Skip to content

Commit d513ff7

Browse files
committed
Syncing with main. Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into work-win7-deprecation
2 parents b83c61c + 324bdb9 commit d513ff7

File tree

248 files changed

+2603
-1747
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

248 files changed

+2603
-1747
lines changed

articles/active-directory-b2c/configure-tokens.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -94,7 +94,7 @@ The following values are set in the previous example:
9494

9595
- **token_lifetime_secs** - Access token lifetimes (seconds). The default is 3,600 (1 hour). The minimum is 300 (5 minutes). The maximum is 86,400 (24 hours).
9696
- **id_token_lifetime_secs** - ID token lifetimes (seconds). The default is 3,600 (1 hour). The minimum is 300 (5 minutes). The maximum is 86,400 (24 hours).
97-
- **refresh_token_lifetime_secs** Refresh token lifetimes (seconds). The default is 120,9600 (14 days). The minimum is 86,400 (24 hours). The maximum is 7,776,000 (90 days).
97+
- **refresh_token_lifetime_secs** Refresh token lifetimes (seconds). The default is 1,209,600 (14 days). The minimum is 86,400 (24 hours). The maximum is 7,776,000 (90 days).
9898
- **rolling_refresh_token_lifetime_secs** - Refresh token sliding window lifetime (seconds). The default is 7,776,000 (90 days). The minimum is 86,400 (24 hours). The maximum is 31,536,000 (365 days). If you don't want to enforce a sliding window lifetime, set the value of `allow_infinite_rolling_refresh_token` to `true`.
9999
- **allow_infinite_rolling_refresh_token** - Refresh token sliding window lifetime never expires.
100100

@@ -238,4 +238,4 @@ When using the [OAuth 2.0 authorization code flow](authorization-code-flow.md),
238238
## Next steps
239239

240240
- Learn more about how to [request access tokens](access-tokens.md).
241-
- Learn how to build [Resilience through developer best practices](../active-directory/fundamentals/resilience-b2c-developer-best-practices.md?bc=%2fazure%2factive-directory-b2c%2fbread%2ftoc.json&toc=%2fazure%2factive-directory-b2c%2fTOC.json).
241+
- Learn how to build [Resilience through developer best practices](../active-directory/fundamentals/resilience-b2c-developer-best-practices.md?bc=%2fazure%2factive-directory-b2c%2fbread%2ftoc.json&toc=%2fazure%2factive-directory-b2c%2fTOC.json).

articles/active-directory-b2c/custom-policy-overview.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ manager: CelesteDG
88
ms.service: active-directory
99
ms.workload: identity
1010
ms.topic: reference
11-
ms.date: 10/14/2021
11+
ms.date: 01/10/2023
1212
ms.author: kengaderdus
1313
ms.subservice: B2C
1414
ms.custom: "b2c-support"
@@ -24,20 +24,20 @@ A custom policy is represented as one or more XML-formatted files, which refer t
2424

2525
## Custom policy starter pack
2626

27-
Azure AD B2C custom policy [starter pack](tutorial-create-user-flows.md?pivots=b2c-custom-policy#get-the-starter-pack) comes with several pre-built policies to get you going quickly. Each of these starter packs contains the smallest number of technical profiles and user journeys needed to achieve the scenarios described:
27+
Azure AD B2C custom policy [starter pack](tutorial-create-user-flows.md?pivots=b2c-custom-policy#get-the-starter-pack) comes with several pre-built policies to get you started quickly. Each of these starter packs contains the smallest number of technical profiles and user journeys needed to achieve the scenarios described:
2828

2929
- **LocalAccounts** - Enables the use of local accounts only.
3030
- **SocialAccounts** - Enables the use of social (or federated) accounts only.
3131
- **SocialAndLocalAccounts** - Enables the use of both local and social accounts. Most of our samples refer to this policy.
3232
- **SocialAndLocalAccountsWithMFA** - Enables social, local, and multi-factor authentication options.
3333

34-
In the [Azure AD B2C samples GitHub repository](https://github.com/azure-ad-b2c/samples), you'll find samples for several enhanced Azure AD B2C custom CIAM user journeys. For example, local account policy enhancements, social account policy enhancements, MFA enhancements, user interface enhancements, generic enhancements, app migration, user migration, conditional access, web test, and CI/CD.
34+
In the [Azure AD B2C samples GitHub repository](https://github.com/azure-ad-b2c/samples), you'll find samples for several enhanced Azure AD B2C custom CIAM user journeys and scenarios. For example, local account policy enhancements, social account policy enhancements, MFA enhancements, user interface enhancements, generic enhancements, app migration, user migration, conditional access, web test, and CI/CD.
3535

