You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory-b2c/azure-ad-b2c-global-identity-funnel-based-design.md
+4-5Lines changed: 4 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -22,14 +22,14 @@ The designs account for:
22
22
23
23
* Local Account sign up and sign in
24
24
* Federated account sign up and sign in
25
-
* Authenticating local accounts for users signing in from outside their registered region, supported by cross tenant API based authentication.
25
+
* Authenticating local accounts for users signing in from outside their registered region, supported by cross tenant API based authentication
26
26
* Authenticating federated accounts for users signing in from outside their registered region, supported by cross tenant API based look up
27
27
* Prevents sign up from multiple different regions
28
28
* Applications in each region have a single endpoint to connect with
29
29
30
30
## Local account sign-in use cases
31
31
32
-
The following use cases are typical in a global Azure AD B2C environment. The local account use cases also cover accounts where the user travels. Each provides a diagram and workflow steps for each use case.
32
+
The following use cases are typical in a global Azure AD B2C environment. The local account use cases also cover accounts where the user travels. We provide a diagram and workflow steps for each use case.
33
33
34
34
### Local user sign-up
35
35
@@ -99,8 +99,7 @@ This use case demonstrates how a user can travel across regions and maintain the
99
99
100
100
1. The EMEA Azure AD B2C tenant performs an Azure AD ROPC flow against the NOAM Azure AD B2C tenant to verify credentials.
101
101
>[!NOTE]
102
-
>This call will also fetch a token for the user to perform a Graph API call.
103
-
The EMEA Azure AD B2C tenant performs a Graph API call to the NOAM Azure AD B2C tenant to fetch the user's profile. This call is authenticated by the access token for Graph API acquired in the last step.
102
+
>This call will also fetch a token for the user to perform a Graph API call. The EMEA Azure AD B2C tenant performs a Graph API call to the NOAM Azure AD B2C tenant to fetch the user's profile. This call is authenticated by the access token for Graph API acquired in the last step.
104
103
105
104
1. The regional tenant issues a token back to the funnel tenant.
106
105
@@ -312,6 +311,6 @@ This use case demonstrates how non-local users are able to perform account linki
312
311
313
312
-[Build a global identity solution with region-based approach](azure-ad-b2c-global-identity-region-based-design.md)
314
313
315
-
-[Azure AD B2C global identity proof of concept regional-based configuration](azure-ad-b2c-global-identity-proof-of-concept-regional.md)
314
+
-[Azure AD B2C global identity proof of concept region-based configuration](azure-ad-b2c-global-identity-proof-of-concept-regional.md)
316
315
317
316
-[Azure AD B2C global identity proof of concept funnel-based configuration](azure-ad-b2c-global-identity-proof-of-concept-funnel.md)
Copy file name to clipboardExpand all lines: articles/active-directory-b2c/azure-ad-b2c-global-identity-proof-of-concept-regional.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,5 +1,5 @@
1
1
---
2
-
title: Azure Active Directory B2C global identity framework proof of concept for regional based configuration
2
+
title: Azure Active Directory B2C global identity framework proof of concept for region-based configuration
3
3
description: Learn how to create a proof of concept regional based approach for Azure AD B2C to provide customer identity and access management for global customers.
4
4
services: active-directory-b2c
5
5
author: gargi-sinha
@@ -13,11 +13,11 @@ ms.author: gasinh
13
13
ms.subservice: B2C
14
14
---
15
15
16
-
# Azure Active Directory B2C global identity framework proof of concept regional based configuration
16
+
# Azure Active Directory B2C global identity framework proof of concept for region-based configuration
17
17
18
-
The following section describes how to create proof of concept implementations for regional-based orchestration. The completed Azure Active Directory B2C (Azure AD B2C) custom policies can be found [here](https://github.com/azure-ad-b2c/samples/tree/master/policies/global-architecture-model/region-based-approach).
18
+
The following section describes how to create proof of concept implementations for region-based orchestration. The completed Azure Active Directory B2C (Azure AD B2C) custom policies can be found [here](https://github.com/azure-ad-b2c/samples/tree/master/policies/global-architecture-model/region-based-approach).
19
19
20
-
## Regional-based approach
20
+
## Region-based approach
21
21
22
22
Each regional Azure AD B2C tenant will require an Azure AD B2C Custom policy, which contains the following capabilities:
Copy file name to clipboardExpand all lines: articles/active-directory-b2c/azure-ad-b2c-global-identity-region-based-design.md
+8-20Lines changed: 8 additions & 20 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -108,9 +108,7 @@ This use case demonstrates how a user can reset their password when they are wit
108
108
109
109

