You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory-b2c/b2clogin.md
+5-6Lines changed: 5 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,15 +1,15 @@
1
1
---
2
2
title: Migrate applications and APIs to b2clogin.com
3
3
titleSuffix: Azure AD B2C
4
-
description: Learn about using b2clogin.com in your redirect URLs for Azure Active Directory B2C.
4
+
description: Learn how to update redirect URLs in Azure AD B2C applications to use b2clogin.com or a custom domain for authentication endpoints.
5
5
6
6
author: kengaderdus
7
7
manager: CelesteDG
8
8
9
9
ms.service: azure-active-directory
10
10
11
11
ms.topic: how-to
12
-
ms.date: 01/26/2024
12
+
ms.date: 02/26/2025
13
13
ms.author: kengaderdus
14
14
ms.subservice: b2c
15
15
@@ -40,9 +40,9 @@ With Azure AD B2C [custom domain](./custom-domain.md) the corresponding updated
40
40
- <code>https://<b>login.contoso.com</b>/\<tenant-name\>.onmicrosoft.com/<b>\<policy-name\></b>/oauth2/v2.0/authorize</code> or <code>https://<b>login.contoso.com</b>/\<tenant-name\>.onmicrosoft.com/oauth2/v2.0/authorize?<b>p=\<policy-name\></b></code> for the `/authorize` endpoint.
41
41
- <code>https://<b>login.contoso.com</b>/\<tenant-name\>.onmicrosoft.com/<b>\<policy-name\></b>/oauth2/v2.0/logout</code> or <code>https://<b>login.contoso.com</b>/\<tenant-name\>.onmicrosoft.com/oauth2/v2.0/logout?<b>p=\<policy-name\></b></code> for the `/logout` endpoint.
42
42
43
-
## Endpoints that are not affected
43
+
## Endpoints that aren't affected
44
44
45
-
Some customers use the shared capabilities of Microsoft Entra enterprise tenants. For example, acquiring an access token to call the [MS Graph API](microsoft-graph-operations.md#code-discussion) of the Azure AD B2C tenant.
45
+
Some customers use the shared capabilities of Microsoft Entra enterprise tenants. For example, acquiring an access token to call the [MS Graph API](microsoft-graph-operations.md) of the Azure AD B2C tenant.
46
46
47
47
This change doesn't affect all endpoints, which don't contain a policy parameter in the URL. They're accessed only with the Microsoft Entra ID's login.microsoftonline.com endpoints, and can't be used with the *b2clogin.com*, or custom domains. The following example shows a valid token endpoint of the Microsoft identity platform:
48
48
@@ -64,7 +64,6 @@ There are several modifications you might need to make to migrate your applicati
64
64
* Update your Azure AD B2C applications to use *b2clogin.com*, or custom domain in their user flow and token endpoint references. The change may include updating your use of an authentication library like Microsoft Authentication Library (MSAL).
65
65
* Update any **Allowed Origins** that you define in the CORS settings for [user interface customization](customize-ui-with-html.md).
66
66
67
-
68
67
## Change identity provider redirect URLs
69
68
70
69
On each identity provider's website in which you've created an application, change all trusted URLs to redirect to `your-tenant-name.b2clogin.com`, or a custom domain instead of *login.microsoftonline.com*.
@@ -146,7 +145,7 @@ this.clientApplication = new UserAgentApplication(
146
145
);
147
146
```
148
147
149
-
## Next steps
148
+
## Related content
150
149
151
150
For information about migrating OWIN-based web applications to b2clogin.com, see [Migrate an OWIN-based web API to b2clogin.com](multiple-token-endpoints.md).
