You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: .github/workflows/stale.yml
+2-2Lines changed: 2 additions & 2 deletions
Original file line number
Diff line number
Diff line change
@@ -18,9 +18,9 @@ jobs:
18
18
stale-pr-label: inactive
19
19
close-pr-label: auto-close
20
20
exempt-pr-labels: keep-open
21
-
operations-per-run: 700
21
+
operations-per-run: 800
22
22
ascending: true
23
-
start-date: '2020-12-17'
23
+
start-date: '2021-07-13'
24
24
stale-pr-message: >
25
25
This pull request has been inactive for at least 14 days.
26
26
If you are finished with your changes, don't forget to sign off. See the [contributor guide](https://review.docs.microsoft.com/help/contribute/contribute-how-to-write-pull-request-automation) for instructions.
Copy file name to clipboardExpand all lines: articles/active-directory-b2c/add-api-connector-token-enrichment.md
+2-1Lines changed: 2 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -320,7 +320,8 @@ Save the files you changed: *TrustFrameworkBase.xml*, and *TrustFrameworkExtensi
320
320
## Test the custom policy
321
321
322
322
1. Sign in to the [Azure portal](https://portal.azure.com).
323
-
1. Make sure you're using the directory that contains your Azure AD tenant by selecting the **Directory + subscription** filter in the top menu and choosing the directory that contains your Azure AD tenant.
323
+
1. Make sure you're using the directory that contains your Azure AD tenant by selecting the **Directories + subscriptions** icon in the portal toolbar.
324
+
1. On the **Portal settings | Directories + subscriptions** page, find your Azure AD directory in the **Directory name** list, and then select **Switch**.
324
325
1. Choose **All services** in the top-left corner of the Azure portal, and then search for and select **App registrations**.
325
326
1. Select **Identity Experience Framework**.
326
327
1. Select **Upload Custom Policy**, and then upload the policy files that you changed: *TrustFrameworkBase.xml*, and *TrustFrameworkExtensions.xml*, *SignUpOrSignin.xml*, *ProfileEdit.xml*, and *PasswordReset.xml*.
Copy file name to clipboardExpand all lines: articles/active-directory-b2c/add-api-connector.md
+2-1Lines changed: 2 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -572,7 +572,8 @@ To return the promo code claim back to the relying party application, add an out
572
572
## Test the custom policy
573
573
574
574
1. Sign in to the [Azure portal](https://portal.azure.com).
575
-
1. Make sure you're using the directory that contains your Azure AD tenant by selecting the **Directory + subscription** filter in the top menu and choosing the directory that contains your Azure AD tenant.
575
+
1. Make sure you're using the directory that contains your Azure AD tenant by selecting the **Directories + subscriptions** icon in the portal toolbar.
576
+
1. On the **Portal settings | Directories + subscriptions** page, find your Azure AD directory in the **Directory name** list, and then select **Switch**.
576
577
1. Choose **All services** in the top-left corner of the Azure portal, and then search for and select **App registrations**.
577
578
1. Select **Identity Experience Framework**.
578
579
1. Select **Upload Custom Policy**, and then upload the policy files that you changed: *TrustFrameworkExtensions.xml*, and *SignUpOrSignin.xml*.
Copy file name to clipboardExpand all lines: articles/active-directory-b2c/add-password-change-policy.md
+8-7Lines changed: 8 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -144,13 +144,14 @@ In Azure Active Directory B2C (Azure AD B2C), you can enable users who are signe
144
144
## Upload and test the policy
145
145
146
146
1. Sign in to the [Azure portal](https://portal.azure.com/).
147
-
2. Make sure you're using the directory that contains your Azure AD B2C tenant by selecting the **Directory + subscription** filter in the top menu and choosing the directory that contains your tenant.
148
-
3. Choose **All services** in the top-left corner of the Azure portal, and then search for and select **Azure AD B2C**.
149
-
4. Select **Identity Experience Framework**.
150
-
5. On the Custom Policies page, click **Upload Policy**.
151
-
6. Select **Overwrite the policy if it exists**, and then search for and select the *TrustframeworkExtensions.xml* file.
152
-
7. Click **Upload**.
153
-
8. Repeat steps 5 through 7 for the relying party file, such as *ProfileEditPasswordChange.xml*.
147
+
1. Make sure you're using the directory that contains your Azure AD B2C tenant by selecting the **Directories + subscriptions** icon in the portal toolbar.