3636
## Understanding the basics
3737

3838
### Claims
3939

40-
A claim provides temporary storage of data during an Azure AD B2C policy execution. It can store information about the user, such as first name, last name, or any other claim obtained from the user or other systems (claims exchanges). The [claims schema](claimsschema.md) is the place where you declare your claims.
40+
A claim provides temporary storage of data during an Azure AD B2C policy execution. Claims are more like variable in a programing language. It can store information about the user, such as first name, last name, or any other claim obtained from the user or other systems (claims exchanges). The [claims schema](claimsschema.md) is the place where you declare your claims.
4141

4242
When the policy runs, Azure AD B2C sends and receives claims to and from internal and external parties and then sends a subset of these claims to your relying party application as part of the token. Claims are used in these ways:
4343

@@ -48,7 +48,7 @@ When the policy runs, Azure AD B2C sends and receives claims to and from interna
4848

4949
### Manipulating your claims
5050

51-
The [claims transformations](claimstransformations.md) are predefined functions that can be used to convert a given claim into another one, evaluate a claim, or set a claim value. For example adding an item to a string collection, changing the case of a string, or evaluate a date and time claim. A claims transformation specifies a transform method.
51+
The [claims transformations](claimstransformations.md) are predefined functions that can be used to convert a given claim into another one, evaluate a claim, or set a claim value. For example adding an item to a string collection, changing the case of a string, or evaluate a date and time claim. A claims transformation specifies a transform method, which is also predefined.
5252

5353
### Customize and localize your UI
5454

@@ -105,7 +105,7 @@ The following diagram illustrates how Azure AD B2C uses a validation technical p
105105

106106
## Inheritance model
107107

108-
Each starter pack includes the following files:
108+
Each [starter pack](https://github.com/Azure-Samples/active-directory-b2c-custom-policy-starterpack) includes the following files:
109109

110110
- A **Base** file that contains most of the definitions. To help with troubleshooting and long-term maintenance of your policies, try to minimize the number of changes you make to this file.
111111
- A **Localization** file that holds the localization strings. This policy file is derived from the Base file. Use this file to accommodate different languages to suit your customer needs.
@@ -127,7 +127,7 @@ The following diagram shows the relationship between the policy files and the re
127127

128128
### Best practices
129129

130-
Within an Azure AD B2C custom policy, you can integrate your own business logic to build the user experiences you require and extend functionality of the service. We have a set of best practices and recommendations to get started.
130+
Within an Azure AD B2C custom policy, you can integrate your own business logic to build the user experiences you require and extend functionality of the service. We've a set of best practices and recommendations to get started.
131131

132132
- Create your logic within the **extension policy**, or **relying party policy**. You can add new elements, which will override the base policy by referencing the same ID. This approach will allow you to scale out your project while making it easier to upgrade base policy later on if Microsoft releases new starter packs.
133133
- Within the **base policy**, we highly recommend avoiding making any changes. When necessary, make comments where the changes are made.
@@ -159,7 +159,7 @@ You get started with Azure AD B2C custom policy:
159159
1. Add the necessary [policy keys](tutorial-create-user-flows.md?pivots=b2c-custom-policy#add-signing-and-encryption-keys-for-identity-experience-framework-applications) and [register the Identity Experience Framework applications](tutorial-create-user-flows.md?pivots=b2c-custom-policy#register-identity-experience-framework-applications).
160160
1. [Get the Azure AD B2C policy starter pack](tutorial-create-user-flows.md?pivots=b2c-custom-policy#get-the-starter-pack) and upload to your tenant.
161161
1. After you upload the starter pack, [test your sign-up or sign-in policy](tutorial-create-user-flows.md?pivots=b2c-custom-policy#test-the-custom-policy).
162-
1. We recommend you to download and install [Visual Studio Code](https://code.visualstudio.com/) (VS Code). Visual Studio Code is a lightweight but powerful source code editor, which runs on your desktop and is available for Windows, macOS, and Linux. With VS Code, you can quickly navigate through and edit your Azure AD B2C custom policy XML files by installing the [Azure AD B2C extension for VS Code](https://marketplace.visualstudio.com/items?itemName=AzureADB2CTools.aadb2c)
162+
1. We recommend that you download and install [Visual Studio Code](https://code.visualstudio.com/) (VS Code). Visual Studio Code is a lightweight but powerful source code editor, which runs on your desktop and is available for Windows, macOS, and Linux. With VS Code, you can quickly navigate through and edit your Azure AD B2C custom policy XML files by installing the [Azure AD B2C extension for VS Code](https://marketplace.visualstudio.com/items?itemName=AzureADB2CTools.aadb2c)
163163

