Skip to content

Commit ff891f8

Browse files
committed
Merge branch 'master' of https://github.com/MicrosoftDocs/azure-docs-pr into overview-rewrite
2 parents f65873c + 7f0de90 commit ff891f8

File tree

837 files changed

+11309
-5448
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

837 files changed

+11309
-5448
lines changed

.gitignore

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -22,5 +22,5 @@ articles/directories.txt
2222
AzureMigration.ps1
2323

2424
!/.vscode/extensions.json
25-
articles/data-lake-analytics/.vscode/settings.json
2625
.gitignore
26+
**/.vscode/settings.json

.openpublishing.redirection.json

Lines changed: 339 additions & 319 deletions
Large diffs are not rendered by default.

FETCH_HEAD

Whitespace-only changes.

articles/active-directory-b2c/TOC.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -372,6 +372,8 @@
372372
href: https://azure.microsoft.com/resources/samples/?service=active-directory-b2c
373373
- name: Cookie definitions
374374
href: cookie-definitions.md
375+
- name: Error codes
376+
href: error-codes.md
375377
- name: Region availability & data residency
376378
href: active-directory-b2c-reference-tenant-type.md
377379
- name: Enable billing

articles/active-directory-b2c/connect-with-saml-service-providers.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -269,7 +269,7 @@ Your custom policy and Azure AD B2C tenant are now ready. Next, create an applic
269269
1. In the left menu, select **Azure AD B2C**. Or, select **All services** and search for and select **Azure AD B2C**.
270270
1. Select **App registrations (Preview)**, and then select **New registration**.
271271
1. Enter a **Name** for the application. For example, *SAMLApp1*.
272-
1. Under **Supported account types**, select **Accounts in any organizational directory or any identity provider.**
272+
1. Under **Supported account types**, select **Accounts in this organizational directory only**
273273
1. Under **Redirect URI**, select **Web**, and then enter `https://localhost`. You modify this value later in the application registration's manifest.
274274
1. Select **Grant admin consent to openid and offline_access permissions**.
275275
1. Select **Register**.
@@ -281,11 +281,11 @@ For SAML apps, there are several properties you need to configure in the applica
281281
1. In the [Azure portal](https://portal.azure.com), navigate to the application registration that you created in the previous section.
282282
1. Under **Manage**, select **Manifest** to open the manifest editor. You modify several properties in the following sections.
283283

284-
#### IdentifierUri
284+
#### identifierUris
285285

286-
The `IdentifierUri` is a string collection containing user-defined URI(s) that uniquely identify a Web app within its Azure AD B2C tenant. The identifier URI must be from a verified domain within your organization's directory. For example, `https://contoso.onmicrosoft.com/app-name`. Your service provider must set this value in the `Issuer` element of a SAML request.
286+
The `identifierUris` is a string collection containing user-defined URI(s) that uniquely identify a Web app within its Azure AD B2C tenant. Your service provider must set this value in the `Issuer` element of a SAML request.
287287

288-
#### SamlMetadataUrl
288+
#### samlMetadataUrl
289289

290290
This property represents service provider's publicly available metadata URL. The metadata URL can point to a metadata file uploaded to any anonymously accessible endpoint, for example blob storage.
291291

@@ -299,7 +299,7 @@ For this tutorial which uses the SAML test application, use the following value
299299
"samlMetadataUrl":"https://samltestapp2.azurewebsites.net/Metadata",
300300
```
301301

302-
#### ReplyUrlWithType (Optional)
302+
#### replyUrlsWithType (Optional)
303303

304304
If you do not provide a metadata URI, you can explicitly specify the reply URL. This optional property represents the `AssertionConsumerServiceUrl` (`SingleSignOnService` URL in the service provider metadata) and the `BindingType` is assumed to be `HTTP POST`.
305305

@@ -316,7 +316,7 @@ For this tutorial, in which you use the SAML test application, set the `url` pro
316316
],
317317
```
318318

319-
#### LogoutUrl (Optional)
319+
#### logoutUrl (Optional)
320320

321321
This optional property represents the `Logout` URL (`SingleLogoutService` URL in the relying party metadata), and the `BindingType` for this is assumed to be `Http-Redirect`.
322322

