Skip to content

Commit eb43e51

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into overview-get-started-data-sources-visualizations-renderers
2 parents 9a92248 + 989f950 commit eb43e51

File tree

1,322 files changed

+9380
-6624
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

1,322 files changed

+9380
-6624
lines changed

articles/active-directory-b2c/display-control-time-based-one-time-password.md

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: CelesteDG
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: reference
12-
ms.date: 12/09/2021
12+
ms.date: 07/20/2022
1313
ms.author: kengaderdus
1414
ms.subservice: B2C
1515
---
@@ -116,4 +116,8 @@ The following screenshot illustrates a TOTP verification page.
116116

117117
## Next steps
118118

119-
- Learn how to validate a TOTP code in [Define an Azure AD MFA technical profile](multi-factor-auth-technical-profile.md).
119+
- Learn more about multifactor authentication in [Enable multifactor authentication in Azure Active Directory B2C](multi-factor-authentication.md?pivots=b2c-custom-policy)
120+
121+
- Learn how to validate a TOTP code in [Define an Azure AD MFA technical profile](multi-factor-auth-technical-profile.md).
122+
123+
- Explore a sample [Azure AD B2C MFA with TOTP using any Authenticator app custom policy in GitHub](https://github.com/azure-ad-b2c/samples/tree/master/policies/totp).

articles/active-directory-b2c/identity-provider-twitter.md

Lines changed: 26 additions & 20 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: CelesteDG
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: how-to
12-
ms.date: 09/16/2021
12+
ms.date: 07/20/2022
1313
ms.custom: project-no-code
1414
ms.author: kengaderdus
1515
ms.subservice: B2C
@@ -34,30 +34,35 @@ zone_pivot_groups: b2c-policy-type
3434
To enable sign-in for users with a Twitter account in Azure AD B2C, you need to create a Twitter application. If you don't already have a Twitter account, you can sign up at [`https://twitter.com/signup`](https://twitter.com/signup). You also need to [Apply for a developer account](https://developer.twitter.com/). For more information, see [Apply for access](https://developer.twitter.com/en/apply-for-access).
3535

3636
1. Sign in to the [Twitter Developer Portal](https://developer.twitter.com/portal/projects-and-apps) with your Twitter account credentials.
37-
1. Under **Standalone Apps**, select **+Create App**.
38-
1. Enter an **App name**, and then select **Complete**.
39-
1. Copy the value of the **App key**, and **API key secret**. You use both of them to configure Twitter as an identity provider in your tenant.
40-
1. Under **Setup your App**, select **App settings**.
41-
1. Under **Authentication settings**, select **Edit**
42-
1. Select **Enable 3-legged OAuth** checkbox.
43-
1. Select **Request email address from users** checkbox.
44-
1. For the **Callback URLs**, enter `https://your-tenant.b2clogin.com/your-tenant-name.onmicrosoft.com/your-user-flow-Id/oauth1/authresp`. If you use a [custom domain](custom-domain.md), enter `https://your-domain-name/your-tenant-name.onmicrosoft.com/your-user-flow-Id/oauth1/authresp`. Use all lowercase letters when entering your tenant name and user flow ID even if they are defined with uppercase letters in Azure AD B2C. Replace:
37+
1. Select **+ Create Project** button.
38+
1. Under **Project name** tab, enter a preferred name of your project, and then select **Next** button.
39+
1. Under **Use case** tab, select your preferred use case, and then select **Next**.
40+
1. Under **Project description** tab, enter your project description, and then select **Next** button.
41+
1. Under **App name** tab, enter a name for your app, such as *azureadb2c*, and the select **Next** button.
42+
1. Under **Keys & Tokens** tab, copy the value of **API Key** and **API Key Secret** for later. You use both of them to configure Twitter as an identity provider in your Azure AD B2C tenant.
43+
1. Select **App settings** to open the app settings.
44+
1. At the lower part of the page, under **User authentication settings**, select **Set up**.
45+
1. In the **User authentication settings** page, select **OAuth 2.0** option.
46+
1. Under **OAUTH 2.0 SETTINGS**, for the **Type of app**, select your appropriate app type such as *Web App*.
47+
1. Under **GENERAL AUTHENTICATION SETTINGS**:
48+
1. For the **Callback URI/Redirect URL**, enter `https://your-tenant.b2clogin.com/your-tenant-name.onmicrosoft.com/your-user-flow-Id/oauth1/authresp`. If you use a [custom domain](custom-domain.md), enter `https://your-domain-name/your-tenant-name.onmicrosoft.com/your-user-flow-Id/oauth1/authresp`. Use all lowercase letters when entering your tenant name and user flow ID even if they are defined with uppercase letters in Azure AD B2C. Replace:
4549
- `your-tenant-name` with the name of your tenant name.
4650
- `your-domain-name` with your custom domain.
4751
- `your-user-flow-Id` with the identifier of your user flow. For example, `b2c_1a_signup_signin_twitter`.
4852

