Skip to content

Commit d7c996d

Browse files
committed
Merge branch 'master' of https://github.com/MicrosoftDocs/azure-docs-pr into tamram-0309
2 parents 19c5d15 + 4a2a682 commit d7c996d

File tree

49 files changed

+944
-571
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

49 files changed

+944
-571
lines changed

articles/active-directory-b2c/TOC.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -187,6 +187,8 @@
187187
- name: Custom email
188188
href: custom-email.md
189189
displayName: verification
190+
- name: Disable email verification
191+
href: custom-policy-disable-email-verification.md
190192
- name: Enable JavaScript
191193
href: javascript-samples.md
192194
- name: Password complexity
Lines changed: 56 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,56 @@
1+
---
2+
title: Disable email verification during customer sign-up with a custom policy
3+
titleSuffix: Azure AD B2C
4+
description: Learn how to disable email verification during customer sign-up in Azure Active Directory B2C.
5+
services: active-directory-b2c
6+
author: msmimart
7+
manager: celestedg
8+
9+
ms.service: active-directory
10+
ms.workload: identity
11+
ms.topic: conceptual
12+
ms.date: 03/11/2020
13+
ms.author: mimart
14+
ms.subservice: B2C
15+
---
16+
17+
# Disable email verification during customer sign-up using a custom policy in Azure Active Directory B2C
18+
19+
[!INCLUDE [disable email verification intro](../../includes/active-directory-b2c-disable-email-verification.md)]
20+
21+
## Prerequisites
22+
23+
Complete the steps in [Get started with custom policies](custom-policy-get-started.md). You should have a working custom policy for sign-up and sign-in with social and local accounts.
24+
25+
## Add the metadata to the self-asserted technical profile
26+
27+
The **LocalAccountSignUpWithLogonEmail** technical profile is a [self-asserted](self-asserted-technical-profile.md), which is invoked during the sign-up flow. To disable the email verification, set the `EnforceEmailVerification` metadata to false. Override the LocalAccountSignUpWithLogonEmail technical profiles in the extension file. Find the `ClaimsProviders` element. Add the following claims provider to the `ClaimsProviders` element:
28+
29+
30+
```XML
31+
<ClaimsProvider>
32+
<DisplayName>Local Account</DisplayName>
33+
<TechnicalProfiles>
34+
<TechnicalProfile Id="SelfAsserted-LocalAccountSignin-Email">
35+
<Metadata>
36+
<Item Key="EnforceEmailVerification">false</Item>
37+
</Metadata>
38+
</TechnicalProfile>
39+
</TechnicalProfiles>
40+
</ClaimsProvider>
41+
```
42+
43+
## Test the custom policy
44+
45+
1. Sign in to the [Azure portal](https://portal.azure.com).
46+
2. Make sure you're using the directory that contains your Azure AD tenant by selecting the **Directory + subscription** filter in the top menu and choosing the directory that contains your Azure AD tenant.
47+
3. Choose **All services** in the top-left corner of the Azure portal, and then search for and select **App registrations**.
48+
4. Select **Identity Experience Framework**.
49+
5. Select **Upload Custom Policy**, and then upload the two policy files that you changed.
50+
2. Select the sign-up or sign-in policy that you uploaded, and click the **Run now** button.
51+
3. You should be able to sign up using an email address without the validation.
52+
53+
54+
## Next steps
55+
56+
- Learn more about the [self-asserted technical profile](self-asserted-technical-profile.md) in the IEF reference.

articles/active-directory-b2c/user-flow-disable-email-verification.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -9,16 +9,14 @@ manager: celestedg
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: conceptual
12-
ms.date: 09/25/2018
12+
ms.date: 03/11/2020
1313
ms.author: mimart
1414
ms.subservice: B2C
1515
---
1616

1717
# Disable email verification during customer sign-up in Azure Active Directory B2C
1818

19-
By default, Azure Active Directory B2C (Azure AD B2C) verifies your customer's email address for local accounts (accounts for users who sign up with email address or username). Azure AD B2C ensures valid email addresses by requiring customers to verify them during the sign-up process. It also prevents a malicious actors from using automated processes to generate fraudulent accounts in your applications.
20-
21-
Some application developers prefer to skip email verification during the sign-up process and instead have customers verify their email address later. To support this, Azure AD B2C can be configured to disable email verification. Doing so creates a smoother sign-up process and gives developers the flexibility to differentiate customers that have verified their email address from customers that have not.
19+
[!INCLUDE [disable email verification intro](../../includes/active-directory-b2c-disable-email-verification.md)]
2220