Lines changed: 147 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,147 @@
1+
---
2+
title: Error code reference
3+
titleSuffix: Azure AD B2C
4+
description: A list of the error codes that can returned by the Azure Active Directory B2C service.
5+
services: B2C
6+
author: mmacy
7+
manager: celestedg
8+
9+
ms.service: active-directory
10+
ms.workload: identity
11+
ms.topic: troubleshooting
12+
ms.date: 01/10/2020
13+
ms.author: marsma
14+
ms.subservice: B2C
15+
---
16+
17+
# Error codes: Azure Active Directory B2C
18+
19+
The following errors can be returned by the Azure Active Directory B2C service.
20+
21+
| Error code | Message |
22+
| ---------- | ------- |
23+
| `AADB2C90002` | The CORS resource '{0}' returned a 404 not found. |
24+
| `AADB2C90006` | The redirect URI '{0}' provided in the request is not registered for the client id '{1}'. |
25+
| `AADB2C90007` | The application associated with client id '{0}' has no registered redirect URIs. |
26+
| `AADB2C90008` | The request does not contain a client id parameter. |
27+
| `AADB2C90010` | The request does not contain a scope parameter. |
28+
| `AADB2C90011` | The client id '{0}' provided in the request does not match client id '{1}' registered in policy. |
29+
| `AADB2C90012` | The scope '{0}' provided in request is not supported. |
30+
| `AADB2C90013` | The requested response type '{0}' provided in the request is not supported. |
31+
| `AADB2C90014` | The requested response mode '{0}' provided in the request is not supported. |
32+
| `AADB2C90016` | The requested client assertion type '{0}' does not match the expected type '{1}'. |
33+
| `AADB2C90017` | The client assertion provided in the request is invalid: {0} |
34+
| `AADB2C90018` | The client id '{0}' specified in the request is not registered in tenant '{1}'. |
35+
| `AADB2C90019` | The key container with id '{0}' in tenant '{1}' does not has a valid key. Reason: {2}. |
36+
| `AADB2C90021` | The technical profile '{0}' does not exist in the policy '{1}' of tenant '{2}'. |
37+
| `AADB2C90022` | Unable to return metadata for the policy '{0}' in tenant '{1}'. |
38+
| `AADB2C90023` | Profile '{0}' does not contain the required metadata key '{1}'. |
39+
| `AADB2C90025` | Profile '{0}' in policy '{1}' in tenant '{2}' does not contain the required cryptographic key '{3}'. |
40+
| `AADB2C90027` | Basic credentials specified for '{0}' are invalid. Check that the credentials are correct and that access has been granted by the resource. |
41+
| `AADB2C90028` | Client certificate specified for '{0}' is invalid. Check that the certificate is correct, contains a private key and that access has been granted by the resource. |
42+
| `AADB2C90031` | Policy '{0}' does not specify a default user journey. Ensure that the policy or it's parents specify a default user journey as part of a relying party section. |
43+
| `AADB2C90035` | The service is temporarily unavailable. Please retry after a few minutes. |
44+
| `AADB2C90036` | The request does not contain a URI to redirect the user to post logout. Specify a URI in the post_logout_redirect_uri parameter field. |
45+
| `AADB2C90037` | An error occurred while processing the request. Please contact administrator of the site you are trying to access. |
46+
| `AADB2C90039` | The request contains a client assertion, but the provided policy '{0}' in tenant '{1}' is missing a client_secret in RelyingPartyPolicy. |
47+
| `AADB2C90040` | User journey '{0}' does not contain a send claims step. |
48+
| `AADB2C90043` | The prompt included in the request contains invalid values. Expected 'none', 'login', 'consent' or 'select_account'. |
49+
| `AADB2C90044` | The claim '{0}' is not supported by the claim resolver '{1}'. |
50+
| `AADB2C90046` | We are having trouble loading your current state. You might want to try starting your session over from the beginning. |
51+
| `AADB2C90047` | The resource '{0}' contains script errors preventing it from being loaded. |
52+
| `AADB2C90048` | An unhandled exception has occurred on the server. |
53+
| `AADB2C90051` | No suitable claims providers were found. |
54+
| `AADB2C90052` | Invalid username or password. |
55+
| `AADB2C90053` | A user with the specified credential could not be found. |
56+
| `AADB2C90054` | Invalid username or password. |
57+
| `AADB2C90055` | The scope '{0}' provided in request must specify a resource, such as 'https://example.com/calendar.read'. |
58+
| `AADB2C90057` | The provided application is not configured to allow the OAuth Implicit flow. |
59+
| `AADB2C90058` | The provided application is not configured to allow public clients. |
60+
| `AADB2C90067` | The post logout redirect URI '{0}' has an invalid format. Specify an https based URL such as 'https://example.com/return' or for native clients use the IETF native client URI 'urn:ietf:wg:oauth:2.0:oob'. |
61+
| `AADB2C90068` | The provided application with ID '{0}' is not valid against this service. Please use an application created via the B2C portal and try again. |
62+
| `AADB2C90075` | The claims exchange '{0}' specified in step '{1}' returned HTTP error response with Code '{2}' and Reason '{3}'. |