164164
## Next steps
165165

articles/active-directory-b2c/enable-authentication-web-api.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -7,15 +7,15 @@ manager: CelesteDG
77
ms.service: active-directory
88
ms.workload: identity
99
ms.topic: reference
10-
ms.date: 10/26/2021
10+
ms.date: 01/10/2023
1111
ms.author: kengaderdus
1212
ms.subservice: B2C
1313
ms.custom: "b2c-support"
1414
---
1515

1616
# Enable authentication in your own web API by using Azure AD B2C
1717

18-
To authorize access to a web API, serve only requests that include a valid Azure Active Directory B2C (Azure AD B2C)-issued access token. This article shows you how to enable Azure AD B2C authorization to your web API. After you complete the steps in this article, only users who obtain a valid access token will be authorized to call your web API endpoints.
18+
To authorize access to a web API, you can serve only requests that include a valid access token that's issued by Azure Active Directory B2C (Azure AD B2C). This article shows you how to enable Azure AD B2C authorization to your web API. After you complete the steps in this article, only users who obtain a valid access token will be authorized to call your web API endpoints.
1919

2020
## Prerequisites
2121

@@ -35,7 +35,7 @@ The app does the following:
3535
1. It passes the access token as a bearer token in the authentication header of the HTTP request by using this format:
3636

3737
```http
38-
Authorization: Bearer <token>
38+
Authorization: Bearer <access token>
3939
```
4040
4141
The web API does the following:
@@ -49,7 +49,7 @@ The web API does the following:
4949
5050
### App registration overview
5151
52-
To enable your app to sign in with Azure AD B2C and call a web API, you must register two applications in the Azure AD B2C directory.
52+
To enable your app to sign in with Azure AD B2C and call a web API, you need to register two applications in the Azure AD B2C directory.
5353
5454
- The *web, mobile, or SPA application* registration enables your app to sign in with Azure AD B2C. The app registration process generates an *Application ID*, also known as the *client ID*, which uniquely identifies your application (for example, *App ID: 1*).
5555

articles/active-directory-b2c/microsoft-graph-operations.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -79,7 +79,7 @@ An email address that can be used by a [username sign-in account](sign-in-option
7979
Manage the [identity providers](add-identity-provider.md) available to your user flows in your Azure AD B2C tenant.
8080

8181
- [List identity providers available in the Azure AD B2C tenant](/graph/api/identityproviderbase-availableprovidertypes)
82-
- [List identity providers configured in the Azure AD B2C tenant](/graph/api/iidentitycontainer-list-identityproviders)
82+
- [List identity providers configured in the Azure AD B2C tenant](/graph/api/identitycontainer-list-identityproviders)
8383
- [Create an identity provider](/graph/api/identitycontainer-post-identityproviders)
8484
- [Get an identity provider](/graph/api/identityproviderbase-get)
8585
- [Update identity provider](/graph/api/identityproviderbase-update)

articles/active-directory-b2c/password-complexity.md

Lines changed: 17 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: CelesteDG
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: how-to
12-
ms.date: 09/20/2021
12+
ms.date: 01/10/2023
1313
ms.custom: project-no-code
1414
ms.author: kengaderdus
1515
ms.subservice: B2C
@@ -30,22 +30,23 @@ Azure Active Directory B2C (Azure AD B2C) supports changing the complexity requi
3030

3131
## Password rule enforcement
3232

33-
During sign-up or password reset, an end user must supply a password that meets the complexity rules. Password complexity rules are enforced per user flow. It is possible to have one user flow require a four-digit pin during sign-up while another user flow requires an eight character string during sign-up. For example, you may use a user flow with different password complexity for adults than for children.
33+
During sign-up or password reset, an end user must supply a password that meets the complexity rules. Password complexity rules are enforced per user flow. It's possible to have one user flow require a four-digit pin during sign-up while another user flow requires an eight character string during sign-up. For example, you may use a user flow with different password complexity for adults than for children.
3434

