Skip to content

Commit ced98c8

Browse files
authored
Merge pull request #109685 from MicrosoftDocs/master
3/31 AM Publish
2 parents 7581df5 + 4b07749 commit ced98c8

File tree

97 files changed

+2004
-443
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

97 files changed

+2004
-443
lines changed

articles/active-directory-b2c/phone-factor-technical-profile.md

Lines changed: 28 additions & 28 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: celestedg
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: reference
12-
ms.date: 03/26/2020
12+
ms.date: 03/31/2020
1313
ms.author: mimart
1414
ms.subservice: B2C
1515
---
@@ -20,12 +20,11 @@ ms.subservice: B2C
2020

2121
Azure Active Directory B2C (Azure AD B2C) provides support for enrolling and verifying phone numbers. This technical profile:
2222

23-
- Provides a user interface to interact with the user.
24-
- Uses content definition to control the look and feel.
25-
- Supports both phone calls and text messages to validate the phone number.
23+
- Provides a user interface to interact with the user to verify, or enroll a phone number.
24+
- Supports phone calls and text messages to validate the phone number.
2625
- Supports multiple phone numbers. The user can select one of the phone numbers to verify.
27-
- If a phone number is provided, the phone factor user interface asks the user to verify the phone number. If not provided, it asks the user to enroll a new phone number.
28-
- Returns a claim indicating whether the user provided a new phone number. You can use this claim to decide whether the phone number should be persisted to the Azure AD user profile.
26+
- Returns a claim indicating whether the user provided a new phone number. You can use this claim to decide whether the phone number should be persisted to the Azure AD B2C user profile.
27+
- Uses a [content definition](contentdefinitions.md) to control the look and feel.
2928

3029
## Protocol
3130

@@ -41,19 +40,25 @@ The following example shows a phone factor technical profile for enrollment and
4140
</TechnicalProfile>
4241
```
4342

44-
## Input claims
43+
## Input claims transformations
4544

46-
The InputClaims element must contain following claims. You can also map the name of your claim to the name defined in the phone factor technical profile.
45+
The InputClaimsTransformations element may contain a collection of input claims transformations that are used to modify the input claims, or generate new ones. The following input claims transformation generates a `UserId` claim that is used later in the input claims collection.
4746

48-
```XML
49-
<InputClaims>
50-
<!--A unique identifier of the user. The partner claim type must be set to `UserId`. -->
51-
<InputClaim ClaimTypeReferenceId="userIdForMFA" PartnerClaimType="UserId" />
52-
<!--A claim that contains the phone number. If the claim is empty, Azure AD B2C asks the user to enroll a new phone number. Otherwise, it asks the user to verify the phone number. -->
53-
<InputClaim ClaimTypeReferenceId="strongAuthenticationPhoneNumber" />
54-
</InputClaims>
47+
```xml
48+
<InputClaimsTransformations>
49+
<InputClaimsTransformation ReferenceId="CreateUserIdForMFA" />
50+
</InputClaimsTransformations>
5551
```
5652

53+
## Input claims
54+
55+
The InputClaims element must contain the following claims. You can also map the name of your claim to the name defined in the phone factor technical profile.
56+
57+
| Data type| Required | Description |
58+
| --------- | -------- | ----------- |
59+
| string| Yes | A unique identifier for the user. The claim name, or PartnerClaimType must be set to `UserId`. This claim should not contain personal identifiable information.|
60+
| string| Yes | List of claim types. Each claim contains one phone number. If any of the input claims do not contain a phone number, the user will be asked to enroll and verify a new phone number. The validated phone number is returned as an output claim. If one of the input claims contain a phone number, the user is asked to verify it. If multiple input claims contain a phone number, the user is asked to choose and verify one of the phone numbers. |
61+
5762
The following example demonstrates using multiple phone numbers. For more information, see [sample policy](https://github.com/azure-ad-b2c/samples/tree/master/policies/mfa-add-secondarymfa).
5863

5964
```XML
@@ -64,22 +69,16 @@ The following example demonstrates using multiple phone numbers. For more inform
6469
</InputClaims>
6570
```
6671

67-
The InputClaimsTransformations element may contain a collection of InputClaimsTransformation elements that are used to modify the input claims or generate new ones before presenting them to the phone factor page.
68-
6972
## Output claims
7073