110
110
111
-
1. User from EMEA attempts to sign in at **myapp.fr**.
112
-
113
-
If the user isn't being sent to their local hostname, the traffic manager will enforce a redirect.
111
+
1. User from EMEA attempts to sign in at **myapp.fr**. If the user isn't being sent to their local hostname, the traffic manager will enforce a redirect.
114
112
115
113
1. The user arrives at the EMEA Azure AD B2C tenant and selects **forgot password**. The user enters and verifies their email.
116
114
@@ -128,9 +126,7 @@ This use case demonstrates how a user can reset their password when they're trav
128
126
129
127

130
128
131
-
1. User from NOAM attempts to sign in at **myapp.fr**, since they are on holiday in France.
132
-
133
-
If the user isn't being sent to their local hostname, the traffic manager will enforce a redirect.
129
+
1. User from NOAM attempts to sign in at **myapp.fr**, since they are on holiday in France. If the user isn't being sent to their local hostname, the traffic manager will enforce a redirect.
134
130
135
131
1. The user arrives at the EMEA Azure AD B2C tenant and selects **forgot password**. The user enters and verifies their email.
136
132
@@ -204,9 +200,7 @@ This use case demonstrates how a user from their local region signs into the ser
204
200
205
201

206
202
207
-
1. User from EMEA attempts to sign in at **myapp.fr**.
208
-
209
-
If the user isn't being sent to their local hostname, the traffic manager will enforce a redirect.
203
+
1. User from EMEA attempts to sign in at **myapp.fr**. If the user isn't being sent to their local hostname, the traffic manager will enforce a redirect.
210
204
211
205
1. User lands at the EMEA tenant.
212
206
@@ -222,15 +216,13 @@ This scenario demonstrates how a user located away from the region in which they
222
216
223
217

224
218
225
-
1. User from NOAM attempts to sign in at **myapp.fr**.
226
-
227
-
If the user isn't being sent to their local hostname, the traffic manager will enforce a redirect.
219
+
1. User from NOAM attempts to sign in at **myapp.fr**. If the user isn't being sent to their local hostname, the traffic manager will enforce a redirect.
228
220
229
221
1. User lands at the EMEA tenant.
230
222
231
223
1. User selects to sign in with a federated identity provider.
232
224
233
-
>[!NOTE]
225
+
>[!NOTE]
234
226
>Use the same App Id from the App Registration at the Social IdP across all Azure AD B2C regional tenants. This ensures that the ID coming back from the Social IdP is always the same.
235
227
236
228
1. Perform a lookup into the global lookup table and determine the user's federated ID is registered in NOAM.
@@ -245,9 +237,7 @@ This scenario demonstrates how users will be able to perform account linking whe
245
237
246
238

247
239
248
-
1. User from EMEA attempts to sign in at **myapp.fr**.
249
-
250
-
If the user isn't being sent to their local hostname, the traffic manager will enforce a redirect.
240
+
1. User from EMEA attempts to sign in at **myapp.fr**. If the user isn't being sent to their local hostname, the traffic manager will enforce a redirect.
251
241
252
242
1. User lands at the EMEA tenant.
253
243
@@ -269,15 +259,13 @@ This scenario demonstrates how users will be able to perform account linking wh
269
259
270
260

