You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory-b2c/active-directory-b2c-get-started-custom.md
+33-33Lines changed: 33 additions & 33 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,7 +8,7 @@ manager: celestedg
8
8
ms.service: active-directory
9
9
ms.workload: identity
10
10
ms.topic: conceptual
11
-
ms.date: 07/16/2019
11
+
ms.date: 09/26/2019
12
12
ms.author: marsma
13
13
ms.subservice: B2C
14
14
---
@@ -21,44 +21,45 @@ ms.subservice: B2C
21
21
22
22
## Prerequisites
23
23
24
-
- If you don't have one already, you need to [create an Azure AD B2C tenant](tutorial-create-tenant.md) that is linked to your Azure subscription.
24
+
- If you don't have one already, [create an Azure AD B2C tenant](tutorial-create-tenant.md) that is linked to your Azure subscription.
25
25
-[Register your application](tutorial-register-applications.md) in the tenant that you created so that it can communicate with Azure AD B2C.
26
+
- Complete the steps in [Set up sign-up and sign-in with a Facebook account](active-directory-b2c-setup-fb-app.md) to configure a Facebook application.
26
27
27
28
## Add signing and encryption keys
28
29
29
-
1. Sign in to the [Azure portal](https://portal.azure.com/) as the global administrator of your Azure AD B2C tenant.
30
-
2. Make sure you're using the directory that contains your Azure AD B2C tenant. Select the **Directory + subscription** filter in the top menu and choose the directory that contains your tenant.
31
-
3. Choose **All services** in the top-left corner of the Azure portal, search for and select **Azure AD B2C**.
32
-
4. On the Overview page, select **Identity Experience Framework**.
30
+
1. Sign in to the [Azure portal](https://portal.azure.com)
31
+
1. Use the **Directory + subscription** filter in the top menu to select the directory that contains your Azure AD B2C tenant.
32
+
1. In the left menu, select **Azure AD B2C**. Or, select **All services** and search for and select **Azure AD B2C**.
33
+
1. On the Overview page, select **Identity Experience Framework**.
33
34
34
35
### Create the signing key
35
36
36
37
1. Select **Policy Keys** and then select **Add**.
37
-
2. For **Options**, choose `Generate`.
38
-
3. In **Name**, enter `TokenSigningKeyContainer`. The prefix `B2C_1A_` might be added automatically.
39
-
4. For **Key type**, select **RSA**.
40
-
5. For **Key usage**, select **Signature**.
41
-
6. Click**Create**.
38
+
1. For **Options**, choose `Generate`.
39
+
1. In **Name**, enter `TokenSigningKeyContainer`. The prefix `B2C_1A_` might be added automatically.
40
+
1. For **Key type**, select **RSA**.
41
+
1. For **Key usage**, select **Signature**.
42
+
1. Select**Create**.
42
43
43
44
### Create the encryption key
44
45
45
46
1. Select **Policy Keys** and then select **Add**.
46
-
2. For **Options**, choose `Generate`.
47
-
3. In **Name**, enter `TokenEncryptionKeyContainer`. The prefix `B2C_1A`_ might be added automatically.
48
-
4. For **Key type**, select **RSA**.
49
-
5. For **Key usage**, select **Encryption**.
50
-
6. Click**Create**.
47
+
1. For **Options**, choose `Generate`.
48
+
1. In **Name**, enter `TokenEncryptionKeyContainer`. The prefix `B2C_1A`_ might be added automatically.
49
+
1. For **Key type**, select **RSA**.
50
+
1. For **Key usage**, select **Encryption**.
51
+
1. Select**Create**.
51
52
52
53
### Create the Facebook key
53
54
54
-
If you already have a [Facebook application secret](active-directory-b2c-setup-fb-app.md), add it as a policy key to your tenant. Otherwise, you must create the key with a placeholder value so that your policies pass validation.
55
+
Add your Facebook application's [App Secret](active-directory-b2c-setup-fb-app.md)as a policy key. You can use the App Secret of the application you created as part of this article's prerequisites.
55
56
56
57
1. Select **Policy Keys** and then select **Add**.
57
-
2. For **Options**, choose `Manual`.
58
-
3. For **Name**, enter `FacebookSecret`. The prefix `B2C_1A_` might be added automatically.
59
-
4. In **Secret**, enter your Facebook secret from developers.facebook.com or `0` as a placeholder. This value is the secret, not the application ID.
