Skip to content

Commit ebf3a28

Browse files
committed
PR review team comments
1 parent 004cda6 commit ebf3a28

8 files changed

+21
-16
lines changed

articles/active-directory-b2c/TOC.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -43,6 +43,8 @@
4343
- name: Manage emergency access
4444
href: tenant-management-emergency-access-account.md
4545
displayName: break glass account, emergence account
46+
- name: Check tenant creation permission
47+
href: tenant-management-check-tenant-creation-permission.md
4648
- name: Find tenant name and ID
4749
href: tenant-management-read-tenant-name.md
4850
displayName: tenant name, tenant ID, tenant details

articles/active-directory-b2c/custom-policies-series-branch-user-journey.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -183,7 +183,7 @@ You now need two new self-asserted technical profiles, one to collect the accoun
183183
1. Remove the `accountType` output claim, `<OutputClaim ClaimTypeReferenceId="accountType"/>`, from the `OutputClaims` collection.
184184

185185

186-
## Step 4 - Update the User Journey Orchestration Steps
186+
## Step 4 - Update the User journey orchestration steps
187187

188188
Now that you've set up your technical profiles, you need to update your user journey orchestration steps:
189189

@@ -220,7 +220,7 @@ Now that you've set up your technical profiles, you need to update your user jou
220220

221221
Follow the steps in [Upload custom policy file](custom-policies-series-hello-world.md#step-3---upload-custom-policy-file) to upload your policy file. If you're uploading a file with same name as the one already in the portal, make sure you select **Overwrite the custom policy if it already exists**.
222222

223-
## Step 5 - Test the custom policy
223+
## Step 6 - Test the custom policy
224224

225225
Follow the steps in [Test the custom policy](custom-policies-series-validate-user-input.md#step-6---test-the-custom-policy) to test your custom policy:
226226

articles/active-directory-b2c/custom-policies-series-install-xml-extensions.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -57,7 +57,7 @@ Azure AD B2C extension allows you to understand the organization of your policy
5757
> [!NOTE]
5858
> The community has developed the VS Code extension for Azure AD B2C to help identity developers. The extension is not supported by Microsoft and is made available strictly as-is.
5959
60-
## Next step
60+
## Next steps
6161

6262
Next, learn:
6363

articles/active-directory-b2c/custom-policies-series-overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -37,7 +37,7 @@ This how-to guide series consists of multiple articles. We recommend that you st
3737
|[Write your first Azure Active Directory B2C custom policy - Hello World!](custom-policies-series-hello-world.md) | Write your first Azure AD B2C custom policy. You'll return the message *Hello World!* in the JWT token. |
3838
|[Collect and manipulate user inputs by using Azure AD B2C custom policy](custom-policies-series-collect-user-input.md) | Learn how to collect inputs from users, and how to manipulate them.|
3939
|[Validate user inputs by using Azure Active Directory B2C custom policy](custom-policies-series-validate-user-input.md) | Learn how to validate user inputs by using techniques such as limiting user input options, regular expressions, predicates, and validation technical profiles|
40-
|[Create branching in user journey by using Azure Active Directory B2C custom policy](custom-policies-series-branch-in-user-journey.md) | Learn how to create different user experiences for different users based on the value of a claim.|
40+
|[Create branching in user journey by using Azure Active Directory B2C custom policy](custom-policies-series-branch-user-journey.md) | Learn how to create different user experiences for different users based on the value of a claim.|
4141
|[Validate custom policy files by using TrustFrameworkPolicy schema](custom-policies-series-install-xml-extensions.md)| Learn how to validate your custom files against a custom policy schema. You also learn how to easily navigate your policy files by using Azure AD B2C Visual Studio Code (VS Code) extension.|
4242
|[Call a REST API by using Azure Active Directory B2C custom policy](custom-policies-series-call-rest-api.md)| Learn how to write a custom policy that integrates with your own RESTful service.|
4343
|[Create and read a user account by using Azure Active Directory B2C custom policy](custom-policies-series-store-user.md)| Learn how to store into and read user details from Azure AD storage by using Azure AD B2C custom policy. You use the Azure Active Directory technical profile.|

articles/active-directory-b2c/custom-policies-series-sign-up-or-sign-in-federation.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -215,7 +215,7 @@ Replace:
215215

216216
Notice the claims transformations we defined in [step 3.2](#step-32---define-claims-transformations) in the *OutputClaimsTransformations* collection.
217217

218-
### Step 3.4 - Create Azure AD Technical Profiles
218+
### Step 3.4 - Create Azure AD technical profiles
219219

220220
Just like in sign-in with a local account, you need to configure the [Azure AD Technical Profiles](active-directory-technical-profile.md), which you use to connect to Azure AD storage, to store or read a user social account.
221221

@@ -292,7 +292,7 @@ Just like in sign-in with a local account, you need to configure the [Azure AD T
292292

293293
1. Replace *B2C_1A_TokenSigningKeyContainer* with the token signing key you created in [Configure the signing](custom-policies-series-hello-world.md#step-1---configure-the-signing-and-encryption-keys).
294294

295-
### Step 3.5 - Configure Content Definition
295+
### Step 3.5 - Configure content definition
296296

297297
After a user signs in, you can collect some information from them by using a self-asserted technical profile. So, you need to configure content definition for the self-asserted technical profile.
298298

@@ -376,7 +376,7 @@ The claims provider we've added contains a self-asserted technical profile, *Sel
376376

377377
Also, notice that we've added the content definition, *socialAccountsignupContentDefinition*, that we configured in [step 3.5](#step-35---configure-content-definition) in the metadata section.
378378

