Skip to content

Commit f65873c

Browse files
committed
Merge branch 'master' of https://github.com/MicrosoftDocs/azure-docs-pr into overview-rewrite
2 parents 5e88716 + 15fee78 commit f65873c

File tree

6,023 files changed

+97239
-70877
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

6,023 files changed

+97239
-70877
lines changed

.markdownlint.json

Lines changed: 20 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,6 +9,7 @@
99
"MD007": false,
1010
"MD009": false,
1111
"MD010": false,
12+
"MD011": true,
1213
"MD012": false,
1314
"MD013": false,
1415
"MD014": false,
@@ -32,10 +33,28 @@
3233
"MD035": false,
3334
"MD036": false,
3435
"MD037": false,
36+
"MD038": true,
37+
"MD039": true,
3538
"MD040": false,
3639
"MD041": false,
3740
"MD042": false,
41+
"MD043": true,
42+
"MD044": {
43+
"code_blocks": false,
44+
"names": [
45+
".NET",
46+
"ASP.NET",
47+
"Azure",
48+
"JavaScript",
49+
"NuGet",
50+
"PowerShell",
51+
"macOS",
52+
"C#",
53+
"CLI"
54+
]
55+
},
3856
"MD045": false,
3957
"MD046": false,
40-
"MD047": false
58+
"MD047": false,
59+
"MD048": true
4160
}

.openpublishing.redirection.json

Lines changed: 1686 additions & 115 deletions
Large diffs are not rendered by default.

articles/active-directory-b2c/TOC.yml

Lines changed: 25 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -76,8 +76,11 @@
7676
items:
7777
- name: App integration
7878
items:
79-
- name: Register an application
79+
- name: Register an OIDC application
8080
href: tutorial-register-applications.md
81+
- name: Register a SAML service provider
82+
href: connect-with-saml-service-providers.md
83+
displayName: SP, RP, service provider, connect
8184
- name: Add a web API application
8285
href: add-web-application.md
8386
- name: Add a native client application
@@ -160,6 +163,9 @@
160163
href: active-directory-b2c-reference-kmsi-custom.md
161164
- name: Password change
162165
href: active-directory-b2c-reference-password-change-custom.md
166+
- name: Phone sign-up & sign-in
167+
href: phone-authentication.md
168+
displayName: otp, passwordless, phone number
163169
- name: UX customization
164170
items:
165171
- name: Configure user input
@@ -168,6 +174,9 @@
168174
href: active-directory-b2c-ui-customization-custom.md
169175
- name: Customize the UI dynamically
170176
href: active-directory-b2c-ui-customization-custom-dynamic.md
177+
- name: Custom email
178+
href: custom-email.md
179+
displayName: verification
171180
- name: Page layout
172181
href: page-layout.md
173182
- name: Enable JavaScript
@@ -196,8 +205,10 @@
196205
items:
197206
- name: ADFS
198207
href: active-directory-b2c-custom-setup-adfs2016-idp.md
208+
displayName: SAML
199209
- name: Salesforce
200210
href: active-directory-b2c-setup-sf-app-custom.md
211+
displayName: SAML
201212
- name: Tokens and session management
202213
items:
203214
- name: Customize tokens
@@ -254,6 +265,8 @@
254265
href: integer-transformations.md
255266
- name: JSON
256267
href: json-transformations.md
268+
- name: Phone number
269+
href: phone-number-claims-transformations.md
257270
- name: External accounts
258271
href: social-transformations.md
259272
- name: StringCollection
@@ -277,6 +290,9 @@
277290
items:
278291
- name: About technical profiles
279292
href: technical-profiles-overview.md
293+
- name: Azure Multi-Factor Authentication
294+
href: multi-factor-auth-technical-profile.md
295+
displayName: mfa
280296
- name: Claim resolvers
281297
href: claim-resolver-overview.md
282298
- name: Azure Active Directory
@@ -289,6 +305,9 @@
289305
href: oauth1-technical-profile.md
290306
- name: OAuth2
291307
href: oauth2-technical-profile.md
308+
- name: One-time password
309+
href: one-time-password-technical-profile.md
310+
displayName: otp
292311
- name: OpenID Connect
293312
href: openid-connect-technical-profile.md
294313
- name: REST
@@ -301,6 +320,11 @@
301320
href: active-directory-b2c-reference-sso-custom.md
302321
- name: Validation
303322
href: validation-technical-profile.md
323+
- name: DisplayControls
324+
href: display-controls.md
325+
items:
326+
- name: Verification
327+
href: display-control-verification.md
304328
- name: UserJourneys
305329
href: userjourneys.md
306330
- name: RelyingParty

articles/active-directory-b2c/active-directory-b2c-custom-guide-eventlogger-appins.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Track user behavior with Application Insights
33
titleSuffix: Azure AD B2C
4-
description: Learn how to enable event logs in Application Insights from Azure AD B2C user journeys by using custom policies (preview).
4+
description: Learn how to enable event logs in Application Insights from Azure AD B2C user journeys by using custom policies.
55
services: active-directory-b2c
66
author: mmacy
77
manager: celestedg
@@ -29,7 +29,7 @@ When you use Azure Active Directory B2C (Azure AD B2C) together with Azure Appli
2929

3030
The Identity Experience Framework in Azure AD B2C includes the provider `Handler="Web.TPEngine.Providers.AzureApplicationInsightsProvider, Web.TPEngine, Version=1.0.0.0`. It sends event data directly to Application Insights by using the instrumentation key provided to Azure AD B2C.
3131

