Skip to content

Commit dc75fe8

Browse files
author
Craig Casey
authored
Merge branch 'master' into vcraic0923
2 parents d5a95a7 + d159d1a commit dc75fe8

File tree

432 files changed

+6551
-3897
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

432 files changed

+6551
-3897
lines changed

.openpublishing.redirection.json

Lines changed: 48 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -26039,11 +26039,21 @@
2603926039
"redirect_url": "/azure/virtual-machine-scale-sets/virtual-machine-scale-sets-autoscale-powershell",
2604026040
"redirect_document_id": false
2604126041
},
26042+
{
26043+
"source_path": "articles/sentinel/tutorial-detect-threats.md",
26044+
"redirect_url": "/azure/sentinel/tutorial-detect-threats-built-in",
26045+
"redirect_document_id": false
26046+
},
2604226047
{
2604326048
"source_path": "articles/sentinel/user-analytics.md",
2604426049
"redirect_url": "/azure/sentinel/overview",
2604526050
"redirect_document_id": false
2604626051
},
26052+
{
26053+
"source_path": "articles/sentinel/connect-fusion.md",
26054+
"redirect_url": "/azure/sentinel/fusion",
26055+
"redirect_document_id": false
26056+
},
2604726057
{
2604826058
"source_path": "articles/security-center/security-center-ata-integration.md",
2604926059
"redirect_url": "/azure/security-center/security-center-partner-integration",
@@ -36870,7 +36880,12 @@
3687036880
},
3687136881
{
3687236882
"source_path": "articles/monitoring-and-diagnostics/monitoring-archive-diagnostic-logs.md",
36873-
"redirect_url": "/azure/azure-monitor/platform/archive-diagnostic-logs",
36883+
"redirect_url": "/azure/azure-monitor/platform/resource-logs-collect-storage",
36884+
"redirect_document_id": false
36885+
},
36886+
{
36887+
"source_path": "articles/azure-monitor/platform/archive-diagnostic-logs.md",
36888+
"redirect_url": "/azure/azure-monitor/platform/resource-logs-collect-storage",
3687436889
"redirect_document_id": true
3687536890
},
3687636891
{
@@ -36888,6 +36903,11 @@
3688836903
"redirect_url": "/azure/azure-monitor/platform/diagnostic-logs-stream-template",
3688936904
"redirect_document_id": true
3689036905
},
36906+
{
36907+
"source_path": "articles/azure-monitor/platform/diagnostic-logs-stream-template.md",
36908+
"redirect_url": "/azure/azure-monitor/platform/diagnostic-settings-template",
36909+
"redirect_document_id": true
36910+
},
3689136911
{
3689236912
"source_path": "articles/monitoring-and-diagnostics/monitoring-autoscale-scale-by-custom-metric.md",
3689336913
"redirect_url": "/azure/azure-monitor/platform/autoscale-custom-metric",
@@ -36955,7 +36975,17 @@
3695536975
},
3695636976
{
3695736977
"source_path": "articles/monitoring-and-diagnostics/monitoring-overview-of-diagnostic-logs.md",
36958-
"redirect_url": "/azure/azure-monitor/platform/diagnostic-logs-overview",
36978+
"redirect_url": "/azure/azure-monitor/platform/resource-logs-overview",
36979+
"redirect_document_id": false
36980+
},
36981+
{
36982+
"source_path": "articles/monitoring-and-diagnostics/diagnostic-logs-overview.md",
36983+
"redirect_url": "/azure/azure-monitor/platform/resource-logs-overview",
36984+
"redirect_document_id": false
36985+
},
36986+
{
36987+
"source_path": "articles/azure-monitor/platform/diagnostic-logs-overview.md",
36988+
"redirect_url": "/azure/azure-monitor/platform/resource-logs-overview",
3695936989
"redirect_document_id": true
3696036990
},
3696136991
{
@@ -36970,14 +37000,24 @@
3697037000
},
3697137001
{
3697237002
"source_path": "articles/monitoring-and-diagnostics/monitoring-stream-diagnostic-logs-to-event-hubs.md",
36973-
"redirect_url": "/azure/azure-monitor/platform/diagnostic-logs-stream-event-hubs",
37003+
"redirect_url": "/azure/azure-monitor/platform/resource-logs-stream-event-hubs",
37004+
"redirect_document_id": false
37005+
},
37006+
{
37007+
"source_path": "articles/azure-monitor/platform/diagnostic-logs-stream-event-hubs.md",
37008+
"redirect_url": "/azure/azure-monitor/platform/resource-logs-stream-event-hubs",
3697437009
"redirect_document_id": true
3697537010
},
3697637011
{
3697737012
"source_path": "articles/monitoring-and-diagnostics/monitor-stream-diagnostic-logs-log-analytics.md",
3697837013
"redirect_url": "/azure/azure-monitor/platform/diagnostic-logs-stream-log-store",
3697937014
"redirect_document_id": true
3698037015
},
37016+
{
37017+
"source_path": "articles/azure-monitor/platform/diagnostic-logs-stream-log-store.md",
37018+
"redirect_url": "/azure/azure-monitor/platform/resource-logs-collect-workspace",
37019+
"redirect_document_id": true
37020+
},
3698137021
{
3698237022
"source_path": "articles/monitoring-and-diagnostics/monitor-tutorial-archive-monitoring-data.md",
3698337023
"redirect_url": "/azure/azure-monitor/learn/tutorial-archive-data",
@@ -41368,6 +41408,11 @@
4136841408
"redirect_url": "/azure/azure-monitor/app/overview-dashboard",
4136941409
"redirect_document_id": false
4137041410
},
41411+
{
41412+
"source_path": "articles/azure-monitor/platform/diagnostic-logs.md",
41413+
"redirect_url": "/azure/azure-monitor/platform/resource-logs-overview",
41414+
"redirect_document_id": false
41415+
},
4137141416
{
4137241417
"source_path": "articles/active-directory-domain-services/active-directory-ds-admin-guide-administer-domain.md",
4137341418
"redirect_url": "/azure/active-directory-domain-services/manage-domain",
Lines changed: 20 additions & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -1,34 +1,36 @@
11
---
2-
title: Disable email verification during consumer sign-up in Azure Active Directory B2C | Microsoft Docs
3-
description: A topic demonstrating how to disable email verification during consumer sign-up in Azure Active Directory B2C.
2+
title: Disable email verification during customer sign-up in Azure Active Directory B2C
3+
description: Learn how to disable email verification during customer sign-up in Azure Active Directory B2C.
44
services: active-directory-b2c
55
author: mmacy
66
manager: celestedg
77

