Skip to content

Commit eca0042

Browse files
committed
Merge branch 'main' into azure-percept-tidy-redirects
2 parents 3e6c6e5 + b1227cb commit eca0042

File tree

552 files changed

+5492
-6421
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

552 files changed

+5492
-6421
lines changed

.openpublishing.redirection.active-directory.json

Lines changed: 6 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -75,6 +75,11 @@
7575
"redirect_url": "/azure/active-directory/saas-apps/tutorial-list",
7676
"redirect_document_id": false
7777
},
78+
{
79+
"source_path_from_root": "/articles/active-directory/saas-apps/usertesting-tutorial.md",
80+
"redirect_url": "/azure/active-directory/saas-apps/tutorial-list",
81+
"redirect_document_id": false
82+
},
7883
{
7984
"source_path_from_root": "/articles/active-directory/saas-apps/otsuka-shokai-tutorial.md",
8085
"redirect_url": "/azure/active-directory/saas-apps/tutorial-list",
@@ -4405,7 +4410,7 @@
44054410
"source_path_from_root": "/articles/active-directory/reports-monitoring/recommendations-integrate-third-party-apps.md",
44064411
"redirect_url": "/azure/active-directory/reports-monitoring/overview-recommendations",
44074412
"redirect_document_id": false
4408-
},
4413+
},
44094414
{
44104415
"source_path_from_root": "/articles/active-directory/reports-monitoring/workbook-legacy authentication.md",
44114416
"redirect_url": "/azure/active-directory/reports-monitoring/workbook-legacy-authentication",

.openpublishing.redirection.azure-monitor.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -35,6 +35,11 @@
3535
"redirect_url": "/azure/azure-monitor/change/change-analysis",
3636
"redirect_document_id": false
3737
},
38+
{
39+
"source_path_from_root": "/articles/azure-monitor/app/web-app-extension-release-notes.md",
40+
"redirect_url": "/azure/azure-monitor/app/azure-web-apps",
41+
"redirect_document_id": false
42+
},
3843
{
3944
"source_path_from_root": "/articles/azure-monitor/app/visual-studio.md",
4045
"redirect_url": "https://learn.microsoft.com/visualstudio/azure/azure-app-insights-add-connected-service",

.openpublishing.redirection.healthcare-apis.json

Lines changed: 673 additions & 668 deletions
Large diffs are not rendered by default.

articles/active-directory-b2c/oauth2-technical-profile.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -124,7 +124,7 @@ The following table lists the token endpoint metadata.
124124
| `HttpBinding` | No | The expected HTTP binding to the token endpoint. Possible values: `GET` or `POST`. |
125125
| `AccessTokenResponseFormat` | No | The format of the access token endpoint call. For example, Facebook requires an HTTP GET method, but the access token response is in JSON format. Possible values: `Default`, `Json`, and `JsonP`. |
126126
| `ExtraParamsInAccessTokenEndpointResponse` | No | Contains the extra parameters that can be returned in the response from **AccessTokenEndpoint** by some identity providers. For example, the response from **AccessTokenEndpoint** contains an extra parameter such as `openid`, which is a mandatory parameter besides the access_token in a **ClaimsEndpoint** request query string. Multiple parameter names should be escaped and separated by the comma ',' delimiter. |
127-
|`token_endpoint_auth_method`| No| Specifies how Azure AD B2C sends the authentication header to the token endpoint. Possible values: `client_secret_post` (default), and `client_secret_basic` (public preview), `private_key_jwt` (public preview). For more information, see [OpenID Connect client authentication section](https://openid.net/specs/openid-connect-core-1_0.html#ClientAuthentication). |
127+
|`token_endpoint_auth_method`| No| Specifies how Azure AD B2C sends the authentication header to the token endpoint. Possible values: `client_secret_post` (default), and `client_secret_basic`, `private_key_jwt`. For more information, see [OpenID Connect client authentication section](https://openid.net/specs/openid-connect-core-1_0.html#ClientAuthentication). |
128128
|`token_signing_algorithm`| No | Specifies the signing algorithm to use when `token_endpoint_auth_method` is set to `private_key_jwt`. Possible values: `RS256` (default) or `RS512`.|
129129

130130
### Configure HTTP binding method
Lines changed: 10 additions & 126 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: "What's new in Azure Active Directory business-to-customer (B2C)"
33
description: "New and updated documentation for the Azure Active Directory business-to-customer (B2C)."
4-
ms.date: 10/31/2022
4+
ms.date: 03/01/2023
55
ms.service: active-directory
66
ms.subservice: B2C
77
ms.topic: reference
@@ -15,6 +15,15 @@ manager: CelesteDG
1515

