Skip to content

Commit f611b3f

Browse files
authored
Merge pull request #151485 from MicrosoftDocs/master
3/22 AM Publish
2 parents 2c1b933 + 078afc2 commit f611b3f

File tree

313 files changed

+3088
-1814
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

313 files changed

+3088
-1814
lines changed

articles/active-directory-b2c/TOC.yml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -496,6 +496,7 @@
496496
href: custom-policy-developer-notes.md
497497
- name: Page layout versions
498498
href: page-layout.md
499+
displayName: Page version
499500
- name: Region availability & data residency
500501
href: data-residency.md
501502
- name: Build for resilience

articles/active-directory-b2c/identity-provider-apple-id.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: celestedg
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: how-to
12-
ms.date: 03/15/2021
12+
ms.date: 03/22/2021
1313
ms.custom: project-no-code
1414
ms.author: mimart
1515
ms.subservice: B2C
@@ -203,8 +203,8 @@ You can define an Apple ID as a claims provider by adding it to the **ClaimsProv
203203
<OutputClaim ClaimTypeReferenceId="issuerUserId" PartnerClaimType="sub" />
204204
<OutputClaim ClaimTypeReferenceId="identityProvider" DefaultValue="https://appleid.apple.com" AlwaysUseDefaultValue="true" />
205205
<OutputClaim ClaimTypeReferenceId="authenticationSource" DefaultValue="socialIdpAuthentication" AlwaysUseDefaultValue="true" />
206-
<OutputClaim ClaimTypeReferenceId="givenName" PartnerClaimType="user.firstName"/>
207-
<OutputClaim ClaimTypeReferenceId="surname" PartnerClaimType="user.lastName"/>
206+
<OutputClaim ClaimTypeReferenceId="givenName" PartnerClaimType="user.name.firstName"/>
207+
<OutputClaim ClaimTypeReferenceId="surname" PartnerClaimType="user.name.lastName"/>
208208
<OutputClaim ClaimTypeReferenceId="email" PartnerClaimType="user.email"/>
209209
</OutputClaims>
210210
<OutputClaimsTransformations>

articles/active-directory-b2c/javascript-and-page-layout.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: celestedg
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: how-to
12-
ms.date: 12/10/2020
12+
ms.date: 03/22/2021
1313
ms.custom: project-no-code, devx-track-js
1414
ms.author: mimart
1515
ms.subservice: B2C
@@ -151,7 +151,7 @@ Follow these guidelines when you customize the interface of your application usi
151151
- Don't use JavaScript directly to call Azure AD B2C endpoints.
152152
- You can embed your JavaScript or you can link to external JavaScript files. When using an external JavaScript file, make sure to use the absolute URL and not a relative URL.
153153
- JavaScript frameworks:
154-
- Azure AD B2C uses a specific version of jQuery. Don’t include another version of jQuery. Using more than one version on the same page causes issues.
154+
- Azure AD B2C uses a [specific version of jQuery](page-layout.md#jquery-version). Don’t include another version of jQuery. Using more than one version on the same page causes issues.
155155
- Using RequireJS isn't supported.
156156
- Most JavaScript frameworks are not supported by Azure AD B2C.
157157
- Azure AD B2C settings can be read by calling `window.SETTINGS`, `window.CONTENT` objects, such as the current UI language. Don’t change the value of these objects.

articles/active-directory-b2c/microsoft-graph-operations.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -135,7 +135,7 @@ For more information about accessing Azure AD B2C audit logs, see [Accessing Azu
135135

136136
## Conditional Access
137137

138-
- [List all of the Conditional Access policies](/graph/api/resources/conditionalaccessroot-list-policies)
138+
- [List all of the Conditional Access policies](/graph/api/conditionalaccessroot-list-policies?view=graph-rest-beta&tabs=http)
139139
- [Read properties and relationships of a Conditional Access policy](/graph/api/conditionalaccesspolicy-get)
140140
- [Create a new Conditional Access policy](/graph/api/resources/application)
141141
- [Update a Conditional Access policy](/graph/api/conditionalaccesspolicy-update)

articles/active-directory-b2c/page-layout.md

Lines changed: 11 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: celestedg
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: reference
12-
ms.date: 03/09/2021
12+
ms.date: 03/22/2021
1313
ms.author: mimart
1414
ms.subservice: B2C
1515
---
@@ -18,6 +18,16 @@ ms.subservice: B2C
1818

1919
Page layout packages are periodically updated to include fixes and improvements in their page elements. The following change log specifies the changes introduced in each version.
2020

21+
## jQuery version
22+
23+
Azure AD B2C page layout uses the following version of the [jQuery library](https://jquery.com/):
24+
25+
|From page layout version |jQuery version |
26+
|---------|---------|
27+
|2.1.4 | 3.5.1 |
28+
|1.2.0 | 3.4.1 |
29+
|1.1.0 | 1.10.2 |
30+
2131
## Self-asserted page (selfasserted)
2232