88
ms.service: active-directory
99
ms.workload: identity
1010
ms.topic: conceptual
11-
ms.date: 11/30/2018
11+
ms.date: 09/25/2018
1212
ms.author: marsma
1313
ms.subservice: B2C
1414
---
1515

16-
# Disable email verification during consumer sign-up in Azure Active Directory B2C
17-
When enabled, Azure Active Directory B2C (Azure AD B2C) gives a consumer the ability to sign up for applications by providing an email address and creating a local account. Azure AD B2C ensures valid email addresses by requiring consumers to verify them during the sign-up process. It also prevents a malicious automated process from generating fake accounts for the applications.
16+
# Disable email verification during customer sign-up in Azure Active Directory B2C
1817

19-
Some application developers prefer to skip email verification during the sign-up process and instead have consumers verify the email address later. To support this, Azure AD B2C can be configured to disable email verification. Doing so creates a smoother sign-up process and gives developers the flexibility to differentiate the consumers that have verified their email address from those consumers that have not.
18+
By default, Azure Active Directory B2C (Azure AD B2C) verifies your customer's email address for local accounts (accounts for users who sign up with email address or username). Azure AD B2C ensures valid email addresses by requiring customers to verify them during the sign-up process. It also prevents a malicious actors from using automated processes to generate fraudulent accounts in your applications.
2019

21-
By default, sign-up user flows have email verification turned on. Use the following steps to turn it off:
20+
Some application developers prefer to skip email verification during the sign-up process and instead have customers verify their email address later. To support this, Azure AD B2C can be configured to disable email verification. Doing so creates a smoother sign-up process and gives developers the flexibility to differentiate customers that have verified their email address from customers that have not.
2221

