Skip to content

Commit eabc7a7

Browse files
committed
2 parents 256c562 + cde03ae commit eabc7a7

File tree

197 files changed

+1996
-1507
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

197 files changed

+1996
-1507
lines changed

articles/active-directory-b2c/external-identities-videos.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -15,6 +15,7 @@ ms.subservice: b2c
1515
---
1616

1717
# Microsoft Azure Active Directory B2C external identity video series
18+
1819
[!INCLUDE [active-directory-b2c-end-of-sale-notice-b](../../includes/active-directory-b2c-end-of-sale-notice-b.md)]
1920

2021
Learn the basics of External Identities - Azure Active Directory B2C (Azure AD B2C) and Microsoft Entra B2B in the Microsoft identity platform.

articles/active-directory-b2c/faq.yml

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,6 +14,8 @@ metadata:
1414
ms.custom: b2c-support, has-azure-ad-ps-ref,azure-ad-ref-level-one-done
1515
title: 'Azure AD B2C: Frequently asked questions (FAQ)'
1616
summary: |
17+
[!INCLUDE [active-directory-b2c-end-of-sale-notice-b](../../includes/active-directory-b2c-end-of-sale-notice-b.md)]
18+
1719
This page answers frequently asked questions about the Azure Active Directory B2C (Azure AD B2C). Keep checking back for updates.
1820
1921
sections:
@@ -22,7 +24,7 @@ sections:
2224
- question: |
2325
Azure AD B2C end of sale
2426
answer: |
25-
Effective May 1, 2025 Azure AD B2C will no longer be available to purchase for new customers, but current Azure AD B2C customers can continue using the product. The product experience, including creating new tenants or user flows, will remain unchanged. The operational commitments, including service level agreements (SLAs), security updates, and compliance, will also remain unchanged. We'll continue supporting Azure AD B2C until at least May 2030. More information, including migration plans will be made available. Contact your account representative for more information and to learn more about Microsoft Entra External ID.
27+
Effective **May 1, 2025** Azure AD B2C will no longer be available to purchase for new customers, but current Azure AD B2C customers can continue using the product. The product experience, including creating new tenants or user flows, will remain unchanged. The operational commitments, including service level agreements (SLAs), security updates, and compliance, will also remain unchanged. We'll continue supporting Azure AD B2C until at least May 2030. More information, including migration plans will be made available. Contact your account representative for more information and to learn more about Microsoft Entra External ID.
2628
- question: |
2729
What is Microsoft Entra External ID?
2830
answer: |

articles/active-directory-b2c/string-transformations.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -446,7 +446,7 @@ The following example generates an error message when an account is already in t
446446
</Localization>
447447
```
448448

449-
The claims transformation creates a response message based on the localized string. The message contains the user's email address embedded into the localized sting *ResponseMessage_EmailExists*.
449+
The claims transformation creates a response message based on the localized string. The message contains the user's email address embedded into the localized string *ResponseMessage_EmailExists*.
450450

451451
```xml
452452
<ClaimsTransformation Id="SetResponseMessageForEmailAlreadyExists" TransformationMethod="FormatLocalizedString">

articles/active-directory-b2c/tutorial-create-user-flows.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -211,8 +211,8 @@ Next, specify that the application should be treated as a public client:
211211
1. In the left menu, under **Manage**, select **Authentication**.
212212
1. Under **Advanced settings**, in the **Allow public client flows** section, set **Enable the following mobile and desktop flows** to **Yes**.
213213
1. Select **Save**.
214-
1. Ensure that **"isFallbackPublicClient": true** is set in the application manifest:
215-
1. In the left menu, under **Manage**, select **Manifest** to open application manifest.
214+
1. Ensure that **"isFallbackPublicClient": true** is set in the Microsoft Graph App Manifest(New):
215+
1. In the left menu, under **Manage**, select **Manifest** to open Microsoft Graph App Manifest(New)
216216
1. Switch from the **Microsoft Graph App Manifest (New)** tab to the **AAD Graph App Manifest (Deprecating Soon)** tab.
217217
1. Find **isFallbackPublicClient** key and ensure its value is set to **true**.
218218

articles/api-management/api-management-howto-aad-b2c.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ author: dlepow
77