63+
| `AADB2C90077` | User does not have an existing session and request prompt parameter has a value of '{0}'. |
64+
| `AADB2C90079` | Clients must send a client_secret when redeeming a confidential grant. |
65+
| `AADB2C90080` | The provided grant has expired. Please re-authenticate and try again. Current time: {0}, Grant issued time: {1}, Grant sliding window expiration time: {2}. |
66+
| `AADB2C90081` | The specified client_secret does not match the expected value for this client. Please correct the client_secret and try again. |
67+
| `AADB2C90083` | The request is missing required parameter: {0}. |
68+
| `AADB2C90084` | Public clients should not send a client_secret when redeeming a publicly acquired grant. |
69+
| `AADB2C90085` | The service has encountered an internal error. Please reauthenticate and try again. |
70+
| `AADB2C90086` | The supplied grant_type [{0}] is not supported. |
71+
| `AADB2C90087` | The provided grant has not been issued for this version of the protocol endpoint. |
72+
| `AADB2C90088` | The provided grant has not been issued for this endpoint. Actual Value : {0} and Expected Value : {1} |
73+
| `AADB2C90092` | The provided application with ID '{0}' is disabled for the tenant '{1}'. Please enable the application and try again. |
74+
| `AADB2C90107` | The application with ID '{0}' cannot get an ID token either because the openid scope was not provided in the request or the application is not authorized for it. |
75+
| `AADB2C90108` | The orchestration step '{0}' does not specify a CpimIssuerTechnicalProfileReferenceId when one was expected. |
76+
| `AADB2C90110` | The scope parameter must include 'openid' when requesting a response_type that includes 'id_token'. |
77+
| `AADB2C90111` | Your account has been locked. Contact your support person to unlock it, then try again. |
78+
| `AADB2C90114` | Your account is temporarily locked to prevent unauthorized use. Try again later. |
79+
| `AADB2C90115` | When requesting the 'code' response_type, the scope parameter must include a resource or client ID for access tokens, and 'openid' for ID tokens. Additionally include 'offline_access' for refresh tokens. |
80+
| `AADB2C90117` | The scope '{0}' provided in the request is not supported. |
81+
| `AADB2C90118` | The user has forgotten their password. |
82+
| `AADB2C90120` | The max age parameter '{0}' specified in the request is invalid. Max age must be an integer between '{1}' and '{2}' inclusive. |
83+
| `AADB2C90122` | Input for '{0}' received in the request has failed HTTP request validation. Ensure that the input does not contain characters such as < or &. |
84+
| `AADB2C90128` | The account associated with this grant no longer exists. Please reauthenticate and try again. |
85+
| `AADB2C90129` | The provided grant has been revoked. Please reauthenticate and try again. |
86+
| `AADB2C90145` | No unverified phone numbers have been found and policy does not allow a user entered number. |
87+
| `AADB2C90146` | The scope '{0}' provided in request specifies more than one resource for an access token, which is not supported. |
88+
| `AADB2C90149` | Script '{0}' failed to load. |
89+
| `AADB2C90151` | User has exceeded the maximum number for retries for multi-factor authentication. |
90+
| `AADB2C90152` | A multi-factor poll request failed to get a response from the service. |
91+
| `AADB2C90154` | A multi-factor verification request failed to get a session id from the service. |
92+
| `AADB2C90155` | A multi-factor verification request has failed with reason '{0}'. |
93+
| `AADB2C90156` | A multi-factor validation request has failed with reason '{0}'. |
94+
| `AADB2C90157` | User has exceeded the maximum number for retries for a self-asserted step. |
95+
| `AADB2C90158` | A self-asserted validation request has failed with reason '{0}'. |
96+
| `AADB2C90159` | A self-asserted verification request has failed with reason '{0}'. |
97+
| `AADB2C90161` | A self-asserted send response has failed with reason '{0}'. |
98+
| `AADB2C90165` | The SAML initiating message with id '{0}' cannot be found in state. |
99+
| `AADB2C90168` | The HTTP-Redirect request does not contain the required parameter '{0}' for a signed request. |
100+
| `AADB2C90178` | The signing certificate '{0}' has no private key. |
101+
| `AADB2C90182` | The supplied code_verifier does not match associated code_challenge |
102+
| `AADB2C90183` | The supplied code_verifier is invalid |
103+
| `AADB2C90184` | The supplied code_challenge_method is not supported. Supported values are plain or S256 |
104+
| `AADB2C90188` | The SAML technical profile '{0}' specifies a PartnerEntity URL of '{1}', but fetching the metadata fails with reason '{2}'. |
105+
| `AADB2C90194` | Claim '{0}' specified for the bearer token is not present in the available claims. Available claims '{1}'. |
106+
| `AADB2C90205` | This application does not have sufficient permissions against this web resource to perform the operation. |
107+
| `AADB2C90206` | A time out has occurred initialization the client. |