1616
Welcome to what's new in Azure Active Directory B2C documentation. This article lists new docs that have been added and those that have had significant updates in the last three months. To learn what's new with the B2C service, see [What's new in Azure Active Directory](../active-directory/fundamentals/whats-new.md) and [Azure AD B2C developer release notes](custom-policy-developer-notes.md)
1717

18+
## February 2023
19+
20+
### Updated articles
21+
22+
- [Azure Active Directory B2C code samples](integrate-with-app-code-samples.md)
23+
- [JSON claims transformations](json-transformations.md)
24+
- [Set up sign-in for a specific Azure Active Directory organization in Azure Active Directory B2C](identity-provider-azure-ad-single-tenant.md)
25+
- [Page layout versions](page-layout.md)
26+
1827
## January 2023
1928

2029
### New articles
@@ -71,128 +80,3 @@ Welcome to what's new in Azure Active Directory B2C documentation. This article
7180
- [Set up a password reset flow in Azure Active Directory B2C](add-password-reset-policy.md)
7281
- [What is Azure Active Directory B2C?](overview.md)
7382
- [Technical and feature overview of Azure Active Directory B2C](technical-overview.md)
74-
75-
## November 2022
76-
77-
### New articles
78-
79-
- [Configure Azure Active Directory B2C with Akamai Enterprise Application Access for SSO and secure hybrid access](partner-akamai-secure-hybrid-access.md)
80-
81-
### Updated articles
82-
83-
- [Manage your Azure Active Directory B2C tenant](tenant-management-manage-administrator.md)
84-
- [Manage Azure AD B2C with Microsoft Graph](microsoft-graph-operations.md)
85-
- [Tutorial: Create an Azure Active Directory B2C tenant](tutorial-create-tenant.md)
86-
- [Roles and resource access control](roles-resource-access-control.md)
87-
- [Define an Azure Active Directory technical profile in an Azure Active Directory B2C custom policy](active-directory-technical-profile.md)
88-
89-
## October 2022
90-
91-
### New articles
92-
93-
- [Edit Azure Active Directory B2C Identity Experience Framework (IEF) XML with Grit Visual IEF Editor](partner-grit-editor.md)
94-
- [Register apps in Azure Active Directory B2C](register-apps.md)
95-
96-
### Updated articles
97-
98-
- [Set up sign-in for a specific Azure Active Directory organization in Azure Active Directory B2C](identity-provider-azure-ad-single-tenant.md)
99-
- [Set up a password reset flow in Azure Active Directory B2C](add-password-reset-policy.md)
100-
- [Azure Active Directory B2C documentation landing page](index.yml)
101-
- [Publish your Azure Active Directory B2C app to the Azure Active Directory app gallery](publish-app-to-azure-ad-app-gallery.md)
102-
- [JSON claims transformations](json-transformations.md)
103-
104-
## September
105-
106-
### New articles
107-
108-
- [Tutorial: Configure the Grit IAM B2B2C solution with Azure Active Directory B2C](partner-grit-iam.md)
109-
110-
## August 2022
111-
112-
### New articles
113-
114-
- [Configure Azure Active Directory B2C with Deduce to combat identity fraud and create a trusted user experience](partner-deduce.md)
115-
116-
### Updated articles
117-
118-
- [Clean up resources and delete the tenant](tutorial-delete-tenant.md)
119-
- [Set up sign-up and sign-in with a Twitter account using Azure Active Directory B2C](identity-provider-twitter.md)
120-
- [JSON claims transformations](json-transformations.md)
121-
- [Extensions app in Azure AD B2C](extensions-app.md)
122-
- [Manage Azure AD B2C with Microsoft Graph](microsoft-graph-operations.md)
123-
- [Define custom attributes in Azure Active Directory B2C](user-flow-custom-attributes.md)
124-
- [Azure Active Directory B2C: What's new](whats-new-docs.md)
125-
- [Page layout versions](page-layout.md)
126-
127-
## July 2022
128-
129-
### New articles
130-
131-
- [Configure authentication in a sample React single-page application by using Azure Active Directory B2C](configure-authentication-sample-react-spa-app.md)
132-
- [Configure authentication options in a React application by using Azure Active Directory B2C](enable-authentication-react-spa-app-options.md)
133-
- [Enable authentication in your own React Application by using Azure Active Directory B2C](enable-authentication-react-spa-app.md)
134-
135-
### Updated articles
136-
137-
- [Enable custom domains for Azure Active Directory B2C](custom-domain.md)
138-
- [Set up sign-up and sign-in with a Twitter account using Azure Active Directory B2C](identity-provider-twitter.md)
