Skip to content

Commit e9456c1

Browse files
committed
Merging changes synced from https://github.com/MicrosoftDocs/azure-docs-pr (branch live)
2 parents 5736854 + 6e9489f commit e9456c1

File tree

180 files changed

+1338
-732
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

180 files changed

+1338
-732
lines changed

.openpublishing.redirection.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -415,6 +415,11 @@
415415
"redirect_url": "/azure/static-web-apps/configuration",
416416
"redirect_document_id": true
417417
},
418+
{
419+
"source_path": "articles/static-web-apps/publish-devops.md",
420+
"redirect_url": "/azure/static-web-apps/get-started-portal?pivots=azure-devops",
421+
"redirect_document_id": true
422+
},
418423
{
419424
"source_path": "articles/static-web-apps/github-actions-workflow.md",
420425
"redirect_url": "/azure/static-web-apps/build-configuration",

articles/active-directory-b2c/partner-xid.md

Lines changed: 69 additions & 25 deletions
Original file line numberDiff line numberDiff line change
@@ -8,14 +8,14 @@ manager: martinco
88
ms.service: active-directory
99
ms.workload: identity
1010
ms.topic: how-to
11-
ms.date: 03/18/2022
11+
ms.date: 04/27/2022
1212
ms.author: gasinh
1313
ms.subservice: B2C
1414
---
1515

1616
# Configure xID with Azure Active Directory B2C for passwordless authentication
1717

18-
In this sample tutorial, learn how to integrate Azure Active Directory B2C (Azure AD B2C) authentication with the xID digital ID solution. The xID app provides users with passwordless, secure, multifactor authentication. xID-authenticated users obtain their identities verified by a My Number Card, the digital ID card issued by the Japanese government. Organizations can get users verified Personal Identification Information (customer content) through the xID API. Furthermore, the xID app generates a private key in a secure area within users mobile device, which can be used as a digital signing device.
18+
In this sample tutorial, learn how to integrate Azure Active Directory B2C (Azure AD B2C) authentication with the xID digital ID solution. The xID app provides users with passwordless, secure, multifactor authentication. xID-authenticated users obtain their identities verified by a My Number Card, the digital ID card issued by the Japanese government. Organizations can get users verified Personal Identification Information (customer content) through the xID API. Furthermore, the xID app generates a private key in a secure area within user's mobile device, which can be used as a digital signing device.
1919

2020

2121
## Prerequisites
@@ -43,23 +43,23 @@ The following architecture diagram shows the implementation.
4343

4444
| Step | Description |
4545
|:--------|:--------|
46-
| 1. |User opens Azure AD B2C's sign in page, and then signs in or signs up by entering their username. |
47-
| 2. |Azure AD B2C redirects the user to xID authorize API endpoint using an OpenID Connect (OIDC) request. An OIDC endpoint is available containing information about the endpoints. xID Identity provider (IdP) redirects the user to the xID authorization sign in page, allows the user to fill in or select their email address. |
48-
| 3. |xID IdP sends the push notification to the users mobile device. |
49-
| 4. |The user opens the xID app and checks the request, then enters the PIN or authenticates with their biometrics. If PIN or biometrics is successfully verified, xID app activates the private key and creates an electronic signature. |
46+
| 1. |User opens Azure AD B2C's sign-in page and then signs in or signs up by entering their username. |
47+
| 2. |Azure AD B2C redirects the user to xID authorize API endpoint using an OpenID Connect (OIDC) request. An OIDC endpoint is available containing information about the endpoints. xID Identity provider (IdP) redirects the user to the xID authorization sign-in page allowing the user to fill in or select their email address. |
48+
| 3. |xID IdP sends the push notification to the user's mobile device. |
49+
| 4. |The user opens the xID app, checks the request, then enters the PIN or authenticates with their biometrics. If PIN or biometrics is successfully verified, xID app activates the private key and creates an electronic signature. |
5050
| 5. |xID app sends the signature to xID IdP for verification. |
51-
| 6. |xID IdP shows consent screen to the user, requesting authorization to give their personal information to the service they're signing in. |
51+
| 6. |xID IdP shows a consent screen to the user, requesting authorization to give their personal information to the service they're signing in. |
5252
| 7. |xID IdP returns the OAuth authorization code to Azure AD B2C. |
53-
| 8. |Using the authorization code, Azure AD B2C sends a token request. |
54-
| 9. |xID IdP checks the token request, and if still valid, returns the OAuth access token and the ID token containing the requested users identifier and email address. |
53+
| 8. | Azure AD B2C sends a token request using the authorization code. |
54+
| 9. |xID IdP checks the token request and, if still valid, returns the OAuth access token and the ID token containing the requested user's identifier and email address. |
5555
| 10. |In addition, if the user's customer content is needed, Azure AD B2C calls the xID userdata API. |
56-
| 11. |The xID userdata API returns the users encrypted customer content. User can decrypt it with their private key, which they create when they request the xID client information. |
56+
| 11. |The xID userdata API returns the user's encrypted customer content. Users can decrypt it with their private key, which they create when requesting the xID client information. |
5757
| 12. | User is either granted or denied access to the customer application based on the verification results. |
5858

