Skip to content

Commit f968b83

Browse files
committed
Merge branch 'master' of https://github.com/MicrosoftDocs/azure-docs-pr into patch-42
2 parents 57ed06c + b064968 commit f968b83

File tree

6,345 files changed

+117601
-96648
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

6,345 files changed

+117601
-96648
lines changed

.openpublishing.publish.config.json

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -233,6 +233,11 @@
233233
"url": "https://github.com/Azure-Samples/azure-iot-samples-node",
234234
"branch": "master"
235235
},
236+
{
237+
"path_to_root": "azure-iot-sdk-node",
238+
"url": "https://github.com/Azure/azure-iot-sdk-node",
239+
"branch": "master"
240+
},
236241
{
237242
"path_to_root": "iot-samples-c",
238243
"url": "https://github.com/Azure/azure-iot-sdk-c",
@@ -499,6 +504,11 @@
499504
"path_to_root": "azure-cosmosdb-java-v4-getting-started",
500505
"url": "https://github.com/Azure-Samples/azure-cosmos-java-getting-started",
501506
"branch": "master"
507+
},
508+
{
509+
"path_to_root": "azure-storage-snippets",
510+
"url": "https://github.com/azure-samples/AzureStorageSnippets",
511+
"branch": "master"
502512
}
503513
],
504514
"branch_target_mapping": {

.openpublishing.redirection.json

Lines changed: 1385 additions & 561 deletions
Large diffs are not rendered by default.

CODEOWNERS

Lines changed: 14 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,17 @@
11
# Testing the new code owners feature in GitHub. Please contact Cory Fowler if you have questions.
2+
3+
# Horizontals
4+
5+
## Azure Policy: Samples
6+
articles/**/policy-samples.md @DCtheGeek
7+
includes/policy/ @DCtheGeek
8+
9+
# Azure Active Directory
10+
11+
articles/active-directory-b2c/ @msmimart @yoelhor
12+
articles/active-directory/app-provisioning/ @CelesteDG
13+
articles/active-directory/manage-apps/ @CelesteDG
14+
215
# Cognitive Services
316
articles/cognitive-services/ @diberry @erhopf @aahill @ievangelist @patrickfarley @nitinme
417

@@ -9,7 +22,7 @@ articles/jenkins/ @TomArcherMsft
922
articles/terraform/ @TomArcherMsft
1023

1124
# Requires Internal Review
12-
articles/best-practices-availability-paired-regions.md @jpconnock @martinekuan @syntaxc4 @tysonn @snoviking
25+
articles/best-practices-availability-paired-regions.md @martinekuan @syntaxc4 @snoviking
1326

1427
# Governance
1528
articles/governance/ @DCtheGeek

CONTRIBUTING.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ For more information, see the [Code of Conduct FAQ](https://opensource.microsoft
1111

1212
## How can I contribute?
1313

14-
There are a variety of ways to contribute to the documentation, review the sections below to find out which one is right for you.
14+
There are many ways to contribute to the documentation, review the sections below to find out which one is right for you.
1515

1616
### Reporting Bugs and Suggesting Enhancements
1717

articles/active-directory-b2c/TOC.yml

Lines changed: 7 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -76,6 +76,8 @@
7676
href: user-overview.md
7777
- name: User profile attributes
7878
href: user-profile-attributes.md
79+
- name: SSO sessions
80+
href: session-overview.md
7981
- name: How-to guides
8082
items:
8183
- name: App integration
@@ -224,7 +226,9 @@
224226
- name: Tokens and session management
225227
items:
226228
- name: Customize tokens
227-
href: custom-policy-manage-sso-and-token-config.md
229+
href: configure-tokens-custom-policy.md
230+
- name: Configure session behavior
231+
href: session-behavior-custom-policy.md
228232
- name: Pass through external IdP token
229233
href: idp-pass-through-custom.md
230234
- name: Adaptive experience
@@ -335,8 +339,8 @@
335339
href: phone-factor-technical-profile.md
336340
- name: REST
337341
href: restful-technical-profile.md
338-
- name: SAML
339-
href: saml-technical-profile.md
342+
- name: SAML identity provider
343+
href: saml-identity-provider-technical-profile.md
340344
- name: SAML token issuer
341345
href: saml-issuer-technical-profile.md
342346
- name: Self-asserted

