Skip to content

Commit eafef19

Browse files
author
gitName
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into apimrel
2 parents deed022 + 1fa5204 commit eafef19

File tree

3,154 files changed

+16811
-61187
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

3,154 files changed

+16811
-61187
lines changed

.openpublishing.publish.config.json

Lines changed: 12 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -620,6 +620,12 @@
620620
"branch": "main",
621621
"branch_mapping": {}
622622
},
623+
{
624+
"path_to_root": "app-service-agentic-semantic-kernel-ai-foundry-agent",
625+
"url": "https://github.com/Azure-Samples/app-service-agentic-semantic-kernel-ai-foundry-agent",
626+
"branch": "main",
627+
"branch_mapping": {}
628+
},
623629
{
624630
"path_to_root": "playwright-testing-service",
625631
"url": "https://github.com/microsoft/playwright-testing-service",
@@ -751,6 +757,12 @@
751757
"url": "https://github.com/AzureADQuickStarts/WebApp-OpenIdConnect-DotNet",
752758
"branch": "GuidedSetup",
753759
"branch_mapping": {}
760+
},
761+
{
762+
"path_to_root": "azure-policy-autogen-docs",
763+
"url": "https://github.com/MicrosoftDocs/azure-policy-autogen-docs",
764+
"branch": "main",
765+
"branch_mapping": {}
754766
}
755767
],
756768
"branch_target_mapping": {

articles/active-directory-b2c/add-password-reset-policy.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -157,7 +157,7 @@ A claims transformation technical profile accesses the `isForgotPassword` claim.
157157

158158
The **SelfAsserted-LocalAccountSignin-Email** technical profile **setting.forgotPasswordLinkOverride** defines the password reset claims exchange that executes in your user journey.
159159

160-
The **LocalAccountWritePasswordUsingObjectId** technical profile **UseTechnicalProfileForSessionManagement** `SM-AAD` session manager is required for the user to preform subsequent logins successfully under [SSO](./custom-policy-reference-sso.md) conditions.
160+
The **LocalAccountWritePasswordUsingObjectId** technical profile **UseTechnicalProfileForSessionManagement** `SM-AAD` session manager is required for the user to perform subsequent logins successfully under [SSO](./custom-policy-reference-sso.md) conditions.
161161

162162
### Add the password reset sub journey
163163

78.3 KB
Loading

articles/active-directory-b2c/partner-cloudflare.md

Lines changed: 10 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ manager: martinco
77
ms.reviewer: kengaderdus
88
ms.service: azure-active-directory
99
ms.topic: how-to
10-
ms.date: 01/26/2024
10+
ms.date: 06/30/2025
1111
ms.author: gasinh
1212
ms.subservice: b2c
1313

@@ -21,20 +21,19 @@ In this article, you can learn how to configure the [Cloudflare Web Application
2121

2222
## Prerequisites
2323

24-
To get started, you'll need:
24+
To get started, you need:
2525

26-
- An Azure subscription
27-
- If you don't have one, you can get an [Azure free account](https://azure.microsoft.com/free/)
28-
- [An Azure AD B2C tenant](tutorial-create-tenant.md) linked to your Azure subscription
29-
- A [Cloudflare](https://dash.cloudflare.com/sign-up) account
26+
- An Azure subscription. If you don't have one, you can get an [Azure free account](https://azure.microsoft.com/free/).
27+
- [An Azure AD B2C tenant](tutorial-create-tenant.md) linked to your Azure subscription.
28+
- A [Cloudflare](https://dash.cloudflare.com/sign-up) account.
3029

3130
## Scenario description
3231

3332
Cloudflare WAF integration includes the following components:
3433

35-
- **Azure AD B2C tenant** – The authorization server that verifies user credentials using the custom policies defined in the tenant. It's known as the identity provider
34+
- **Azure AD B2C tenant** – The authorization server that verifies user credentials using the custom policies defined in the tenant, known as the identity provider.
3635
- [**Azure Front Door**](../frontdoor/front-door-overview.md) – Enables custom domains for Azure B2C tenant. Traffic from Cloudflare WAF is routed to Azure Front Door before arriving at Azure AD B2C tenant.
37-
- **Cloudflare** – The web application firewall that manages traffic sent to the authorization server
36+
- **Cloudflare** – The web application firewall that manages traffic sent to the authorization server.
3837