2321
Follow these steps to disable email verification:
2422

@@ -30,8 +28,10 @@ Follow these steps to disable email verification:
3028
1. Select **Page layouts**.
3129
1. Select **Local account sign-up page**.
3230
1. Under **User attributes**, select **Email Address**.
33-
1. In the **REQUIRES VERIFICATION** drop down, select **No**.
31+
1. In the **REQUIRES VERIFICATION** drop-down, select **No**.
3432
1. Select **Save**. Email verification is now disabled for this user flow.
3533

36-
> [!WARNING]
37-
> Disabling email verification in the sign-up process may lead to spam. If you disable the default Azure AD B2C-provided email verification, we recommend that you implement a replacement verification system.
34+
## Next steps
35+
36+
- Learn how to [customize the user interface in Azure Active Directory B2C](customize-ui-overview.md)
37+

articles/active-directory-domain-services/change-sku.md

Lines changed: 6 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ ms.author: iainfou
1717

1818
# Change the SKU for an existing Azure AD Domain Services managed domain
1919

20-
In Azure Active Directory Domain Services (Azure AD DS), the available performance and features are based on the SKU type. These feature differences include the backup frequency or maximum number of one-way outbound forest trusts (currently in preview). You select a SKU when you create the managed domain, and you can switch SKUs as your business needs change after the managed domain has been deployed. Changes in business requirements could include the need for more frequent backups or to create additional forest trusts. For more information on the limits and pricing of the different SKUs, see [Azure AD DS SKU concepts][concepts-sku] and [Azure AD DS pricing][pricing] pages.
20+
In Azure Active Directory Domain Services (Azure AD DS), the available performance and features are based on the SKU type. These feature differences include the backup frequency or maximum number of one-way outbound forest trusts (currently in preview). You select a SKU when you create the managed domain, and you can switch SKUs up or down as your business needs change after the managed domain has been deployed. Changes in business requirements could include the need for more frequent backups or to create additional forest trusts. For more information on the limits and pricing of the different SKUs, see [Azure AD DS SKU concepts][concepts-sku] and [Azure AD DS pricing][pricing] pages.
2121

2222
This article shows you how to change the SKU for an existing Azure AD DS managed domain using the Azure portal.
2323

@@ -34,9 +34,12 @@ To complete this article, you need the following resources and privileges:
3434

3535
## SKU change limitations
3636

37-
There are some limitations for the SKU change operation if you use a resource forest (currently in preview) and have created one-way outbound forest trusts from Azure AD DS to an on-premises AD DS environment. The *Premium* and *Enterprise* SKUs define a limit on the number of trusts you can create. You can't change to a SKU with a lower maximum limit than you currently have configured.
37+
You can change SKUs up or down after the Azure AD DS managed domain has been deployed. However, if you use a resource forest (currently in preview) and have created one-way outbound forest trusts from Azure AD DS to an on-premises AD DS environment, there are some limitations for the SKU change operation. The *Premium* and *Enterprise* SKUs define a limit on the number of trusts you can create. You can't change to a SKU with a lower maximum limit than you currently have configured.
3838

39-
For example, if you have created two forest trusts on the *Premium* SKU, you can't change down to the *Standard* SKU. The *Standard* SKU doesn't support forest trusts. Or, if you have created seven trusts on the *Premium* SKU, you can't change down to the *Enterprise* SKU. The *Enterprise* SKU supports a maximum of five trusts.
39+
For example:
40+
41+
* If you have created two forest trusts on the *Premium* SKU, you can't change down to the *Standard* SKU. The *Standard* SKU doesn't support forest trusts.
42+
* Or, if you have created seven trusts on the *Premium* SKU, you can't change down to the *Enterprise* SKU. The *Enterprise* SKU supports a maximum of five trusts.
4043

4144
For more information on these limits, see [Azure AD DS SKU features and limits][concepts-sku].
4245

articles/active-directory/develop/tutorial-v2-asp-webapp.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -27,6 +27,9 @@ When you've completed this guide, your application will be able to accept sign-i
2727

2828
> This guide requires Microsoft Visual Studio 2019. Don’t have it? [Download Visual Studio 2019 for free](https://www.visualstudio.com/downloads/).
2929
30+
>[!NOTE]
31+
> If you are new to the Microsoft identity platform, we recommend you start with the [Add Microsoft identity platform sign-in to an ASP.NET web app](quickstart-v2-aspnet-webapp.md).
32+
3033
## How the sample app generated by this guide works
3134