4953
1. For the **Website URL**, enter `https://your-tenant.b2clogin.com`. Replace `your-tenant` with the name of your tenant. For example, `https://contosob2c.b2clogin.com`. If you use a [custom domain](custom-domain.md), enter `https://your-domain-name`.
5054
1. Enter a URL for the **Terms of service**, for example `http://www.contoso.com/tos`. The policy URL is a page you maintain to provide terms and conditions for your application.
5155
1. Enter a URL for the **Privacy policy**, for example `http://www.contoso.com/privacy`. The policy URL is a page you maintain to provide privacy information for your application.
52-
1. Select **Save**.
56+
1. Select **Save**.
5357

5458
::: zone pivot="b2c-user-flow"
5559

5660
## Configure Twitter as an identity provider
5761

5862
1. Sign in to the [Azure portal](https://portal.azure.com/) as the global administrator of your Azure AD B2C tenant.
59-
1. Make sure you're using the directory that contains your Azure AD B2C tenant. Select the **Directories + subscriptions** icon in the portal toolbar.
60-
1. On the **Portal settings | Directories + subscriptions** page, find your Azure AD B2C directory in the **Directory name** list, and then select **Switch**.
63+
1. Make sure you're using the directory that contains your Azure AD B2C tenant.
64+
1. Select the **Directories + subscriptions** icon in the portal toolbar.
65+
1. On the **Portal settings | Directories + subscriptions** page, find your Azure AD B2C directory in the **Directory name** list, and then select **Switch**.
6166
1. Choose **All services** in the top-left corner of the Azure portal, search for and select **Azure AD B2C**.
6267
1. Select **Identity providers**, then select **Twitter**.
6368
1. Enter a **Name**. For example, *Twitter*.
@@ -86,25 +91,26 @@ If the sign-in process is successful, your browser is redirected to `https://jwt
8691

8792
## Create a policy key
8893

89-
You need to store the secret key that you previously recorded in your Azure AD B2C tenant.
94+
You need to store the secret key that you previously recorded for Twitter app in your Azure AD B2C tenant.
9095

9196
1. Sign in to the [Azure portal](https://portal.azure.com/).
92-
1. Make sure you're using the directory that contains your Azure AD B2C tenant. Select the **Directories + subscriptions** icon in the portal toolbar.
93-
1. On the **Portal settings | Directories + subscriptions** page, find your Azure AD B2C directory in the **Directory name** list, and then select **Switch**.
94-
1. Choose **All services** in the top-left corner of the Azure portal, and then search for and select **Azure AD B2C**.
95-
1. On the Overview page, select **Identity Experience Framework**.
97+
1. Make sure you're using the directory that contains your Azure AD B2C tenant.
98+
1. Select the **Directories + subscriptions** icon in the portal toolbar.
99+
1. On the **Portal settings | Directories + subscriptions** page, find your Azure AD B2C directory in the **Directory name** list, and then select **Switch**.
100+
1. In the Azure portal, search for and select **Azure AD B2C**.
101+
1. On the left menu, under **Policies**, select **Identity Experience Framework**.
96102
1. Select **Policy Keys** and then select **Add**.
97103
1. For **Options**, choose `Manual`.
98104
1. Enter a **Name** for the policy key. For example, `TwitterSecret`. The prefix `B2C_1A_` is added automatically to the name of your key.
99-
1. In **Secret**, enter your client secret that you previously recorded.
105+
1. For **Secret**, enter your *API key secret* value that you previously recorded.
100106
1. For **Key usage**, select `Encryption`.
101107
1. Click **Create**.
102108

103109
## Configure Twitter as an identity provider
104110

105111
To enable users to sign in using a Twitter account, you need to define the account as a claims provider that Azure AD B2C can communicate with through an endpoint. The endpoint provides a set of claims that are used by Azure AD B2C to verify that a specific user has authenticated.
106112

107-
You can define a Twitter account as a claims provider by adding it to the **ClaimsProviders** element in the extension file of your policy.
113+
You can define a Twitter account as a claims provider by adding it to the **ClaimsProviders** element in the extension file of your policy. Refer to the custom policy starter pack that you downloaded in the Prerequisites of this article.
108114

