Skip to content

Commit e2f3c12

Browse files
authored
Merge pull request #220433 from MicrosoftDocs/main
12/05 AM Publish
2 parents 741c5e4 + 3c20009 commit e2f3c12

File tree

95 files changed

+10110
-495
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

95 files changed

+10110
-495
lines changed

articles/active-directory-b2c/add-password-reset-policy.md

Lines changed: 17 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -9,8 +9,8 @@ manager: CelesteDG
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: how-to
12-
ms.date: 10/07/2022
13-
ms.custom: project-no-code
12+
ms.date: 10/25/2022
13+
ms.custom: project-no-code, engagement-fy23
1414
ms.author: kengaderdus
1515
ms.subservice: B2C
1616
zone_pivot_groups: b2c-policy-type
@@ -28,13 +28,19 @@ The password reset flow involves the following steps:
2828
1. In the next dialog that appears, the user enters their email address, and then selects **Send verification code**. Azure AD B2C sends a verification code to the user's email account. The user copies the verification code from the email, enters the code in the Azure AD B2C password reset dialog, and then selects **Verify code**.
2929
1. The user can then enter a new password. (After the email is verified, the user can still select the **Change e-mail** button; see [Hide the change email button](#hide-the-change-email-button).)
3030

31-
![Diagram that shows three dialogs in the password reset flow.](./media/add-password-reset-policy/password-reset-flow.png)
31+
:::image type="content" source="./media/add-password-reset-policy/password-reset-flow.png" alt-text="Diagram that shows three dialogs in the password reset flow." lightbox="./media/add-password-reset-policy/password-reset-flow.png":::
3232

3333
> [!TIP]
34-
> A user can change their password by using the self-service password reset flow if they forget their password and want to reset it. Choose one of these user flow options:
34+
> A user can change their password by using the self-service password reset flow if they forget their password and want to reset it. You can also choose one of the following user flow options:
3535
> - If a user knows their password and wants to change it, use a [password change flow](add-password-change-policy.md).
3636
> - If you want to force a user to reset their password (for example, when they sign in for the first time, when their passwords have been reset by an admin, or after they've been migrated to Azure AD B2C with random passwords), use a [force password reset](force-password-reset.md) flow.
3737
38+
The default name of the **Change email** button in *selfAsserted.html* is **changeclaims**. To find the button name, on the sign-up page, inspect the page source by using a browser tool such as _Inspect_.
39+
40+
## Prerequisites
41+
42+
[!INCLUDE [active-directory-b2c-customization-prerequisites](../../includes/active-directory-b2c-customization-prerequisites.md)]
43+
3844
### Hide the change email button
3945

