Skip to content

Commit de0484d

Browse files
committed
update
2 parents 9b9fcc9 + e9abad5 commit de0484d

File tree

653 files changed

+7138
-4294
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

653 files changed

+7138
-4294
lines changed

.openpublishing.publish.config.json

Lines changed: 30 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -151,17 +151,17 @@
151151
"url": "https://github.com/Azure-Samples/functions-python-tensorflow-tutorial",
152152
"branch": "master",
153153
"branch_mapping": {}
154-
},
154+
},
155155
{
156156
"path_to_root": "functions-quickstart-templates",
157157
"url": "https://github.com/Azure/azure-functions-templates",
158158
"branch": "dev"
159-
},
159+
},
160160
{
161161
"path_to_root": "functions-docs-csharp",
162162
"url": "https://github.com/Azure-Samples/functions-docs-csharp",
163163
"branch": "master"
164-
},
164+
},
165165
{
166166
"path_to_root": "functions-docs-javascript",
167167
"url": "https://github.com/Azure-Samples/functions-docs-javascript",
@@ -171,12 +171,12 @@
171171
"path_to_root": "functions-docs-typescript",
172172
"url": "https://github.com/Azure-Samples/functions-docs-typescript",
173173
"branch": "master"
174-
},
174+
},
175175
{
176176
"path_to_root": "functions-docs-python",
177177
"url": "https://github.com/Azure-Samples/functions-docs-python",
178178
"branch": "master"
179-
},
179+
},
180180
{
181181
"path_to_root": "functions-docs-powershell",
182182
"url": "https://github.com/Azure-Samples/functions-docs-powershell",
@@ -186,6 +186,11 @@
186186
"url": "https://github.com/Azure-Samples/cognitive-services-personalizer-samples",
187187
"branch": "master"
188188
},
189+
{
190+
"path_to_root": "samples-cognitive-services-data-files",
191+
"url": "https://github.com/Azure-Samples/cognitive-services-sample-data-files",
192+
"branch": "master"
193+
},
189194
{
190195
"path_to_root": "samples-luis",
191196
"url": "https://github.com/Azure-Samples/cognitive-services-language-understanding",
@@ -341,6 +346,26 @@
341346
"url": "https://github.com/Azure-Samples/azure-sdk-for-go-samples",
342347
"branch": "master"
343348
},
349+
{
350+
"path_to_root": "azure-sdk-for-java-event-hubs",
351+
"url": "https://github.com/Azure/azure-sdk-for-java/",
352+
"branch": "master"
353+
},
354+
{
355+
"path_to_root": "azure-sdk-for-java-script-event-hubs",
356+
"url": "https://github.com/Azure/azure-sdk-for-js/",
357+
"branch": "master"
358+
},
359+
{
360+
"path_to_root": "azure-sdk-for-net-event-hubs",
361+
"url": "https://github.com/Azure/azure-sdk-for-net/",
362+
"branch": "master"
363+
},
364+
{
365+
"path_to_root": "azure-sdk-for-python-event-hubs",
366+
"url": "https://github.com/Azure/azure-sdk-for-python/",
367+
"branch": "master"
368+
},
344369
{
345370
"path_to_root": "cosmos-dotnet-getting-started",
346371
"url": "https://github.com/Azure-Samples/cosmos-dotnet-getting-started",