7174
The OutputClaims element contains a list of claims returned by the phone factor technical profile.
7275

73-
```xml
74-
<OutputClaims>
75-
<!-- The verified phone number. The partner claim type must be set to `Verified.OfficePhone`. -->
76-
<OutputClaim ClaimTypeReferenceId="Verified.strongAuthenticationPhoneNumber" PartnerClaimType="Verified.OfficePhone" />
77-
<!-- Indicates whether the new phone number has been entered by the user. The partner claim type must be set to `newPhoneNumberEntered`. -->
78-
<OutputClaim ClaimTypeReferenceId="newPhoneNumberEntered" PartnerClaimType="newPhoneNumberEntered" />
79-
</OutputClaims>
80-
```
76+
| Data type| Required | Description |
77+
| -------- | ----------- |----------- |
78+
| boolean | Yes | Indicates whether the new phone number has been entered by the user. The claim name, or PartnerClaimType must be set to `newPhoneNumberEntered`|
79+
| string| Yes | The verified phone number. The claim name, or PartnerClaimType must be set to `Verified.OfficePhone`.|
8180

82-
The OutputClaimsTransformations element may contain a collection of OutputClaimsTransformation elements that are used to modify the output claims or generate new ones.
81+
The OutputClaimsTransformations element may contain a collection of OutputClaimsTransformation elements that are used to modify the output claims, or generate new ones.
8382

8483
## Cryptographic keys
8584

@@ -91,7 +90,9 @@ The **CryptographicKeys** element is not used.
9190
| Attribute | Required | Description |
9291
| --------- | -------- | ----------- |
9392
| ContentDefinitionReferenceId | Yes | The identifier of the [content definition](contentdefinitions.md) associated with this technical profile. |
94-
| ManualPhoneNumberEntryAllowed| No | Specify whether or not a user is allowed to manually enter a phone number. Possible values: `true` or `false` (default).|
93+
| ManualPhoneNumberEntryAllowed| No | Specify whether or not a user is allowed to manually enter a phone number. Possible values: `true`, or `false` (default).|
94+
| setting.authenticationMode | No | The method to validate the phone number. Possible values: `sms`, `phone`, or `mixed` (default).|
95+
| setting.autodial| No| Specify whether the technical profile should auto dial or auto send an SMS. Possible values: `true`, or `false` (default). Auto dial requires the `setting.authenticationMode` metadata be set to `sms`, or `phone`. The input claims collection must have a single phone number. |
9596

9697
### UI elements
9798

@@ -100,4 +101,3 @@ The phone factor authentication page user interface elements can be [localized](
100101
## Next steps
101102

102103
- Check the [social and local accounts with MFA](https://github.com/Azure-Samples/active-directory-b2c-custom-policy-starterpack/tree/master/SocialAndLocalAccountsWithMfa) starter pack.
103-

articles/active-directory/governance/entitlement-management-catalog-create.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: Create & manage resources in entitlement management - Azure AD
2+
title: Create & manage a catalog of resources in entitlement management - Azure AD
33
description: Learn how to create a new container of resources and access packages in Azure Active Directory entitlement management.
44
services: active-directory
55
documentationCenter: ''

articles/app-service/configure-authentication-provider-aad.md

Lines changed: 13 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -1,17 +1,21 @@
11
---
22
title: Configure Azure AD authentication
3-
description: Learn how to configure Azure Active Directory authentication as an identity provider for your App Service app.
3+
description: Learn how to configure Azure Active Directory authentication as an identity provider for your App Service or Azure Functions app.
44
ms.assetid: 6ec6a46c-bce4-47aa-b8a3-e133baef22eb
55
ms.topic: article
66
ms.date: 09/03/2019
77
ms.custom: seodec18, fasttrack-edit
88
---
99

10-
# Configure your App Service app to use Azure AD login
10+
# Configure your App Service or Azure Functions app to use Azure AD login
1111

1212
[!INCLUDE [app-service-mobile-selector-authentication](../../includes/app-service-mobile-selector-authentication.md)]
1313

14-
This article shows you how to configure Azure App Service to use Azure Active Directory (Azure AD) as an authentication provider.
14+
This article shows you how to configure Azure App Service or Azure Functions to use Azure Active Directory (Azure AD) as an authentication provider.
15+
16+
> [!NOTE]
17+
> At this time, [Azure Active Directory v2.0](../active-directory/develop/v2-overview.md) (including [MSAL](../active-directory/develop/msal-overview.md)) is not supported for Azure App Service and Azure Functions. Please check back for updates.
18+
>
1519
1620
Follow these best practices when setting up your app and authentication:
1721