148
+
1. On the **Portal settings | Directories + subscriptions** page, find your Azure AD B2C directory in the **Directory name** list, and then select **Switch**.
149
+
1. Choose **All services** in the top-left corner of the Azure portal, and then search for and select **Azure AD B2C**.
150
+
1. Select **Identity Experience Framework**.
151
+
1. On the Custom Policies page, click **Upload Policy**.
152
+
1. Select **Overwrite the policy if it exists**, and then search for and select the *TrustframeworkExtensions.xml* file.
153
+
1. Click **Upload**.
154
+
1. Repeat steps 5 through 7 for the relying party file, such as *ProfileEditPasswordChange.xml*.
Copy file name to clipboardExpand all lines: articles/active-directory-b2c/add-password-reset-policy.md
+4-2Lines changed: 4 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -69,7 +69,8 @@ The self-service password reset experience can be configured for the **Sign-in (
69
69
To enable self-service password reset for the sign-up or sign-in user flow:
70
70
71
71
1. Sign in to the [Azure portal](https://portal.azure.com).
72
-
1. Select the **Directory + Subscription** icon in the portal toolbar, and then select the directory that contains your Azure AD B2C tenant.
72
+
1. Select the **Directories + Subscriptions** icon in the portal toolbar.
73
+
1. On the **Portal settings | Directories + subscriptions** page, find your Azure AD B2C directory in the **Directory name** list, and then select **Switch**.
73
74
1. In the Azure portal, search for and select **Azure AD B2C**.
74
75
1. Select **User flows**.
75
76
1. Select a sign-up or sign-in user flow (of type **Recommended**) that you want to customize.
@@ -267,7 +268,8 @@ Your application might need to detect whether the user signed in via the Forgot
267
268
### Upload the custom policy
268
269
269
270
1. Sign in to the [Azure portal](https://portal.azure.com).
270
-
1. Select the **Directory + Subscription** icon in the portal toolbar, and then select the directory that contains your Azure AD B2C tenant.
271
+
1. Select the **Directories + Subscriptions** icon in the portal toolbar.
272
+
1. On the **Portal settings | Directories + subscriptions** page, find your Azure AD B2C directory in the **Directory name** list, and then select **Switch**.
271
273
1. In the Azure portal, search for and select **Azure AD B2C**.
272
274
1. Under **Policies**, select **Identity Experience Framework**.
273
275
1. Select **Upload Custom Policy**, and then upload the two policy files that you changed in the following order:
Copy file name to clipboardExpand all lines: articles/active-directory-b2c/add-sign-in-policy.md
+4-2Lines changed: 4 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -42,7 +42,8 @@ If you haven't already done so, [register a web application in Azure Active Dire
42
42
To add sign-in policy:
43
43
44
44
1. Sign in to the [Azure portal](https://portal.azure.com).
45
-
1. Select the **Directory + Subscription** icon in the portal toolbar, and then select the directory that contains your Azure AD B2C tenant.
45
+
1. Select the **Directories + Subscriptions** icon in the portal toolbar.
46
+
1. On the **Portal settings | Directories + subscriptions** page, find your Azure AD B2C directory in the **Directory name** list, and then select **Switch**.
46
47
1. In the Azure portal, search for and select **Azure AD B2C**.
47
48
1. Under **Policies**, select **User flows**, and then select **New user flow**.
48
49
1. On the **Create a user flow** page, select the **Sign in** user flow.
@@ -112,7 +113,8 @@ The **SelfAsserted-LocalAccountSignin-Email** technical profile is a [self-asser
112
113
## Update and test your policy
113
114
114
115
1. Sign in to the [Azure portal](https://portal.azure.com).
115
-
1. Make sure you're using the directory that contains your Azure AD tenant by selecting the **Directory + subscription** filter in the top menu and choosing the directory that contains your Azure AD tenant.
116
+
1. Make sure you're using the directory that contains your Azure AD tenant by selecting the **Directories + subscriptions** icon in the portal toolbar.
117
+
1. On the **Portal settings | Directories + subscriptions** page, find your Azure AD directory in the **Directory name** list, and then select **Switch**.
116
118
1. Choose **All services** in the top-left corner of the Azure portal, and then search for and select **App registrations**.
117
119
1. Select **Identity Experience Framework**.
118
120
1. Select **Upload Custom Policy**, and then upload the policy file that you changed, *TrustFrameworkExtensions.xml*.
0 commit comments