.openpublishing.redirection.json

Lines changed: 34 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1745,22 +1745,22 @@
17451745
},
17461746
{
17471747
"source_path": "articles/cognitive-services/Bing-Web-Search/web-search-sdk-quickstart.md",
1748-
"redirect_url": "/azure/cognitive-services/bing-web-search/quickstarts/client-libraries",
1748+
"redirect_url": "/azure/cognitive-services/bing-web-search/quickstarts/client-libraries?pivots=programming-language-csharp",
17491749
"redirect_document_id": false
17501750
},
17511751
{
17521752
"source_path": "articles/cognitive-services/Bing-Web-Search/web-sdk-java-quickstart.md",
1753-
"redirect_url": "/azure/cognitive-services/bing-web-search/quickstarts/client-libraries",
1753+
"redirect_url": "/azure/cognitive-services/bing-web-search/quickstarts/client-libraries?pivots=programming-language-java",
17541754
"redirect_document_id": false
17551755
},
17561756
{
17571757
"source_path": "articles/cognitive-services/Bing-Web-Search/web-search-sdk-node-quickstart.md",
1758-
"redirect_url": "/azure/cognitive-services/bing-web-search/quickstarts/client-libraries",
1758+
"redirect_url": "/azure/cognitive-services/bing-web-search/quickstarts/client-libraries?pivots=programming-language-javascript",
17591759
"redirect_document_id": false
17601760
},
17611761
{
17621762
"source_path": "articles/cognitive-services/Bing-Web-Search/web-sdk-python-quickstart.md",
1763-
"redirect_url": "/azure/cognitive-services/bing-web-search/quickstarts/client-libraries",
1763+
"redirect_url": "/azure/cognitive-services/bing-web-search/quickstarts/client-libraries?pivots=programming-language-python",
17641764
"redirect_document_id": false
17651765
},
17661766
{
@@ -32618,6 +32618,21 @@
3261832618
"redirect_url": "/azure/cognitive-services/bing-web-search/language-support",
3261932619
"redirect_document_id": true
3262032620
},
32621+
{
32622+
"source_path": "articles/cognitive-services/Bing-Custom-Search/sdk-csharp-quick-start.md",
32623+
"redirect_url": "/azure/cognitive-services/bing-custom-search/quickstarts/client-libraries?pivots=programming-language-csharp",
32624+
"redirect_document_id": false
32625+
},
32626+
{
32627+
"source_path": "articles/cognitive-services/Bing-Custom-Search/sdk-java-quickstart.md",
32628+
"redirect_url": "/azure/cognitive-services/bing-custom-search/quickstarts/client-libraries?pivots=programming-language-java",
32629+
"redirect_document_id": false
32630+
},
32631+
{
32632+
"source_path": "articles/cognitive-services/Bing-Custom-Search/sdk-python-quickstart.md",
32633+
"redirect_url": "/azure/cognitive-services/bing-custom-search/quickstarts/client-libraries?pivots=programming-language-python",
32634+
"redirect_document_id": false
32635+
},
3262132636
{
3262232637
"source_path": "articles/cognitive-services/Bing-Autosuggest/bing-autosuggest-supported-languages.md",
3262332638
"redirect_url": "/azure/cognitive-services/bing-autosuggest/language-support",
@@ -46674,6 +46689,11 @@
4667446689
"redirect_url": "/azure/active-directory-domain-services/tutorial-create-instance#update-dns-settings-for-the-azure-virtual-network",
4667546690
"redirect_document_id": false
4667646691
},
46692+
{
46693+
"source_path": "articles/active-directory/authentication/howto-password-ban-bad-configure.md",
46694+
"redirect_url": "/azure/active-directory/authentication/tutorial-configure-custom-password-protection",
46695+
"redirect_document_id": true
46696+
},
4667746697
{
4667846698
"source_path": "articles/media-services/previous/media-services-fmp4-live-ingest-overview.md",
4667946699
"redirect_url": "/azure/media-services/media-services-fmp4-live-ingest-overview",
@@ -49169,10 +49189,20 @@
4916949189
"redirect_url": "/azure/aks/aks-migration",
4917049190
"redirect_document_id": false
4917149191
},
49192+
{
49193+
"source_path": "articles/virtual-machines/workloads/sap/sap-hana-backup-storage-snapshots.md",
49194+
"redirect_url": "sap-hana-backup-guide",
49195+
"redirect_document_id": true
49196+
},
4917249197
{
4917349198
"source_path": "articles/service-fabric/service-fabric-cicd-your-linux-applications-with-jenkins.md",
4917449199
"redirect_url": "/azure/jenkins/service-fabric-cicd-your-linux-applications-with-jenkins",
4917549200
"redirect_document_id": true
4917649201
},
49202+
{
49203+
"source_path": "articles/jenkins/install-jenkins-solution-template.md",
49204+
"redirect_url": "/azure/jenkins/install-solution-template-tutorial",
49205+
"redirect_document_id": true
49206+
}
4917749207
]
4917849208
}