88
ms.service: azure-api-management
99
ms.topic: how-to
10-
ms.date: 01/07/2025
10+
ms.date: 05/20/2025
1111
ms.author: danlep
1212
ms.custom: engagement-fy23
1313
---
@@ -16,6 +16,8 @@ ms.custom: engagement-fy23
1616

1717
[!INCLUDE [premium-dev-standard-premiumv2-standardv2-basicv2.md](../../includes/api-management-availability-premium-dev-standard-premiumv2-standardv2-basicv2.md)]
1818

19+
[!INCLUDE [active-directory-b2c-end-of-sale-notice-b](../../includes/active-directory-b2c-end-of-sale-notice-b.md)]
20+
1921
Azure Active Directory B2C is a cloud identity management solution for consumer-facing web and mobile applications. You can use it to manage access to your API Management developer portal.
2022

2123
In this tutorial, you'll learn the configuration required in your API Management service to integrate with Azure Active Directory B2C.

articles/api-management/applications.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: Protect Access to Product APIs with Microsoft Entra Application - Azure API Management
2+
title: Securely Access Products and APIs - Microsoft Entra Applications - Azure API Management
33
titleSuffix: Azure API Management
44
description: Configure OAuth 2.0 access to product APIs in Azure API Management with Microsoft Entra ID applications.
55
services: api-management
@@ -11,7 +11,7 @@ ms.date: 05/19/2025
1111
ms.author: danlep
1212
ms.custom:
1313
---
14-
# Secure product API access with Microsoft Entra applications
14+
# Securely access products and APIs with Microsoft Entra applications
1515

1616
[!INCLUDE [api-management-availability-premium-dev-standard-basic](../../includes/api-management-availability-premium-dev-standard-basic.md)]
1717

@@ -64,14 +64,14 @@ The following example uses the **Starter** product, but choose any published pro
6464
1. In the left menu, under **APIs**, select **Products**.
6565
1. Choose the product that you want to configure, such as the **Starter** product.
6666
1. In the left menu, under **Product**, select **Properties**.
67-
1. Enable the **Application based access** setting.
68-
1. Optionally, enable the **Requires subscription** setting. If you enable both application based access and a subscription requirement, the API Management gateway can accept either OAuth 2.0 authorization or a subscription key for access to the product's APIs.
67+
1. In the **Application based access** section, enable the **OAuth 2.0 token (most secure)** setting.
68+
1. Optionally, enable the **Subscription key** setting. If you enable both application based access and a subscription requirement, the API Management gateway can accept either an OAuth 2.0 token or a subscription key for access to the product's APIs.
6969
1. Select **Save**.
7070

7171
:::image type="content" source="media/applications/enable-application-based-access.png" alt-text="Screenshot of enabling application based access in the portal.":::
7272

7373
> [!TIP]
74-
> You can also enable the **Application based access** setting when creating a new product.
74+
> You can also enable the **OAuth 2.0 token** setting when creating a new product.
7575
7676
Enabling application based access creates a backend enterprise application in Microsoft Entra ID to represent the product. The backend application ID is displayed in the product's **Properties** page.
7777

articles/api-management/breaking-changes/identity-provider-adal-retirement-sep-2025.md

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -5,14 +5,16 @@ services: api-management
55
author: mikebudzynski
66
ms.service: azure-api-management
77
ms.topic: reference
8-
ms.date: 09/06/2022
8+
ms.date: 05/21/2025
99
ms.author: mibudz
1010
---
1111

1212
# ADAL-based Microsoft Entra ID or Azure AD B2C identity provider retirement (September 2025)
1313

1414
[!INCLUDE [api-management-availability-premium-dev-standard-basic-premiumv2-standardv2-basicv2](../../../includes/api-management-availability-premium-dev-standard-basic-premiumv2-standardv2-basicv2.md)]
1515

16+
[!INCLUDE [active-directory-b2c-end-of-sale-notice-b](../../../includes/active-directory-b2c-end-of-sale-notice-b.md)]
17+
1618
On 30 September, 2025 as part of our continuing work to increase the resiliency of API Management services, we're removing the support for the previous library for user authentication and authorization in the developer portal (AD Authentication Library, or ADAL). You need to migrate your Microsoft Entra ID or Azure AD B2C applications, change identity provider configuration to use the Microsoft Authentication Library (MSAL), and republish your developer portal.
1719