@@ -67,7 +71,8 @@ Perform the following steps:
6771
1. In **Redirect URI**, select **Web** and type `<app-url>/.auth/login/aad/callback`. For example, `https://contoso.azurewebsites.net/.auth/login/aad/callback`.
6872
1. Select **Create**.
6973
1. After the app registration is created, copy the **Application (client) ID** and the **Directory (tenant) ID** for later.
70-
1. Select **Branding**. In **Home page URL**, enter the URL of your App Service app and select **Save**.
74+
1. Select **Authentication**. Under **Implicit grant**, enable **ID tokens** to allow OpenID Connect user sign-ins from App Service.
75+
1. (Optional) Select **Branding**. In **Home page URL**, enter the URL of your App Service app and select **Save**.
7176
1. Select **Expose an API** > **Set**. Paste in the URL of your App Service app and select **Save**.
7277

7378
> [!NOTE]
@@ -91,7 +96,7 @@ Perform the following steps:
9196
|Field|Description|
9297
|-|-|
9398
|Client ID| Use the **Application (client) ID** of the app registration. |
94-
|Issuer ID| Use `https://login.microsoftonline.com/<tenant-id>`, and replace *\<tenant-id>* with the **Directory (tenant) ID** of the app registration. |
99+
|Issuer Url| Use `https://login.microsoftonline.com/<tenant-id>`, and replace *\<tenant-id>* with the **Directory (tenant) ID** of the app registration. This value is used to redirect users to the correct Azure AD tenant, as well as to download the appropriate metadata to determine the appropriate token signing keys and token issuer claim value for example. |
95100
|Client Secret (Optional)| Use the client secret you generated in the app registration.|
96101
|Allowed Token Audiences| If this is a cloud or server app and you want to allow authentication tokens from a web app, add the **Application ID URI** of the web app here. The configured **Client ID** is *always* implicitly considered to be an allowed audience. |
97102

@@ -101,21 +106,21 @@ You're now ready to use Azure Active Directory for authentication in your App Se
101106

102107
## Configure a native client application
103108

104-
You can register native clients to allow authentication using a client library such as the **Active Directory Authentication Library**.
109+
You can register native clients to allow authentication to Web API's hosted in your app using a client library such as the **Active Directory Authentication Library**.
105110

106111
1. In the [Azure portal], select **Active Directory** > **App registrations** > **New registration**.
107112
1. In the **Register an application** page, enter a **Name** for your app registration.
108113
1. In **Redirect URI**, select **Public client (mobile & desktop)** and type the URL `<app-url>/.auth/login/aad/callback`. For example, `https://contoso.azurewebsites.net/.auth/login/aad/callback`.
109114

110115
> [!NOTE]
111-
> For a Windows application, use the [package SID](../app-service-mobile/app-service-mobile-dotnet-how-to-use-client-library.md#package-sid) as the URI instead.
116+
> For a Microsoft Store application, use the [package SID](../app-service-mobile/app-service-mobile-dotnet-how-to-use-client-library.md#package-sid) as the URI instead.
112117
1. Select **Create**.
113118
1. After the app registration is created, copy the value of **Application (client) ID**.
114119
1. Select **API permissions** > **Add a permission** > **My APIs**.
115120
1. Select the app registration you created earlier for your App Service app. If you don't see the app registration, make sure that you've added the **user_impersonation** scope in [Create an app registration in Azure AD for your App Service app](#register).
116121
1. Select **user_impersonation**, and then select **Add permissions**.
117122

118-
You have now configured a native client application that can access your App Service app.
123+
You have now configured a native client application that can access your App Service app on behalf of a user.
119124

120125
## <a name="related-content"> </a>Next steps
121126

articles/app-service/configure-authentication-provider-facebook.md

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,19 +1,20 @@
11
---
22
title: Configure Facebook authentication
3-
description: Learn how to configure Facebook authentication as an identity provider for your App Service app.
3+
description: Learn how to configure Facebook authentication as an identity provider for your App Service or Azure Functions app.
44

55
ms.assetid: b6b4f062-fcb4-47b3-b75a-ec4cb51a62fd
66
ms.topic: article
77
ms.date: 06/06/2019
88
ms.custom: seodec18
9+
ms.custom: fasttrack-edit
910