articles/active-directory-b2c/best-practices.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -39,7 +39,7 @@ Define your application and service architecture, inventory current systems, and
3939
| Create a migration plan |Planning ahead can make migration go more smoothly. Learn more about [user migration](user-migration.md).|
4040
| Usability vs. security | Your solution must strike the right balance between application usability and your organization's acceptable level of risk. |
4141
| Move on-premises dependencies to the cloud | To help ensure a resilient solution, consider moving existing application dependencies to the cloud. |
42-
| Migrate existing apps to b2clogin.com | The deprecation of login.microsoftonline.com went into effect for all Azure AD B2C tenants on 04 December 2020. [Learn more](b2clogin.md). |
42+
| Migrate existing apps to b2clogin.com | The deprecation of login.microsoftonline.com will go into effect for all Azure AD B2C tenants on 04 December 2020. [Learn more](b2clogin.md). |
4343

4444
## Implementation
4545

@@ -88,4 +88,4 @@ Stay up to date with the state of the service and find support options.
8888
|--|--|
8989
| [Service updates](https://azure.microsoft.com/updates/?product=active-directory-b2c) | Stay up to date with Azure AD B2C product updates and announcements. |
9090
| [Microsoft Support](support-options.md) | File a support request for Azure AD B2C technical issues. Billing and subscription management support is provided at no cost. |
91-
| [Azure status](https://status.azure.com/status) | View the current health status of all Azure services. |
91+
| [Azure status](https://status.azure.com/status) | View the current health status of all Azure services. |

articles/active-directory-b2c/claim-resolver-overview.md

Lines changed: 11 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: celestedg
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: reference
12-
ms.date: 03/30/2020
12+
ms.date: 04/21/2020
1313
ms.author: mimart
1414
ms.subservice: B2C
1515
---
@@ -86,7 +86,14 @@ The following sections list available claim resolvers.
8686
| {Context:IPAddress} | The user IP address. | 11.111.111.11 |
8787
| {Context:KMSI} | Indicates whether [Keep me signed in](custom-policy-keep-me-signed-in.md) checkbox is selected. | true |
8888

89-
### Non-protocol parameters
89+
### Claims
90+
91+
| Claim | Description | Example |
92+
| ----- | ----------- | --------|
93+
| {Claim:claim type} | An identifier of a claim type already defined in the ClaimsSchema section in the policy file or parent policy file. For example: `{Claim:displayName}`, or `{Claim:objectId}`. | A claim type value.|
94+
95+
96+
### OAuth2 key-value parameters
9097

9198
Any parameter name included as part of an OIDC or OAuth2 request can be mapped to a claim in the user journey. For example, the request from the application might include a query string parameter with a name of `app_session`, `loyalty_number`, or any custom query string.
9299

@@ -114,6 +121,7 @@ Any parameter name included as part of an OIDC or OAuth2 request can be mapped t
114121
| {SAML:AllowCreate} | The `AllowCreate` attribute value, from the `NameIDPolicy` element of the SAML request. | True |
115122
| {SAML:ForceAuthn} | The `ForceAuthN` attribute value, from the `AuthnRequest` element of the SAML request. | True |
116123
| {SAML:ProviderName} | The `ProviderName` attribute value, from the `AuthnRequest` element of the SAML request.| Contoso.com |
124+
| {SAML:RelayState} | The `RelayState` query string parameter.|
117125