5959

6060
## Onboard with xID
6161

62-
Request for API documents by filling out [the form](https://xid.inc/contact-us). In the message field, indicate that you would like to onboard with Azure AD B2C. The xID sales representatives will contact you. Follow the instructions provided in the xID API document and request a xID API client. xID tech team will send client information to you in 3-4 working days.
62+
Request API documents by filling out [the request form](https://xid.inc/contact-us). In the message field, indicate that you'd like to onboard with Azure AD B2C. Then, an xID sales representative will contact you. Follow the instructions provided in the xID API document and request an xID API client. xID tech team will send client information to you in 3-4 working days.
6363

6464
## Step 1: Create a xID policy key
6565

@@ -94,7 +94,7 @@ Store the client secret that you received from xID in your Azure AD B2C tenant.
9494
9595
## Step 2: Configure xID as an Identity provider
9696

97-
To enable users to sign in using xID, you need to define xID as a claims provider that Azure AD B2C can communicate with through an endpoint. The endpoint provides a set of claims that are used by Azure AD B2C to verify that a specific user has authenticated using digital identity available on their device, proving the users identity.
97+
To enable users to sign in using xID, you need to define xID as a claims provider that Azure AD B2C can communicate with through an endpoint. The endpoint provides a set of claims Azure AD B2C uses to verify that a specific user has authenticated using digital identity available on their device. Proving the user's identity.
9898

9999
Use the following steps to add xID as a claims provider:
100100

@@ -167,7 +167,7 @@ Use the following steps to add xID as a claims provider:
167167
<Item Key="UseClaimAsBearerToken">identityProviderAccessToken</Item>
168168
<!-- <Item Key="AllowInsecureAuthInProduction">true</Item> -->
169169
<Item Key="DebugMode">true</Item>
170-
<Item Key="DefaultUserMessageIfRequestFailed">Cannot process your request right now, please try again later.</Item>
170+
<Item Key="DefaultUserMessageIfRequestFailed">Can't process your request right now, please try again later.</Item>
171171
</Metadata>
172172
<InputClaims>
173173
<!-- Claims sent to your REST API -->
@@ -203,7 +203,7 @@ Use the following steps to add xID as a claims provider:
203203

204204
## Step 3: Add a user journey
205205

206-
At this point, you've set up the identity provider, but it's not yet available in any of the sign in pages. If you've your own custom user journey continue to [step 4](#step-4-add-the-identity-provider-to-a-user-journey), otherwise, create a duplicate of an existing template user journey as follows:
206+
At this point, you've set up the identity provider, but it's not yet available on any of the sign-in pages. If you have a custom user journey, continue to [step 4](#step-4-add-the-identity-provider-to-a-user-journey). Otherwise, create a duplicate of an existing template user journey as follows:
207207