1011
---
1112

12-
# Configure your App Service app to use Facebook login
13+
# Configure your App Service or Azure Functions app to use Facebook login
1314

1415
[!INCLUDE [app-service-mobile-selector-authentication](../../includes/app-service-mobile-selector-authentication.md)]
1516

16-
This article shows how to configure Azure App Service to use Facebook as an authentication provider.
17+
This article shows how to configure Azure App Service or Azure Functions to use Facebook as an authentication provider.
1718

1819
To complete the procedure in this article, you need a Facebook account that has a verified email address and a mobile phone number. To create a new Facebook account, go to [facebook.com].
1920

articles/app-service/configure-authentication-provider-google.md

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,18 +1,19 @@
11
---
22
title: Configure Google authentication
3-
description: Learn how to configure Google authentication as an identity provider for your App Service app.
3+
description: Learn how to configure Google authentication as an identity provider for your App Service or Azure Functions app.
44
ms.assetid: 2b2f9abf-9120-4aac-ac5b-4a268d9b6e2b
55
ms.topic: article
66
ms.date: 09/02/2019
77
ms.custom: seodec18
8+
ms.custom: fasttrack-edit
89

910
---
1011

11-
# Configure your App Service app to use Google login
12+
# Configure your App Service or Azure Functions app to use Google login
1213

1314
[!INCLUDE [app-service-mobile-selector-authentication](../../includes/app-service-mobile-selector-authentication.md)]
1415

15-
This topic shows you how to configure Azure App Service to use Google as an authentication provider.
16+
This topic shows you how to configure Azure App Service or Azure Functions to use Google as an authentication provider.
1617

1718
To complete the procedure in this topic, you must have a Google account that has a verified email address. To create a new Google account, go to [accounts.google.com](https://go.microsoft.com/fwlink/p/?LinkId=268302).
1819

articles/app-service/configure-authentication-provider-microsoft.md

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,19 +1,20 @@
11
---
22
title: Configure Microsoft authentication
3-
description: Learn how to configure Microsoft Account authentication as an identity provider for your App Service app.
3+
description: Learn how to configure Microsoft Account authentication as an identity provider for your App Service or Azure Functions app.
44

55
ms.assetid: ffbc6064-edf6-474d-971c-695598fd08bf
66
ms.topic: article
77
ms.date: 08/08/2019
88
ms.custom: seodec18
9+
ms.custom: fasttrack-edit
910

1011
---
1112

12-
# Configure your App Service app to use Microsoft Account login
13+
# Configure your App Service or Azure Functions app to use Microsoft Account login
1314

1415
[!INCLUDE [app-service-mobile-selector-authentication](../../includes/app-service-mobile-selector-authentication.md)]
1516

16-
This topic shows you how to configure Azure App Service to use AAD to support personal Microsoft account logins.
17+
This topic shows you how to configure Azure App Service or Azure Functions to use AAD to support personal Microsoft account logins.
1718

1819
> [!NOTE]
1920
> Both personal Microsoft accounts and organizational accounts use the AAD identity provider. At this time, is not possible to configure this identity provider to support both types of log-ins.

articles/app-service/configure-authentication-provider-twitter.md

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,19 +1,20 @@
11
---
22
title: Configure Twitter authentication
3-
description: Learn how to configure Twitter authentication as an identity provider for your App Service app.
3+
description: Learn how to configure Twitter authentication as an identity provider for your App Service or Azure Functions app.
44

55
ms.assetid: c6dc91d7-30f6-448c-9f2d-8e91104cde73
66
ms.topic: article
77
ms.date: 02/28/2020
88
ms.custom: seodec18
9+
ms.custom: fasttrack-edit
910

1011
---
1112

12-
# Configure your App Service app to use Twitter login
13+
# Configure your App Service or Azure Functions app to use Twitter login
1314

1415
[!INCLUDE [app-service-mobile-selector-authentication](../../includes/app-service-mobile-selector-authentication.md)]
1516

16-
This article shows how to configure Azure App Service to use Twitter as an authentication provider.
17+
This article shows how to configure Azure App Service or Azure Functions to use Twitter as an authentication provider.
1718

1819
To complete the procedure in this article, you need a Twitter account that has a verified email address and phone number. To create a new Twitter account, go to [twitter.com].
1920

0 commit comments

Comments
 (0)