2333
**2.1.2**

articles/active-directory-b2c/tutorial-create-user-flows.md

Lines changed: 21 additions & 22 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ manager: celestedg
88
ms.service: active-directory
99
ms.workload: identity
1010
ms.topic: tutorial
11-
ms.date: 12/16/2020
11+
ms.date: 03/22/2021
1212
ms.author: mimart
1313
ms.subservice: B2C
1414
---
@@ -21,8 +21,9 @@ In this article, you learn how to:
2121

2222
> [!div class="checklist"]
2323
> * Create a sign-up and sign-in user flow
24+
> * Enable self-service password reset
2425
> * Create a profile editing user flow
25-
> * Create a password reset user flow
26+
2627

2728
This tutorial shows you how to create some recommended user flows by using the Azure portal. If you're looking for information about how to set up a resource owner password credentials (ROPC) flow in your application, see [Configure the resource owner password credentials flow in Azure AD B2C](add-ropc-policy.md).
2829

@@ -81,6 +82,24 @@ The sign-up and sign-in user flow handles both sign-up and sign-in experiences w
8182
> [!NOTE]
8283
> The "Run user flow" experience is not currently compatible with the SPA reply URL type using authorization code flow. To use the "Run user flow" experience with these kinds of apps, register a reply URL of type "Web" and enable the implicit flow as described [here](tutorial-register-spa.md).
8384
85+
## Enable self-service password reset
86+
87+
To enable [self-service password reset](add-password-reset-policy.md) for the sign-up or sign-in user flow:
88+
89+
1. Select the sign-up or sign-in user flow you created.
90+
1. Under **Settings** in the left menu, select **Properties**.
91+
1. Under **Password complexity**, select **Self-service password reset**.
92+
1. Select **Save**.
93+
94+
### Test the user flow
95+
96+
1. Select the user flow you created to open its overview page, then select **Run user flow**.
97+
1. For **Application**, select the web application named *webapp1* that you previously registered. The **Reply URL** should show `https://jwt.ms`.
98+
1. Select **Run user flow**.
99+
1. From the sign-up or sign-in page, select **Forgot your password?**.
100+
1. Verify the email address of the account that you previously created, and then select **Continue**.
101+
1. You now have the opportunity to change the password for the user. Change the password and select **Continue**. The token is returned to `https://jwt.ms` and should be displayed to you.
102+
84103
## Create a profile editing user flow
85104

86105
If you want to enable users to edit their profile in your application, you use a profile editing user flow.
@@ -100,26 +119,6 @@ If you want to enable users to edit their profile in your application, you use a
100119
1. Click **Run user flow**, and then sign in with the account that you previously created.
101120
1. You now have the opportunity to change the display name and job title for the user. Click **Continue**. The token is returned to `https://jwt.ms` and should be displayed to you.
102121

103-
## Create a password reset user flow
104-
105-
To enable users of your application to reset their password, you use a password reset user flow.
106-
107-
1. In the Azure AD B2C tenant overview menu, select **User flows**, and then select **New user flow**.
108-
1. On the **Create a user flow** page, select the **Password reset** user flow.
109-
1. Under **Select a version**, select **Recommended**, and then select **Create**.
110-
1. Enter a **Name** for the user flow. For example, *passwordreset1*.
111-
1. For **Identity providers**, enable **Reset password using email address**.
112-
2. Under Application claims, click **Show more** and choose the claims that you want returned in the authorization tokens sent back to your application. For example, select **User's Object ID**.
113-
3. Click **OK**.
114-
4. Click **Create** to add the user flow. A prefix of *B2C_1* is automatically appended to the name.
115-
116-
### Test the user flow
117-
118-
1. Select the user flow you created to open its overview page, then select **Run user flow**.
119-
1. For **Application**, select the web application named *webapp1* that you previously registered. The **Reply URL** should show `https://jwt.ms`.
120-
1. Click **Run user flow**, verify the email address of the account that you previously created, and select **Continue**.
121-
1. You now have the opportunity to change the password for the user. Change the password and select **Continue**. The token is returned to `https://jwt.ms` and should be displayed to you.
122-
123122
## Next steps
124123

125124
In this article, you learned how to:

articles/active-directory/develop/authentication-national-cloud.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -51,7 +51,7 @@ The following table lists the base URLs for the Azure AD endpoints used to acqui
5151
|----------------|-------------------------|
5252
| Azure AD for US Government | `https://login.microsoftonline.us` |
5353
| Azure AD Germany| `https://login.microsoftonline.de` |
54-
| Azure AD China operated by 21Vianet | `https://login.chinacloudapi.cn` |
54+
| Azure AD China operated by 21Vianet | `https://login.partner.microsoftonline.cn/common` |
5555
| Azure AD (global service)| `https://login.microsoftonline.com` |
5656