4046
After the email is verified, the user can still select **Change email**, enter another email address, and then repeat email verification. If you'd prefer to hide the **Change email** button, you can modify the CSS to hide the associated HTML elements in the dialog. For example, you can add the following CSS entry to selfAsserted.html and [customize the user interface by using HTML templates](customize-ui-with-html.md):
@@ -48,12 +54,6 @@ After the email is verified, the user can still select **Change email**, enter a
4854
</style>
4955
```
5056

51-
The default name of the **Change email** button in *selfAsserted.html* is **changeclaims**. To find the button name, on the sign-up page, inspect the page source by using a browser tool like Inspect.
52-
53-
## Prerequisites
54-
55-
[!INCLUDE [active-directory-b2c-customization-prerequisites](../../includes/active-directory-b2c-customization-prerequisites.md)]
56-
5757
## Self-service password reset (recommended)
5858

5959
The new password reset experience is now part of the sign-up or sign-in policy. When the user selects the **Forgot your password?** link, they are immediately sent to the Forgot Password experience. Your application no longer needs to handle the [AADB2C90118 error code](#password-reset-policy-legacy), and you don't need a separate policy for password reset.
@@ -204,7 +204,7 @@ The sub journey is called from the user journey and performs the specific steps
204204

205205
### Prepare your user journey
206206

207-
Next, connect the **Forgot your password?** link to the Forgot Password sub journey. Reference the Forgot Password sub journey ID in the **ClaimsProviderSelection** element of the **CombinedSignInAndSignUp** step.
207+
Next, to connect the **Forgot your password?** link to the **Forgot Password** sub journey you will need to reference the **Forgot Password** sub journey ID in the **ClaimsProviderSelection** element of the **CombinedSignInAndSignUp** step.
208208

209209
If you don't have your own custom user journey that has a **CombinedSignInAndSignUp** step, complete the following steps to duplicate an existing sign-up or sign-in user journey. Otherwise, continue to the next section.
210210

@@ -287,9 +287,10 @@ Your application might need to detect whether the user signed in by using the Fo
287287
1. In the **Portal settings | Directories + subscriptions** pane, find your Azure AD B2C directory in the **Directory name** list, and then select **Switch**.
288288
1. In the Azure portal, search for and select **Azure AD B2C**.
289289
1. In the menu under **Policies**, select **Identity Experience Framework**.
290-
1. Select **Upload custom policy**. In the following order, upload the two policy files that you changed:
291-
1. The extension policy, for example, *SocialAndLocalAccounts/TrustFrameworkExtensions.xml*.
292-
1. The relying party policy, for example, *SocialAndLocalAccounts/SignUpOrSignin.xml*.
290+
1. Select **Upload custom policy**. In the following order, upload the policy files that you changed:
291+
1. The base file of your policy, for example *TrustFrameworkBase.xml*.
292+
1. The extension policy, for example, *TrustFrameworkExtensions.xml*.
293+
1. The relying party policy, for example, *SignUpSignIn.xml*.
293294

294295
::: zone-end
295296

@@ -341,8 +342,8 @@ To let your application users reset their passwords, create a password reset use
341342
To test the user flow:
342343

343344
1. Select the user flow you created. On the user flow overview page, select **Run user flow**.
344-
1. For **Application**, select the web application named *webapp1* that you registered earlier. The **Reply URL** should be `https://jwt.ms`.
345-
1. Select **Run user flow**, verify the email address of the account you created earlier, and then select **Continue**.
345+
1. For **Application**, select the web application you wish to test, such as the one named *webapp1* if you registered that earlier. The **Reply URL** should be `https://jwt.ms`.
346+
1. Select **Run user flow**, verify the email address of the account that you want to reset the password for, and then select **Continue**.
346347
1. Change the password, and then select **Continue**. The token is returned to `https://jwt.ms` and the browser displays it.
347348

348349
::: zone-end

articles/active-directory-b2c/javascript-and-page-layout.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -9,8 +9,8 @@ manager: CelesteDG
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: how-to
12-
ms.date: 08/12/2021
13-
ms.custom: project-no-code, devx-track-js
12+
ms.date: 10/26/2022
13+
ms.custom: project-no-code, devx-track-js, engagement-fy23
1414
ms.author: kengaderdus
1515
ms.subservice: B2C
1616
zone_pivot_groups: b2c-policy-type
@@ -139,7 +139,7 @@ You enable script execution by adding the **ScriptExecution** element to the [Re
139139

140140
Follow these guidelines when you customize the interface of your application using JavaScript:
141141

142-
- Don't
142+
- Don't:
143143
- bind a click event on `<a>` HTML elements.
144144
- take a dependency on Azure AD B2C code or comments.
145145
- change the order or hierarchy of Azure AD B2C HTML elements. Use an Azure AD B2C policy to control the order of the UI elements.
4.92 KB
Loading
109 KB
Loading

articles/active-directory-b2c/overview.md

Lines changed: 10 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -1,14 +1,15 @@
11
---
22
title: What is Azure Active Directory B2C?
3-
description: Learn how you can use Azure Active Directory B2C to support external identities in your applications, including social sign up with Facebook, Google, and other identity providers.