208208
1. Open the `TrustFrameworkBase.xml` file from the starter pack.
209209

@@ -217,15 +217,15 @@ At this point, you've set up the identity provider, but it's not yet available i
217217

218218
## Step 4: Add the identity provider to a user journey
219219

220-
Now that you have a user journey, add the new identity provider to the user journey.
220+
Now that you have a user journey add the new identity provider to the user journey.
221221

222-
1. Find the orchestration step element that includes Type=`CombinedSignInAndSignUp`, or Type=`ClaimsProviderSelection` in the user journey. It's usually the first orchestration step. The **ClaimsProviderSelections** element contains a list of identity providers that a user can sign in with. The order of the elements controls the order of the sign-in buttons presented to the user. Add a **ClaimsProviderSelection** XML element. Set the value of **TargetClaimsExchangeId** to a friendly name, such as `X-IDExchange`.
222+
1. Find the orchestration step element that includes Type=`CombinedSignInAndSignUp`, or Type=`ClaimsProviderSelection` in the user journey. It's usually the first orchestration step. The **ClaimsProviderSelections** element contains a list of identity providers used for signing in. The order of the elements controls the order of the sign-in buttons presented to the user. Add a **ClaimsProviderSelection** XML element. Set the value of **TargetClaimsExchangeId** to a friendly name, such as `X-IDExchange`.
223223

224-
2. In the next orchestration step, add a **ClaimsExchange** element. Set the **Id** to the value of the target claims exchange ID to link the xID button to `X-ID-SignIn` action. Update the value of **TechnicalProfileReferenceId** to the ID of the technical profile you created earlier.
224+
2. In the next orchestration step, add a **ClaimsExchange** element. Set the **Id** to the value of the target claims exchange ID to link the xID button to `X-ID-SignIn` action. Next, update the value of **TechnicalProfileReferenceId** to the ID of the technical profile you created earlier.
225225

226-
The following XML demonstrates orchestration steps of a user journey with the identity provider:
226+
The following XML demonstrates the orchestration steps of a user journey with the identity provider:
227227

228-
```xml
228+
```xml
229229

230230
<UserJourney Id="X-IDSignUpOrSignIn">
231231
<OrchestrationSteps>
@@ -299,25 +299,69 @@ Now that you have a user journey, add the new identity provider to the user jour
299299

300300
a. Select the **Directories + subscriptions** icon in the portal toolbar.
301301

302-
b. On the **Portal settings | Directories + subscriptions** page, find your Azure AD B2C directory in the **Directory name** list, and then select **Switch**.
302+
b. On the **Portal settings | Directories + subscriptions** page, find your Azure AD B2C directory in the **Directory name** list, and select **Switch**.
303303

304304
3. In the [Azure portal](https://portal.azure.com/#home), search for and select **Azure AD B2C**.
305305