139-
- [Page layout versions](page-layout.md)
140-
- [Monitor Azure AD B2C with Azure Monitor](azure-monitor.md)
141-
- [Enable JavaScript and page layout versions in Azure Active Directory B2C](javascript-and-page-layout.md)
142-
- [Localization string IDs](localization-string-ids.md)
143-
144-
## June 2022
145-
146-
### New articles
147-
148-
- [Configure authentication in an Azure Static Web App by using Azure AD B2C](configure-authentication-in-azure-static-app.md)
149-
- [Configure authentication in an Azure Web App configuration file by using Azure AD B2C](configure-authentication-in-azure-web-app-file-based.md)
150-
- [Configure authentication in an Azure Web App by using Azure AD B2C](configure-authentication-in-azure-web-app.md)
151-
- [Enable authentication options in an Azure Static Web App by using Azure AD B2C](enable-authentication-azure-static-app-options.md)
152-
- [Enable authentication in your own Python web application using Azure Active Directory B2C](enable-authentication-python-web-app.md)
153-
- [Set up OAuth 2.0 client credentials flow in Azure Active Directory B2C](client-credentials-grant-flow.md)
154-
- [Configure WhoIAM Rampart with Azure Active Directory B2C](partner-whoiam-rampart.md)
155-
156-
### Updated articles
157-
158-
- [Configure authentication in a sample Python web app by using Azure AD B2C](configure-authentication-sample-python-web-app.md)
159-
- [Single-page application sign-in using the OAuth 2.0 implicit flow in Azure Active Directory B2C](implicit-flow-single-page-application.md)
160-
- [Set up OAuth 2.0 client credentials flow in Azure Active Directory B2C](client-credentials-grant-flow.md)
161-
- [Tutorial: Create user flows and custom policies in Azure Active Directory B2C](tutorial-create-user-flows.md)
162-
- [Configure TheAccessHub Admin Tool by using Azure Active Directory B2C](partner-n8identity.md)
163-
- [Monitor Azure AD B2C with Azure Monitor](azure-monitor.md)
164-
165-
166-
## May 2022
167-
168-
### Updated articles
169-
170-
- [Set redirect URLs to b2clogin.com for Azure Active Directory B2C](b2clogin.md)
171-
- [Enable custom domains for Azure Active Directory B2C](custom-domain.md)
172-
- [Configure xID with Azure Active Directory B2C for passwordless authentication](partner-xid.md)
173-
- [UserJourneys](userjourneys.md)
174-
- [Secure your API used an API connector in Azure AD B2C](secure-rest-api.md)
175-
176-
## April 2022
177-
178-
### New articles
179-
180-
- [Tutorial: Configure Azure Web Application Firewall with Azure Active Directory B2C](partner-azure-web-application-firewall.md)
181-
- [Configure Asignio with Azure Active Directory B2C for multi-factor authentication](partner-asignio.md)
182-
- [Set up sign-up and sign-in with Mobile ID using Azure Active Directory B2C](identity-provider-mobile-id.md)
183-
- [Find help and open a support ticket for Azure Active Directory B2C](find-help-open-support-ticket.md)
184-
185-
### Updated articles
186-
187-
- [Configure authentication in a sample single-page application by using Azure AD B2C](configure-authentication-sample-spa-app.md)
188-
- [Configure xID with Azure Active Directory B2C for passwordless authentication](partner-xid.md)
189-
- [Azure Active Directory B2C service limits and restrictions](service-limits.md)
190-
- [Localization string IDs](localization-string-ids.md)
191-
- [Manage your Azure Active Directory B2C tenant](tenant-management-manage-administrator.md)
192-
- [Page layout versions](page-layout.md)
193-
- [Secure your API used an API connector in Azure AD B2C](secure-rest-api.md)
194-
- [Azure Active Directory B2C: What's new](whats-new-docs.md)
195-
- [Application types that can be used in Active Directory B2C](application-types.md)
196-
- [Publish your Azure Active Directory B2C app to the Azure Active Directory app gallery](publish-app-to-azure-ad-app-gallery.md)
197-
- [Quickstart: Set up sign in for a desktop app using Azure Active Directory B2C](quickstart-native-app-desktop.md)
198-
- [Register a single-page application (SPA) in Azure Active Directory B2C](tutorial-register-spa.md)

articles/active-directory/authentication/concept-registration-mfa-sspr-combined.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -64,9 +64,10 @@ Combined registration supports the authentication methods and actions in the fol
6464
| FIDO2 security keys*| Yes | No | Yes |
6565