60
-
5. For **Key usage**, select **Signature**.
61
-
6. Click**Create**.
58
+
1. For **Options**, choose `Manual`.
59
+
1. For **Name**, enter `FacebookSecret`. The prefix `B2C_1A_` might be added automatically.
60
+
1. In **Secret**, enter your Facebook application's *App Secret*from developers.facebook.com. This value is the secret, not the application ID.
@@ -74,19 +75,19 @@ Azure AD B2C requires you to register two applications that are used to sign up
74
75
1. For **Name**, enter `IdentityExperienceFramework`.
75
76
1. For **Application type**, choose **Web app/API**.
76
77
1. For **Sign-on URL**, enter `https://your-tenant-name.b2clogin.com/your-tenant-name.onmicrosoft.com`, where `your-tenant-name` is your Azure AD B2C tenant domain name. All URLs should now be using [b2clogin.com](b2clogin.md).
77
-
1.Click**Create**. After it's created, copy the application ID and save it to use later.
78
+
1.Select**Create**. After it's created, copy the application ID and save it to use later.
78
79
79
80
### Register the ProxyIdentityExperienceFramework application
80
81
81
82
1. In **App registrations (Legacy)**, select **New application registration**.
82
-
2. For **Name**, enter `ProxyIdentityExperienceFramework`.
83
-
3. For **Application type**, choose **Native**.
84
-
4. For **Redirect URI**, enter `https://your-tenant-name.b2clogin.com/your-tenant-name.onmicrosoft.com`, where `your-tenant-name` is your Azure AD B2C tenant.
85
-
5. Click**Create**. After it's created, copy the application ID and save it to use later.
86
-
6. On the Settings page, select **Required permissions**, and then select **Add**.
87
-
7. Choose **Select an API**, search for and select **IdentityExperienceFramework**, and then click **Select**.
88
-
9. Select the check box next to **Access IdentityExperienceFramework**, click **Select**, and then click **Done**.
89
-
10. Select **Grant Permissions**, and then confirm by selecting **Yes**.
83
+
1. For **Name**, enter `ProxyIdentityExperienceFramework`.
84
+
1. For **Application type**, choose **Native**.
85
+
1. For **Redirect URI**, enter `https://your-tenant-name.b2clogin.com/your-tenant-name.onmicrosoft.com`, where `your-tenant-name` is your Azure AD B2C tenant.
86
+
1. Select**Create**. After it's created, copy the application ID and save it to use later.
87
+
1. Select **Settings**, then select **Required permissions**, and then select **Add**.
88
+
1. Choose **Select an API**, search for and select **IdentityExperienceFramework**, and then click **Select**.
89
+
1. Select the check box next to **Access IdentityExperienceFramework**, click **Select**, and then click **Done**.
90
+
1. Select **Grant permissions**, and then confirm by selecting **Yes**.
90
91
91
92
## Custom policy starter pack
92
93
@@ -156,7 +157,6 @@ As you upload the files, Azure adds the prefix `B2C_1A_` to each.
156
157
157
158
## Add Facebook as an identity provider
158
159
159
-
1. Complete the steps in [Set up sign-up and sign-in with a Facebook account](active-directory-b2c-setup-fb-app.md) to configure a Facebook application.
160
160
1. In the `SocialAndLocalAccounts/`**`TrustFrameworkExtensions.xml`** file, replace the value of `client_id` with the Facebook application ID:
161
161
162
162
```xml
@@ -168,7 +168,7 @@ As you upload the files, Azure adds the prefix `B2C_1A_` to each.
168
168
169
169
1. Upload the *TrustFrameworkExtensions.xml* file to your tenant.
170
170
1. Under **Custom policies**, select **B2C_1A_signup_signin**.
171
-
1. Select **Run now** and select Facebook to sign in with Facebook and test the custom policy. Or, invoke the policy directly from your registered application.
171
+
1. Select **Run now** and select Facebook to sign in with Facebook and test the custom policy.
title: Disable email verification during consumer sign-up in Azure Active Directory B2C | Microsoft Docs
3
-
description: A topic demonstrating how to disable email verification during consumer sign-up in Azure Active Directory B2C.
2
+
title: Disable email verification during customer sign-up in Azure Active Directory B2C
3
+
description: Learn how to disable email verification during customer sign-up in Azure Active Directory B2C.