109115
1. Open the *TrustFrameworkExtensions.xml*.
110116
2. Find the **ClaimsProviders** element. If it does not exist, add it under the root element.
@@ -149,7 +155,7 @@ You can define a Twitter account as a claims provider by adding it to the **Clai
149155
</ClaimsProvider>
150156
```
151157

152-
4. Replace the value of **client_id** with the *API key secret* that you previously recorded.
158+
4. Replace the value of **client_id** with the *API key* that you previously recorded.
153159
5. Save the file.
154160

155161
[!INCLUDE [active-directory-b2c-add-identity-provider-to-user-journey](../../includes/active-directory-b2c-add-identity-provider-to-user-journey.md)]

articles/active-directory-b2c/multi-factor-authentication.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ manager: CelesteDG
88
ms.service: active-directory
99
ms.workload: identity
1010
ms.topic: how-to
11-
ms.date: 06/27/2022
11+
ms.date: 07/20/2022
1212
ms.custom: project-no-code
1313
ms.author: kengaderdus
1414
ms.subservice: B2C
@@ -83,7 +83,7 @@ To enable multifactor authentication, get the custom policy starter pack from Gi
8383

8484
- [Download the .zip file](https://github.com/Azure-Samples/active-directory-b2c-custom-policy-starterpack/archive/master.zip) or clone the repository from `https://github.com/Azure-Samples/active-directory-b2c-custom-policy-starterpack`, and then update the XML files in the **SocialAndLocalAccountsWithMFA** starter pack with your Azure AD B2C tenant name. The **SocialAndLocalAccountsWithMFA** enables social and local sign in options, and multifactor authentication options, except for the Authenticator app - TOTP option.
8585
- To support the **Authenticator app - TOTP** MFA option, download the custom policy files from `https://github.com/azure-ad-b2c/samples/tree/master/policies/totp`, and then update the XML files with your Azure AD B2C tenant name. Make sure to include `TrustFrameworkExtensions.xml`, `TrustFrameworkLocalization.xml`, and `TrustFrameworkBase.xml` XML files from the **SocialAndLocalAccounts** starter pack.
86-
- Update your [page layout] to version `2.1.9`. For more information, see [Select a page layout](contentdefinitions.md#select-a-page-layout).
86+
- Update your [page layout] to version `2.1.14`. For more information, see [Select a page layout](contentdefinitions.md#select-a-page-layout).
8787

8888
::: zone-end
8989

articles/active-directory-b2c/tutorial-create-user-flows.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -343,7 +343,7 @@ As you upload the files, Azure adds the prefix `B2C_1A_` to each.
343343
In this article, you learned how to:
344344

345345
> [!div class="checklist"]
346-
> * Create a sig- up and sign in user flow
346+
> * Create a sign-up and sign in user flow
347347
> * Create a profile editing user flow
348348
> * Create a password reset user flow
349349

articles/active-directory-domain-services/policy-reference.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Built-in policy definitions for Azure Active Directory Domain Services
33
description: Lists Azure Policy built-in policy definitions for Azure Active Directory Domain Services. These built-in policy definitions provide common approaches to managing your Azure resources.
4-
ms.date: 07/06/2022
4+
ms.date: 07/20/2022
55
ms.service: active-directory
66
ms.subservice: domain-services
77
author: justinha

articles/active-directory/app-provisioning/sap-successfactors-integration-reference.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -79,12 +79,12 @@ Based on the attribute-mapping, during full sync Azure AD provisioning service s
7979
>| OData API Host | Appends https to the *Tenant URL*. Example: `https://api4.successfactors.com` |
8080
>| OData API Endpoint | `/odata/v2/PerPerson` |
8181
>| OData $format query parameter | `json` |
82-
>| OData $filter query parameter | `(personEmpTerminationInfoNav/activeEmploymentsCount ge 1) and (lastModifiedDateTime le <CurrentExecutionTime>)` |
82+
>| OData $filter query parameter | `(personEmpTerminationInfoNav/activeEmploymentsCount ne null) and (lastModifiedDateTime le <CurrentExecutionTime>)` |
8383
>| OData $expand query parameter | This parameter value depends on the attributes mapped. Example: `employmentNav/userNav,employmentNav/jobInfoNav,personalInfoNav,personEmpTerminationInfoNav,phoneNav,emailNav,employmentNav/jobInfoNav/companyNav/countryOfRegistrationNav,employmentNav/jobInfoNav/divisionNav,employmentNav/jobInfoNav/departmentNav` |
8484
>| OData customPageSize query parameter | `100` |
8585
8686
> [!NOTE]
87-
> During the first initial full sync, Azure AD provisioning service does not pull inactive/terminated worker data.
87+
> During the full initial sync, both active and terminated workers from SAP SuccessFactors will be fetched.
8888
8989
For each SuccessFactors user, the provisioning service looks for an account in the target (Azure AD/on-premises Active Directory) using the matching attribute defined in the mapping. For example: if *personIdExternal* maps to *employeeId* and is set as the matching attribute, then the provisioning service uses the *personIdExternal* value to search for the user with *employeeId* filter. If a user match is found, then it updates the target attributes. If no match is found, then it creates a new entry in the target.
9090

0 commit comments

Comments
 (0)