Skip to content

Commit dc620f6

Browse files
committed
Merge branch 'master' of https://github.com/MicrosoftDocs/azure-docs-pr into heidist-api
2 parents ad98b6d + b4738d4 commit dc620f6

File tree

78 files changed

+562
-449
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

78 files changed

+562
-449
lines changed

articles/active-directory-b2c/TOC.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -187,6 +187,8 @@
187187
- name: Custom email
188188
href: custom-email.md
189189
displayName: verification
190+
- name: Disable email verification
191+
href: custom-policy-disable-email-verification.md
190192
- name: Enable JavaScript
191193
href: javascript-samples.md
192194
- name: Password complexity

articles/active-directory-b2c/best-practices.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -47,7 +47,7 @@ During the implementation phase, consider the following recommendations.
4747

4848
| | |
4949
|--|--|
50-
| Edit custom policies with the Azure AD B2C extension for Visual Studio Code | Download Visual Studio Code and this community-built [extension from the Visual Studio Code Marketplace]((https://marketplace.visualstudio.com/items?itemName=AzureADB2CTools.aadb2c)). While not an official Microsoft product, the Azure AD B2C extension for Visual Studio Code includes several features that help make working with custom policies easier. |
50+
| Edit custom policies with the Azure AD B2C extension for Visual Studio Code | Download Visual Studio Code and this community-built [extension from the Visual Studio Code Marketplace](https://marketplace.visualstudio.com/items?itemName=AzureADB2CTools.aadb2c). While not an official Microsoft product, the Azure AD B2C extension for Visual Studio Code includes several features that help make working with custom policies easier. |
5151
| Learn how to troubleshoot Azure AD B2C | Learn how to [troubleshoot custom policies](https://docs.microsoft.com/azure/active-directory-b2c/troubleshoot-custom-policies?tabs=applications) during development. Learn what a normal authentication flow looks like and use tools for discovering anomalies and errors. For example, use [Application Insights](troubleshoot-with-application-insights.md) to review output logs of user journeys. |
5252
| Leverage our library of proven custom policy patterns | Find [samples](https://github.com/azure-ad-b2c/samples) for several enhanced Azure AD B2C customer identity and access management (CIAM) user journeys. |
5353

Lines changed: 56 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,56 @@
1+
---
2+
title: Disable email verification during customer sign-up with a custom policy
3+
titleSuffix: Azure AD B2C
4+
description: Learn how to disable email verification during customer sign-up in Azure Active Directory B2C.
5+
services: active-directory-b2c
6+
author: msmimart
7+
manager: celestedg
8+
9+
ms.service: active-directory
10+
ms.workload: identity
11+
ms.topic: conceptual
12+
ms.date: 03/11/2020
13+
ms.author: mimart
14+
ms.subservice: B2C
15+
---
16+
17+
# Disable email verification during customer sign-up using a custom policy in Azure Active Directory B2C
18+
19+
[!INCLUDE [disable email verification intro](../../includes/active-directory-b2c-disable-email-verification.md)]
20+
21+
## Prerequisites
22+
23+
Complete the steps in [Get started with custom policies](custom-policy-get-started.md). You should have a working custom policy for sign-up and sign-in with social and local accounts.
24+
25+
## Add the metadata to the self-asserted technical profile
26+
27+
The **LocalAccountSignUpWithLogonEmail** technical profile is a [self-asserted](self-asserted-technical-profile.md), which is invoked during the sign-up flow. To disable the email verification, set the `EnforceEmailVerification` metadata to false. Override the LocalAccountSignUpWithLogonEmail technical profiles in the extension file. Find the `ClaimsProviders` element. Add the following claims provider to the `ClaimsProviders` element:
28+
29+
30+
```XML
31+
<ClaimsProvider>
32+
<DisplayName>Local Account</DisplayName>
33+
<TechnicalProfiles>
34+
<TechnicalProfile Id="SelfAsserted-LocalAccountSignin-Email">
35+
<Metadata>
36+
<Item Key="EnforceEmailVerification">false</Item>
37+
</Metadata>
38+
</TechnicalProfile>
39+
</TechnicalProfiles>
40+
</ClaimsProvider>
41+
```
42+
43+
## Test the custom policy
44+
45+
1. Sign in to the [Azure portal](https://portal.azure.com).
46+
2. Make sure you're using the directory that contains your Azure AD tenant by selecting the **Directory + subscription** filter in the top menu and choosing the directory that contains your Azure AD tenant.
47+
3. Choose **All services** in the top-left corner of the Azure portal, and then search for and select **App registrations**.
48+
4. Select **Identity Experience Framework**.
49+
5. Select **Upload Custom Policy**, and then upload the two policy files that you changed.
50+
2. Select the sign-up or sign-in policy that you uploaded, and click the **Run now** button.
51+
3. You should be able to sign up using an email address without the validation.
52+
53+
54+
## Next steps
55+
56+
- Learn more about the [self-asserted technical profile](self-asserted-technical-profile.md) in the IEF reference.

