Skip to content

Commit fdc5ef7

Browse files
authored
Merge branch 'master' into IoTHubEGGA_June2018
2 parents c8b1471 + 8fbc78d commit fdc5ef7

File tree

7,144 files changed

+117500
-81247
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

7,144 files changed

+117500
-81247
lines changed

.openpublishing.redirection.json

Lines changed: 1139 additions & 233 deletions
Large diffs are not rendered by default.

CODEOWNERS

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -5,3 +5,4 @@
55
# articles/virtual-machines/windows/ @iainfoulds @cynthn
66
# articles/application-insights/ @SergeyKanzhelev
77
# articles/cosmos-db/ @mimig1
8+
articles/cognitive-services/ @nitinme @tchristiani @cjgronlund

articles/active-directory-b2c/TOC.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -72,8 +72,6 @@
7272
href: active-directory-b2c-devquickstarts-web-dotnet-susi.md
7373
- name: ASP.NET Core
7474
href: https://github.com/Azure-Samples/active-directory-b2c-dotnetcore-webapp
75-
- name: Node.js
76-
href: active-directory-b2c-devquickstarts-web-node.md
7775
- name: Single page apps
7876
items:
7977
- name: Overview
@@ -263,6 +261,8 @@
263261
href: https://azure.microsoft.com/roadmap/?category=security-identity
264262
- name: Frequently asked questions
265263
href: active-directory-b2c-faqs.md
264+
- name: Getting help
265+
href: /azure/active-directory/develop/developer-support-help-options
266266
- name: Pricing
267267
href: https://azure.microsoft.com/pricing/details/active-directory-b2c/
268268
- name: Pricing calculator

articles/active-directory-b2c/active-directory-b2c-apps.md

Lines changed: 16 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -56,7 +56,13 @@ Learn more about the types of tokens and claims available to an application in t
5656

5757
In a web application, each execution of a [policy](active-directory-b2c-reference-policies.md) takes these high-level steps:
5858

59-
![Web App Swimlanes Image](./media/active-directory-b2c-apps/webapp.png)
59+
1. The user browses to the web application.
60+
2. The web application redirects the user to Azure AD B2C indicating the policy to execute.
61+
3. The user completes policy.
62+
4. Azure AD B2C returns an `id_token` to the browser.
63+
5. The `id_token` is posted to the redirect URI.
64+
6. The `id_token` is validated and a session cookie is set.
65+
7. A secure page is returned to the user.
6066

6167
Validation of the `id_token` by using a public signing key that is received from Azure AD is sufficient to verify the identity of the user. This also sets a session cookie that can be used to identify the user on subsequent page requests.
6268

@@ -85,7 +91,15 @@ The web API can then use the token to verify the API caller's identity and to ex
8591
8692
A web API can receive tokens from many types of clients, including web applications, desktop and mobile applications, single page applications, server-side daemons, and other web APIs. Here's an example of the complete flow for a web application that calls a web API:
8793

88-
![Web App Web API Swimlanes Image](./media/active-directory-b2c-apps/webapi.png)
94+
1. The web application executes a policy and the user completes the user experience.
95+
2. Azure AD B2C returns an `access_token` and an authorization code to the browser.
96+
3. The browser posts the `access_token` and authorization code to the redirect URI.
97+
4. The web server validates the `access token` and sets a session cookie.
98+
5. The `access_token` is provided to Azure AD B2C with the authorization code, application client ID, and credentials.
99+
6. The `access_token` and `refresh_token` are returned to the web server.
100+
7. The web API is called with the `access_token` in an authorization header.
101+
8. The web API validates the token.
102+
9. Secure data is returned to the web server.
89103

90104
To learn more about authorization codes, refresh tokens, and the steps for getting tokens, read about the [OAuth 2.0 protocol](active-directory-b2c-reference-oauth-code.md).
91105

@@ -102,8 +116,6 @@ In this flow, the application executes [policies](active-directory-b2c-reference
102116
>
103117
>
104118
105-
![Native App Swimlanes Image](./media/active-directory-b2c-apps/native.png)
106-
107119
## Current limitations
108120

109121
Azure AD B2C does not currently support the following types of apps, but they are on the roadmap.

articles/active-directory-b2c/active-directory-b2c-devquickstarts-graph-dotnet.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,7 @@ Azure Active Directory (Azure AD) B2C tenants tend to be very large. This means
2323
For B2C tenants, there are two primary modes of communicating with the Graph API.
2424

2525
* For interactive, run-once tasks, you should act as an administrator account in the B2C tenant when you perform the tasks. This mode requires an administrator to sign in with credentials before that admin can perform any calls to the Graph API.
26-
* For automated, continuous tasks, you should use some type of service account that you provide with the necessary privileges to perform management tasks. In Azure AD, you can do this by registering an application and authenticating to Azure AD. This is done by using an **Application ID** that uses the [OAuth 2.0 client credentials grant](../active-directory/develop/active-directory-authentication-scenarios.md#daemon-or-server-application-to-web-api). In this case, the application acts as itself, not as a user, to call the Graph API.
26+
* For automated, continuous tasks, you should use some type of service account that you provide with the necessary privileges to perform management tasks. In Azure AD, you can do this by registering an application and authenticating to Azure AD. This is done by using an **Application ID** that uses the [OAuth 2.0 client credentials grant](../active-directory/develop/authentication-scenarios.md#daemon-or-server-application-to-web-api). In this case, the application acts as itself, not as a user, to call the Graph API.
2727

2828
In this article, you learn how to perform the automated-use case. You'll build a .NET 4.5 `B2CGraphClient` that performs user create, read, update, and delete (CRUD) operations. The client will have a Windows command-line interface (CLI) that allows you to invoke various methods. However, the code is written to behave in a noninteractive, automated fashion.
2929

0 commit comments

Comments
 (0)