articles/active-directory-b2c/TOC.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -48,6 +48,8 @@
4848
href: code-samples.md
4949
- name: Concepts
5050
items:
51+
- name: Azure AD B2C best practices
52+
href: best-practices.md
5153
- name: Application types
5254
href: application-types.md
5355
- name: Authentication protocols
Lines changed: 91 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,91 @@
1+
---
2+
title: Best practices for Azure AD B2C
3+
titleSuffix: Azure AD B2C
4+
description: Recommendations and best practices to consider when working with Azure Active Directory B2C (Azure AD B2C).
5+
services: active-directory-b2c
6+
author: vigunase
7+
manager: celestedg
8+
9+
ms.service: active-directory
10+
ms.workload: identity
11+
ms.topic: conceptual
12+
ms.date: 03/03/2020
13+
ms.author: vigunase
14+
ms.subservice: B2C
15+
---
16+
17+
# Recommendations and best practices for Azure Active Directory B2C
18+
19+
The following best practices and recommendations cover some of the primary aspects of integrating Azure Active Directory (Azure AD) B2C into existing or new application environments.
20+
21+
## Fundamentals
22+
23+
| | |
24+
|--|--|
25+
| Choose user flows for most scenarios | The Identity Experience Framework of Azure AD B2C is the core strength of the service. Policies fully describe identity experiences such as sign-up, sign-in, or profile editing. To help you set up the most common identity tasks, the Azure AD B2C portal includes predefined, configurable policies called user flows. With user flows, you can create great user experiences in minutes, with just a few clicks. [Learn when to use user flows vs. custom policies](custom-policy-overview.md#comparing-user-flows-and-custom-policies).|
26+
| App registrations | Every application (web, native) and API that is being secured must be registered in Azure AD B2C. If an app has both a web and native version of iOS and Android, you can register them as one application in Azure AD B2C with the same client ID. Learn how to [register OIDC, SAML, web, and native apps](https://docs.microsoft.com/azure/active-directory-b2c/tutorial-register-applications?tabs=applications). Learn more about [application types that can be used in Azure AD B2C](https://docs.microsoft.com/azure/active-directory-b2c/application-types). |
27+
| Move to monthly active users billing | Azure AD B2C has moved from monthly active authentications to monthly active users (MAU) billing. Most customers will find this model cost-effective. [Learn more about monthly active users billing](https://azure.microsoft.com/updates/mau-billing/). |
28+
29+
## Planning and design
30+
31+
Define your application and service architecture, inventory current systems, and plan your migration to Azure AD B2C.
32+
33+
| | |
34+
|--|--|
35+
| Architect an end-to-end solution | Include all of your applications' dependencies when planning an Azure AD B2C integration. Consider all services and products that are currently in your environment or that might need to be added to the solution, for example, Azure Functions, customer relationship management (CRM) systems, Azure API Management gateway, and storage services. Take into account the security and scalability for all services. |
36+
| Document your users' experiences | Detail all the user journeys your customers can experience in your application. Include every screen and any branching flows they might encounter when interacting with the identity and profile aspects of your application. Include usability, accessibility, and localization in your planning. |
37+
| Choose the right authentication protocol | For a breakdown of the different application scenarios and their recommended authentication flows, see [Scenarios and supported authentication flows](../active-directory/develop/authentication-flows-app-scenarios.md#scenarios-and-supported-authentication-flows). |
38+
| Pilot a proof-of-concept (POC) end-to-end user experience | Start with our [Microsoft code samples](code-samples.md) and [community samples](https://github.com/azure-ad-b2c/samples). |
39+
| Create a migration plan |Planning ahead can make migration go more smoothly. Learn more about [user migration](user-migration.md).|
40+
| Usability vs. security | Your solution must strike the right balance between application usability and your organization's acceptable level of risk. |
41+
| Move on-premises dependencies to the cloud | To help ensure a resilient solution, consider moving existing application dependencies to the cloud. |
42+
| Migrate existing apps to b2clogin.com | The deprecation of login.microsoftonline.com went into effect for all Azure AD B2C tenants on 04 December 2020. [Learn more](b2clogin.md). |
43+
44+
## Implementation
45+
46+
During the implementation phase, consider the following recommendations.
47+
48+
| | |
49+
|--|--|
50+
| Edit custom policies with the Azure AD B2C extension for Visual Studio Code | Download Visual Studio Code and this community-built [extension from the Visual Studio Code Marketplace]((https://marketplace.visualstudio.com/items?itemName=AzureADB2CTools.aadb2c)). While not an official Microsoft product, the Azure AD B2C extension for Visual Studio Code includes several features that help make working with custom policies easier. |
51+
| Learn how to troubleshoot Azure AD B2C | Learn how to [troubleshoot custom policies](https://docs.microsoft.com/azure/active-directory-b2c/troubleshoot-custom-policies?tabs=applications) during development. Learn what a normal authentication flow looks like and use tools for discovering anomalies and errors. For example, use [Application Insights](troubleshoot-with-application-insights.md) to review output logs of user journeys. |
52+
| Leverage our library of proven custom policy patterns | Find [samples](https://github.com/azure-ad-b2c/samples) for several enhanced Azure AD B2C customer identity and access management (CIAM) user journeys. |
53+
54+
55+
## Testing
56+
57+
Test and automate your Azure AD B2C implementation.
58+
59+
| | |
60+
|--|--|
61+
| Account for global traffic | Use traffic sources from different global address to test the performance and localization requirements. Make sure all the HTMLs, CSS, and dependencies can meet your performance needs. |
62+
| Functional and UI testing | Test the user flows end-to-end. Add synthetic tests every few minutes using Selenium, VS Web Test, etc. |
63+
| Pen-testing | Before going live with your solution, perform penetration testing exercises to verify all components are secure, including any third-party dependencies. Verify you've secured your APIs with access tokens and used the right authentication protocol for your application scenario. Learn more about [Penetration testing](https://docs.microsoft.com/azure/security/fundamentals/pen-testing) and the [Microsoft Cloud Unified Penetration Testing Rules of Engagement](https://www.microsoft.com/msrc/pentest-rules-of-engagement?rtc=1). |
64+
| A/B Testing | Flight your new features with a small, random set of users before rolling out to your entire population. With JavaScript enabled in Azure AD B2C, you can integrate with A/B testing tools like Optimizely, Clarity, and others. |
65+
| Load testing | Azure AD B2C can scale, but your application can scale only if all of its dependencies can scale. Load-test your APIs and CDN. |
66+
| Throttling | Azure AD B2C throttles traffic if too many requests are sent from the same source in a short period of time. Use several traffic sources while load testing, and handle the `AADB2C90229` error code gracefully in your applications. |
67+
| Automation | Use continuous integration and delivery (CI/CD) pipelines to automate testing and deployments, for example, [Azure DevOps](deploy-custom-policies-devops.md). |
68+
69+
## Operations
70+
71+
Manage your Azure AD B2C environment.
72+
73+
| | |
74+
|--|--|
75+
| Create multiple environments | For easier operations and deployment roll-out, create separate environments for development, testing, pre-production, and production. Create Azure AD B2C tenants for each. |
76+
| Use version control for your custom policies | Consider using GitHub, Azure Repos, or another cloud-based version control system for your Azure AD B2C custom policies. |
77+
| Use the Microsoft Graph API to automate the management of your B2C tenants | Microsoft Graph APIs:<br/>Manage [Identity Experience Framework](https://docs.microsoft.com/graph/api/resources/trustframeworkpolicy?view=graph-rest-beta) (custom policies)<br/>[Keys](https://docs.microsoft.com/graph/api/resources/trustframeworkkeyset?view=graph-rest-beta)<br/>[User Flows](https://docs.microsoft.com/graph/api/resources/identityuserflow?view=graph-rest-beta) |
78+
| Integrate with Azure DevOps | A [CI/CD pipeline](deploy-custom-policies-devops.md) makes moving code between different environments easy and ensures production readiness at all times. |
79+
| Integrate with Azure Monitor | [Audit log events](view-audit-logs.md) are only retained for seven days. [Integrate with Azure Monitor](azure-monitor.md) to retain the logs for long-term use, or integrate with third-party security information and event management (SIEM) tools to gain insights into your environment. |
80+
| Setup active alerting and monitoring | [Track user behavior](active-directory-b2c-custom-guide-eventlogger-appins.md) in Azure AD B2C using Application Insights. |
81+
82+
83+
## Support and Status Updates
84+
85+
Stay up to date with the state of the service and find support options.
86+
87+
| | |
88+
|--|--|
89+
| [Service updates](https://azure.microsoft.com/updates/?product=active-directory-b2c) | Stay up to date with Azure AD B2C product updates and announcements. |
90+
| [Microsoft Support](support-options.md) | File a support request for Azure AD B2C technical issues. Billing and subscription management support is provided at no cost. |
91+
| [Azure status](https://status.azure.com/status) | View the current health status of all Azure services. |

