Skip to content

Commit e5baa71

Browse files
Merge branch 'master' of https://github.com/MicrosoftDocs/azure-docs-pr into us1680669d
2 parents cb91d62 + ea6c772 commit e5baa71

File tree

418 files changed

+4239
-3995
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

418 files changed

+4239
-3995
lines changed

.openpublishing.publish.config.json

Lines changed: 26 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -152,6 +152,12 @@
152152
"branch": "master",
153153
"branch_mapping": {}
154154
},
155+
{
156+
"path_to_root": "functions-pytorch",
157+
"url": "https://github.com/Azure-Samples/functions-python-pytorch-tutorial",
158+
"branch": "master",
159+
"branch_mapping": {}
160+
},
155161
{
156162
"path_to_root": "functions-quickstart-templates",
157163
"url": "https://github.com/Azure/azure-functions-templates",
@@ -346,6 +352,26 @@
346352
"url": "https://github.com/Azure-Samples/azure-sdk-for-go-samples",
347353
"branch": "master"
348354
},
355+
{
356+
"path_to_root": "azure-sdk-for-java-event-hubs",
357+
"url": "https://github.com/Azure/azure-sdk-for-java/",
358+
"branch": "master"
359+
},
360+
{
361+
"path_to_root": "azure-sdk-for-java-script-event-hubs",
362+
"url": "https://github.com/Azure/azure-sdk-for-js/",
363+
"branch": "master"
364+
},
365+
{
366+
"path_to_root": "azure-sdk-for-net-event-hubs",
367+
"url": "https://github.com/Azure/azure-sdk-for-net/",
368+
"branch": "master"
369+
},
370+
{
371+
"path_to_root": "azure-sdk-for-python-event-hubs",
372+
"url": "https://github.com/Azure/azure-sdk-for-python/",
373+
"branch": "master"
374+
},
349375
{
350376
"path_to_root": "cosmos-dotnet-getting-started",
351377
"url": "https://github.com/Azure-Samples/cosmos-dotnet-getting-started",

.openpublishing.redirection.json

Lines changed: 22 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -801,6 +801,16 @@
801801
"redirect_url": "/azure/machine-learning",
802802
"redirect_document_id": false
803803
},
804+
{
805+
"source_path": "articles/cognitive-services/QnAMaker/Tutorials/create-publish-query-in-portal.md",
806+
"redirect_url": "/azure/cognitive-services/QnAMaker/Quickstarts/create-publish-knowledge-base",
807+
"redirect_document_id": false
808+
},
809+
{
810+
"source_path": "articles/cognitive-services/QnAMaker/Tutorials/create-qna-bot.md",
811+
"redirect_url": "/azure/cognitive-services/QnAMaker/Quickstarts/create-publish-knowledge-base#create-a-bot",
812+
"redirect_document_id": false
813+
},
804814
{
805815
"source_path": "articles/cognitive-services/QnAMaker/concepts/data-sources-supported.md",
806816
"redirect_url": "/azure/cognitive-services/QnAMaker/Quickstarts/reference-document-format-guidelines",
@@ -7277,7 +7287,7 @@
72777287
"source_path": "articles/azure-functions/functions-create-first-azure-function-azure-cli-linux.md",
72787288
"redirect_url": "/azure/azure-functions/functions-create-first-azure-function-azure-cli?pivots=programming-language-python",
72797289
"redirect_document_id": false
7280-
},
7290+
},
72817291
{
72827292
"source_path": "articles/azure-functions/functions-add-output-binding-storage-queue-python.md",
72837293
"redirect_url": "/azure/azure-functions/functions-add-output-binding-storage-queue-cli.md?pivots=programming-language-python",
@@ -13492,7 +13502,7 @@
1349213502
"source_path": "articles/event-hubs/event-hubs-authentication-and-security-model-overview.md",
1349313503
"redirect_url": "/azure/event-hubs/authenticate-shared-access-signature",
1349413504
"redirect_document_id": false
13495-
},
13505+
},
1349613506
{
1349713507
"source_path": "articles/event-hubs/event-hubs-c-ephcs-getstarted.md",
1349813508
"redirect_url": "/azure/event-hubs/event-hubs-c-getstarted-send",
@@ -26913,6 +26923,16 @@
2691326923
"redirect_url": "/azure/storage/common/storage-azure-cli",
2691426924
"redirect_document_id": true
2691526925
},
26926+
{
26927+
"source_path": "articles/storage/common/storage-azure-cli.md",
26928+
"redirect_url": "/azure/storage/blobs/storage-quickstart-blobs-cli",
26929+
"redirect_document_id": true
26930+
},
26931+
{
26932+
"source_path": "articles/storage/common/storage-azure-cli-nodejs.md",
26933+
"redirect_url": "/azure/storage/blobs/storage-quickstart-blobs-cli",
26934+
"redirect_document_id": false
26935+
},
2691626936
{
2691726937
"source_path": "articles/storage/storage-backup-and-disaster-recovery-for-azure-iaas-disks.md",
2691826938
"redirect_url": "/azure/storage/common/storage-backup-and-disaster-recovery-for-azure-iaas-disks",

