Skip to content

Commit efeb272

Browse files
committed
updating the redirection file to solve merge conflicts
2 parents 3db8f43 + d4cd2f3 commit efeb272

File tree

428 files changed

+2047
-2526
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

428 files changed

+2047
-2526
lines changed

.openpublishing.redirection.json

Lines changed: 12 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -43641,6 +43641,18 @@
4364143641
{
4364243642
"source_path": "articles/load-balancer/load-balancer-get-started-internet-classic-cli.md",
4364343643
"redirect_url": "/previous-versions/azure/load-balancer/load-balancer-get-started-internet-classic-cli",
43644+
"source_path": "articles/cognitive-services/translator/how-to-install-containers.md",
43645+
"redirect_url": "/azure/cognitive-services/translator/translator-info-overview",
43646+
"redirect_document_id": false
43647+
},
43648+
{
43649+
"source_path": "articles/cognitive-services/translator/translator-text-container-config.md",
43650+
"redirect_url": "/azure/cognitive-services/translator/translator-info-overview",
43651+
"redirect_document_id": false
43652+
},
43653+
{
43654+
"source_path": "articles/aks/virtual-kubelet.md",
43655+
"redirect_url": "/azure/aks/concepts-scale#burst-to-azure-container-instances",
4364443656
"redirect_document_id": false
4364543657
}
4364643658
]

articles/active-directory-b2c/TOC.yml

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -320,6 +320,9 @@
320320
href: active-directory-b2c-devquickstarts-graph-dotnet.md
321321
- name: Audit logs
322322
href: active-directory-b2c-reference-audit-logs.md
323+
- name: Manage users - Azure portal
324+
href: manage-users-portal.md
325+
displayName: create users, add users, delete users
323326
- name: Secure API Management API
324327
href: secure-api-management.md
325328
displayName: apim, api management, migrate, b2clogin.com
Lines changed: 60 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,60 @@
1+
---
2+
title: Create & delete Azure AD B2C consumer user accounts in the Azure portal
3+
description: Learn how to use the Azure portal to create and delete consumer users in your Azure AD B2C directory.
4+
services: active-directory-b2c
5+
author: mmacy
6+
manager: celestedg
7+
8+
ms.service: active-directory
9+
ms.workload: identity
10+
ms.topic: conceptual
11+
ms.date: 11/09/2019
12+
ms.author: marsma
13+
ms.subservice: B2C
14+
---
15+
16+
# Use the Azure portal to create and delete consumer users in Azure AD B2C
17+
18+
There might be scenarios in which you want to manually create consumer accounts in your Azure Active Directory B2C (Azure AD B2C) directory. Although consumer accounts in an Azure AD B2C directory are most commonly created when users sign up to use one of your applications, you can create them programmatically and by using the Azure portal. This article focuses on the Azure portal method of user creation and deletion.
19+
20+
To add or delete users, your account must be assigned the *User administrator* or *Global administrator* role.
21+
22+
[!INCLUDE [active-directory-b2c-public-preview](../../includes/active-directory-b2c-public-preview.md)]
23+
24+
## Types of user accounts
25+
26+
As described in [Overview of user accounts in Azure AD B2C](user-overview.md), there are three types of user accounts that can be created in an Azure AD B2C directory:
27+
28+
* Work
29+
* Guest
30+
* Consumer
31+
32+
This article focuses on working with **consumer accounts** in the Azure portal. For information about creating and deleting Work and Guest accounts, see [Add or delete users using Azure Active Directory](../active-directory/fundamentals/add-users-azure-active-directory.md).
33+
34+
## Create a consumer user
35+
36+
1. Sign in to the [Azure portal](https://portal.azure.com).
37+
1. Select the **Directory + subscription** filter in the top menu, and then select the directory that contains your Azure AD B2C tenant.
38+
1. In the left menu, select **Azure AD B2C**. Or, select **All services** and search for and select **Azure AD B2C**.
39+
1. Under **Manage**, select **Users**.
40+
1. Select **New user**.
41+
1. Select **Create Azure AD B2C user**.
42+
1. Choose a **Sign in method** and enter either an **Email** address or a **Username** for the new user. The sign in method you select here must match the setting you've specified for your Azure AD B2C tenant's *Local account* identity provider (see **Manage** > **Identity providers** in your Azure AD B2C tenant).
43+
1. Enter a **Name** for the user. This is typically the full name (given and surname) of the user.
44+
1. (Optional) You can **Block sign in** if you wish to delay the ability for the user to sign in. You can enable sign in later by editing the user's **Profile** in the Azure portal.
45+
1. Choose **Auto-generate password** or **Let me create password**.
46+
1. Specify the user's **First name** and **Last name**.
47+
1. Select **Create**.
48+
49+
Unless you've selected **Block sign in**, the user can now sign in using the sign in method (email or username) that you specified.
50+
51+
## Delete a consumer user
52+
53+
1. In your Azure AD B2C directory, select **Users**, and then select the user you want to delete.
54+
1. Select **Delete**, and then **Yes** to confirm the deletion.
55+
56+
For details about restoring a user within the first 30 days after deletion, or for permanently deleting a user, see [Restore or remove a recently deleted user using Azure Active Directory](../active-directory/fundamentals/active-directory-users-restore.md).
57+
58+
## Next steps
59+
60+
For automated user management scenarios, for example migrating users from another identity provider to your Azure AD B2C directory, see [Azure AD B2C: User migration](active-directory-b2c-user-migration.md).