118126
## Using claim resolvers
119127

@@ -127,7 +135,7 @@ You can use claims resolvers with the following elements:
127135
|[OpenID Connect](openid-connect-technical-profile.md) technical profile| `InputClaim`, `OutputClaim`| 1, 2|
128136
|[Claims transformation](claims-transformation-technical-profile.md) technical profile| `InputClaim`, `OutputClaim`| 1, 2|
129137
|[RESTful provider](restful-technical-profile.md) technical profile| `InputClaim`| 1, 2|
130-
|[SAML2](saml-technical-profile.md) technical profile| `OutputClaim`| 1, 2|
138+
|[SAML identity provider](saml-identity-provider-technical-profile.md) technical profile| `OutputClaim`| 1, 2|
131139
|[Self-Asserted](self-asserted-technical-profile.md) technical profile| `InputClaim`, `OutputClaim`| 1, 2|
132140
|[ContentDefinition](contentdefinitions.md)| `LoadUri`| |
133141
|[ContentDefinitionParameters](relyingparty.md#contentdefinitionparameters)| `Parameter` | |

articles/active-directory-b2c/code-samples.md

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -43,3 +43,9 @@ The following tables provide links to samples for applications including iOS, An
4343
| Sample | Description |
4444
|--------| ----------- |
4545
| [javascript-msal-singlepageapp](https://github.com/Azure-Samples/active-directory-b2c-javascript-msal-singlepageapp) | A single page application (SPA) calling a Web API. Authentication is done with Azure AD B2C by using MSAL.js. |
46+
47+
## SAML test application
48+
49+
| Sample | Description |
50+
|--------| ----------- |
51+
| [saml-sp-tester](https://github.com/azure-ad-b2c/saml-sp-tester/tree/master/source-code) | SAML test application to test Azure AD B2C configured to act as SAML identity provider. |
Lines changed: 91 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,91 @@
1+
---
2+
title: Manage SSO and token customization using custom policies
3+
titleSuffix: Azure AD B2C
4+
description: Learn about managing SSO and token customization using custom policies in Azure Active Directory B2C.
5+
services: active-directory-b2c
6+
author: msmimart
7+
manager: celestedg
8+
9+
ms.service: active-directory
10+
ms.workload: identity
11+
ms.topic: conceptual
12+
ms.date: 05/07/2020
13+
ms.author: mimart
14+
ms.subservice: B2C
15+
---
16+
17+
# Manage SSO and token customization using custom policies in Azure Active Directory B2C
18+
19+
This article provides information about how you can manage your token, session, and single sign-on (SSO) configurations using [custom policies](custom-policy-overview.md) in Azure Active Directory B2C (Azure AD B2C).
20+
21+
## JTW token lifetimes and claims configuration
22+
23+
To change the settings on your token lifetimes, you add a [ClaimsProviders](claimsproviders.md) element in the relying party file of the policy you want to impact. The **ClaimsProviders** element is a child of the [TrustFrameworkPolicy](trustframeworkpolicy.md) element.
24+
25+
Insert the ClaimsProviders element between the BasePolicy element and the RelyingParty element of the relying party file.
26+
27+
Inside, you'll need to put the information that affects your token lifetimes. The XML looks like this example:
28+
29+
```XML
30+
<ClaimsProviders>
31+
<ClaimsProvider>
32+
<DisplayName>Token Issuer</DisplayName>
33+
<TechnicalProfiles>
34+
<TechnicalProfile Id="JwtIssuer">
35+
<Metadata>
36+
<Item Key="token_lifetime_secs">3600</Item>
37+
<Item Key="id_token_lifetime_secs">3600</Item>
38+
<Item Key="refresh_token_lifetime_secs">1209600</Item>
39+
<Item Key="rolling_refresh_token_lifetime_secs">7776000</Item>
40+
<Item Key="IssuanceClaimPattern">AuthorityAndTenantGuid</Item>
41+