articles/active-directory-b2c/TOC.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -48,6 +48,8 @@
4848
href: code-samples.md
4949
- name: Concepts
5050
items:
51+
- name: Azure AD B2C best practices
52+
href: best-practices.md
5153
- name: Application types
5254
href: application-types.md
5355
- name: Authentication protocols
Lines changed: 91 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,91 @@
1+
---
2+
title: Best practices for Azure AD B2C
3+
titleSuffix: Azure AD B2C
4+
description: Recommendations and best practices to consider when working with Azure Active Directory B2C (Azure AD B2C).
5+
services: active-directory-b2c
6+
author: vigunase
7+
manager: celestedg
8+
9+
ms.service: active-directory
10+
ms.workload: identity
11+
ms.topic: conceptual
12+
ms.date: 03/03/2020
13+
ms.author: vigunase
14+
ms.subservice: B2C
15+
---
16+
17+
# Recommendations and best practices for Azure Active Directory B2C
18+
19+
The following best practices and recommendations cover some of the primary aspects of integrating Azure Active Directory (Azure AD) B2C into existing or new application environments.
20+
21+
## Fundamentals
22+
23+
| | |
24+
|--|--|
25+
| Choose user flows for most scenarios | The Identity Experience Framework of Azure AD B2C is the core strength of the service. Policies fully describe identity experiences such as sign-up, sign-in, or profile editing. To help you set up the most common identity tasks, the Azure AD B2C portal includes predefined, configurable policies called user flows. With user flows, you can create great user experiences in minutes, with just a few clicks. [Learn when to use user flows vs. custom policies](custom-policy-overview.md#comparing-user-flows-and-custom-policies).|
26+
| App registrations | Every application (web, native) and API that is being secured must be registered in Azure AD B2C. If an app has both a web and native version of iOS and Android, you can register them as one application in Azure AD B2C with the same client ID. Learn how to [register OIDC, SAML, web, and native apps](https://docs.microsoft.com/azure/active-directory-b2c/tutorial-register-applications?tabs=applications). Learn more about [application types that can be used in Azure AD B2C](https://docs.microsoft.com/azure/active-directory-b2c/application-types). |
27+
| Move to monthly active users billing | Azure AD B2C has moved from monthly active authentications to monthly active users (MAU) billing. Most customers will find this model cost-effective. [Learn more about monthly active users billing](https://azure.microsoft.com/updates/mau-billing/). |
28+
29+
## Planning and design
30+
31+
Define your application and service architecture, inventory current systems, and plan your migration to Azure AD B2C.
32+
33+
| | |
34+
|--|--|
35+
| Architect an end-to-end solution | Include all of your applications' dependencies when planning an Azure AD B2C integration. Consider all services and products that are currently in your environment or that might need to be added to the solution, for example, Azure Functions, customer relationship management (CRM) systems, Azure API Management gateway, and storage services. Take into account the security and scalability for all services. |
36+
| Document your users' experiences | Detail all the user journeys your customers can experience in your application. Include every screen and any branching flows they might encounter when interacting with the identity and profile aspects of your application. Include usability, accessibility, and localization in your planning. |
37+
| Choose the right authentication protocol | For a breakdown of the different application scenarios and their recommended authentication flows, see [Scenarios and supported authentication flows](../active-directory/develop/authentication-flows-app-scenarios.md#scenarios-and-supported-authentication-flows). |
38+
| Pilot a proof-of-concept (POC) end-to-end user experience | Start with our [Microsoft code samples](code-samples.md) and [community samples](https://github.com/azure-ad-b2c/samples). |
39+
| Create a migration plan |Planning ahead can make migration go more smoothly. Learn more about [user migration](user-migration.md).|
40+
| Usability vs. security | Your solution must strike the right balance between application usability and your organization's acceptable level of risk. |
41+
| Move on-premises dependencies to the cloud | To help ensure a resilient solution, consider moving existing application dependencies to the cloud. |
42+
| Migrate existing apps to b2clogin.com | The deprecation of login.microsoftonline.com went into effect for all Azure AD B2C tenants on 04 December 2020. [Learn more](b2clogin.md). |
43+
44+
## Implementation
45+
46+
During the implementation phase, consider the following recommendations.
47+
48+
| | |
49+
|--|--|
50+