108+
| `AADB2C90208` | The provided id_token_hint parameter is expired. Please provide another token and try again. |
109+
| `AADB2C90209` | The provided id_token_hint parameter does not contain an accepted audience. Valid audience values: '{0}'. Please provide another token and try again. |
110+
| `AADB2C90210` | The provided id_token_hint parameter could not be validated. Please provide another token and try again. |
111+
| `AADB2C90211` | The request contained an incomplete state cookie. |
112+
| `AADB2C90212` | The request contained an invalid state cookie. |
113+
| `AADB2C90220` | The key container in tenant '{0}' with storage identifier '{1}' exists but does not contain a valid certificate. The certificate might be expired or your certificate might become active in the future (nbf). |
114+
| `AADB2C90223` | An error has occurred sanitizing the CORS resource. |
115+
| `AADB2C90224` | Resource owner flow has not been enabled for the application. |
116+
| `AADB2C90225` | The username or password provided in the request are invalid. |
117+
| `AADB2C90226` | The specified token exchange is only supported over HTTP POST. |
118+
| `AADB2C90232` | The provided id_token_hint parameter does not contain an accepted issuer. Valid issuers: '{0}'. Please provide another token and try again. |
119+
| `AADB2C90233` | The provided id_token_hint parameter failed signature validation. Please provide another token and try again. |
120+
| `AADB2C90235` | The provided id_token is expired. Please provide another token and try again. |
121+
| `AADB2C90237` | The provided id_token does not contain a valid audience. Valid audience values: '{0}'. Please provide another token and try again. |
122+
| `AADB2C90238` | The provided id_token does not contain a valid issuer. Valid issuer values: '{0}'. Please provide another token and try again. |
123+
| `AADB2C90239` | The provided id_token failed signature validation. Please provide another token and try again. |
124+
| `AADB2C90240` | The provided id_token is malformed and could not be parsed. Please provide another token and try again. |
125+
| `AADB2C90242` | The SAML technical profile '{0}' specifies PartnerEntity CDATA which cannot be loaded for reason '{1}'. |
126+
| `AADB2C90243` | The IDP's client key/secret is not properly configured. |
127+
| `AADB2C90244` | There are too many requests at this moment. Please wait for some time and try again. |
128+
| `AADB2C90248` | Resource owner flow can only be used by applications created through the B2C admin portal. |
129+
| `AADB2C90250` | The generic login endpoint is not supported. |
130+
| `AADB2C90255` | The claims exchange specified in technical profile '{0}' did not complete as expected. You might want to try starting your session over from the beginning. |
131+
| `AADB2C90261` | The claims exchange '{0}' specified in step '{1}' returned HTTP error response that could not be parsed. |
132+
| `AADB2C90272` | The id_token_hint parameter has not been specified in the request. Please provide token and try again. |
133+
| `AADB2C90273` | An invalid response was received : '{0}' |
134+
| `AADB2C90274` | The provider metadata does not specify a single logout service or the endpoint binding is not one of 'urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Redirect' or 'urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST'. |
135+
| `AADB2C90276` | The request is not consistent with the control setting '{0}': '{1}' in technicalProfile '{2}' for policy '{3}' tenant '{4}'. |
136+
| `AADB2C90277` | The orchestration step '{0}' of user journey '{1}' of policy '{2}' does not contain a content definition reference. |
137+
| `AADB2C90279` | The provided client id '{0}' does not match the client id that issued the grant. |
138+
| `AADB2C90284` | The application with identifier '{0}' has not been granted consent and is unable to be used for local accounts. |
139+
| `AADB2C90285` | The application with identifier '{0}' was not found. |
140+
| `AADB2C90288` | UserJourney with id '{0}' referenced in TechnicalProfile '{1}' for refresh token redemption for tenant '{2}' does not exist in policy '{3}' or any of its base policies. |
141+
| `AADB2C90289` | We encountered an error connecting to the identity provider. Please try again later. |
142+
| `AADB2C90296` | Application has not been configured correctly. Please contact administrator of the site you are trying to access. |
143+
| `AADB2C99005` | The request contains an invalid scope parameter which includes an illegal character '{0}'. |
144+
| `AADB2C99006` | Azure AD B2C cannot find the extensions app with app id '{0}'. Please visit https://go.microsoft.com/fwlink/?linkid=851224 for more information. |
145+
| `AADB2C99011` | The metadata value '{0}' has not been specified in TechnicalProfile '{1}' in policy '{2}'. |
146+
| `AADB2C99013` | The supplied grant_type [{0}] and token_type [{1}] combination is not supported. |
147+
| `AADB2C99015` | Profile '{0}' in policy '{1}' in tenant '{2}' is missing all InputClaims required for resource owner password credential flow. |