3938
## Integrate with Azure AD B2C
4039

@@ -58,6 +57,9 @@ The settings appear in the following image.
5857

5958
![Screenshot of proxied status.](./media/partner-cloudflare/select-proxied.png)
6059

60+
> [!NOTE]
61+
> Azure Front Door-managed certificates aren't automatically renewed if your custom domain’s CNAME record points to a DNS record other than the Azure Front Door endpoint’s domain (for example, when using a third-party DNS service like Cloudflare). To renew the certificate in such cases, follow the instructions in the [Renew Azure Front Door-managed certificates](../frontdoor/domain.md#renew-azure-front-door-managed-certificates) article.
62+
6163
### Configure the Web Application Firewall
6264

6365
Go to your Cloudflare settings, and use the Cloudflare content to [configure the WAF](https://www.cloudflare.com/application-services/products/waf/) and learn about other security tools.

articles/active-directory-b2c/partner-nok-nok.md

Lines changed: 22 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -40,7 +40,7 @@ To enable passkey authentication for your users, enable Nok Nok as an identity p
4040

4141
The following diagram illustrates the Nok Nok solution as an IdP for Azure AD B2C by using OpenID Connect (OIDC) for passkey authentication.
4242

43-
![Diagram of Nok Nok as IdP for Azure AD B2C using OpenID Connect (OIDC) for passkey authentication.](./media/partner-nok-nok/nok-nok-architecture-diagram.png)
43+
![Diagram for passkey authentication with Nok Nok as an IdP.](./media/partner-nok-nok/nok-nok-architecture-diagram.png)
4444

4545
### Scenario 1: Passkey registration
4646
1. The user navigates to the Nok Nok tutorial web app using the link provided by Nok Nok.
@@ -52,9 +52,11 @@ The following diagram illustrates the Nok Nok solution as an IdP for Azure AD B2
5252
### Scenario 2: Passkey authentication
5353
1. The user selects the sign-in with Nok Nok Cloud button on the Azure AD B2C sign-in page.
5454
2. Azure AD B2C redirects the user to the Nok Nok sign-in app.
55-
3. The user authenticates with their passkey.
56-
4. The Nok Nok server validates the passkey assertion and sends an OIDC authentication response to Azure AD B2C.
57-
5. Based on the authentication result, Azure AD B2C either grants or denies access to the target application.
55+
3. The user requests passkey authentication
56+
4. The user authenticates with their passkey.
57+
5. The Nok Nok Cloud validates the passkey assertion
58+
6. The Nok Nok Cloud sends an OIDC authentication response to Azure AD B2C.
59+
7. Based on the authentication result, Azure AD B2C either grants or denies access to the target application.
5860

5961
## Get started with Nok Nok
6062

@@ -125,6 +127,22 @@ For the following instructions, Nok Nok is a new OIDC IdP in the B2C identity pr
125127

126128
If the flow is incomplete, confirm the user is or isn't saved in the directory.
127129

130+
## Alternate flow for Authentication
131+
132+
The following diagram illustrates an alternate passkey sign in or sign up flow using the ID Token Hint feature of Azure AD B2C. With this approach, an Azure custom policy verifies the ID Token Hint produced by the Nok Nok Cloud. For more details, please refer to the article, [Define an ID token hint technical profile in an Azure Active Directory B2C custom policy](./id-token-hint.md). Please contact Nok Nok support for help with integrated the required Azure custom policy.
133+
134+
![Diagram for passkey authentication using ID Token Hint from Nok Nok.](./media/partner-nok-nok/nok-nok-id-token-hint-architecture-diagram.png)
135+
136+
The following are the steps
137+
1. The user selects the sign-in with Nok Nok Cloud button.
138+
2. The Nok Nok Cloud request passkey authentication.
139+
3. The user authenticates with their passkey.
140+
4. The Nok Nok Cloud validates the passkey assertion.
141+
5. The ID Token Hint is returned.
142+
6. The App posts an OIDC request with the ID Token Hint to Azure AD B2C.
143+
7. Azure AD B2C Custom Policy verifies the ID Token Hint.
144+
8. Based on the authentication result, Azure AD B2C either grants or denies access to the target application.
145+
128146
## Next steps
129147