| Edit custom policies with the Azure AD B2C extension for Visual Studio Code | Download Visual Studio Code and this community-built [extension from the Visual Studio Code Marketplace]((https://marketplace.visualstudio.com/items?itemName=AzureADB2CTools.aadb2c)). While not an official Microsoft product, the Azure AD B2C extension for Visual Studio Code includes several features that help make working with custom policies easier. |
51+
| Learn how to troubleshoot Azure AD B2C | Learn how to [troubleshoot custom policies](https://docs.microsoft.com/azure/active-directory-b2c/troubleshoot-custom-policies?tabs=applications) during development. Learn what a normal authentication flow looks like and use tools for discovering anomalies and errors. For example, use [Application Insights](troubleshoot-with-application-insights.md) to review output logs of user journeys. |
52+
| Leverage our library of proven custom policy patterns | Find [samples](https://github.com/azure-ad-b2c/samples) for several enhanced Azure AD B2C customer identity and access management (CIAM) user journeys. |
53+
54+
55+
## Testing
56+
57+
Test and automate your Azure AD B2C implementation.
58+
59+
| | |
60+
|--|--|
61+
| Account for global traffic | Use traffic sources from different global address to test the performance and localization requirements. Make sure all the HTMLs, CSS, and dependencies can meet your performance needs. |
62+
| Functional and UI testing | Test the user flows end-to-end. Add synthetic tests every few minutes using Selenium, VS Web Test, etc. |
63+
| Pen-testing | Before going live with your solution, perform penetration testing exercises to verify all components are secure, including any third-party dependencies. Verify you've secured your APIs with access tokens and used the right authentication protocol for your application scenario. Learn more about [Penetration testing](https://docs.microsoft.com/azure/security/fundamentals/pen-testing) and the [Microsoft Cloud Unified Penetration Testing Rules of Engagement](https://www.microsoft.com/msrc/pentest-rules-of-engagement?rtc=1). |
64+
| A/B Testing | Flight your new features with a small, random set of users before rolling out to your entire population. With JavaScript enabled in Azure AD B2C, you can integrate with A/B testing tools like Optimizely, Clarity, and others. |
65+
| Load testing | Azure AD B2C can scale, but your application can scale only if all of its dependencies can scale. Load-test your APIs and CDN. |
66+
| Throttling | Azure AD B2C throttles traffic if too many requests are sent from the same source in a short period of time. Use several traffic sources while load testing, and handle the `AADB2C90229` error code gracefully in your applications. |
67+
| Automation | Use continuous integration and delivery (CI/CD) pipelines to automate testing and deployments, for example, [Azure DevOps](deploy-custom-policies-devops.md). |
68+
69+
## Operations
70+
71+
Manage your Azure AD B2C environment.
72+
73+
| | |
74+
|--|--|
75+
| Create multiple environments | For easier operations and deployment roll-out, create separate environments for development, testing, pre-production, and production. Create Azure AD B2C tenants for each. |
76+
| Use version control for your custom policies | Consider using GitHub, Azure Repos, or another cloud-based version control system for your Azure AD B2C custom policies. |
77+
| Use the Microsoft Graph API to automate the management of your B2C tenants | Microsoft Graph APIs:<br/>Manage [Identity Experience Framework](https://docs.microsoft.com/graph/api/resources/trustframeworkpolicy?view=graph-rest-beta) (custom policies)<br/>[Keys](https://docs.microsoft.com/graph/api/resources/trustframeworkkeyset?view=graph-rest-beta)<br/>[User Flows](https://docs.microsoft.com/graph/api/resources/identityuserflow?view=graph-rest-beta) |
78+
| Integrate with Azure DevOps | A [CI/CD pipeline](deploy-custom-policies-devops.md) makes moving code between different environments easy and ensures production readiness at all times. |
79+
| Integrate with Azure Monitor | [Audit log events](view-audit-logs.md) are only retained for seven days. [Integrate with Azure Monitor](azure-monitor.md) to retain the logs for long-term use, or integrate with third-party security information and event management (SIEM) tools to gain insights into your environment. |
80+
| Setup active alerting and monitoring | [Track user behavior](active-directory-b2c-custom-guide-eventlogger-appins.md) in Azure AD B2C using Application Insights. |
81+
82+
83+
## Support and Status Updates
84+
85+
Stay up to date with the state of the service and find support options.
86+
87+
| | |
88+
|--|--|
89+
| [Service updates](https://azure.microsoft.com/updates/?product=active-directory-b2c) | Stay up to date with Azure AD B2C product updates and announcements. |
90+
| [Microsoft Support](support-options.md) | File a support request for Azure AD B2C technical issues. Billing and subscription management support is provided at no cost. |
91+
| [Azure status](https://status.azure.com/status) | View the current health status of all Azure services. |

