Skip to content

Commit ea41b90

Browse files
authored
Merge pull request #174091 from kengaderdus/content-freshness-on-stale-articles-b2c
[identity][AAD][B2C] Content freshness on stale b2c content
2 parents 1548a6b + cd1a748 commit ea41b90

File tree

4 files changed

+72
-55
lines changed

4 files changed

+72
-55
lines changed

articles/active-directory-b2c/overview.md

Lines changed: 19 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -8,18 +8,23 @@ manager: celestedg
88
ms.service: active-directory
99
ms.workload: identity
1010
ms.topic: overview
11-
ms.date: 09/19/2019
11+
ms.date: 10/01/2021
1212
ms.author: mimart
1313
ms.subservice: B2C
1414
---
1515

1616
# What is Azure Active Directory B2C?
1717

18-
Azure Active Directory B2C provides business-to-customer identity as a service. Your customers use their preferred social, enterprise, or local account identities to get single sign-on access to your applications and APIs.
18+
Azure Active Directory Business-to-consumer (Azure AD B2C) provides business-to-customer identity as a service. Your customers use their preferred social, enterprise, or local account identities to get single sign-on access to your applications and APIs.
1919

2020
![Infographic of Azure AD B2C identity providers and downstream applications](./media/overview/azureadb2c-overview.png)
2121

22-
Azure Active Directory B2C (Azure AD B2C) is a customer identity access management (CIAM) solution capable of supporting millions of users and billions of authentications per day. It takes care of the scaling and safety of the authentication platform, monitoring and automatically handling threats like denial-of-service, password spray, or brute force attacks.
22+
Azure AD B2C is a customer identity access management (CIAM) solution capable of supporting millions of users and billions of authentications per day. It takes care of the scaling and safety of the authentication platform, monitoring, and automatically handling threats like denial-of-service, password spray, or brute force attacks.
23+
24+
Azure AD B2C is a separate service from [Azure Active Directory (Azure AD)](../active-directory/fundamentals/active-directory-whatis.md). It is built on the same technology as Azure AD but for a different purpose - to allow businesses build customer facing application and then allow anyone to sign up into those applications with no restrictions on user account.
25+
26+
## Who uses Azure AD B2C?
27+
Any business or individual who wishes to allow anyone to sign up to their web/mobile applications.
2328

2429
## Custom-branded identity solution
2530

@@ -31,35 +36,36 @@ Customize every page displayed by Azure AD B2C when your users sign up, sign in,
3136

3237
## Single sign-on access with a user-provided identity
3338

34-
Azure AD B2C uses standards-based authentication protocols including OpenID Connect, OAuth 2.0, and SAML. It integrates with most modern applications and commercial off-the-shelf software.
39+
Azure AD B2C uses standards-based authentication protocols including OpenID Connect, OAuth 2.0, and Security Assertion Markup Language (SAML). It integrates with most modern applications and commercial off-the-shelf software.
3540

36-
![Diagram of third-party identities federating to Azure AD B2C](./media/overview/scenario-singlesignon.png)
41+
:::image type="content" source="./media/overview/scenario-singlesignon.png" alt-text="Diagram of third-party identities federating to Azure AD B2C.":::
3742

3843
By serving as the central authentication authority for your web applications, mobile apps, and APIs, Azure AD B2C enables you to build a single sign-on (SSO) solution for them all. Centralize the collection of user profile and preference information, and capture detailed analytics about sign-in behavior and sign-up conversion.
3944

4045
## Integrate with external user stores
4146

4247
Azure AD B2C provides a directory that can hold 100 custom attributes per user. However, you can also integrate with external systems. For example, use Azure AD B2C for authentication, but delegate to an external customer relationship management (CRM) or customer loyalty database as the source of truth for customer data.
4348

44-
Another external user store scenario is to have Azure AD B2C handle the authentication for your application, but integrate with an external system that stores user profile or personal data. For example, to satisfy data residency requirements like regional or on-premises data storage policies.
49+
Another external user store scenario is to have Azure AD B2C handle the authentication for your application, but integrate with an external system that stores user profile or personal data. For example, to satisfy data residency requirements like regional or on-premises data storage policies. However, Azure AD B2C service itself is worldwide via the Azure public cloud.
4550

46-
![A logical diagram of Azure AD B2C communicating with an external user store](./media/overview/scenario-remoteprofile.png)
51+
:::image type="content" source="./media/overview/scenario-remoteprofile.png" alt-text="A logical diagram of Azure AD B2C communicating with an external user store.":::
4752

