You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory-b2c/add-api-connector-token-enrichment.md
+1-1
Original file line number
Diff line number
Diff line change
@@ -169,7 +169,7 @@ A claim provides temporary storage of data during an Azure AD B2C policy executi
169
169
</ClaimType>
170
170
```
171
171
## Add the RESTful API technical profile
172
-
A [Restful technical profile](restful-technical-profile.md) provides support for interfacing with your own RESTful service. Azure AD B2C sends data to the RESTful service in an `InputClaims` collection and receives data back in an `OutputClaims` collection. Find the **ClaimsProviders** element in your <em>**`TrustFrameworkExtensions.xml`**</em> file and add a new claims provider as follows:
172
+
A [RESTful technical profile](restful-technical-profile.md) provides support for interfacing with your own RESTful service. Azure AD B2C sends data to the RESTful service in an `InputClaims` collection and receives data back in an `OutputClaims` collection. Find the **ClaimsProviders** element in your <em>**`TrustFrameworkExtensions.xml`**</em> file and add a new claims provider as follows:
Copy file name to clipboardExpand all lines: articles/active-directory-b2c/add-api-connector.md
+1-1
Original file line number
Diff line number
Diff line change
@@ -442,7 +442,7 @@ A claim provides temporary storage of data during an Azure AD B2C policy executi
442
442
443
443
## Add the RESTful API technical profile
444
444
445
-
A [Restful technical profile](restful-technical-profile.md) provides support for interfacing to your own RESTful service. Azure AD B2C sends data to the RESTful service in an `InputClaims` collection and receives data back in an `OutputClaims` collection. Find the **ClaimsProviders** element and add a new claims provider as follows:
445
+
A [RESTful technical profile](restful-technical-profile.md) provides support for interfacing to your own RESTful service. Azure AD B2C sends data to the RESTful service in an `InputClaims` collection and receives data back in an `OutputClaims` collection. Find the **ClaimsProviders** element and add a new claims provider as follows:
Copy file name to clipboardExpand all lines: articles/active-directory-b2c/configure-authentication-sample-react-spa-app.md
+1-1
Original file line number
Diff line number
Diff line change
@@ -62,7 +62,7 @@ The following diagram describes the app registrations and the app architecture.
62
62
Before you follow the procedures in this article, make sure that your computer is running:
63
63
64
64
*[Visual Studio Code](https://code.visualstudio.com/) or another code editor.
65
-
*[Node.js runtime](https://nodejs.org/en/download/) and [npm](https://docs.npmjs.com/downloading-and-installing-node-js-and-npm/). To test that you have Node.js and npm correctly installed on your machine, you can type `node --version` and `npm --version` in a terminal or command prompt.
65
+
*[Node.js runtime](https://nodejs.org/en/download/package-manager/) and [npm](https://docs.npmjs.com/downloading-and-installing-node-js-and-npm/). To test that you have Node.js and npm correctly installed on your machine, you can type `node --version` and `npm --version` in a terminal or command prompt.
Copy file name to clipboardExpand all lines: articles/active-directory-b2c/custom-policies-series-sign-up-or-sign-in.md
+2-2
Original file line number
Diff line number
Diff line change
@@ -1,5 +1,5 @@
1
1
---
2
-
title: Set up a sign-up and sign-in flow for a local account by using Azure Active Directory B2C custom policy
2
+
title: Set up a sign-up and sign-in flow for a local account
3
3
titleSuffix: Azure AD B2C
4
4
description: Learn how to configure a sign-up and sign-in flow for a local account, using email and password, by using Azure Active Directory B2C custom policy.
|[OAuthSSOSessionProvider](#oauthssosessionprovider)|[JWT token issuer](jwt-issuer-technical-profile.md)| Manages session between OAuth2 or OpenId Connect relying party and Azure AD B2C. Performs single-logout. | No | No |
57
57
|[SamlSSOSessionProvider](#samlssosessionprovider)|[SAML token issuer](saml-issuer-technical-profile.md)| Manages session between SAML relying party and Azure AD B2C. Performs single-logout. | No | No |
58
58
|[NoopSSOSessionProvider](#noopssosessionprovider)|Any| Suppress any technical profile from being part of the session.| No | No |
@@ -291,7 +291,7 @@ To use the `SM-Saml-issuer` session management technical profile, add a referenc
291
291
The `NoopSSOSessionProvider` session provider is used to suppress single sign on behavior. Technical profiles that use this type of session provider will always be processed, even when the user has an active session. This type of session provider can be useful to force particular technical profiles to always run, for example:
292
292
293
293
-[Claims transformation](claims-transformation-technical-profile.md) - To create, or transform claims that are later used to determine which orchestration steps to process or skip.