1820
This change will have no effect on the availability of your API Management service. However, you have to take steps described below to configure your API Management service if you wish to continue using Microsoft Entra ID or Azure AD B2C identity providers beyond 30 September, 2025.
@@ -68,4 +70,4 @@ If you have questions, get answers from community experts in [Microsoft Q&A](htt
6870

6971
## Next steps
7072

71-
See all [upcoming breaking changes and feature retirements](overview.md).
73+
See all [upcoming breaking changes and feature retirements](overview.md).

articles/api-management/howto-protect-backend-frontend-azure-ad-b2c.md

Lines changed: 6 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ author: WillEastbury
77
manager: alberts
88
ms.service: azure-api-management
99
ms.topic: how-to
10-
ms.date: 02/18/2021
10+
ms.date: 05/20/2025
1111
ms.author: wieastbu
1212
ms.custom: fasttrack-new, fasttrack-update, devx-track-js
1313
---
@@ -16,6 +16,8 @@ ms.custom: fasttrack-new, fasttrack-update, devx-track-js
1616

1717
[!INCLUDE [api-management-availability-all-tiers](../../includes/api-management-availability-all-tiers.md)]
1818

19+
[!INCLUDE [active-directory-b2c-end-of-sale-notice-b](../../includes/active-directory-b2c-end-of-sale-notice-b.md)]
20+
1921
This scenario shows you how to configure your Azure API Management instance to protect an API.
2022
We'll use the Azure AD B2C SPA (Auth Code + PKCE) flow to acquire a token, alongside API Management to secure an Azure Functions backend using EasyAuth.
2123

@@ -36,7 +38,7 @@ For defense in depth, we then use EasyAuth to validate the token again inside th
3638
> * Import of an Azure Functions API into Azure API Management
3739
> * Securing the API in Azure API Management
3840
> * Calling the Azure Active Directory B2C Authorization Endpoints via the Microsoft identity platform Libraries (MSAL.js)
39-
> * Storing a HTML / Vanilla JS Single Page Application and serving it from an Azure Blob Storage Endpoint
41+
> * Storing an HTML / Vanilla JS Single Page Application and serving it from an Azure Blob Storage Endpoint
4042
4143
## Prerequisites
4244

@@ -70,7 +72,7 @@ Here's a quick overview of the steps:
7072
1. Test the Client Application
7173

7274
> [!TIP]
73-
> We're going to capture quite a few pieces of information and keys etc as we walk this document, you might find it handy to have a text editor open to store the following items of configuration temporarily.
75+
> We're going to capture quite a few pieces of information and keys etc. as we walk this document, you might find it handy to have a text editor open to store the following items of configuration temporarily.
7476
>
7577
> B2C BACKEND CLIENT ID:
7678
> B2C BACKEND CLIENT SECRET KEY:
@@ -174,7 +176,7 @@ Open the Azure AD B2C blade in the portal and do the following steps.
174176
1. Switch back to the Code + Test tab, click 'Get Function URL', then copy the URL that appears and save it for later.
175177

176178
> [!NOTE]
177-
> The bindings you just created simply tell Functions to respond on anonymous http GET requests to the URL you just copied (`https://yourfunctionappname.azurewebsites.net/api/hello?code=secretkey`). Now we have a scalable serverless https API, that is capable of returning a very simple payload.
179+
> The bindings you just created simply tell Functions to respond on anonymous http GET requests to the URL you just copied (`https://yourfunctionappname.azurewebsites.net/api/hello?code=secretkey`). Now we have a scalable serverless https API that is capable of returning a very simple payload.
178180
>
179181
> You can now test calling this API from a web browser using your version of the URL above that you just copied and saved. You can also remove the query string parameters "?code=secretkey" portion of the URL , and test again, to prove that Azure Functions will return a 401 error.
180182
42.4 KB
Loading
9.03 KB
Loading

0 commit comments

Comments
 (0)