23-
1. Click **User flows**.
24-
2. Click your user flow (for example, "B2C_1_SiUp") to open it.
25-
3. Click **Page layouts**.
26-
4. Click **Local account sign-up page**.
27-
5. Click **Email Address** in the **Name** column under the **User attributes** section.
28-
6. Under **Requires verification**, select **No**.
29-
7. Click **Save** at the top of the blade. You're done!
22+
Follow these steps to disable email verification:
3023

31-
> [!NOTE]
32-
> Disabling email verification in the sign-up process may lead to spam. If you disable the default one, we recommend adding your own verification system.
33-
>
34-
>
24+
1. Sign in to the [Azure portal](https://portal.azure.com)
25+
1. Use the **Directory + subscription** filter in the top menu to select the directory that contains your Azure AD B2C tenant.
26+
1. In the left menu, select **Azure AD B2C**. Or, select **All services** and search for and select **Azure AD B2C**.
27+
1. Select **User flows**.
28+
1. Select the user flow for which you want to disable email verification. For example, *B2C_1_signinsignup*.
29+
1. Select **Page layouts**.
30+
1. Select **Local account sign-up page**.
31+
1. Under **User attributes**, select **Email Address**.
32+
1. In the **REQUIRES VERIFICATION** drop down, select **No**.
33+
1. Select **Save**. Email verification is now disabled for this user flow.
34+
35+
> [!WARNING]
36+
> Disabling email verification in the sign-up process may lead to spam. If you disable the default Azure AD B2C-provided email verification, we recommend that you implement a replacement verification system.

articles/active-directory-b2c/active-directory-b2c-reference-threat-management.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ manager: celestedg
88
ms.service: active-directory
99
ms.workload: identity
1010
ms.topic: conceptual
11-
ms.date: 07/10/2019
11+
ms.date: 09/26/2019
1212
ms.author: marsma
1313
ms.subservice: B2C
1414
---
@@ -32,10 +32,10 @@ The first 10 lockout periods are one minute long. The next 10 lockout periods ar
3232

3333
To manage password protection settings, including the lockout threshold:
3434

35-
1. Navigate to the [Azure portal](https://portal.azure.com).
36-
1. Select the **Directory + Subscription** filter in the top-right menu of the portal, then select your Azure AD B2C tenant.
37-
1. Select **Azure Active Directory** in the left-hand menu (or select **All services** in the upper-left section of the portal, then search for and select *Azure Active Directory*).
38-
1. Under **Security**, select **Authentication methods**, then select **Password protection**.
35+
1. Sign in to the [Azure portal](https://portal.azure.com)
36+
1. Use the **Directory + subscription** filter in the top menu to select the directory that contains your Azure AD B2C tenant.
37+
1. In the left menu, select **Azure AD B2C**. Or, select **All services** and search for and select **Azure AD B2C**.
38+
1. Under **Security**, select **Authentication methods (Preview)**, then select **Password protection**.
3939
1. Enter your desired password protection settings, then select **Save**.
4040

4141
![Azure portal Password protection page in Azure AD settings](media/active-directory-b2c-reference-threat-management/portal-02-password-protection.png)

articles/active-directory-b2c/active-directory-b2c-setup-sf-app-custom.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -123,7 +123,7 @@ You can define a Salesforce account as a claims provider by adding it to the **C
123123
<Key Id="SamlMessageSigning" StorageReferenceId="B2C_1A_SAMLSigningCert"/>
124124
</CryptographicKeys>
125125
<OutputClaims>
126-
<OutputClaim ClaimTypeReferenceId="socialIdpUserId" PartnerClaimType="userId"/>
126+
<OutputClaim ClaimTypeReferenceId="issuerUserId" PartnerClaimType="userId"/>
127127
<OutputClaim ClaimTypeReferenceId="givenName" PartnerClaimType="given_name"/>
128128
<OutputClaim ClaimTypeReferenceId="surname" PartnerClaimType="family_name"/>
129129
<OutputClaim ClaimTypeReferenceId="email" PartnerClaimType="email"/>

0 commit comments

Comments
 (0)