3235
![Shows how the sample app generated by this tutorial works](media/active-directory-develop-guidedsetup-aspnetwebapp-intro/aspnetbrowsergeneral.svg)

articles/active-directory/develop/tutorial-v2-aspnet-daemon-web-app.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -36,7 +36,8 @@ The app is built as an ASP.NET MVC application. It uses the OWIN OpenID Connect
3636

3737
The "daemon" component in this sample is an API controller, `SyncController.cs`. When the controller is called, it pulls in a list of users in the customer's Azure Active Directory (Azure AD) tenant from Microsoft Graph. `SyncController.cs` is triggered by an AJAX call in the web application. It uses the [Microsoft Authentication Library (MSAL) for .NET](msal-overview.md) to acquire an access token for Microsoft Graph.
3838

39-
For a simpler console daemon application, see the [.NET Core daemon quickstart](quickstart-v2-netcore-daemon.md).
39+
>[!NOTE]
40+
> If you are new to the Microsoft identity platform, we recommend you start with the [.NET Core daemon quickstart](quickstart-v2-netcore-daemon.md).
4041
4142
## Scenario
4243

articles/active-directory/develop/tutorial-v2-ios.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -22,6 +22,9 @@ In this tutorial, you'll learn how to integrate an iOS or macOS app with the Mic
2222

2323
When you've completed the guide, your application will accept sign-ins of personal Microsoft accounts (including outlook.com, live.com, and others) and work or school accounts from any company or organization that uses Azure Active Directory.
2424

25+
>[!NOTE]
26+
> If you are new to the Microsoft identity platform, we recommend you start with the [Sign in users and call the Microsoft Graph API from an iOS or macOS app](quickstart-v2-ios.md).
27+
2528
## How this tutorial works
2629

2730
![Shows how the sample app generated by this tutorial works](../../../includes/media/active-directory-develop-guidedsetup-ios-introduction/iosintro.svg)

articles/active-directory/develop/tutorial-v2-javascript-spa.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -25,6 +25,9 @@ This guide demonstrates how a JavaScript single-page application (SPA) can:
2525
- Acquire an access token
2626
- Call the Microsoft Graph API or other APIs that require access tokens from the *Microsoft identity platform endpoint*
2727

28+
>[!NOTE]
29+
> If you are new to the Microsoft identity platform, we recommend you start with the [Sign in users and get an access token in a JavaScript SPA quickstart](quickstart-v2-javascript.md).
30+
2831
## How the sample app generated by this guide works
2932

3033
![Shows how the sample app generated by this tutorial works](media/active-directory-develop-guidedsetup-javascriptspa-introduction/javascriptspa-intro.svg)

articles/active-directory/develop/tutorial-v2-windows-desktop.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -27,6 +27,9 @@ When you've completed the guide, your application will be able to call a protect
2727
> [!NOTE]
2828
> The guide requires Visual Studio 2015 Update 3, Visual Studio 2017, or Visual Studio 2019. Don’t have any of these versions? [Download Visual Studio 2019 for free](https://www.visualstudio.com/downloads/).
2929
30+
>[!NOTE]
31+
> If you are new to the Microsoft identity platform, we recommend you start with the [Acquire a token and call Microsoft Graph API from a Windows desktop app](quickstart-v2-windows-desktop.md).
32+
3033
## How the sample app generated by this guide works
3134

3235
![Shows how the sample app generated by this tutorial works](./media/active-directory-develop-guidedsetup-windesktop-intro/windesktophowitworks.svg)

articles/active-directory/develop/tutorial-v2-windows-uwp.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -29,6 +29,9 @@ At the end of this guide, your application calls a protected API by using person
2929
>[!NOTE]
3030
> This guide requires Visual Studio with Universal Windows Platform development installed. See [Get set up](https://docs.microsoft.com/windows/uwp/get-started/get-set-up) for instructions to download and configure Visual Studio to develop Universal Windows Platform apps.
3131
32+
>[!NOTE]
33+
> If you are new to the Microsoft identity platform, we recommend you start with the [Call the Microsoft Graph API from a Universal Windows Platform (UWP) application quickstart](quickstart-v2-uwp.md).
34+
3235
## How this guide works
3336

3437
![Shows how the sample app generated by this tutorial works](./media/tutorial-v2-windows-uwp/uwp-intro.svg)

0 commit comments

Comments
 (0)