<Item Key="AuthenticationContextReferenceClaimPattern">None</Item>
42+
</Metadata>
43+
</TechnicalProfile>
44+
</TechnicalProfiles>
45+
</ClaimsProvider>
46+
</ClaimsProviders>
47+
```
48+
49+
The following values are set in the previous example:
50+
51+
- **Access token lifetimes** - The access token lifetime value is set with **token_lifetime_secs** metadata item. The default value is 3600 seconds (60 minutes).
52+
- **ID token lifetime** - The ID token lifetime value is set with the **id_token_lifetime_secs** metadata item. The default value is 3600 seconds (60 minutes).
53+
- **Refresh token lifetime** - The refresh token lifetime value is set with the **refresh_token_lifetime_secs** metadata item. The default value is 1209600 seconds (14 days).
54+
- **Refresh token sliding window lifetime** - If you would like to set a sliding window lifetime to your refresh token, set the value of **rolling_refresh_token_lifetime_secs** metadata item. The default value is 7776000 (90 days). If you don't want to enforce a sliding window lifetime, replace the item with `<Item Key="allow_infinite_rolling_refresh_token">True</Item>`.
55+
- **Issuer (iss) claim** - The Issuer (iss) claim is set with the **IssuanceClaimPattern** metadata item. The applicable values are `AuthorityAndTenantGuid` and `AuthorityWithTfp`.
56+
- **Setting claim representing policy ID** - The options for setting this value are `TFP` (trust framework policy) and `ACR` (authentication context reference). `TFP` is the recommended value. Set **AuthenticationContextReferenceClaimPattern** with the value of `None`.
57+
58+
In the **ClaimsSchema** element, add this element:
59+
60+
```XML
61+
<ClaimType Id="trustFrameworkPolicy">
62+
<DisplayName>Trust framework policy name</DisplayName>
63+
<DataType>string</DataType>
64+
</ClaimType>
65+
```
66+
67+
In your **OutputClaims** element, add this element:
68+
69+
```XML
70+
<OutputClaim ClaimTypeReferenceId="trustFrameworkPolicy" Required="true" DefaultValue="{policy}" />
71+
```
72+
73+
For ACR, remove the **AuthenticationContextReferenceClaimPattern** item.
74+
75+
- **Subject (sub) claim** - This option defaults to ObjectID, if you would like to switch this setting to `Not Supported`, replace this line:
76+
77+
```XML
78+
<OutputClaim ClaimTypeReferenceId="objectId" PartnerClaimType="sub" />
79+
```
80+
81+
with this line:
82+
83+
```XML
84+
<OutputClaim ClaimTypeReferenceId="sub" />
85+
```
86+
87+
## Next steps
88+
89+
- Learn more about [Azure AD B2C session](session-overview.md).
90+
- Learn how to [configure session behavior in custom policies](session-behavior-custom-policy.md).
91+
- Reference: [JwtIssuer](jwt-issuer-technical-profile.md).

articles/active-directory-b2c/configure-tokens.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ manager: celestedg
88
ms.service: active-directory
99
ms.workload: identity
1010
ms.topic: conceptual
11-
ms.date: 04/16/2019
11+
ms.date: 05/07/2020
1212
ms.author: mimart
1313
ms.subservice: B2C
1414
---
@@ -21,7 +21,7 @@ In this article, you learn how to configure the [lifetime and compatibility of a
2121

2222
[Create a user flow](tutorial-create-user-flows.md) to enable users to sign up and sign in to your application.
2323

24-
## Configure token lifetime
24+
## Configure JWT token lifetime
2525

2626
You can configure the token lifetime on any user flow.
2727

@@ -37,7 +37,7 @@ You can configure the token lifetime on any user flow.
3737

3838
8. Click **Save**.
3939

40-
## Configure token compatibility
40+
## Configure JWT token compatibility
4141

4242
1. Select **User flows (policies)**.
4343
2. Open the user flow that you previously created.

0 commit comments

Comments
 (0)