articles/active-directory/authentication/howto-mfa-userstates.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -133,7 +133,7 @@ Using PowerShell is a good option when you need to bulk enable users. As an exam
133133
To disable MFA, use this script:
134134

135135
```PowerShell
136-
Get-MsolUser -UserPrincipalName [email protected] | Set-MsolUser -StrongAuthenticationMethods @()
136+
Get-MsolUser -UserPrincipalName [email protected] | Set-MsolUser -StrongAuthenticationRequirements @()
137137
```
138138

139139
which can also be shortened to:

articles/active-directory/authentication/howto-password-ban-bad-on-premises-operations.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,7 @@ Follow the guidance in the article [Configuring the custom banned password list]
2525

2626
## Enable Password Protection
2727

28-
1. Sign in to the [Azure portal](https://portal.azure.com) and browse to **Azure Active Directory**, **Authentication methods**, then **Password Protection**.
28+
1. Sign in to the [Azure portal](https://portal.azure.com) and browse to **Azure Active Directory**, **Security**,**Authentication methods**, then **Password Protection**.
2929
1. Set **Enable Password Protection on Windows Server Active Directory** to **Yes**
3030
1. As mentioned in the [Deployment guide](howto-password-ban-bad-on-premises-deploy.md#deployment-strategy), it is recommended to initially set the **Mode** to **Audit**
3131
* After you are comfortable with the feature, you can switch the **Mode** to **Enforced**

articles/active-directory/authentication/howto-password-smart-lockout.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -65,7 +65,7 @@ Based on your organizational requirements, smart lockout values may need to be c
6565
To check or modify the smart lockout values for your organization, use the following steps:
6666

6767
1. Sign in to the [Azure portal](https://portal.azure.com).
68-
1. Search for and select *Azure Active Directory*. Select **Authentication methods** > **Password protection**.
68+
1. Search for and select *Azure Active Directory*. Select **Security** > **Authentication methods** > **Password protection**.
6969
1. Set the **Lockout threshold**, based on how many failed sign-ins are allowed on an account before its first lockout. The default is 10.
7070
1. Set the **Lockout duration in seconds**, to the length in seconds of each lockout. The default is 60 seconds (one minute).
7171

0 commit comments

Comments
 (0)