Copy file name to clipboardExpand all lines: articles/active-directory-b2c/custom-email-mailjet.md
+6-6Lines changed: 6 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -9,7 +9,7 @@ manager: CelesteDG
9
9
ms.service: azure-active-directory
10
10
11
11
ms.topic: how-to
12
-
ms.date: 01/11/2024
12
+
ms.date: 02/21/2025
13
13
ms.author: kengaderdus
14
14
ms.subservice: b2c
15
15
zone_pivot_groups: b2c-policy-type
@@ -33,7 +33,7 @@ Use custom email in Azure Active Directory B2C (Azure AD B2C) to send customized
33
33
34
34
::: zone pivot="b2c-custom-policy"
35
35
36
-
Custom email verification requires the use of a third-party email provider like [Mailjet](https://www.mailjet.com/), [SendGrid](./custom-email-sendgrid.md), or [SparkPost](https://messagebird.com/email/cloud-sending?sp=true), a custom REST API, or any HTTP-based email provider (including your own). This article describes setting up a solution that uses Mailjet.
36
+
Custom email verification requires the use of a third-party email provider like [Mailjet](https://www.mailjet.com/), [SendGrid](./custom-email-sendgrid.md), or [SparkPost](https://messagebird.com/support-center/omnichannel-and-connectivity/sms/sending-email-to-sms?sp=true), a custom REST API, or any HTTP-based email provider (including your own). This article describes setting up a solution that uses Mailjet.
37
37
38
38
## Create a Mailjet account
39
39
@@ -74,7 +74,7 @@ With a Mailjet account created and the Mailjet API key stored in an Azure AD B2C
74
74
1. On the Mailjet site, open the [transactional templates](https://app.mailjet.com/templates/transactional) page and select **Create a new template**.
75
75
1. Select **By coding it in HTML**, and then select **Code from scratch**.
76
76
1. Enter a unique template name like `Verification email`, and then select **Create**.
77
-
1. In the HTML editor, paste following HTML template or use your own. The `{{var:otp:""}}` and `{{var:email:""}}` parameters will be replaced dynamically with the one-time password value and the user email address.
77
+
1. In the HTML editor, paste following HTML template or use your own. The `{{var:otp:""}}` and `{{var:email:""}}` parameters are replaced dynamically with the one-time password value and the user email address.
78
78
79
79
```HTML
80
80
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN""http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
@@ -210,7 +210,7 @@ These claims types are necessary to generate and verify the email address using
210
210
211
211
## Add the claims transformation
212
212
213
-
Next, you need a claims transformation to output a JSON string claim that will be the body of the request sent to Mailjet.
213
+
Next, you need a claims transformation to output a JSON string claim that's the body of the request sent to Mailjet.
214
214
215
215
The JSON object's structure is defined by the IDs in dot notation of the InputParameters and the TransformationClaimTypes of the InputClaims. Numbers in the dot notation imply arrays. The values come from the InputClaims' values and the InputParameters' "Value" properties. For more information about JSON claims transformations, see [JSON claims transformations](json-transformations.md).
216
216
@@ -572,9 +572,9 @@ The Localization element allows you to support multiple locales or languages in
572
572
```
573
573
574
574
575
-
## Next steps
575
+
## Related content
576
576
577
577
- You can find an example of a [Custom email verification - DisplayControls](https://github.com/azure-ad-b2c/samples/tree/master/policies/custom-email-verifcation-displaycontrol/policy/Mailjet) custom policy on GitHub.
578
578
- For information about using a custom REST API or any HTTP-based SMTP email provider, see [Define a RESTful technical profile in an Azure AD B2C custom policy](restful-technical-profile.md).
Copy file name to clipboardExpand all lines: articles/active-directory-b2c/custom-email-sendgrid.md
+5-5Lines changed: 5 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -9,7 +9,7 @@ manager: CelesteDG
9
9
ms.service: azure-active-directory
10
10
11
11
ms.topic: how-to
12
-
ms.date: 01/11/2024
12
+
ms.date: 02/21/2025
13
13
ms.author: kengaderdus
14
14
ms.subservice: b2c
15
15
zone_pivot_groups: b2c-policy-type
@@ -33,7 +33,7 @@ Use custom email in Azure Active Directory B2C (Azure AD B2C) to send customized
33
33
34
34
::: zone pivot="b2c-custom-policy"
35
35
36
-
Custom email verification requires the use of a third-party email provider like [SendGrid](https://sendgrid.com), [Mailjet](https://www.mailjet.com/), or [SparkPost](https://messagebird.com/email/cloud-sending?sp=true), a custom REST API, or any HTTP-based email provider (including your own). This article describes setting up a solution that uses SendGrid.