48-
Azure AD B2C can facilitate collecting the information from the user during registration or profile editing, then hand that data off to the external system. Then, during future authentications, Azure AD B2C can retrieve the data from the external system and, if needed, include it as a part of the authentication token response it sends to your application.
53+
Azure AD B2C can facilitate collecting the information from the user during registration or profile editing, then hand that data off to the external system via API. Then, during future authentications, Azure AD B2C can retrieve the data from the external system and, if needed, include it as a part of the authentication token response it sends to your application.
4954

5055
## Progressive profiling
5156

5257
Another user journey option includes progressive profiling. Progressive profiling allows your customers to quickly complete their first transaction by collecting a minimal amount of information. Then, gradually collect more profile data from the customer on future sign-ins.
5358

54-
![A visual depiction of progressive profiling](./media/overview/scenario-progressive.png)
59+
:::image type="content" source="./media/overview/scenario-progressive.png" alt-text="A visual depiction of progressive profiling.":::
5560

5661
## Third-party identity verification and proofing
5762

58-
Use Azure AD B2C to facilitate identity verification and proofing by collecting user data, then passing it to a third party system to perform validation, trust scoring, and approval for user account creation.
63+
Use Azure AD B2C to facilitate identity verification and proofing by collecting user data, then passing it to a third-party system to perform validation, trust scoring, and approval for user account creation.
64+
5965

60-
![A diagram showing the user flow for third-party identity proofing](./media/overview/scenario-idproofing.png)
66+
:::image type="content" source="./media/overview/scenario-idproofing.png" alt-text="A diagram showing the user flow for third-party identity proofing.":::
6167

62-
These are just some of the things you can do with Azure AD B2C as your business-to-customer identity platform. The following sections of this overview walk you through a demo application that uses Azure AD B2C. You're also welcome to move on directly to a more in-depth [technical overview of Azure AD B2C](technical-overview.md).
68+
You have learned some of the things you can do with Azure AD B2C as your business-to-customer identity platform. The following sections of this overview walk you through a demo application that uses Azure AD B2C. You're also welcome to move on directly to a more in-depth [technical overview of Azure AD B2C](technical-overview.md).
6369

6470
## Example: WoodGrove Groceries
6571

@@ -99,7 +105,7 @@ Clicking the **Create** button causes Azure AD B2C to redirect the user back to
99105

100106
### Authenticate business customers
101107

102-
When a customer selects one of the options under **Business customers**, the WoodGrove Groceries website invokes a different Azure AD B2C policy than it does for individual customers.
108+
When a customer selects one of the options under **Business customers**, the WoodGrove Groceries website invokes a different Azure AD *B2C policy* than it does for individual customers. You learn what a *B2C policy* is in [technical overview of Azure AD B2C](technical-overview.md)
103109

104110
This policy presents the user with an option to use their corporate credentials for sign-up and sign-in. In the WoodGrove example, users are prompted to sign in with any work or school account. This policy uses a [multi-tenant Azure AD application](../active-directory/develop/howto-convert-app-to-be-multi-tenant.md) and the `/common` Azure AD endpoint to federate Azure AD B2C with any Microsoft 365 customer in the world.
105111

articles/active-directory-b2c/quickstart-web-app-dotnet.md

Lines changed: 14 additions & 25 deletions
Original file line numberDiff line numberDiff line change
@@ -9,16 +9,18 @@ manager: celestedg
99
ms.service: active-directory
1010
ms.topic: quickstart
1111
ms.custom: "devx-track-csharp, mvc"
12-
ms.date: 09/12/2019
12+
ms.date: 10/01/2021
1313
ms.author: mimart
1414
ms.subservice: B2C
1515
---
1616

1717
# Quickstart: Set up sign in for an ASP.NET application using Azure Active Directory B2C
1818

19-
Azure Active Directory B2C (Azure AD B2C) provides cloud identity management to keep your application, business, and customers protected. Azure AD B2C enables your applications to authenticate to social accounts and enterprise accounts using open standard protocols. In this quickstart, you use an ASP.NET application to sign in using a social identity provider and call an Azure AD B2C protected web API.
19+
Azure Active Directory B2C (Azure AD B2C) provides cloud identity management to keep your application, business, and customers protected. Azure AD B2C enables your applications to authenticate to social accounts and enterprise accounts using open standard protocols.
20+
21+
In this quickstart, you use an ASP.NET application to sign in using a social identity provider and call an Azure AD B2C protected web API.
22+
2023

21-
[!INCLUDE [quickstarts-free-trial-note](../../includes/quickstarts-free-trial-note.md)]
2224