3+
description: Learn how you can use Azure Active Directory B2C to support external identities in your applications, including social sign-up with Facebook, Google, and other identity providers.
44
services: active-directory-b2c
55
author: kengaderdus
66
manager: CelesteDG
77

88
ms.service: active-directory
99
ms.workload: identity
1010
ms.topic: overview
11-
ms.date: 10/01/2021
11+
ms.date: 10/26/2022
12+
ms.custom: engagement-fy23
1213
ms.author: kengaderdus
1314
ms.subservice: B2C
1415
---
@@ -21,16 +22,16 @@ Azure Active Directory B2C provides business-to-customer identity as a service.
2122

2223
Azure AD B2C is a customer identity access management (CIAM) solution capable of supporting millions of users and billions of authentications per day. It takes care of the scaling and safety of the authentication platform, monitoring, and automatically handling threats like denial-of-service, password spray, or brute force attacks.
2324

24-
Azure AD B2C is a separate service from [Azure Active Directory (Azure AD)](../active-directory/fundamentals/active-directory-whatis.md). It is built on the same technology as Azure AD but for a different purpose. It allows businesses to build customer facing applications, and then allow anyone to sign up into those applications with no restrictions on user account.
25+
Azure AD B2C is a separate service from [Azure Active Directory (Azure AD)](../active-directory/fundamentals/active-directory-whatis.md). It is built on the same technology as Azure AD but for a different purpose. It allows businesses to build customer facing applications, and then allow anyone to sign-up and into those applications with no restrictions on user account.
2526

2627
## Who uses Azure AD B2C?
27-
Any business or individual who wishes to authenticate end users to their web/mobile applications using a white-label authentication solution. Apart from authentication, Azure AD B2C service is used for authorization such as access to API resources by authenticated users. Azure AD B2C is meant to be used by **IT administrators** and **developers**.
28+
Any business or individual who wishes to authenticate end users to their web/mobile applications using a white-label authentication solution. Apart from authentication, Azure AD B2C service is used for authorization such as access to API resources by authenticated users. Azure AD B2C is designed to be used by **IT administrators** and **developers**.
2829

2930
## Custom-branded identity solution
3031

3132
Azure AD B2C is a white-label authentication solution. You can customize the entire user experience with your brand so that it blends seamlessly with your web and mobile applications.
3233

33-
Customize every page displayed by Azure AD B2C when your users sign up, sign in, and modify their profile information. Customize the HTML, CSS, and JavaScript in your user journeys so that the Azure AD B2C experience looks and feels like it's a native part of your application.
34+
Customize every page displayed by Azure AD B2C when your users sign-up, sign in, and modify their profile information. Customize the HTML, CSS, and JavaScript in your user journeys so that the Azure AD B2C experience looks and feels like it's a native part of your application.
3435

3536
![Customized sign-up and sign-in pages and background image](./media/overview/sign-in-small.png)
3637

@@ -79,8 +80,8 @@ WoodGrove is an online grocery store that sells groceries to both individual con
7980

8081
WoodGrove Groceries offers several sign-in options based on the relationship their customers have with the store:
8182

82-
* **Individual** customers can sign up or sign in with individual accounts, such as with a social identity provider or an email address and password.
83-
* **Business** customers can sign up or sign in with their enterprise credentials.
83+
* **Individual** customers can sign-up or sign in with individual accounts, such as with a social identity provider or an email address and password.
84+
* **Business** customers can sign-up or sign in with their enterprise credentials.
8485
* **Partners** and suppliers are individuals who supply the grocery store with products to sell. Partner identity is provided by [Azure Active Directory B2B](../active-directory/external-identities/what-is-b2b.md).
8586

8687
![Individual (B2C), business (B2C), and partner (B2B) sign-in pages](./media/overview/woodgrove-overview.png)
@@ -91,9 +92,9 @@ When a customer selects **Sign in with your personal account**, they're redirect
9192

9293
![Custom WoodGrove sign-in page hosted by Azure AD B2C](./media/overview/sign-in.png)
9394

94-
WoodGrove allows their customers to sign up and sign in by using their Google, Facebook, or Microsoft accounts as their identity provider. Or, they can sign up by using their email address and a password to create what's called a *local account*.
95+
WoodGrove allows their customers to sign-up and sign in by using their Google, Facebook, or Microsoft accounts as their identity provider. Or, they can sign-up by using their email address and a password to create what's called a *local account*.
9596

96-
When a customer selects **Sign up with your personal account** and then **Sign up now**, they're presented with a custom sign-up page.
97+
When a customer selects **Sign-up with your personal account** and then **Sign-up now**, they're presented with a custom sign-up page.
9798

9899
![Custom WoodGrove sign-up page hosted by Azure AD B2C](./media/overview/sign-up.png)
99100

0 commit comments

Comments
 (0)