You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory-b2c/configure-tokens.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -94,7 +94,7 @@ The following values are set in the previous example:
94
94
95
95
-**token_lifetime_secs** - Access token lifetimes (seconds). The default is 3,600 (1 hour). The minimum is 300 (5 minutes). The maximum is 86,400 (24 hours).
96
96
-**id_token_lifetime_secs** - ID token lifetimes (seconds). The default is 3,600 (1 hour). The minimum is 300 (5 minutes). The maximum is 86,400 (24 hours).
97
-
-**refresh_token_lifetime_secs** Refresh token lifetimes (seconds). The default is 120,9600 (14 days). The minimum is 86,400 (24 hours). The maximum is 7,776,000 (90 days).
97
+
-**refresh_token_lifetime_secs** Refresh token lifetimes (seconds). The default is 1,209,600 (14 days). The minimum is 86,400 (24 hours). The maximum is 7,776,000 (90 days).
98
98
-**rolling_refresh_token_lifetime_secs** - Refresh token sliding window lifetime (seconds). The default is 7,776,000 (90 days). The minimum is 86,400 (24 hours). The maximum is 31,536,000 (365 days). If you don't want to enforce a sliding window lifetime, set the value of `allow_infinite_rolling_refresh_token` to `true`.
99
99
-**allow_infinite_rolling_refresh_token** - Refresh token sliding window lifetime never expires.
100
100
@@ -238,4 +238,4 @@ When using the [OAuth 2.0 authorization code flow](authorization-code-flow.md),
238
238
## Next steps
239
239
240
240
- Learn more about how to [request access tokens](access-tokens.md).
241
-
- Learn how to build [Resilience through developer best practices](../active-directory/fundamentals/resilience-b2c-developer-best-practices.md?bc=%2fazure%2factive-directory-b2c%2fbread%2ftoc.json&toc=%2fazure%2factive-directory-b2c%2fTOC.json).
241
+
- Learn how to build [Resilience through developer best practices](../active-directory/fundamentals/resilience-b2c-developer-best-practices.md?bc=%2fazure%2factive-directory-b2c%2fbread%2ftoc.json&toc=%2fazure%2factive-directory-b2c%2fTOC.json).
Copy file name to clipboardExpand all lines: articles/active-directory-b2c/custom-policy-overview.md
+8-8Lines changed: 8 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,7 +8,7 @@ manager: CelesteDG
8
8
ms.service: active-directory
9
9
ms.workload: identity
10
10
ms.topic: reference
11
-
ms.date: 10/14/2021
11
+
ms.date: 01/10/2023
12
12
ms.author: kengaderdus
13
13
ms.subservice: B2C
14
14
ms.custom: "b2c-support"
@@ -24,20 +24,20 @@ A custom policy is represented as one or more XML-formatted files, which refer t
24
24
25
25
## Custom policy starter pack
26
26
27
-
Azure AD B2C custom policy [starter pack](tutorial-create-user-flows.md?pivots=b2c-custom-policy#get-the-starter-pack) comes with several pre-built policies to get you going quickly. Each of these starter packs contains the smallest number of technical profiles and user journeys needed to achieve the scenarios described:
27
+
Azure AD B2C custom policy [starter pack](tutorial-create-user-flows.md?pivots=b2c-custom-policy#get-the-starter-pack) comes with several pre-built policies to get you started quickly. Each of these starter packs contains the smallest number of technical profiles and user journeys needed to achieve the scenarios described:
28
28
29
29
-**LocalAccounts** - Enables the use of local accounts only.
30
30
-**SocialAccounts** - Enables the use of social (or federated) accounts only.
31
31
-**SocialAndLocalAccounts** - Enables the use of both local and social accounts. Most of our samples refer to this policy.
32
32
-**SocialAndLocalAccountsWithMFA** - Enables social, local, and multi-factor authentication options.
33
33
34
-
In the [Azure AD B2C samples GitHub repository](https://github.com/azure-ad-b2c/samples), you'll find samples for several enhanced Azure AD B2C custom CIAM user journeys. For example, local account policy enhancements, social account policy enhancements, MFA enhancements, user interface enhancements, generic enhancements, app migration, user migration, conditional access, web test, and CI/CD.