4
4
services: active-directory-b2c
5
5
author: mmacy
6
6
manager: celestedg
7
7
8
8
ms.service: active-directory
9
9
ms.workload: identity
10
10
ms.topic: conceptual
11
-
ms.date: 11/30/2018
11
+
ms.date: 09/25/2018
12
12
ms.author: marsma
13
13
ms.subservice: B2C
14
14
---
15
15
16
-
# Disable email verification during consumer sign-up in Azure Active Directory B2C
17
-
When enabled, Azure Active Directory B2C (Azure AD B2C) gives a consumer the ability to sign up for applications by providing an email address and creating a local account. Azure AD B2C ensures valid email addresses by requiring consumers to verify them during the sign-up process. It also prevents a malicious automated process from generating fake accounts for the applications.
16
+
# Disable email verification during customer sign-up in Azure Active Directory B2C
18
17
19
-
Some application developers prefer to skip email verification during the sign-up process and instead have consumers verify the email address later. To support this, Azure AD B2C can be configured to disable email verification. Doing so creates a smoother sign-up process and gives developers the flexibility to differentiate the consumers that have verified their email address from those consumers that have not.
18
+
By default, Azure Active Directory B2C (Azure AD B2C) verifies your customer's email address for local accounts (accounts for users who sign up with email address or username). Azure AD B2C ensures valid email addresses by requiring customers to verify them during the sign-up process. It also prevents a malicious actors from using automated processes to generate fraudulent accounts in your applications.
20
19
21
-
By default, sign-up user flows have email verification turned on. Use the following steps to turn it off:
20
+
Some application developers prefer to skip email verification during the sign-up process and instead have customers verify their email address later. To support this, Azure AD B2C can be configured to disable email verification. Doing so creates a smoother sign-up process and gives developers the flexibility to differentiate customers that have verified their email address from customers that have not.
22
21
23
-
1. Click **User flows**.
24
-
2. Click your user flow (for example, "B2C_1_SiUp") to open it.
25
-
3. Click **Page layouts**.
26
-
4. Click **Local account sign-up page**.
27
-
5. Click **Email Address** in the **Name** column under the **User attributes** section.
28
-
6. Under **Requires verification**, select **No**.
29
-
7. Click **Save** at the top of the blade. You're done!
22
+
Follow these steps to disable email verification:
30
23
31
-
> [!NOTE]
32
-
> Disabling email verification in the sign-up process may lead to spam. If you disable the default one, we recommend adding your own verification system.
33
-
>
34
-
>
24
+
1. Sign in to the [Azure portal](https://portal.azure.com)
25
+
1. Use the **Directory + subscription** filter in the top menu to select the directory that contains your Azure AD B2C tenant.
26
+
1. In the left menu, select **Azure AD B2C**. Or, select **All services** and search for and select **Azure AD B2C**.
27
+
1. Select **User flows**.
28
+
1. Select the user flow for which you want to disable email verification. For example, *B2C_1_signinsignup*.
29
+
1. Select **Page layouts**.
30
+
1. Select **Local account sign-up page**.
31
+
1. Under **User attributes**, select **Email Address**.
32
+
1. In the **REQUIRES VERIFICATION** drop down, select **No**.
33
+
1. Select **Save**. Email verification is now disabled for this user flow.
34
+
35
+
> [!WARNING]
36
+
> Disabling email verification in the sign-up process may lead to spam. If you disable the default Azure AD B2C-provided email verification, we recommend that you implement a replacement verification system.
Copy file name to clipboardExpand all lines: articles/active-directory-b2c/active-directory-b2c-reference-threat-management.md
+5-5Lines changed: 5 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,7 +8,7 @@ manager: celestedg
8
8
ms.service: active-directory
9
9
ms.workload: identity
10
10
ms.topic: conceptual
11
-
ms.date: 07/10/2019
11
+
ms.date: 09/26/2019
12
12
ms.author: marsma
13
13
ms.subservice: B2C
14
14
---
@@ -32,10 +32,10 @@ The first 10 lockout periods are one minute long. The next 10 lockout periods ar
32
32
33
33
To manage password protection settings, including the lockout threshold:
34
34
35
-
1.Navigate to the [Azure portal](https://portal.azure.com).