articles/active-directory-domain-services/faqs.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -87,7 +87,7 @@ No. After you create an Azure AD Domain Services managed domain, you can't then
8787
No. You don't have permissions to connect to domain controllers for the managed domain using Remote Desktop. Members of the *AAD DC Administrators* group can administer the managed domain using AD administration tools such as the Active Directory Administration Center (ADAC) or AD PowerShell. These tools are installed using the *Remote Server Administration Tools* feature on a Windows server joined to the managed domain. For more information, see [Create a management VM to configure and administer an Azure AD Domain Services managed domain](tutorial-create-management-vm.md).
8888

8989
### I've enabled Azure AD Domain Services. What user account do I use to domain join machines to this domain?
90-
Members of the administrative group *AAD DC Administrators* can domain-join machines. Additionally, members of this group are granted remote desktop access to machines that have been joined to the domain.
90+
Any user account that's part of the Azure AD DS managed domain can join a VM. Members of the *AAD DC Administrators* group are granted remote desktop access to machines that have been joined to the managed domain.
9191

9292
### Do I have domain administrator privileges for the managed domain provided by Azure AD Domain Services?
9393
No. You aren't granted administrative privileges on the managed domain. *Domain Administrator* and *Enterprise Administrator* privileges aren't available for you to use within the domain. Members of the domain administrator or enterprise administrator groups in your on-premises Active Directory are also not granted domain / enterprise administrator privileges on the managed domain.

articles/active-directory-domain-services/join-centos-linux-vm.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -30,7 +30,7 @@ To complete this tutorial, you need the following resources and privileges:
3030
* If needed, [create an Azure Active Directory tenant][create-azure-ad-tenant] or [associate an Azure subscription with your account][associate-azure-ad-tenant].
3131
* An Azure Active Directory Domain Services managed domain enabled and configured in your Azure AD tenant.
3232
* If needed, the first tutorial [creates and configures an Azure Active Directory Domain Services instance][create-azure-ad-ds-instance].
33-
* A user account that's a member of the *Azure AD DC administrators* group in your Azure AD tenant.
33+
* A user account that's part of the Azure AD DS managed domain.
3434

3535
## Create and connect to a CentOS Linux VM
3636

@@ -94,15 +94,15 @@ Now that the required packages are installed on the VM, join the VM to the Azure
9494
* Check that the VM is deployed to the same, or a peered, virtual network in which the Azure AD DS managed domain is available.
9595
* Confirm that the DNS server settings for the virtual network have been updated to point to the domain controllers of the Azure AD DS managed domain.
9696

97-
1. Now initialize Kerberos using the `kinit` command. Specify a user that belongs to the *AAD DC Administrators* group. If needed, [add a user account to a group in Azure AD](../active-directory/fundamentals/active-directory-groups-members-azure-portal.md).
97+
1. Now initialize Kerberos using the `kinit` command. Specify a user that's a part of the Azure AD DS managed domain. If needed, [add a user account to a group in Azure AD](../active-directory/fundamentals/active-directory-groups-members-azure-portal.md).
9898

99-
Again, the Azure AD DS managed domain name must be entered in ALL UPPERCASE. In the following example, the account named `[email protected]` is used to initialize Kerberos. Enter your own user account that's a member of the *AAD DC Administrators* group:
99+
Again, the Azure AD DS managed domain name must be entered in ALL UPPERCASE. In the following example, the account named `[email protected]` is used to initialize Kerberos. Enter your own user account that's a part of the Azure AD DS managed domain:
100100

101101
```console
102102
103103
```
104104

105-
1. Finally, join the machine to the Azure AD DS managed domain using the `realm join` command. Use the same user account that's a member of the *AAD DC Administrators* group that you specified in the previous `kinit` command, such as `[email protected]`:
105+
1. Finally, join the machine to the Azure AD DS managed domain using the `realm join` command. Use the same user account that's a part of the Azure AD DS managed domain that you specified in the previous `kinit` command, such as `[email protected]`:
106106

107107
```console
108108
sudo realm join --verbose AADDSCONTOSO.COM -U '[email protected]'

0 commit comments

Comments
 (0)