34
+
In the [Azure AD B2C samples GitHub repository](https://github.com/azure-ad-b2c/samples), you'll find samples for several enhanced Azure AD B2C custom CIAM user journeys and scenarios. For example, local account policy enhancements, social account policy enhancements, MFA enhancements, user interface enhancements, generic enhancements, app migration, user migration, conditional access, web test, and CI/CD.
35
35
36
36
## Understanding the basics
37
37
38
38
### Claims
39
39
40
-
A claim provides temporary storage of data during an Azure AD B2C policy execution. It can store information about the user, such as first name, last name, or any other claim obtained from the user or other systems (claims exchanges). The [claims schema](claimsschema.md) is the place where you declare your claims.
40
+
A claim provides temporary storage of data during an Azure AD B2C policy execution. Claims are more like variable in a programing language. It can store information about the user, such as first name, last name, or any other claim obtained from the user or other systems (claims exchanges). The [claims schema](claimsschema.md) is the place where you declare your claims.
41
41
42
42
When the policy runs, Azure AD B2C sends and receives claims to and from internal and external parties and then sends a subset of these claims to your relying party application as part of the token. Claims are used in these ways:
43
43
@@ -48,7 +48,7 @@ When the policy runs, Azure AD B2C sends and receives claims to and from interna
48
48
49
49
### Manipulating your claims
50
50
51
-
The [claims transformations](claimstransformations.md) are predefined functions that can be used to convert a given claim into another one, evaluate a claim, or set a claim value. For example adding an item to a string collection, changing the case of a string, or evaluate a date and time claim. A claims transformation specifies a transform method.
51
+
The [claims transformations](claimstransformations.md) are predefined functions that can be used to convert a given claim into another one, evaluate a claim, or set a claim value. For example adding an item to a string collection, changing the case of a string, or evaluate a date and time claim. A claims transformation specifies a transform method, which is also predefined.
52
52
53
53
### Customize and localize your UI
54
54
@@ -105,7 +105,7 @@ The following diagram illustrates how Azure AD B2C uses a validation technical p
105
105
106
106
## Inheritance model
107
107
108
-
Each starter pack includes the following files:
108
+
Each [starter pack](https://github.com/Azure-Samples/active-directory-b2c-custom-policy-starterpack) includes the following files:
109
109
110
110
- A **Base** file that contains most of the definitions. To help with troubleshooting and long-term maintenance of your policies, try to minimize the number of changes you make to this file.
111
111
- A **Localization** file that holds the localization strings. This policy file is derived from the Base file. Use this file to accommodate different languages to suit your customer needs.
@@ -127,7 +127,7 @@ The following diagram shows the relationship between the policy files and the re
127
127
128
128
### Best practices
129
129
130
-
Within an Azure AD B2C custom policy, you can integrate your own business logic to build the user experiences you require and extend functionality of the service. We have a set of best practices and recommendations to get started.
130
+
Within an Azure AD B2C custom policy, you can integrate your own business logic to build the user experiences you require and extend functionality of the service. We've a set of best practices and recommendations to get started.
131
131
132
132
- Create your logic within the **extension policy**, or **relying party policy**. You can add new elements, which will override the base policy by referencing the same ID. This approach will allow you to scale out your project while making it easier to upgrade base policy later on if Microsoft releases new starter packs.
133
133
- Within the **base policy**, we highly recommend avoiding making any changes. When necessary, make comments where the changes are made.
@@ -159,7 +159,7 @@ You get started with Azure AD B2C custom policy:
159
159
1. Add the necessary [policy keys](tutorial-create-user-flows.md?pivots=b2c-custom-policy#add-signing-and-encryption-keys-for-identity-experience-framework-applications) and [register the Identity Experience Framework applications](tutorial-create-user-flows.md?pivots=b2c-custom-policy#register-identity-experience-framework-applications).
160
160
1.[Get the Azure AD B2C policy starter pack](tutorial-create-user-flows.md?pivots=b2c-custom-policy#get-the-starter-pack) and upload to your tenant.
161
161
1. After you upload the starter pack, [test your sign-up or sign-in policy](tutorial-create-user-flows.md?pivots=b2c-custom-policy#test-the-custom-policy).