379-
## Step 4 - Update the User Journey Orchestration Steps
379+
## Step 4 - Update the User journey orchestration steps
380380

381381
In the `ContosoCustomPolicy.XML` file, locate the `HelloWorldJourney` user journey and replace all the orchestration steps with the steps shown in the following code:
382382

articles/active-directory-b2c/custom-policies-series-sign-up-or-sign-in.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -162,7 +162,7 @@ When your policy runs, the user needs to see a user interface that allows them t
162162
- Configure a self-asserted technical profile, which displays the sign-in form to the user.
163163
- Configure content definition for the sign-in user interface.
164164

165-
### Step 2.1 - Configure a sign-in user interface Technical Profile
165+
### Step 2.1 - Configure a sign-in user interface technical profile
166166

167167
In the `ContosoCustomPolicy.XML` file, locate the `SignInUser` technical profile and add a SelfAsserted Technical Profile after it by using the following code:
168168

@@ -197,7 +197,7 @@ Also, we've added the *SignInUser* OpenID Connect Technical Profile as a *Valida
197197

198198
In the next step ([step 2.2](#step-22---configure-sign-in-interface-content-definition)), we configure a content definition that we'll use in this SelfAsserted Technical Profile.
199199

200-
### Step 2.2 - Configure sign-in interface Content Definition
200+
### Step 2.2 - Configure sign-in interface content definition
201201

202202
In the `ContosoCustomPolicy.XML` file, locate the *ContentDefinitions* section, and then sign-in [Content Definition](contentdefinitions.md) by using the following code:
203203

@@ -217,7 +217,7 @@ In the `ContosoCustomPolicy.XML` file, locate the *ContentDefinitions* section,
217217
We've configured a content definition for our self-asserted technical profile, `SignupOrSigninContentDefinition`. We can specify it in the technical profile using the metadata element or specify it when we reference the technical profile in the orchestration steps. Previously, we learnt how to specify a content definition directly in the self-asserted technical profile, so in this article, we'll learn how to specify it when we reference the technical profile in the orchestration steps, [step 3](#step-3---update-the-user-journey-orchestration-steps).
218218

219219

220-
## Step 3 - Update the User Journey Orchestration Steps
220+
## Step 3 - Update the User journey orchestration steps
221221

222222
In the `ContosoCustomPolicy.XML` file, locate the *HelloWorldJourney* user journey and replace all its orchestration steps collection with the following code:
223223

articles/active-directory-b2c/custom-policies-series-validate-user-input.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Validate user inputs by using Azure AD B2C custom policy
33
titleSuffix: Azure AD B2C
4-
description: Learn how to validate user inputs by using Azure Active Directory B2C custom policy. Learn how to validate user input by providing user input options. Learn how to validate user input by using Predicates. Learn how t validate user input by using Regular Expressions. Learn how to validate user input by using validation technical profiles
4+
description: Learn how to validate user inputs by using Azure Active Directory B2C custom policy. Learn how to validate user input by limiting user input options. Learn how to validate user input by using Predicates. Learn how to validate user input by using Regular Expressions. Learn how to validate user input by using validation technical profiles
55
services: active-directory-b2c
66
author: kengaderdus
77
manager: CelesteDG
@@ -85,7 +85,7 @@ If you know all the possible values that a user can enter for a given input, you
8585
<OutputClaim ClaimTypeReferenceId="accountType" />
8686
```
8787

88-
## Step 2 - Validate user input by using Regular Expressions
88+
## Step 2 - Validate user input by using regular expressions
8989

9090
When it's not possible to know all possible user input values in advance, you allow the user to input the data themselves. In this case, you can use *regular expressions (regex)* or [pattern](claimsschema.md#pattern) to dictate how a user input need to be formatted. For instance, an email must have the *at (@)* symbol and a *period (.)* somewhere in its text.
9191

@@ -126,7 +126,7 @@ When you declare a claim, custom policy allows you to define a regex, which the
126126
<OutputClaim ClaimTypeReferenceId="email" />
127127
```
128128

129-
## Step 3 - Validate user input by using Predicates
129+
## Step 3 - Validate user input by using predicates
130130

131131
You've used regex to validate user inputs. However, regex have one weakness, that's, the error message displays until you correct input without showing you the specific requirement the input is missing.
132132

@@ -482,9 +482,9 @@ Use the following steps to learn how to validate user input by using validation
482482

483483
:::image type="content" source="media/custom-policies-series-validate-user-input/screenshot-of-error-due-to-invalid-email-address.png" alt-text="screenshot of error due to invalid email address.":::
484484

485-
## Next Steps
485+
## Next steps
486486

487487
- Learn about [validation technical profile](validation-technical-profile.md).
488488

489-
- Learn how to [Conditionally enable or disable Technical Profiles in Azure AD B2C custom policies](custom-policies-series-branch-in-user-journey.md)
489+
- Learn how to [Conditionally enable or disable Technical Profiles in Azure AD B2C custom policies](custom-policies-series-branch-user-journey.md)
490490

articles/active-directory-b2c/tenant-management-check-tenant-creation-permision.md renamed to articles/active-directory-b2c/tenant-management-check-tenant-creation-permission.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -59,4 +59,7 @@ Before you create an Azure AD B2C tenant, make sure that you've the permission t
5959
1. Review your **Tenant Creation** setting. If the settings is set to **No**, then contact your administrator to assign the tenant creator role to you. The setting is greyed out if you're not an administrator in the tenant.
6060

6161

62-
## Next steps
62+
## Next steps
63+
64+
- [Read tenant name and ID](tenant-management-read-tenant-name.md)
65+
- [Clean up resources and delete tenant](tutorial-delete-tenant.md)

0 commit comments

Comments
 (0)