32-
A technical profile uses this provider to define an event from Azure AD B2C. The profile specifies the name of the event, the claims that are recorded, and the instrumentation key. To post an event, the technical profile is then added as an `orchestration step`, or as a `validation technical profile` in a custom user journey.
32+
A technical profile uses this provider to define an event from Azure AD B2C. The profile specifies the name of the event, the claims that are recorded, and the instrumentation key. To post an event, the technical profile is then added as an `orchestration step` in a custom user journey.
3333

3434
Application Insights can unify the events by using a correlation ID to record a user session. Application Insights makes the event and session available within seconds and presents many visualization, export, and analytical tools.
3535

articles/active-directory-b2c/active-directory-b2c-devquickstarts-graph-dotnet.md

Lines changed: 3 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -26,9 +26,6 @@ For B2C tenants, there are two primary modes of communicating with the Graph API
2626

2727
In this article, you learn how to perform the automated use case. You'll build a .NET 4.5 `B2CGraphClient` that performs user create, read, update, and delete (CRUD) operations. The client will have a Windows command-line interface (CLI) that allows you to invoke various methods. However, the code is written to behave in a non-interactive, automated fashion.
2828

29-
>[!IMPORTANT]
30-
> You **must** use the [Azure AD Graph API](../active-directory/develop/active-directory-graph-api-quickstart.md) to manage users in an Azure AD B2C directory. The Azure AD Graph API is different from the Microsoft Graph API. Learn more in this MSDN blog post: [Microsoft Graph or Azure AD Graph](https://blogs.msdn.microsoft.com/aadgraphteam/2016/07/08/microsoft-graph-or-azure-ad-graph/).
31-
3229
## Prerequisites
3330

3431
Before you can create applications or users, you need an Azure AD B2C tenant. If you don't already have one, [Create an Azure Active Directory B2C tenant](tutorial-create-tenant.md).
@@ -59,8 +56,9 @@ The *Read and write directory data* permission that you granted earlier does **N
5956

6057
If you want to give your application the ability to delete users or update passwords, you need to grant it the *User administrator* role.
6158

62-
1. Sign in to the [Azure portal](https://portal.azure.com) and switch to the directory that contains your Azure AD B2C tenant.
63-
1. Select **Azure AD B2C** in the left menu. Or, select **All services** and then search for and select **Azure AD B2C**.
59+
1. Sign in to the [Azure portal](https://portal.azure.com).
60+
1. Select the **Directory + Subscription** icon in the portal toolbar, and then select the directory that contains your Azure AD B2C tenant.
61+
1. In the Azure portal, search for and select **Azure AD B2C**.
6462
1. Under **Manage**, select **Roles and administrators**.
6563
1. Select the **User administrator** role.
6664
1. Select **Add assignment**.

articles/active-directory-b2c/active-directory-b2c-get-started-custom.md

Lines changed: 7 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -27,10 +27,10 @@ ms.subservice: B2C
2727

2828
## Add signing and encryption keys
2929

30-
1. Sign in to the [Azure portal](https://portal.azure.com)
31-
1. Use the **Directory + subscription** filter in the top menu to select the directory that contains your Azure AD B2C tenant.
32-
1. In the left menu, select **Azure AD B2C**. Or, select **All services** and search for and select **Azure AD B2C**.
33-
1. On the Overview page, select **Identity Experience Framework** from the **Policies** pane.
30+
1. Sign in to the [Azure portal](https://portal.azure.com).
31+
1. Select the **Directory + Subscription** icon in the portal toolbar, and then select the directory that contains your Azure AD B2C tenant.
32+
1. In the Azure portal, search for and select **Azure AD B2C**.
33+
1. On the overview page, under **Policies**, select **Identity Experience Framework**.
3434

3535
### Create the signing key
3636

@@ -73,10 +73,9 @@ To register an application in your Azure AD B2C tenant, you can use the current
7373

7474
#### [Applications](#tab/applications/)
7575

76-
1. Select **All services** in the top-left corner of the Azure portal.
77-
1. In the search box, enter `Azure Active Directory`.
78-
1. Select **Azure Active Directory** in the search results.
79-
1. Under **Manage** in the left-hand menu, select **App registrations (Legacy)**.
76+
1. Sign in to the [Azure portal](https://portal.azure.com).
77+
1. In the Azure portal, search for and select **Azure Active Directory**.
78+
1. In the **Azure Active Directory** overview menu, under **Manage**, select **App registrations (Legacy)**.
8079
1. Select **New application registration**.
8180
1. For **Name**, enter `IdentityExperienceFramework`.
8281
1. For **Application type**, choose **Web app/API**.

articles/active-directory-b2c/active-directory-b2c-landing-custom.md

Lines changed: 0 additions & 39 deletions
This file was deleted.

articles/active-directory-b2c/active-directory-b2c-navigate-to-b2c-context.md

Lines changed: 0 additions & 39 deletions
This file was deleted.

articles/active-directory-b2c/active-directory-b2c-quickstarts-desktop-app.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -73,9 +73,9 @@ Azure AD B2C provides functionality to allow users to update their profiles. The
7373
7474
Click **Call API** to make a request to the protected resource.
7575
76-
![Call API](media/active-directory-b2c-quickstarts-desktop-app/call-api-wpf.png)
76+
![Call API](media/active-directory-b2c-quickstarts-desktop-app/call-api-wpf.png)
7777
78-
The application includes the Azure AD access token in the request to the protected web API resource. The web API sends back the display name contained in the access token.
78+
The application includes the Azure AD access token in the request to the protected web API resource. The web API sends back the display name contained in the access token.
7979
8080
You've successfully used your Azure AD B2C user account to make an authorized call an Azure AD B2C protected web API.
8181

0 commit comments

Comments
 (0)