36
+
Custom email verification requires the use of a third-party email provider like [SendGrid](https://sendgrid.com), [Mailjet](https://www.mailjet.com/), or [SparkPost](https://messagebird.com/support-center/omnichannel-and-connectivity/sms/sending-email-to-sms?sp=true), a custom REST API, or any HTTP-based email provider (including your own). This article describes setting up a solution that uses SendGrid.
37
37
38
38
## Create a SendGrid account
39
39
@@ -42,7 +42,7 @@ If you don't already have one, start by setting up a SendGrid account. For setup
42
42
Make sure you complete the section in which you [create a SendGrid API key](https://docs.sendgrid.com/for-developers/partners/microsoft-azure-2021#to-find-your-sendgrid-api-key). Record the API key for use in a later step.
43
43
44
44
> [!IMPORTANT]
45
-
> SendGrid offers customers the ability to send emails from shared IP and [dedicated IP addresses](https://docs.sendgrid.com/ui/account-and-settings/dedicated-ip-addresses). When using dedicated IP addresses, you need to build your own reputation properly with an IP address warm-up. For more information, see [Warming Up An Ip Address](https://docs.sendgrid.com/ui/sending-email/warming-up-an-ip-address).
45
+
> SendGrid offers customers the ability to send emails from shared IP and [dedicated IP addresses](https://docs.sendgrid.com/ui/account-and-settings/dedicated-ip-addresses). When using dedicated IP addresses, you need to build your own reputation properly with an IP address warm-up. For more information, see [Warming Up An IP Address](https://www.twilio.com/docs/sendgrid/ui/sending-email/warming-up-an-ip-address).
46
46
47
47
## Create Azure AD B2C policy key
48
48
@@ -558,9 +558,9 @@ The Localization element allows you to support multiple locales or languages in
558
558
```
559
559
560
560
561
-
## Next steps
561
+
## Related content
562
562
563
563
- Find an example of [Custom email verification - DisplayControls custom policy](https://github.com/azure-ad-b2c/samples/tree/master/policies/custom-email-verifcation-displaycontrol/policy/SendGrid) on GitHub.
564
564
- Learn how to use a custom REST API or any HTTP-based SMTP email provider, see [Define a RESTful technical profile in an Azure AD B2C custom policy](restful-technical-profile.md).
Copy file name to clipboardExpand all lines: articles/active-directory-b2c/enable-authentication-python-web-app.md
+8-8Lines changed: 8 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,5 +1,5 @@
1
1
---
2
-
title: Enable authentication in your own Python web application using Azure Active Directory B2C
2
+
title: Enable authentication in your own Python web application using Azure AD B2C
3
3
description: This article explains how to enable authentication in your own Python web application using Azure AD B2C
4
4
titleSuffix: Azure AD B2C
5
5
@@ -8,23 +8,23 @@ manager: CelesteDG
8
8
ms.service: azure-active-directory
9
9
ms.custom: devx-track-python
10
10
ms.topic: how-to
11
-
ms.date: 01/11/2024
11
+
ms.date: 02/21/2025
12
12
ms.author: kengaderdus
13
13
ms.subservice: b2c
14
14
#Customer intent: As a Python web application developer, I want to enable Azure Active Directory B2C authentication in my application, so that users can sign in, sign out, update their profile, and reset their password using Azure AD B2C user flows.
15
15
---
16
16
17
17
# Enable authentication in your own Python web application using Azure Active Directory B2C
18
18
19
-
In this article, you'll learn how to add Azure Active Directory B2C (Azure AD B2C) authentication in your own Python web application. You'll enable users to sign in, sign out, update profile and reset password using Azure AD B2C user flows. This article uses [Microsoft Authentication Library (MSAL) for Python](https://github.com/AzureAD/microsoft-authentication-library-for-python/tree/main) to simplify adding authentication to your Python web application.
19
+
In this article, you learn how to add Azure Active Directory B2C (Azure AD B2C) authentication in your own Python web application. You enable users to sign in, sign out, update profile and reset password using Azure AD B2C user flows. This article uses [Microsoft Authentication Library (MSAL) for Python](https://github.com/AzureAD/microsoft-authentication-library-for-python/tree/main) to simplify adding authentication to your Python web application.