articles/active-directory/b2b/add-users-administrator.md

Lines changed: 9 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ services: active-directory
77
ms.service: active-directory
88
ms.subservice: B2B
99
ms.topic: conceptual
10-
ms.date: 04/11/2019
10+
ms.date: 11/12/2019
1111

1212
ms.author: mimart
1313
author: msmimart
@@ -44,14 +44,18 @@ To add B2B collaboration users to the directory, follow these steps:
4444
> [!NOTE]
4545
> The **New guest user** option is also available on the **Organizational relationships** page. In **Azure Active Directory**, under **Manage**, select **Organizational relationships**.
4646
47-
5. Under **User name**, enter the email address of the external user. Optionally, include a welcome message. For example:
48-
49-
![Shows where New guest user is in the UI](./media/add-users-administrator/InviteGuest.png)
47+
5. On the **New user** page, select **Invite user** and then add the guest user's information.
5048

5149
> [!NOTE]
5250
> Group email addresses aren’t supported; enter the email address for an individual. Also, some email providers allow users to add a plus symbol (+) and additional text to their email addresses to help with things like inbox filtering. However, Azure AD doesn’t currently support plus symbols in email addresses. To avoid delivery issues, omit the plus symbol and any characters following it up to the @ symbol.
5351
54-
6. Select **Invite** to automatically send the invitation to the guest user.
52+
- **Name.** The first and last name of the guest user.
53+
- **Email address (required)**. The email address of the guest user.
54+
- **Personal message (optional)** Include a personal welcome message to the guest user.
55+
- **Groups**: You can add the guest user to one or more existing groups, or you can do it later.
56+
- **Directory role**: If you require Azure AD administrative permissions for the user, you can add them to an Azure AD role.
57+
58+
7. Select **Invite** to automatically send the invitation to the guest user.
5559

5660
After you send the invitation, the user account is automatically added to the directory as a guest.
5761

articles/active-directory/b2b/b2b-quickstart-add-guest-users-portal.md

Lines changed: 7 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: B2B
88
ms.topic: quickstart
9-
ms.date: 07/02/2018
9+
ms.date: 11/12/2019
1010

1111
ms.author: mimart
1212
author: msmimart
@@ -44,9 +44,13 @@ To complete the scenario in this tutorial, you need:
4444

4545
![Screenshot showing where to select the New guest user option](media/quickstart-add-users-portal/quickstart-users-portal-user-3.png)
4646

47-
5. Under **User name**, enter the email address of the external user. Under **Include a personal message with the invitation**, type a welcome message.
47+
5. On the **New user** page, select **Invite user** and then add the guest user's information.
4848

49-
![Screenshot showing where to enter the guest user invitation message](media/quickstart-add-users-portal/quickstart-users-portal-user-4.png)
49+
- **Name.** The first and last name of the guest user.
50+
- **Email address (required)**. The email address of the guest user.
51+
- **Personal message (optional)** Include a personal welcome message to the guest user.
52+
- **Groups**: You can add the guest user to one or more existing groups, or you can do it later.
53+
- **Directory role**: If you require Azure AD administrative permissions for the user, you can add them to an Azure AD role.
5054

5155
6. Select **Invite** to automatically send the invitation to the guest user. A notification appears in the upper right with the message **Successfully invited user**.
5256
7. After you send the invitation, the user account is automatically added to the directory as a guest.

articles/active-directory/develop/access-tokens.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -260,9 +260,9 @@ Refresh tokens can be invalidated or revoked at any time, for different reasons.
260260
| [Single sign-out](v1-protocols-openid-connect-code.md#single-sign-out) on web | Revoked | Stays alive | Revoked | Stays alive | Stays alive |
261261

262262
> [!NOTE]
263-
> A "Non-password based" login is one where the user didn't type in a password to get it. For example, using your face with Windows Hello, a FIDO key, or a PIN.
263+
> A "Non-password based" login is one where the user didn't type in a password to get it. For example, using your face with Windows Hello, a FIDO2 key, or a PIN.
264264
>
265-
> A known issue exists with the Windows Primary Refresh Token. If the PRT is obtained via a password, and then the user logs in via Hello, this does not change the origination of the PRT, and it will be revoked if the user changes their password.
265+
> Primary Refresh Tokens (PRT) on Windows 10 are segregated based on the credential. For example, Windows Hello and password have their respective PRTs, isolated from one another. When a user signs-in with a Hello credential (PIN or biometrics) and then changes the password, the password based PRT obtained previously will be revoked. Signing back in with a password invalidates the old PRT and requests a new one.
266266
>
267267
> Refresh tokens aren't invalidated or revoked when used to fetch a new access token and refresh token.
268268

articles/active-directory/develop/howto-configure-publisher-domain.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@ ms.custom: aaddev
2121
ms.collection: M365-identity-device-management
2222
---
2323