5757
You can form requests to the Azure AD authorization or token endpoints by using the appropriate region-specific base URL. For example, for Azure Germany:

articles/active-directory/develop/scenario-web-app-sign-user-app-configuration.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -82,7 +82,7 @@ In ASP.NET Core, these settings are located in the [appsettings.json](https://gi
8282
// - "https://login.microsoftonline.com/" for Azure public cloud
8383
// - "https://login.microsoftonline.us/" for Azure US government
8484
// - "https://login.microsoftonline.de/" for Azure AD Germany
85-
// - "https://login.chinacloudapi.cn/" for Azure AD China operated by 21Vianet
85+
// - "https://login.partner.microsoftonline.cn/common" for Azure AD China operated by 21Vianet
8686
"Instance": "https://login.microsoftonline.com/",
8787

8888
// Azure AD audience among:

articles/active-directory/develop/single-sign-out-saml-protocol.md

Lines changed: 2 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -4,20 +4,19 @@ description: This article describes the Single Sign-Out SAML Protocol in Azure A
44
services: active-directory
55
author: kenwith
66
manager: CelesteDG
7-
87
ms.service: active-directory
98
ms.subservice: develop
109
ms.workload: identity
1110
ms.topic: conceptual
12-
ms.date: 07/19/2017
11+
ms.date: 03/22/2021
1312
ms.author: kenwith
1413
ms.custom: aaddev
1514
ms.reviewer: paulgarn
1615
---
1716

1817
# Single Sign-Out SAML Protocol
1918

20-
Azure Active Directory (Azure AD) supports the SAML 2.0 web browser single sign-out profile. For single sign-out to work correctly, the **LogoutURL** for the application must be explicitly registered with Azure AD during application registration. Azure AD uses the LogoutURL to redirect users after they're signed out.
19+
Azure Active Directory (Azure AD) supports the SAML 2.0 web browser single sign-out profile. For single sign-out to work correctly, the **LogoutURL** for the application must be explicitly registered with Azure AD during application registration. If the app is [added to the Azure App Gallery](v2-howto-app-gallery-listing.md) then this value can be set by default. Otherwise, the value must be determined and set by the person adding the app to their Azure AD tenant. Azure AD uses the LogoutURL to redirect users after they're signed out.
2120

2221
Azure AD supports redirect binding (HTTP GET), and not HTTP POST binding.
2322

articles/active-directory/external-identities/reset-redemption-status.md

Lines changed: 13 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -27,9 +27,20 @@ After a guest user has redeemed your invitation for B2B collaboration, there mig
2727

2828
To manage these scenarios previously, you had to manually delete the guest user’s account from your directory and reinvite the user. Now you can use PowerShell or the Microsoft Graph invitation API to reset the user's redemption status and reinvite the user while retaining the user's object ID, group memberships, and app assignments. When the user redeems the new invitation, the UPN of the user doesn't change, but the user's sign-in name changes to the new email. The user can subsequently sign in using the new email or an email you've added to the `otherMails` property of the user object.
2929

30+
## Reset the email address used for sign-in
31+
32+
If a user wants to sign in using a different email:
33+
34+
1. Make sure the new email address is added to the `mail` or `otherMails` property of the user object.
35+
2. Replace the email address in the `InvitedUserEmailAddress` property with the new email address.
36+
3. Use one of the methods below to reset the user's redemption status.
37+
38+
> [!NOTE]
39+
>During public preview, when you're resetting the user's email address, we recommend setting the `mail` property to the new email address. This way the user can redeem the invitation by signing into your directory in addition to using the redemption link in the invitation.
40+
>
3041
## Use PowerShell to reset redemption status
3142

32-
Install the latest AzureADPreview PowerShell module and create a new invitation with `InvitedUserEMailAddress` set to the new email address, and `ResetRedemption` set to `true`.
43+
Install the latest AzureADPreview PowerShell module and create a new invitation with `InvitedUserEmailAddress` set to the new email address, and `ResetRedemption` set to `true`.
3344

3445
```powershell
3546
Uninstall-Module AzureADPreview
@@ -42,7 +53,7 @@ New-AzureADMSInvitation -InvitedUserEmailAddress <<external email>> -SendInvitat
4253

4354
## Use Microsoft Graph API to reset redemption status
4455

45-
Using the [Microsoft Graph invitation API](/graph/api/resources/invitation), set the `resetRedemption` property to `true` and specify the new email address in the `invitedUserEmailAddress` property.
56+
Using the [Microsoft Graph invitation API](/graph/api/resources/invitation?view=graph-rest-1.0), set the `resetRedemption` property to `true` and specify the new email address in the `invitedUserEmailAddress` property.
4657

4758
```json
4859
POST https://graph.microsoft.com/beta/invitations

0 commit comments

Comments
 (0)