162
-
1. We recommend you to download and install [Visual Studio Code](https://code.visualstudio.com/) (VS Code). Visual Studio Code is a lightweight but powerful source code editor, which runs on your desktop and is available for Windows, macOS, and Linux. With VS Code, you can quickly navigate through and edit your Azure AD B2C custom policy XML files by installing the [Azure AD B2C extension for VS Code](https://marketplace.visualstudio.com/items?itemName=AzureADB2CTools.aadb2c)
162
+
1. We recommend that you download and install [Visual Studio Code](https://code.visualstudio.com/) (VS Code). Visual Studio Code is a lightweight but powerful source code editor, which runs on your desktop and is available for Windows, macOS, and Linux. With VS Code, you can quickly navigate through and edit your Azure AD B2C custom policy XML files by installing the [Azure AD B2C extension for VS Code](https://marketplace.visualstudio.com/items?itemName=AzureADB2CTools.aadb2c)
Copy file name to clipboardExpand all lines: articles/active-directory-b2c/enable-authentication-web-api.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -7,15 +7,15 @@ manager: CelesteDG
7
7
ms.service: active-directory
8
8
ms.workload: identity
9
9
ms.topic: reference
10
-
ms.date: 10/26/2021
10
+
ms.date: 01/10/2023
11
11
ms.author: kengaderdus
12
12
ms.subservice: B2C
13
13
ms.custom: "b2c-support"
14
14
---
15
15
16
16
# Enable authentication in your own web API by using Azure AD B2C
17
17
18
-
To authorize access to a web API, serve only requests that include a valid Azure Active Directory B2C (Azure AD B2C)-issued access token. This article shows you how to enable Azure AD B2C authorization to your web API. After you complete the steps in this article, only users who obtain a valid access token will be authorized to call your web API endpoints.
18
+
To authorize access to a web API, you can serve only requests that include a valid access token that's issued by Azure Active Directory B2C (Azure AD B2C). This article shows you how to enable Azure AD B2C authorization to your web API. After you complete the steps in this article, only users who obtain a valid access token will be authorized to call your web API endpoints.
19
19
20
20
## Prerequisites
21
21
@@ -35,7 +35,7 @@ The app does the following:
35
35
1. It passes the access token as a bearer token in the authentication header of the HTTP request by using this format:
36
36
37
37
```http
38
-
Authorization: Bearer <token>
38
+
Authorization: Bearer <access token>
39
39
```
40
40
41
41
The web API does the following:
@@ -49,7 +49,7 @@ The web API does the following:
49
49
50
50
### App registration overview
51
51
52
-
To enable your app to sign in with Azure AD B2C and call a web API, you must register two applications in the Azure AD B2C directory.
52
+
To enable your app to sign in with Azure AD B2C and call a web API, you need to register two applications in the Azure AD B2C directory.
53
53
54
54
- The *web, mobile, or SPA application* registration enables your app to sign in with Azure AD B2C. The app registration process generates an *Application ID*, also known as the *client ID*, which uniquely identifies your application (for example, *App ID: 1*).
Copy file name to clipboardExpand all lines: articles/active-directory-b2c/password-complexity.md
+17-15Lines changed: 17 additions & 15 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -9,7 +9,7 @@ manager: CelesteDG
9
9
ms.service: active-directory
10
10
ms.workload: identity
11
11
ms.topic: how-to
12
-
ms.date: 09/20/2021
12
+
ms.date: 01/10/2023
13
13
ms.custom: project-no-code
14
14
ms.author: kengaderdus
15
15
ms.subservice: B2C
@@ -30,22 +30,23 @@ Azure Active Directory B2C (Azure AD B2C) supports changing the complexity requi
30
30
31
31
## Password rule enforcement
32
32
33
-
During sign-up or password reset, an end user must supply a password that meets the complexity rules. Password complexity rules are enforced per user flow. It is possible to have one user flow require a four-digit pin during sign-up while another user flow requires an eight character string during sign-up. For example, you may use a user flow with different password complexity for adults than for children.
33
+
During sign-up or password reset, an end user must supply a password that meets the complexity rules. Password complexity rules are enforced per user flow. It's possible to have one user flow require a four-digit pin during sign-up while another user flow requires an eight character string during sign-up. For example, you may use a user flow with different password complexity for adults than for children.
34
34
35
35
Password complexity is never enforced during sign-in. Users are never prompted during sign-in to change their password because it doesn't meet the current complexity requirement.