306306
4. Under Policies, select **Identity Experience Framework**.
307307

308-
5. Select **Upload Custom Policy**, and then upload the files in the **LocalAccounts** starter pack in the following order: the extension policy, for example `TrustFrameworkExtensions.xml`, then the relying party policy, such as `SignUpSignIn.xml`.
308+
5. Select **Upload Custom Policy**, and then upload the files in the **LocalAccounts** starter pack in the following order: the extension policy, for example, `TrustFrameworkExtensions.xml`, then the relying party policy, such as `SignUpSignIn.xml`.
309+
310+
## Step 6: Configure the relying party policy
311+
312+
The relying party policy, for example [SignUpSignIn.xml](https://github.com/Azure-Samples/active-directory-b2c-custom-policy-starterpack/blob/main/LocalAccounts/SignUpOrSignin.xml), specifies the user journey which Azure AD B2C will execute. First, find the **DefaultUserJourney** element within the relying party. Then, update the **ReferenceId** to match the user journey ID you added to the identity provider.
313+
314+
In the following example, for the `X-IDSignUpOrSignIn` user journey, the **ReferenceId** is set to `X-IDSignUpOrSignIn`:
315+
316+
```xml
317+
<RelyingParty>
318+
<DefaultUserJourney ReferenceId="X-IDSignUpOrSignIn" />
319+
<TechnicalProfile Id="PolicyProfile">
320+
<DisplayName>PolicyProfile</DisplayName>
321+
<Protocol Name="OpenIdConnect" />
322+
<OutputClaims>
323+
<OutputClaim ClaimTypeReferenceId="objectId" PartnerClaimType="sub" />
324+
<OutputClaim ClaimTypeReferenceId="tenantId" AlwaysUseDefaultValue="true" DefaultValue="{Policy:TenantObjectId}" />
325+
<OutputClaim ClaimTypeReferenceId="correlationId" DefaultValue="{Context:CorrelationId}" />
326+
<OutputClaim ClaimTypeReferenceId="issuerUserId" />
327+
<OutputClaim ClaimTypeReferenceId="givenName" PartnerClaimType="first_name" />
328+
<OutputClaim ClaimTypeReferenceId="surName" PartnerClaimType="last_name" />
329+
<OutputClaim ClaimTypeReferenceId="previous_name" />
330+
<OutputClaim ClaimTypeReferenceId="year" />
331+
<OutputClaim ClaimTypeReferenceId="month" />
332+
<OutputClaim ClaimTypeReferenceId="date" />
333+
<OutputClaim ClaimTypeReferenceId="prefecture" />
334+
<OutputClaim ClaimTypeReferenceId="city" />
335+
<OutputClaim ClaimTypeReferenceId="address" />
336+
<OutputClaim ClaimTypeReferenceId="sub_char_common_name" />
337+
<OutputClaim ClaimTypeReferenceId="sub_char_previous_name" />
338+
<OutputClaim ClaimTypeReferenceId="sub_char_address" />
339+
<OutputClaim ClaimTypeReferenceId="gender" />
340+
<OutputClaim ClaimTypeReferenceId="verified_at" />
341+
<OutputClaim ClaimTypeReferenceId="email" />
342+
<OutputClaim ClaimTypeReferenceId="sid" />
343+
<OutputClaim ClaimTypeReferenceId="userdataid" />
344+
<OutputClaim ClaimTypeReferenceId="xid_verified" />
345+
<OutputClaim ClaimTypeReferenceId="email_verified" />
346+
</OutputClaims>
347+
<SubjectNamingInfo ClaimType="sub" />
348+
</TechnicalProfile>
349+
</RelyingParty>
350+
351+
```
352+
309353

310-
## Step 6: Test your custom policy
354+
## Step 7: Test your custom policy
311355

312-
1. In your Azure AD B2C tenant blade, and under **Policies**, select **Identity Experience Framework**.
356+
1. In your Azure AD B2C tenant, and under **Policies**, select **Identity Experience Framework**.
313357

314358
1. Under **Custom policies**, select **CustomSignUpSignIn**.
315359

316360
3. For **Application**, select the web application that you previously registered as part of this article's prerequisites. The **Reply URL** should show `https://jwt.ms`.
317361

318-
4. Select **Run now**. Your browser should be redirected to the xID sign in page.
362+
4. Select **Run now**. Your browser should redirect to the xID sign in page.
319363

320-
5. If the sign-in process is successful, your browser is redirected to `https://jwt.ms`, which displays the contents of the token returned by Azure AD B2C.
364+
5. If the sign-in process is successful, your browser redirects to `https://jwt.ms`, which displays the contents of the token returned by Azure AD B2C.
321365

322366
## Next steps
323367

articles/active-directory/authentication/concept-authentication-operator-assistance.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: conceptual
9-
ms.date: 10/21/2021
9+
ms.date: 04/27/2022
1010

1111
ms.author: justinha
1212
author: rckyplln
@@ -17,6 +17,8 @@ ms.collection: M365-identity-device-management
1717
---
1818
# How to enable and disable operator assistance
1919