271
261
272
-
1. User from NOAM attempts to sign in at **myapp.fr**.
273
-
274
-
If the user isn't being sent to their local hostname, the traffic manager will enforce a redirect.
262
+
1. User from NOAM attempts to sign in at **myapp.fr**. If the user isn't being sent to their local hostname, the traffic manager will enforce a redirect.
275
263
276
264
1. User lands at the EMEA tenant.
277
265
278
266
1. User selects to sign in with a federated identity provider/social IdP.
279
267
280
-
1. A lookup is performed into the global lookup table for the ID returned from the federated IdP.
268
+
1. A lookup is performed into the global lookup table for the ID returned from the federated IdP.
281
269
282
270
1. Where the ID doesn't exist, and the email from the federated IdP exists in another region, it's a traveling user account linking scenario.
Copy file name to clipboardExpand all lines: articles/azure-monitor/app/asp-net-core.md
+17-18Lines changed: 17 additions & 18 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -44,8 +44,7 @@ The [Application Insights SDK for ASP.NET Core](https://nuget.org/packages/Micro
44
44
***IDE**: Visual Studio, Visual Studio Code, or command line
45
45
46
46
> [!NOTE]
47
-
> - ASP.NET Core 6.0 requires [Application Insights 2.19.0](https://www.nuget.org/packages/Microsoft.ApplicationInsights.AspNetCore/2.18.0) or later
48
-
> - ASP.NET Core 3.1 requires [Application Insights 2.8.0](https://www.nuget.org/packages/Microsoft.ApplicationInsights.AspNetCore/2.8.0) or later
47
+
> - ASP.NET Core 6.0 requires [Application Insights 2.19.0](https://www.nuget.org/packages/Microsoft.ApplicationInsights.AspNetCore/2.19.0) or later
49
48
50
49
## Prerequisites
51
50
@@ -86,7 +85,7 @@ For Visual Studio for Mac, use the [manual guidance](#enable-application-insight
86
85
87
86
2. Add `AddApplicationInsightsTelemetry()` to your `startup.cs` or `program.cs` class (depending on your .NET Core version)
88
87
89
-
### [ASP.NET Core 6.0](#tab/netcore6)
88
+
### [ASP.NET Core 6 and later](#tab/netcorenew)
90
89
91
90
Add `builder.Services.AddApplicationInsightsTelemetry();` after the `WebApplication.CreateBuilder()` method in your `Program` class, as in this example:
92
91
@@ -103,7 +102,7 @@ For Visual Studio for Mac, use the [manual guidance](#enable-application-insight
103
102
var app = builder.Build();
104
103
```
105
104
106
-
### [ASP.NET Core 3.1](#tab/netcore3)
105
+
### [ASP.NET Core 5 and earlier](#tab/netcoreold)
107
106
108
107
Add `services.AddApplicationInsightsTelemetry();` to the `ConfigureServices()` method in your `Startup` class, as in this example:
109
108
@@ -238,7 +237,7 @@ You can customize the Application Insights SDK for ASP.NET Core to change the de
238
237
239
238
You can modify a few common settings by passing `ApplicationInsightsServiceOptions` to `AddApplicationInsightsTelemetry`, as in this example:
@@ -320,7 +319,7 @@ When you want to enrich telemetry with additional information, use [telemetry in
320
319
321
320
Add any new `TelemetryInitializer` to the `DependencyInjection` container as shown in the following code. The SDK automatically picks up any `TelemetryInitializer` that's added to the `DependencyInjection` container.
322
321
323
-
### [ASP.NET Core 6.0](#tab/netcore6)
322
+
### [ASP.NET Core 6 and later](#tab/netcorenew)
324
323
325
324
```csharp
326
325
varbuilder=WebApplication.CreateBuilder(args);
@@ -333,7 +332,7 @@ var app = builder.Build();
333
332
> [!NOTE]
334
333
> `builder.Services.AddSingleton<ITelemetryInitializer, MyCustomTelemetryInitializer>();` works for simple initializers. For others, the following is required: `builder.Services.AddSingleton(new MyCustomTelemetryInitializer() { fieldName = "myfieldName" });`
@@ -351,7 +350,7 @@ public void ConfigureServices(IServiceCollection services)
351
350
352
351
By default, telemetry initializers are present. To remove all or specific telemetry initializers, use the following sample code *after* calling `AddApplicationInsightsTelemetry()`.
@@ -400,7 +399,7 @@ public void ConfigureServices(IServiceCollection services)
400
399
401
400
You can add custom telemetry processors to `TelemetryConfiguration` by using the extension method `AddApplicationInsightsTelemetryProcessor` on `IServiceCollection`. You use telemetry processors in [advanced filtering scenarios](./api-filtering-sampling.md#itelemetryprocessor-and-itelemetryinitializer). Use the following example.
@@ -447,7 +446,7 @@ By default, the following automatic-collection modules are enabled. These module
447
446
448
447
To configure any default `TelemetryModule`, use the extension method `ConfigureTelemetryModule<T>` on `IServiceCollection`, as shown in the following example.
@@ -564,7 +563,7 @@ public void ConfigureServices(IServiceCollection services)
564
563
565
564
If you want to disable telemetry conditionally and dynamically, you can resolve the `TelemetryConfiguration` instance with an ASP.NET Core dependency injection container anywhere in your code and set the `DisableTelemetry` flag on it.
566
565
567
-
### [ASP.NET Core 6.0](#tab/netcore6)
566
+
### [ASP.NET Core 6 and later](#tab/netcorenew)
568
567
569
568
```csharp
570
569
varbuilder=WebApplication.CreateBuilder(args);
@@ -577,7 +576,7 @@ builder.Services.Configure<TelemetryConfiguration>(x => x.DisableTelemetry = tru
0 commit comments