
176
187
177
-
- Paste the SecretAPI **Application ID URI** in the `<add key="todo:TodoListResourceId" value="" />` field. You can find and copy this value (a URI) from the SecretAPI's **Expose an API** page, in the left navigation under **Manage**.
188
+
1. Paste the SecretAPI **Application ID URI** in the `<add key="todo:TodoListResourceId" value="" />` field. This is the same value as `todo:TodoListBaseAddress` below. You can find and copy this value (a URI) from the SecretAPI's **Expose an API** page, in the left navigation under **Manage**.
178
189
179
-
- Paste the SecretAPI **Home Page URL** in the `<add key="todo:TodoListBaseAddress" value="" />` field. You can find and copy this value (a URL) from the SecretAPI's **Branding** page, in the left navigation under **Manage**.
190
+
1. Paste the SecretAPI **Home Page URL** in the `<add key="todo:TodoListBaseAddress" value="" />` field. You can find and copy this value (a URL) from the SecretAPI **Branding & properties** page, in the left navigation under **Manage**.
191
+
192
+
> [!NOTE]
193
+
> If the solution doesn't build and reports the error *invalid Resx file*, in Solution Explorer, expand **Properties**, right-click *Resources.resx*, and then select **View Code**. Comment lines 121 to 123.
180
194
181
195
After you configure the parameters, build and run the native app. When you select the **Sign In** button, the app lets you sign in, and then displays a success screen to confirm that it successfully connected to the SecretAPI.
Copy file name to clipboardExpand all lines: articles/active-directory/authentication/concept-authentication-phone-options.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -59,9 +59,9 @@ With phone call verification during SSPR or Azure AD Multi-Factor Authentication
59
59
If you have problems with phone authentication for Azure AD, review the following troubleshooting steps:
60
60
61
61
* “You've hit our limit on verification calls” or “You’ve hit our limit on text verification codes” error messages during sign-in
62
-
* Microsoft may limit repeated authentication attempts that are performed by the same user in a short period of time. This limitation does not apply to the Microsoft Authenticator or verification code. If you have hit these limits, you can use the Authenticator App, verification code or try to sign in again in a few minutes.
62
+
* Microsoft may limit repeated authentication attempts that are performed by the same user or organization in a short period of time. This limitation does not apply to the Microsoft Authenticator or verification code. If you have hit these limits, you can use the Authenticator App, verification code or try to sign in again in a few minutes.
63
63
* "Sorry, we're having trouble verifying your account" error message during sign-in
64
-
* Microsoft may limit or block voice or SMS authentication attempts that are performed by the same user, phone number, or organization due to high number of failed voice or SMS authentication attempts. If you are experiencing this error, you can try another method, such as Authenticator App or verification code, or reach out to your admin for support.
64
+
* Microsoft may limit or block voice or SMS authentication attempts that are performed by the same user, phone number, or organization due to high number of voice or SMS authentication attempts. If you are experiencing this error, you can try another method, such as Authenticator App or verification code, or reach out to your admin for support.
65
65
* Blocked caller ID on a single device.
66
66
* Review any blocked numbers configured on the device.
67
67
* Wrong phone number or incorrect country/region code, or confusion between personal phone number versus work phone number.
0 commit comments