20
20
21
21
The aim of this article is to substitute the sample application you used in [Configure authentication in a sample Python web application by using Azure AD B2C](configure-authentication-sample-python-web-app.md) with your own Python application.
22
22
23
-
This article uses [Python 3.9+](https://www.python.org/) and [Flask 2.1](https://flask.palletsprojects.com/en/2.1.x/) to create a basic web app. The application's views uses[Jinja2 templates](https://flask.palletsprojects.com/en/2.1.x/templating/).
23
+
This article uses [Python 3.9+](https://www.python.org/) and [Flask 2.1](https://flask.palletsprojects.com/en/stable/installation/) to create a basic web app. The application's views use[Jinja2 templates](https://flask.palletsprojects.com/en/2.1.x/templating/).
24
24
25
25
## Prerequisites
26
26
27
-
- Complete the steps in [Configure authentication in a sample Python web application by using Azure AD B2C](configure-authentication-sample-python-web-app.md). You'll create Azure AD B2C user flows and register a web application in Azure portal.
27
+
- Complete the steps in [Configure authentication in a sample Python web application by using Azure AD B2C](configure-authentication-sample-python-web-app.md). You create Azure AD B2C user flows and register a web application in Azure portal.
28
28
- Install [Python](https://www.python.org/downloads/) 3.9 or above
29
29
-[Visual Studio Code](https://code.visualstudio.com/) or another code editor
30
30
- Install the [Python extension](https://marketplace.visualstudio.com/items?itemName=ms-python.python) for Visual Studio Code
Flask is a lightweight Python framework for web applications that provides the basics for URL routing and page rendering. It leverages Jinja2 as its template engine to render the content of your app. For more information, check out the [template designer documentation](https://jinja.palletsprojects.com/en/3.1.x/templates/). In this section, you add the required templates that provide the basic functionality of your web app.
129
+
Flask is a lightweight Python framework for web applications that provides the basics for URL routing and page rendering. It uses Jinja2 as its template engine to render the content of your app. For more information, check out the [template designer documentation](https://jinja.palletsprojects.com/en/3.1.x/templates/). In this section, you add the required templates that provide the basic functionality of your web app.
130
130
131
131
### Step 3.1 Create a base template
132
132
@@ -475,6 +475,6 @@ To change the host name and/or port number, use the `args` array of the `launch.
475
475
476
476
477
477
478
-
## Next steps
478
+
## Related content
479
479
480
-
- Learn how to [customize and enhance the Azure AD B2C authentication experience for your web app](enable-authentication-python-web-app-options.md)
480
+
- Learn how to [customize and enhance the Azure AD B2C authentication experience for your web app](enable-authentication-python-web-app-options.md)
Copy file name to clipboardExpand all lines: articles/active-directory-b2c/microsoft-graph-operations.md
+2-56Lines changed: 2 additions & 56 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -218,65 +218,11 @@ You can manage Microsoft Graph in two ways:
218
218
> [!NOTE]
219
219
> Delegated permissions for users signing in through user flows or custom policies can't be used against delegated permissions for Microsoft Graph API.
220
220
221
-
## Code sample: How to programmatically manage user accounts
222
-
223
-
This code sample is a .NET Core console application that uses the [Microsoft Graph SDK](/graph/sdks/sdks-overview) to interact with Microsoft Graph API. Its code demonstrates how to call the API to programmatically manage users in an Azure AD B2C tenant.
224
-
You can [download the sample archive](https://github.com/Azure-Samples/ms-identity-dotnetcore-b2c-account-management/archive/master.zip) (*.zip), [browse the repository](https://github.com/Azure-Samples/ms-identity-dotnetcore-b2c-account-management) on GitHub, or clone the repository:
After you've obtained the code sample, configure it for your environment and then build the project:
231
-
232
-
1. Open the project in [Visual Studio](https://visualstudio.microsoft.com) or [Visual Studio Code](https://code.visualstudio.com).