20+
On September 30, 2023, we will retire operator assistance in Azure AD Multi-Factor Authentication and it will no longer be available. To avoid service disruption, follow the steps in this topic to disable operator assistance before September 30, 2023.
21+
2022
Operator assistance is a feature within Azure AD that allows an operator to manually transfer phone calls instead of automatic transfer. When this setting is enabled, the office phone number is dialed and when answered, the system asks the operator to transfer the call to a given extension.
2123

2224
Operator assistance can be enabled for an entire tenant or for an individual user. If the setting is **On**, the entire tenant is enabled for operator assistance. If you choose **Phone call** as the default method and have an extension specified as part of your office phone number (delineated by **x**), an operator can manually transfer the phone call.

articles/active-directory/conditional-access/concept-conditional-access-conditions.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: conditional-access
88
ms.topic: conceptual
9-
ms.date: 04/05/2022
9+
ms.date: 04/27/2022
1010

1111
ms.author: joflore
1212
author: MicrosoftGuyJFlo
@@ -186,17 +186,17 @@ For more information, see the following articles:
186186

187187
By selecting **Other clients**, you can specify a condition that affects apps that use basic authentication with mail protocols like IMAP, MAPI, POP, SMTP, and older Office apps that don't use modern authentication.
188188

189-
## Device state (preview)
189+
## Device state (deprecated)
190190

191-
**This preview feature is being deprecated.** Customers should use the **Filter for devices** condition in the Conditional Access policy, to satisfy scenarios previously achieved using device state (preview) condition.
191+
**This preview feature has been deprecated.** Customers should use the **Filter for devices** condition in the Conditional Access policy, to satisfy scenarios previously achieved using device state (preview) condition.
192192

193193

194194
The device state condition was used to exclude devices that are hybrid Azure AD joined and/or devices marked as compliant with a Microsoft Intune compliance policy from an organization's Conditional Access policies.
195195

196196
For example, *All users* accessing the *Microsoft Azure Management* cloud app including **All device state** excluding **Device Hybrid Azure AD joined** and **Device marked as compliant** and for *Access controls*, **Block**.
197197
- This example would create a policy that only allows access to Microsoft Azure Management from devices that are either hybrid Azure AD joined or devices marked as compliant.
198198

199-
The above scenario, can be configured using *All users* accessing the *Microsoft Azure Management* cloud app with **Filter for devices** condition in include mode using the following rule **device.trustType -ne "ServerAD" -or device.isCompliant -ne True** and for *Access controls*, **Block**.
199+
The above scenario, can be configured using *All users* accessing the *Microsoft Azure Management* cloud app with **Filter for devices** condition in **exclude** mode using the following rule **device.trustType -eq "ServerAD" -or device.isCompliant -eq True** and for *Access controls*, **Block**.
200200
- This example would create a policy that blocks access to Microsoft Azure Management cloud app from unmanaged or non-compliant devices.
201201

202202
> [!IMPORTANT]

articles/active-directory/develop/workload-identity-federation.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -51,7 +51,7 @@ The workflow for exchanging an external token for an access token is the same, h
5151
1. When the checks are satisfied, Microsoft identity platform issues an access token to the external workload.
5252
1. The external workload accesses Azure AD protected resources using the access token from Microsoft identity platform. A GitHub Actions workflow, for example, uses the access token to publish a web app to Azure App Service.
5353

54-
The Microsoft identity platform stores only the first 10 signing keys when they're downloaded from the external IdP's OIDC endpoint. If the external IdP exposes more than 10 signing keys, you may experience errors when using Workload Identity Federation.
54+
The Microsoft identity platform stores only the first 25 signing keys when they're downloaded from the external IdP's OIDC endpoint. If the external IdP exposes more than 25 signing keys, you may experience errors when using Workload Identity Federation.
5555

5656
## Next steps
5757
Learn more about how workload identity federation works:

0 commit comments

Comments
 (0)