6666
> [!NOTE]
67+
> <b>Alternate phone</b> can only be registered in *manage mode* on the [Security info](https://mysignins.microsoft.com/security-info) page and requires Voice calls to be enabled in the Authentication methods policy. <br />
6768
> <b>Office phone</b> can only be registered in *Interrupt mode* if the users *Business phone* property has been set. Office phone can be added by users in *Managed mode from the [Security info](https://mysignins.microsoft.com/security-info)* without this requirement. <br />
68-
> <b>App passwords</b> are available only to users who have been enforced for Azure AD Multi-Factor Authentication. App passwords are not available to users who are enabled for Azure AD Multi-Factor Authentication by a Conditional Access policy. <br />
69-
> <b>FIDO2 security keys</b>, can only be added in *Managed mode only from the [Security info](https://mysignins.microsoft.com/security-info) page*
69+
> <b>App passwords</b> are available only to users who have been enforced for per-user MFA. App passwords are not available to users who are enabled for Azure AD Multi-Factor Authentication by a Conditional Access policy. <br />
70+
> <b>FIDO2 security keys</b>, can only be added in *manage mode only* on the [Security info](https://mysignins.microsoft.com/security-info) page.
7071
7172
Users can set one of the following options as the default multifactor authentication method.
7273

articles/active-directory/conditional-access/plan-conditional-access.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -184,7 +184,7 @@ The following name indicates that this policy is the first of four policies to e
184184

185185
### Block countries from which you never expect a sign-in.
186186

187-
Azure active directory allows you to create [named locations](location-condition.md). Create the list of countries that are allowed, and then create a network block policy with these "allowed countries" as an exclusion. This is less overhead for customers who are based in smaller geographic locations.**Be sure to exempt your emergency access accounts from this policy**.
187+
Azure active directory allows you to create [named locations](location-condition.md). Create the list of countries that are allowed, and then create a network block policy with these "allowed countries" as an exclusion. This is less overhead for customers who are based in smaller geographic locations. **Be sure to exempt your emergency access accounts from this policy**.
188188

189189
## Deploy Conditional Access policy
190190

articles/active-directory/develop/active-directory-v2-protocols.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -16,11 +16,11 @@ ms.custom: aaddev, has-adal-ref, engagement-fy23
1616

1717
# OAuth 2.0 and OpenID Connect (OIDC) in the Microsoft identity platform
1818

19-
Knowing about OAuth or OpenID Connect (OIDC) at the protocol level is not required to use the Microsoft identity platform. However, you will encounter protocol terms and concepts as you use the identity platform to add authentication to your apps. As you work with the Azure portal, our documentation, and authentication libraries, knowing some fundamentals can assist your integration and overall experience.
19+
Knowing about OAuth or OpenID Connect (OIDC) at the protocol level isn't required to use the Microsoft identity platform. However, you'll encounter protocol terms and concepts as you use the identity platform to add authentication to your apps. As you work with the Azure portal, our documentation, and authentication libraries, knowing some fundamentals can assist your integration and overall experience.
2020

2121
## Roles in OAuth 2.0
2222

23-
Four parties are usually involved in an OAuth 2.0 and OpenID Connect authentication and authorization exchange. These exchanges are often called *authentication flows* or *auth flows*.
23+
Four parties are generally involved in an OAuth 2.0 and OpenID Connect authentication and authorization exchange. These exchanges are often called *authentication flows* or *auth flows*.
2424

2525
![Diagram showing the OAuth 2.0 roles](./media/active-directory-v2-flows/protocols-roles.svg)
2626

@@ -89,9 +89,9 @@ Next, learn about the OAuth 2.0 authentication flows used by each application ty
8989
* [Authentication flows and application scenarios](authentication-flows-app-scenarios.md)
9090
* [Microsoft Authentication Library (MSAL)](msal-overview.md)
9191

92-
**We strongly advise against crafting your own library or raw HTTP calls to execute authentication flows.** A [Microsoft Authentication Library](reference-v2-libraries.md) is safer and much easier. However, if your scenario prevents you from using our libraries or you'd just like to learn more about the identity platform's implementation, we have protocol reference:
92+
**We strongly advise against crafting your own library or raw HTTP calls to execute authentication flows.** A [Microsoft Authentication Library](reference-v2-libraries.md) is safer and easier. However, if your scenario prevents you from using our libraries or you'd just like to learn more about the identity platform's implementation, we have protocol reference:
9393

9494
* [Authorization code grant flow](v2-oauth2-auth-code-flow.md) - Single-page apps (SPA), mobile apps, native (desktop) applications
9595
* [Client credentials flow](v2-oauth2-client-creds-grant-flow.md) - Server-side processes, scripts, daemons
9696
* [On-behalf-of (OBO) flow](v2-oauth2-on-behalf-of-flow.md) - Web APIs that call another web API on a user's behalf
97-
* [OpenID Connect](v2-protocols-oidc.md) - User sign-in, sign-out, and single sign-on (SSO)
97+
* [OpenID Connect](v2-protocols-oidc.md) - User sign-in, sign out, and single sign-on (SSO)

0 commit comments

Comments
 (0)