articles/active-directory-b2c/user-flow-disable-email-verification.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -9,16 +9,14 @@ manager: celestedg
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: conceptual
12-
ms.date: 09/25/2018
12+
ms.date: 03/11/2020
1313
ms.author: mimart
1414
ms.subservice: B2C
1515
---
1616

1717
# Disable email verification during customer sign-up in Azure Active Directory B2C
1818

19-
By default, Azure Active Directory B2C (Azure AD B2C) verifies your customer's email address for local accounts (accounts for users who sign up with email address or username). Azure AD B2C ensures valid email addresses by requiring customers to verify them during the sign-up process. It also prevents a malicious actors from using automated processes to generate fraudulent accounts in your applications.
20-
21-
Some application developers prefer to skip email verification during the sign-up process and instead have customers verify their email address later. To support this, Azure AD B2C can be configured to disable email verification. Doing so creates a smoother sign-up process and gives developers the flexibility to differentiate customers that have verified their email address from customers that have not.
19+
[!INCLUDE [disable email verification intro](../../includes/active-directory-b2c-disable-email-verification.md)]
2220

2321
Follow these steps to disable email verification:
2422

@@ -30,8 +28,10 @@ Follow these steps to disable email verification:
3028
1. Select **Page layouts**.
3129
1. Select **Local account sign-up page**.
3230
1. Under **User attributes**, select **Email Address**.
33-
1. In the **REQUIRES VERIFICATION** drop down, select **No**.
31+
1. In the **REQUIRES VERIFICATION** drop-down, select **No**.
3432
1. Select **Save**. Email verification is now disabled for this user flow.
3533

36-
> [!WARNING]
37-
> Disabling email verification in the sign-up process may lead to spam. If you disable the default Azure AD B2C-provided email verification, we recommend that you implement a replacement verification system.
34+
## Next steps
35+
36+
- Learn how to [customize the user interface in Azure Active Directory B2C](customize-ui-overview.md)
37+

articles/active-directory-domain-services/change-sku.md

Lines changed: 6 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ ms.author: iainfou
1717

1818
# Change the SKU for an existing Azure AD Domain Services managed domain
1919

20-
In Azure Active Directory Domain Services (Azure AD DS), the available performance and features are based on the SKU type. These feature differences include the backup frequency or maximum number of one-way outbound forest trusts (currently in preview). You select a SKU when you create the managed domain, and you can switch SKUs as your business needs change after the managed domain has been deployed. Changes in business requirements could include the need for more frequent backups or to create additional forest trusts. For more information on the limits and pricing of the different SKUs, see [Azure AD DS SKU concepts][concepts-sku] and [Azure AD DS pricing][pricing] pages.
20+
In Azure Active Directory Domain Services (Azure AD DS), the available performance and features are based on the SKU type. These feature differences include the backup frequency or maximum number of one-way outbound forest trusts (currently in preview). You select a SKU when you create the managed domain, and you can switch SKUs up or down as your business needs change after the managed domain has been deployed. Changes in business requirements could include the need for more frequent backups or to create additional forest trusts. For more information on the limits and pricing of the different SKUs, see [Azure AD DS SKU concepts][concepts-sku] and [Azure AD DS pricing][pricing] pages.
2121

2222
This article shows you how to change the SKU for an existing Azure AD DS managed domain using the Azure portal.
2323

@@ -34,9 +34,12 @@ To complete this article, you need the following resources and privileges:
3434

3535
## SKU change limitations
3636

37-
There are some limitations for the SKU change operation if you use a resource forest (currently in preview) and have created one-way outbound forest trusts from Azure AD DS to an on-premises AD DS environment. The *Premium* and *Enterprise* SKUs define a limit on the number of trusts you can create. You can't change to a SKU with a lower maximum limit than you currently have configured.
37+
You can change SKUs up or down after the Azure AD DS managed domain has been deployed. However, if you use a resource forest (currently in preview) and have created one-way outbound forest trusts from Azure AD DS to an on-premises AD DS environment, there are some limitations for the SKU change operation. The *Premium* and *Enterprise* SKUs define a limit on the number of trusts you can create. You can't change to a SKU with a lower maximum limit than you currently have configured.
3838

39-
For example, if you have created two forest trusts on the *Premium* SKU, you can't change down to the *Standard* SKU. The *Standard* SKU doesn't support forest trusts. Or, if you have created seven trusts on the *Premium* SKU, you can't change down to the *Enterprise* SKU. The *Enterprise* SKU supports a maximum of five trusts.
39+
For example:
40+
41+
* If you have created two forest trusts on the *Premium* SKU, you can't change down to the *Standard* SKU. The *Standard* SKU doesn't support forest trusts.
42+
* Or, if you have created seven trusts on the *Premium* SKU, you can't change down to the *Enterprise* SKU. The *Enterprise* SKU supports a maximum of five trusts.
4043