articles/active-directory-b2c/boolean-transformations.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: celestedg
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: reference
12-
ms.date: 02/03/2020
12+
ms.date: 03/03/2020
1313
ms.author: mimart
1414
ms.subservice: B2C
1515
---
@@ -112,7 +112,7 @@ The self-asserted technical profile calls the validation **login-NonInteractive*
112112

113113
## CompareBooleanClaimToValue
114114

115-
Checks that boolean value of a claims is equal to `true` or `false`, and return the result of the compression.
115+
Checks that boolean value of a claim is equal to `true` or `false`, and return the result of the compression.
116116

117117
| Item | TransformationClaimType | Data Type | Notes |
118118
| ---- | ------------------------ | ---------- | ----- |

articles/active-directory-b2c/custom-policy-configure-user-input.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -259,7 +259,7 @@ The following elements are used to define the claim:
259259
1. Sign in to the [Azure portal](https://portal.azure.com).
260260
2. Make sure you're using the directory that contains your Azure AD tenant by selecting the **Directory + subscription** filter in the top menu and choosing the directory that contains your Azure AD tenant.
261261
3. Choose **All services** in the top-left corner of the Azure portal, and then search for and select **App registrations**.
262-
4. Select **Identity Experience Framework (Preview)**.
262+
4. Select **Identity Experience Framework**.
263263
5. Select **Upload Custom Policy**, and then upload the two policy files that you changed.
264264
2. Select the sign-up or sign-in policy that you uploaded, and click the **Run now** button.
265265
3. You should be able to sign up using an email address.

0 commit comments

Comments
 (0)