36
36
37
-
Password complexity can be configured in the following types of user flows:
37
+
You can configure password complexity in the following types of user flows:
38
38
39
39
- Sign-up or Sign-in user flow
40
40
- Password Reset user flow
41
41
42
-
If you are using custom policies, you can ([configure password complexity in a custom policy](password-complexity.md)).
42
+
If you're using custom policies, you can [configure password complexity in a custom policy](password-complexity.md).
43
43
44
44
## Configure password complexity
45
45
46
46
1. Sign in to the [Azure portal](https://portal.azure.com).
47
-
1. Make sure you're using the directory that contains your Azure AD B2C tenant. Select the **Directories + subscriptions** icon in the portal toolbar.
48
-
1. On the **Portal settings | Directories + subscriptions** page, find your Azure AD B2C directory in the **Directory name** list, and then select **Switch**..
47
+
1. Make sure you're using the directory that contains your Azure AD B2C tenant:
48
+
1. Select the **Directories + subscriptions** icon in the portal toolbar.
49
+
1. On the **Portal settings | Directories + subscriptions** page, find your Azure AD B2C directory in the **Directory name** list, and then select **Switch**..
49
50
1. In the Azure portal, search for and select **Azure AD B2C**.
50
51
1. Select **User flows**.
51
52
1. Select a user flow, and click **Properties**.
@@ -55,8 +56,8 @@ If you are using custom policies, you can ([configure password complexity in a c
55
56
56
57
| Complexity | Description |
57
58
| --- | --- |
58
-
| Simple | A password that is at least 8 to 64 characters. |
59
-
| Strong | A password that is at least 8 to 64 characters. It requires 3 out of 4 of lowercase, uppercase, numbers, or symbols. |
59
+
| Simple | A password that's at least *8* to *64* characters. |
60
+
| Strong | A password that's at least *8* to *64* characters. It requires *3* out of *4* of lowercase, uppercase, numbers, or symbols. |
60
61
| Custom | This option provides the most control over password complexity rules. It allows configuring a custom length. It also allows accepting number-only passwords (pins). |
61
62
62
63
## Custom options
@@ -219,20 +220,21 @@ Save the policy file.
219
220
### Upload the files
220
221
221
222
1. Sign in to the [Azure portal](https://portal.azure.com/).
222
-
1. Make sure you're using the directory that contains your Azure AD B2C tenant. Select the **Directories + subscriptions** icon in the portal toolbar.
223
-
1. On the **Portal settings | Directories + subscriptions** page, find your Azure AD B2C directory in the **Directory name** list, and then select **Switch**.
223
+
1. Make sure you're using the directory that contains your Azure AD B2C tenant:
224
+
1. Select the **Directories + subscriptions** icon in the portal toolbar.
225
+
1. On the **Portal settings | Directories + subscriptions** page, find your Azure AD B2C directory in the **Directory name** list, and then select **Switch**.
224
226
1. Choose **All services** in the top-left corner of the Azure portal, and then search for and select **Azure AD B2C**.
225
227
1. Select **Identity Experience Framework**.
226
-
1. On the Custom Policies page, click**Upload Policy**.
228
+
1. On the Custom Policies page, select**Upload Policy**.
227
229
1. Select **Overwrite the policy if it exists**, and then search for and select the *TrustFrameworkExtensions.xml* file.
228
-
1.Click**Upload**.
230
+
1.Select**Upload**.
229
231
230
232
### Run the policy
231
233
232
-
1. Open the sign-up or sign-in policy. For example,*B2C_1A_signup_signin*.
234
+
1. Open the sign-up or sign-in policy such as*B2C_1A_signup_signin*.
233
235
2. For **Application**, select your application that you previously registered. To see the token, the **Reply URL** should show `https://jwt.ms`.
234
-
3.Click**Run now**.
235
-
4. Select **Sign up now**, enter an email address, and enter a new password. Guidance is presented on password restrictions. Finish entering the user information, and then click**Create**. You should see the contents of the token that was returned.
236
+
3.Select**Run now**.
237
+
4. Select **Sign up now**, enter an email address, and enter a new password. Guidance is presented on password restrictions. Finish entering the user information, and then select**Create**. You should see the contents of the token that was returned.
0 commit comments