24-
# How to: Configure an application's publisher domain (Preview)
24+
# How to: Configure an application's publisher domain
2525

2626
An application’s publisher domain is displayed to users on the [application’s consent prompt](application-consent-experience.md) to let users know where their information is being sent. Multi-tenant applications that are registered after May 21, 2019 that don't have a publisher domain show up as **unverified**. Multi-tenant applications are applications that support accounts outside of a single organizational directory; for example, support all Azure AD accounts, or support all Azure AD accounts and personal Microsoft accounts.
2727

articles/active-directory/develop/scenario-web-api-call-api-app-configuration.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -138,6 +138,8 @@ private void AddAccountToCacheFromJwt(IEnumerable<string> scopes, JwtSecurityTok
138138
}
139139
```
140140

141+
You can also see an example of on behalf of flow implementation in [NodeJS and Azure Functions](https://github.com/Azure-Samples/ms-identity-nodejs-webapi-onbehalfof-azurefunctions/blob/master/MiddleTierAPI/MyHttpTrigger/index.js#L61).
142+
141143
## Protocol
142144

143145
For more information about the on-behalf-of protocol, see [Microsoft identity platform and OAuth 2.0 On-Behalf-Of flow](https://docs.microsoft.com/azure/active-directory/develop/v2-oauth2-on-behalf-of-flow).

articles/active-directory/develop/tutorial-v2-ios.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -138,7 +138,7 @@ let kScopes: [String] = ["https://graph.microsoft.com/user.read"] // request per
138138
let kAuthority = "https://login.microsoftonline.com/common" // this authority allows a personal Microsoft account and a work or school account in any organization’s Azure AD tenant to sign in
139139
var accessToken = String()
140140
var applicationContext : MSALPublicClientApplication?
141-
var webViewParamaters : MSALWebviewParameters?
141+
var webViewParameters : MSALWebviewParameters?
142142
```
143143

144144
The only value you need to modify above is the value assigned to `kClientID`to be your [Application ID](https://docs.microsoft.com/azure/active-directory/develop/developer-glossary#application-id-client-id). This value is part of the MSAL Configuration data that you saved during the step at the beginning of this tutorial to register the application in the Azure portal.
@@ -318,16 +318,16 @@ Add the following after `initMSAL` method to the `ViewController` class.
318318

319319
```swift
320320
func initWebViewParams() {
321-
self.webViewParamaters = MSALWebviewParameters(parentViewController: self)
321+
self.webViewParameters = MSALWebviewParameters(parentViewController: self)
322322
}
323323
```
324324

325325
### macOS code:
326326

327327
```swift
328328
func initWebViewParams() {
329-
self.webViewParamaters = MSALWebviewParameters()
330-
self.webViewParamaters?.webviewType = .wkWebView
329+
self.webViewParameters = MSALWebviewParameters()
330+
self.webViewParameters?.webviewType = .wkWebView
331331
}
332332
```
333333

@@ -421,7 +421,7 @@ Add the following code to the `ViewController` class.
421421
func acquireTokenInteractively() {
422422

423423
guard let applicationContext = self.applicationContext else { return }
424-
guard let webViewParameters = self.webViewParamaters else { return }
424+
guard let webViewParameters = self.webViewParameters else { return }
425425

426426
// #1
427427
let parameters = MSALInteractiveTokenParameters(scopes: kScopes, webviewParameters: webViewParameters)

articles/active-directory/develop/v2-supported-account-types.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -37,7 +37,7 @@ In the Microsoft Azure public Cloud, most types of apps can sign in users with a
3737
- With their work or school or personal Microsoft account.
3838
- With only personal Microsoft account.
3939
> [!NOTE]
40-
> Currently the Microsoft identity platform supports personal Microsoft accounts only by registering an app for **work or school or Microsoft personal accounts**, and then, restrict sign-in in the code for the application by specifying an Azure AD authority, when building the application, such as `https://login.onmicrosoftonline.com/consumers`.
40+
> Currently the Microsoft identity platform supports personal Microsoft accounts only by registering an app for **work or school or Microsoft personal accounts**, and then, restrict sign-in in the code for the application by specifying an Azure AD authority, when building the application, such as `https://login.microsoftonline.com/consumers`.
4141
4242
- If you're writing a business to consumers application, you can also sign in users with their social identities, using Azure AD B2C.
4343

@@ -57,4 +57,4 @@ Some account types can't be used with certain authentication flows. For instance
5757
## Next steps
5858

5959
- Learn more about [Tenancy in Azure Active Directory](./single-and-multi-tenant-apps.md)
60-
- Learn more about [National Clouds](./authentication-national-cloud.md)
60+
- Learn more about [National Clouds](./authentication-national-cloud.md)

0 commit comments

Comments
 (0)