4144
For more information on these limits, see [Azure AD DS SKU features and limits][concepts-sku].
4245

articles/active-directory/authentication/howto-authentication-passwordless-deployment.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -128,7 +128,7 @@ See [Best practices for a pilot](https://aka.ms/deploymentplans) on the deployme
128128

129129
## Plan passwordless authentication with the Microsoft Authenticator app
130130

131-
The Microsoft Authenticator app is a free download from Google Play or the Apple App Store. [Learn more about downloading the Microsoft Authenticator app](https://www.microsoft.com/account/authenticator?cmp=h66ftb_42hbak). Have users download the Microsoft Authenticator app. and follow the directions to enable phone sign in.
131+
The Microsoft Authenticator app is a free download from Google Play or the Apple App Store. [Learn more about downloading the Microsoft Authenticator app](https://www.microsoft.com/p/microsoft-authenticator/9nblgggzmcj6). Have users download the Microsoft Authenticator app. and follow the directions to enable phone sign in.
132132

133133
It turns any iOS or Android phone into a strong, passwordless credential. Users sign in to any platform or browser by getting a notification to their phone, matching a number displayed on the screen to the one on their phone, and then using biometrics or a PIN to confirm. [See details on how the Microsoft Authenticator app works](https://docs.microsoft.com/azure/security/fundamentals/ad-passwordless#user-using-microsoft-authenticator-for-passwordless-sign-in).
134134

articles/active-directory/develop/microsoft-graph-intro.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -54,4 +54,4 @@ When you complete the quickstart, you have an app that's ready to run. For more
5454

5555
Microsoft Graph Explorer is a web-based tool that you can use to build and test requests using Microsoft Graph APIs. You can access Microsoft Graph Explorer at: `https://developer.microsoft.com/graph/graph-explorer`.
5656

57-
Postman is a tool that you can also use to build and test requests using the Microsoft Graph APIs. You can download Postman at: `https://www.getpostman.com/`. To interact with Microsoft Graph in Postman, you use the Microsoft Graph collection in Postman. For more information, see [Use Postman with the Microsoft Graph API](https://docs.microsoft.comgraph/use-postman?context=graph%2Fapi%2Fbeta&view=graph-rest-beta).
57+
Postman is a tool that you can also use to build and test requests using the Microsoft Graph APIs. You can download Postman at: `https://www.getpostman.com/`. To interact with Microsoft Graph in Postman, you use the Microsoft Graph collection in Postman. For more information, see [Use Postman with the Microsoft Graph API](/graph/use-postman?context=graph%2Fapi%2Fbeta&view=graph-rest-beta).

articles/active-directory/develop/tutorial-v2-asp-webapp.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -27,6 +27,9 @@ When you've completed this guide, your application will be able to accept sign-i
2727

2828
> This guide requires Microsoft Visual Studio 2019. Don’t have it? [Download Visual Studio 2019 for free](https://www.visualstudio.com/downloads/).
2929
30+
>[!NOTE]
31+
> If you are new to the Microsoft identity platform, we recommend you start with the [Add Microsoft identity platform sign-in to an ASP.NET web app](quickstart-v2-aspnet-webapp.md).
32+
3033
## How the sample app generated by this guide works
3134

3235
![Shows how the sample app generated by this tutorial works](media/active-directory-develop-guidedsetup-aspnetwebapp-intro/aspnetbrowsergeneral.svg)

articles/active-directory/develop/tutorial-v2-aspnet-daemon-web-app.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -36,7 +36,8 @@ The app is built as an ASP.NET MVC application. It uses the OWIN OpenID Connect
3636

3737
The "daemon" component in this sample is an API controller, `SyncController.cs`. When the controller is called, it pulls in a list of users in the customer's Azure Active Directory (Azure AD) tenant from Microsoft Graph. `SyncController.cs` is triggered by an AJAX call in the web application. It uses the [Microsoft Authentication Library (MSAL) for .NET](msal-overview.md) to acquire an access token for Microsoft Graph.
3838

39-
For a simpler console daemon application, see the [.NET Core daemon quickstart](quickstart-v2-netcore-daemon.md).
39+
>[!NOTE]
40+
> If you are new to the Microsoft identity platform, we recommend you start with the [.NET Core daemon quickstart](quickstart-v2-netcore-daemon.md).
4041
4142
## Scenario
4243

articles/active-directory/develop/tutorial-v2-ios.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -22,6 +22,9 @@ In this tutorial, you'll learn how to integrate an iOS or macOS app with the Mic
2222

2323
When you've completed the guide, your application will accept sign-ins of personal Microsoft accounts (including outlook.com, live.com, and others) and work or school accounts from any company or organization that uses Azure Active Directory.
2424

25+
>[!NOTE]
26+
> If you are new to the Microsoft identity platform, we recommend you start with the [Sign in users and call the Microsoft Graph API from an iOS or macOS app](quickstart-v2-ios.md).
27+
2528
## How this tutorial works
2629

2730
![Shows how the sample app generated by this tutorial works](../../../includes/media/active-directory-develop-guidedsetup-ios-introduction/iosintro.svg)

0 commit comments

Comments
 (0)