130148
* [Azure AD B2C custom policy overview](./custom-policy-overview.md)

articles/active-directory-b2c/whats-new-docs.md

Lines changed: 10 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: "What's new in Azure Active Directory business-to-customer (B2C)"
33
description: "New and updated documentation for the Azure Active Directory business-to-customer (B2C)."
4-
ms.date: 04/01/2025
4+
ms.date: 07/03/2025
55
ms.service: azure-active-directory
66
ms.subservice: b2c
77
ms.topic: whats-new
@@ -18,6 +18,15 @@ manager: CelesteDG
1818

1919
Welcome to what's new in Azure Active Directory B2C documentation. This article lists new and significantly updated docs from the past three months. To learn what's new with the B2C service, see [What's new in Microsoft Entra ID](../active-directory/fundamentals/whats-new.md), [Azure AD B2C developer release notes](custom-policy-developer-notes.md) and [What's new in Microsoft Entra External ID](/entra/external-id/whats-new-docs).
2020

21+
## June 2025
22+
23+
### Updated articles
24+
25+
- [Configure Cloudflare Web Application Firewall with Azure Active Directory B2C](partner-cloudflare.md) - Added a note about Azure Front Door-managed certificates
26+
- [Azure AD B2C: Frequently asked questions (FAQ)](faq.yml) - Updated the note in the Azure AD B2C end-of-sale section
27+
- [Page layout versions](page-layout.md) - Added updates related to CAPTCHA
28+
- [Securing phone-based multifactor authentication](phone-based-mfa.md) - Added information on preventing fraudulent sign-ups
29+
2130
## April 2025
2231

2332
### Updated articles
@@ -32,12 +41,3 @@ This month, we added an important note to our articles stating that starting May
3241
### Updated articles
3342
- [Error codes: Azure Active Directory B2C](error-codes.md) - Updated error messages
3443

35-
## February 2025
36-
37-
### Updated articles
38-
39-
- [Enable multifactor authentication in Azure Active Directory B2C](multi-factor-authentication.md) - Added SMS pricing
40-
- [Page layout versions](page-layout.md) - Updated the latest versions of the self-asserted and MFA pages
41-
- [Azure AD B2C: Frequently asked questions (FAQ)](faq.yml) - Added billing name change for SMS phone
42-
- [Enable CAPTCHA in Azure Active Directory B2C](add-captcha.md) - Added CAPTCHA feature flag
43-

articles/api-center/includes/api-center-portal-app-registration.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -35,7 +35,7 @@ If you want to create the app registration manually, follow these steps:
3535
1. Set **Name** to a meaningful name such as *api-center-portal*
3636
1. Under **Supported account types**, select **Accounts in this organizational directory (Single tenant)**.
3737
1. In **Redirect URI**, select **Single-page application (SPA)** and set the URI.
38-
Enter the URI of your API Center portal deployment, in the following form: `https://<service-name>.portal.<location>.azure-api-center.ms`. Replace `<service name>` and `<location>` with the name of your API center and the location where it's deployed, Example: `https://myapicenter.portal.eastus.azure-api-center.ms`.
38+
Enter the URI of your API Center portal deployment, in the following form: `https://<service-name>.portal.<location>.azure-apicenter.ms`. Replace `<service name>` and `<location>` with the name of your API center and the location where it's deployed, Example: `https://myapicenter.portal.eastus.azure-apicenter.ms`.
3939
1. Select **Register**.
4040