2325
## Prerequisites
2426

@@ -40,21 +42,21 @@ Azure Active Directory B2C (Azure AD B2C) provides cloud identity management to
4042
1. In the sample application project folder, open the **B2C-WebAPI-DotNet.sln** solution in Visual Studio.
4143
2. For this quickstart, you run both the **TaskWebApp** and **TaskService** projects at the same time. Right-click the **B2C-WebAPI-DotNet** solution in Solution Explorer, and then select **Set StartUp Projects**.
4244
3. Select **Multiple startup projects** and change the **Action** for both projects to **Start**.
43-
4. Click **OK**.
45+
4. Select **OK**.
4446
5. Press **F5** to debug both applications. Each application opens in its own browser tab:
4547
4648
- `https://localhost:44316/` - The ASP.NET web application. You interact directly with this application in the quickstart.
4749
- `https://localhost:44332/` - The web API that's called by the ASP.NET web application.
4850
4951
## Sign in using your account
5052
51-
1. Click **Sign up / Sign in** in the ASP.NET web application to start the workflow.
53+
1. Select **Sign up / Sign in** in the ASP.NET web application to start the workflow.
5254
5355
![Sample ASP.NET web app in browser with sign up/sign link highlighted](./media/quickstart-web-app-dotnet/web-app-sign-in.png)
5456
5557
The sample supports several sign-up options including using a social identity provider or creating a local account using an email address. For this quickstart, use a social identity provider account from either Facebook, Google, or Microsoft.
5658
57-
2. Azure AD B2C presents a sign-in page for a fictitious company called Fabrikam for the sample web application. To sign up using a social identity provider, click the button of the identity provider you want to use.
59+
2. Azure AD B2C presents a sign-in page for a fictitious company called Fabrikam for the sample web application. To sign up using a social identity provider, select the button of the identity provider you want to use.
5860
5961
![Sign In or Sign Up page showing identity provider buttons](./media/quickstart-web-app-dotnet/sign-in-or-sign-up-web.png)
6062
@@ -66,40 +68,27 @@ Azure Active Directory B2C (Azure AD B2C) provides cloud identity management to
6668
6769
Azure Active Directory B2C provides functionality to allow users to update their profiles. The sample web app uses an Azure AD B2C edit profile user flow for the workflow.
6870
69-
1. In the application menu bar, click your profile name and select **Edit profile** to edit the profile you created.
71+
1. In the application menu bar, select your profile name, and then select **Edit profile** to edit the profile you created.
7072
7173
![Sample web app in browser with Edit profile link highlighted](./media/quickstart-web-app-dotnet/edit-profile-web.png)
7274
73-
2. Change your **Display name** or **City**, and then click **Continue** to update your profile.
75+
2. Change your **Display name** or **City**, and then select **Continue** to update your profile.
7476
75-
The changed is displayed in the upper right portion of the web application's home page.
77+
The change is displayed in the upper right portion of the web application's home page.
7678
7779
## Access a protected API resource
7880
79-
1. Click **To-Do List** to enter and modify your to-do list items.
81+
1. Select **To-Do List** to enter and modify your to-do list items.
8082
81-
2. Enter text in the **New Item** text box. Click **Add** to call the Azure AD B2C protected web API that adds a to-do list item.
83+
2. In the **New Item** text box, enter text. To call the Azure AD B2C protected web API that adds a to-do list item, select **Add**.
8284
8385
![Sample web app in browser with Add a to-do list item](./media/quickstart-web-app-dotnet/add-todo-item-web.png)
8486
8587
The ASP.NET web application includes an Azure AD access token in the request to the protected web API resource to perform operations on the user's to-do list items.
8688
8789
You've successfully used your Azure AD B2C user account to make an authorized call an Azure AD B2C protected web API.
8890
89-
## Clean up resources
90-
91-
You can use your Azure AD B2C tenant if you plan to try other Azure AD B2C quickstarts or tutorials. When no longer needed, you can [delete your Azure AD B2C tenant](faq.yml#how-do-i-delete-my-azure-ad-b2c-tenant-).
9291
9392
## Next steps
9493
95-
In this quickstart, you used a sample ASP.NET application to:
96-
97-
* Sign in with a custom login page
98-
* Sign in with a social identity provider
99-
* Create an Azure AD B2C account
100-
* Call a web API protected by Azure AD B2C
101-
102-
Get started creating your own Azure AD B2C tenant.
103-
104-
> [!div class="nextstepaction"]
105-
> [Create an Azure Active Directory B2C tenant in the Azure portal](tutorial-create-tenant.md)
94+
[Create an Azure Active Directory B2C tenant in the Azure portal](tutorial-create-tenant.md)

0 commit comments

Comments
 (0)