3535
Password complexity is never enforced during sign-in. Users are never prompted during sign-in to change their password because it doesn't meet the current complexity requirement.
3636

37-
Password complexity can be configured in the following types of user flows:
37+
You can configure password complexity in the following types of user flows:
3838

3939
- Sign-up or Sign-in user flow
4040
- Password Reset user flow
4141

42-
If you are using custom policies, you can ([configure password complexity in a custom policy](password-complexity.md)).
42+
If you're using custom policies, you can [configure password complexity in a custom policy](password-complexity.md).
4343

4444
## Configure password complexity
4545

4646
1. Sign in to the [Azure portal](https://portal.azure.com).
47-
1. Make sure you're using the directory that contains your Azure AD B2C tenant. Select the **Directories + subscriptions** icon in the portal toolbar.
48-
1. On the **Portal settings | Directories + subscriptions** page, find your Azure AD B2C directory in the **Directory name** list, and then select **Switch**..
47+
1. Make sure you're using the directory that contains your Azure AD B2C tenant:
48+
1. Select the **Directories + subscriptions** icon in the portal toolbar.
49+
1. On the **Portal settings | Directories + subscriptions** page, find your Azure AD B2C directory in the **Directory name** list, and then select **Switch**..
4950
1. In the Azure portal, search for and select **Azure AD B2C**.
5051
1. Select **User flows**.
5152
1. Select a user flow, and click **Properties**.
@@ -55,8 +56,8 @@ If you are using custom policies, you can ([configure password complexity in a c
5556

5657
| Complexity | Description |
5758
| --- | --- |
58-
| Simple | A password that is at least 8 to 64 characters. |
59-
| Strong | A password that is at least 8 to 64 characters. It requires 3 out of 4 of lowercase, uppercase, numbers, or symbols. |
59+
| Simple | A password that's at least *8* to *64* characters. |
60+
| Strong | A password that's at least *8* to *64* characters. It requires *3* out of *4* of lowercase, uppercase, numbers, or symbols. |
6061
| Custom | This option provides the most control over password complexity rules. It allows configuring a custom length. It also allows accepting number-only passwords (pins). |
6162

6263
## Custom options
@@ -219,20 +220,21 @@ Save the policy file.
219220
### Upload the files
220221

221222
1. Sign in to the [Azure portal](https://portal.azure.com/).
222-
1. Make sure you're using the directory that contains your Azure AD B2C tenant. Select the **Directories + subscriptions** icon in the portal toolbar.
223-
1. On the **Portal settings | Directories + subscriptions** page, find your Azure AD B2C directory in the **Directory name** list, and then select **Switch**.
223+
1. Make sure you're using the directory that contains your Azure AD B2C tenant:
224+
1. Select the **Directories + subscriptions** icon in the portal toolbar.
225+
1. On the **Portal settings | Directories + subscriptions** page, find your Azure AD B2C directory in the **Directory name** list, and then select **Switch**.
224226
1. Choose **All services** in the top-left corner of the Azure portal, and then search for and select **Azure AD B2C**.
225227
1. Select **Identity Experience Framework**.
226-
1. On the Custom Policies page, click **Upload Policy**.
228+
1. On the Custom Policies page, select **Upload Policy**.
227229
1. Select **Overwrite the policy if it exists**, and then search for and select the *TrustFrameworkExtensions.xml* file.
228-
1. Click **Upload**.
230+
1. Select **Upload**.
229231

230232
### Run the policy
231233

232-
1. Open the sign-up or sign-in policy. For example, *B2C_1A_signup_signin*.
234+
1. Open the sign-up or sign-in policy such as *B2C_1A_signup_signin*.
233235
2. For **Application**, select your application that you previously registered. To see the token, the **Reply URL** should show `https://jwt.ms`.
234-
3. Click **Run now**.
235-
4. Select **Sign up now**, enter an email address, and enter a new password. Guidance is presented on password restrictions. Finish entering the user information, and then click **Create**. You should see the contents of the token that was returned.
236+
3. Select **Run now**.
237+
4. Select **Sign up now**, enter an email address, and enter a new password. Guidance is presented on password restrictions. Finish entering the user information, and then select **Create**. You should see the contents of the token that was returned.
236238

237239
## Next steps
238240

0 commit comments

Comments
 (0)