4141
#### Configure additional redirect URIs for VS Code extension
@@ -49,4 +49,4 @@ When enabling the API Center portal view in the Visual Studio Code extension for
4949
`http://localhost`<br/>
5050
`ms-appx-web://Microsoft.AAD.BrokerPlugin/<application-client-id>`<br/>
5151

52-
Replace `<application-client-id>` with the application (client) ID of this app. You can find this value on the **Overview** page of the app registration.
52+
Replace `<application-client-id>` with the application (client) ID of this app. You can find this value on the **Overview** page of the app registration.

articles/api-center/set-up-api-center-portal.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -48,7 +48,7 @@ After you create the API Center portal app registration, you need to configure a
4848
You can now access the API Center portal:
4949
* On the **Portal settings** page, select **View API Center portal** to open the portal in a new tab.
5050
* Or, enter the following URL in your browser, replacing `<service-name>` and `<location>` with the name of your API center and the location where it's deployed:<br/>
51-
`https://<service-name>.portal.<location>.azure-api-center.ms`
51+
`https://<service-name>.portal.<location>.azure-apicenter.ms`
5252

5353
### API visibility
5454

@@ -96,4 +96,4 @@ To use AI-assisted search when signed in to the API Center portal, click in the
9696

9797
## Related content
9898

99-
* [Enable and view Azure API Center portal in Visual Studio Code](enable-api-center-portal-vs-code-extension.md)
99+
* [Enable and view Azure API Center portal in Visual Studio Code](enable-api-center-portal-vs-code-extension.md)

articles/api-management/api-management-authenticate-authorize-azure-openai.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -103,7 +103,7 @@ Following are steps to configure your API Management instance to use a managed i
103103
```
104104

105105
> [!TIP]
106-
> An alternative to using the `authentication-managed-identity` and `set-header` policies shown in this example is to configure a [backend](backends.md) resource that directs API requests to the Azure OpenAI Service endpoint. In the backend configuration, enable managed identity authentication to the Azure OpenAI Service. Azure API Management automates these steps when importing an API directly from Azure OpenAI Service. For more information, see [Import API from Azure OpenAI Service](azure-openai-api-from-specification.md#option-1-import-api-from-azure-openai-service).
106+
> An alternative to using the `authentication-managed-identity` and `set-header` policies shown in this example is to configure a [backend](backends.md) resource that directs API requests to the Azure OpenAI Service endpoint. In the backend configuration, enable managed identity authentication to the Azure OpenAI Service. Azure API Management automates these steps when importing an API directly from Azure OpenAI Service. For more information, see [Import API from Azure OpenAI Service](azure-openai-api-from-specification.md#option-1-import-api-from-azure-openai).
107107

108108
## OAuth 2.0 authorization using identity provider
109109

articles/api-management/api-management-gateways-overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -81,7 +81,7 @@ The following tables compare features available in the following API Management
8181
| [Outbound virtual network integration](integrate-vnet-outbound.md) || Standard v2, Premium v2 ||| ✔️ |
8282
| [Availability zones](zone-redundancy.md) | Premium | ✔️<sup>3</sup> || ✔️<sup>1</sup> | ✔️<sup>3</sup> |
8383
| [Multi-region deployment](api-management-howto-deploy-multi-region.md) | Premium ||| ✔️<sup>1</sup> ||
84-
| [CA root certificates](api-management-howto-ca-certificates.md) for certificate validation | ✔️ | ✔️ || ✔️<sup>4</sup> ||
84+
| [CA root certificates](api-management-howto-ca-certificates.md) for certificate validation | ✔️ | || ✔️<sup>4</sup> ||
8585
| [Managed domain certificates](configure-custom-domain.md?tabs=managed#domain-certificate-options) | Developer, Basic, Standard, Premium || ✔️ |||
8686
| [TLS settings](api-management-howto-manage-protocols-ciphers.md) | ✔️ | ✔️ | ✔️ | ✔️ ||
8787
| **HTTP/2** (Client-to-gateway) | ✔️<sup>5</sup> | ✔️<sup>5</sup> || ✔️ ||

0 commit comments

Comments
 (0)