233
-
1. Open `src/appsettings.json`.
234
-
1. In the `appSettings` section, replace `your-b2c-tenant` with the name of your tenant, and `Application (client) ID` and `Client secret` with the values for your management application registration. For more information, see [Register a Microsoft Graph Application](microsoft-graph-get-started.md).
235
-
1. Open a console window within your local clone of the repo, switch into the `src` directory, then build the project:
236
-
237
-
```console
238
-
cd src
239
-
dotnet build
240
-
```
241
-
242
-
1. Run the application with the `dotnet` command:
243
-
244
-
```console
245
-
dotnet bin/Debug/netcoreapp3.1/b2c-ms-graph.dll
246
-
```
247
-
248
-
The application displays a list of commands you can execute. For example, get all users, get a single user, delete a user, update a user's password, and bulk import.
249
-
250
-
> [!NOTE]
251
-
> For the application to update user account passwords, you need to [grant the user administrator role](microsoft-graph-get-started.md#optional-grant-user-administrator-role) to the application.
252
-
253
-
### Code discussion
254
-
255
-
The sample code uses the [Microsoft Graph SDK](/graph/sdks/sdks-overview), which is designed to simplify building high-quality, efficient, and resilient applications that access Microsoft Graph.
256
-
257
-
Any request to the Microsoft Graph API requires an access token for authentication. The solution makes use of the [Microsoft.Graph.Auth](https://www.nuget.org/packages/Microsoft.Graph.Auth/) NuGet package that provides an authentication scenario-based wrapper of the Microsoft Authentication Library (MSAL) for use with the Microsoft Graph SDK.
258
-
259
-
The `RunAsync` method in the _Program.cs_ file:
260
-
261
-
1. Reads application settings from the _appsettings.json_ file
262
-
1. Initializes the auth provider using [OAuth 2.0 client credentials grant](../active-directory/develop/v2-oauth2-client-creds-grant-flow.md) flow. With the client credentials grant flow, the app is able to get an access token to call the Microsoft Graph API.
263
-
1. Sets up the Microsoft Graph service client with the auth provider:
264
-
265
-
The previously published sample code isn't available at this time.
The initialized _GraphServiceClient_ is then used in _UserService.cs_ to perform the user management operations. For example, getting a list of the user accounts in the tenant:
269
-
270
-
The previously published sample code isn't available at this time.
[Make API calls using the Microsoft Graph SDKs](/graph/sdks/create-requests) includes information on how to read and write information from Microsoft Graph, use `$select` to control the properties returned, provide custom query parameters, and use the `$filter` and `$orderBy` query parameters.
274
-
275
221
## Related content
276
-
- For code samples in JavaScript and Node.js, please see: [Manage B2C user accounts with MSAL.js and Microsoft Graph SDK](https://github.com/Azure-Samples/ms-identity-b2c-javascript-nodejs-management)
222
+
-Explore [Microsoft Graph API](/graph/overview)
277
223
- Explore [Graph Explorer](https://aka.ms/ge) that lets you try Microsoft Graph APIs and learn about them.
Copy file name to clipboardExpand all lines: includes/active-directory-b2c-appreg-ropc.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,7 +3,7 @@ author: kengaderdus
3
3
ms.service: active-directory-b2c
4
4
ms.subservice: B2C
5
5
ms.topic: include
6
-
ms.date: 10/08/2021
6
+
ms.date: 02/25/2025
7
7
ms.author: kengaderdus
8
8
# Used by the ROPC configuration articles for both user flows and custom policies.
9
9
---
@@ -25,7 +25,7 @@ To register an application in your Azure AD B2C tenant, you can use our new unif
25
25
1. Under **Advanced settings**, and section **Enable the following mobile and desktop flows**, select **Yes** to treat the application as a public client. This setting is required for the ROPC flow.
26
26
1. Select **Save**.
27
27
1. In the left menu, select **Manifest** to open the manifest editor.
28
-
1. Set the **oauth2AllowImplicitFlow** attribute to *true*:
28
+
1. Set the **oauth2AllowImplicitFlow** attribute to *true*. If the attribute doesn't exist, add it:
0 commit comments