36
-
1.Select the **Directory + Subscription** filter in the top-right menu of the portal, then select your Azure AD B2C tenant.
37
-
1.Select **Azure Active Directory** in the left-hand menu (or select **All services**in the upper-left section of the portal, then search for and select *Azure Active Directory*).
38
-
1. Under **Security**, select **Authentication methods**, then select **Password protection**.
35
+
1.Sign in to the [Azure portal](https://portal.azure.com)
36
+
1.Use the **Directory + subscription** filter in the top menu to select the directory that contains your Azure AD B2C tenant.
37
+
1.In the left menu, select **Azure AD B2C**. Or, select **All services**and search for and select **Azure AD B2C**.
38
+
1. Under **Security**, select **Authentication methods (Preview)**, then select **Password protection**.
39
39
1. Enter your desired password protection settings, then select **Save**.
40
40
41
41

Copy file name to clipboardExpand all lines: articles/active-directory-b2c/active-directory-b2c-setup-fb-app.md
+6-6Lines changed: 6 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,7 +8,7 @@ manager: celestedg
8
8
ms.service: active-directory
9
9
ms.workload: identity
10
10
ms.topic: conceptual
11
-
ms.date: 08/08/2019
11
+
ms.date: 09/26/2019
12
12
ms.author: marsma
13
13
ms.subservice: B2C
14
14
---
@@ -21,20 +21,20 @@ To use a Facebook account as an [identity provider](active-directory-b2c-referen
21
21
22
22
1. Sign in to [Facebook for developers](https://developers.facebook.com/) with your Facebook account credentials.
23
23
1. If you have not already done so, you need to register as a Facebook developer. To do this, select **Get Started** on the upper-right corner of the page, accept Facebook's policies, and complete the registration steps.
24
-
1. Select **My Apps** and then **Add New App**.
24
+
1. Select **My Apps** and then **Create App**.
25
25
1. Enter a **Display Name** and a valid **Contact Email**.
26
-
1.Click**Create App ID**. This may require you to accept Facebook platform policies and complete an online security check.
26
+
1.Select**Create App ID**. This may require you to accept Facebook platform policies and complete an online security check.
27
27
1. Select **Settings** > **Basic**.
28
28
1. Choose a **Category**, for example `Business and Pages`. This value is required by Facebook, but not used for Azure AD B2C.
29
29
1. At the bottom of the page, select **Add Platform**, and then select **Website**.
30
30
1. In **Site URL**, enter `https://your-tenant-name.b2clogin.com/` replacing `your-tenant-name` with the name of your tenant. Enter a URL for the **Privacy Policy URL**, for example `http://www.contoso.com`. The policy URL is a page you maintain to provide privacy information for your application.
31
31
1. Select **Save Changes**.
32
32
1. At the top of the page, copy the value of **App ID**.
33
-
1.Click**Show** and copy the value of **App Secret**. You use both of them to configure Facebook as an identity provider in your tenant. **App Secret** is an important security credential.
33
+
1.Select**Show** and copy the value of **App Secret**. You use both of them to configure Facebook as an identity provider in your tenant. **App Secret** is an important security credential.
34
34
1. Select the plus sign next to **PRODUCTS**, and then select **Set up** under **Facebook Login**.
35
35
1. Under **Facebook Login**, select **Settings**.
36
-
1. In **Valid OAuth redirect URIs**, enter `https://your-tenant-name.b2clogin.com/your-tenant-name.onmicrosoft.com/oauth2/authresp`. Replace `your-tenant-name` with the name of your tenant. Click**Save Changes** at the bottom of the page.
37
-
1. To make your Facebook application available to Azure AD B2C, click the Status selector at the top right of the page and turn it **On** to make the Application public, and then click**Confirm**. At this point the Status should change from **Development** to **Live**.
36
+
1. In **Valid OAuth redirect URIs**, enter `https://your-tenant-name.b2clogin.com/your-tenant-name.onmicrosoft.com/oauth2/authresp`. Replace `your-tenant-name` with the name of your tenant. Select**Save Changes** at the bottom of the page.
37
+
1. To make your Facebook application available to Azure AD B2C, select the Status selector at the top right of the page and turn it **On** to make the Application public, and then select**Switch Mode**. At this point the Status should change from **Development** to **Live**.
38
38
39
39
## Configure a Facebook account as an identity provider
0 commit comments