294
-
-[Restful](restful-technical-profile.md) - Fetch updated data from a Restful service each time the policy runs. You can also call a Restful for extended logging, and auditing.
294
+
-[RESTful](restful-technical-profile.md) - Fetch updated data from a RESTful service each time the policy runs. You can also call a RESTful for extended logging, and auditing.
295
295
-[Self-asserted](self-asserted-technical-profile.md) - Force the user to provide data each time the policy runs. For example, verify emails with one-time pass-code, or ask the user's consent.
296
296
-[Phonefactor](phone-factor-technical-profile.md) - Force the user to perform multifactor authentication as part of a "step up authentication" even during subsequent logons (single sign-on).
Copy file name to clipboardExpand all lines: articles/active-directory-b2c/data-residency.md
+3-3
Original file line number
Diff line number
Diff line change
@@ -9,7 +9,7 @@ manager: CelesteDG
9
9
ms.service: azure-active-directory
10
10
11
11
ms.topic: reference
12
-
ms.date: 01/11/2024
12
+
ms.date: 11/27/2024
13
13
ms.author: kengaderdus
14
14
ms.subservice: b2c
15
15
ms.custom: references_regions
@@ -26,7 +26,7 @@ Azure Active Directory B2C (Azure AD B2C) stores customer data in a geographic l
26
26
Region availability and data residency are two different concepts that apply to Azure AD B2C. This article explains the differences between these two concepts, and compares how they apply to Azure versus Azure AD B2C. [Region availability](#region-availability) refers to where a service is available for use whereas [Data residency](#data-residency) refers to where user data is stored.
27
27
28
28
29
-
Azure AD B2C is **generally available worldwide** with the option for **data residency** in the **United States, Europe, Asia Pacific, or Australia**.
29
+
Azure AD B2C is **generally available worldwide** with the option for **data residency** in the **United States, Europe, Asia Pacific Australia or New Zealand**.
30
30
31
31
[Region availability](#region-availability) refers to where a service is available for use. [Data residency](#data-residency) refers to where customer data is stored. For customers in the EU and EFTA, see [EU Data Boundary](#eu-data-boundary).
32
32
@@ -59,7 +59,7 @@ Data resides in **Asia Pacific** for the following locations:
59
59
60
60
> Afghanistan (AF), Hong Kong SAR (HK), India (IN), Indonesia (ID), Japan (JP), Korea (KR), Malaysia (MY), Philippines (PH), Singapore (SG), Sri Lanka (LK), Taiwan (TW), and Thailand (TH)
61
61
62
-
Data resides in **Australia** for the following locations:
62
+
Data resides in Australia or New Zealand for the following locations:
Why can't I access the Azure AD B2C extension in the Azure portal?
34
34
answer: |
35
-
There are two common reasons for why the Microsoft Entra extension isn't working for you. Azure AD B2C requires your user role in the directory to be a global administrator. Contact your administrator if you think you should have access. If you have global administrator privileges, make sure that you are in an Azure AD B2C directory and not a Microsoft Entra directory. You can see instructions for [creating an Azure AD B2C tenant](tutorial-create-tenant.md).
35
+
There are two common reasons for why the Microsoft Entra extension isn't working for you. Azure AD B2C requires your user role in the directory to be a Global administrator. Contact your administrator if you think you should have access. If you have Global administrator privileges, make sure that you are in an Azure AD B2C directory and not a Microsoft Entra directory. You can see instructions for [creating an Azure AD B2C tenant](tutorial-create-tenant.md).
36
36
37
37
- question: |
38
38
Can I use Azure AD B2C features in my existing, employee-based Microsoft Entra tenant?
@@ -92,7 +92,7 @@ sections:
92
92
- question: |
93
93
Why am I unable to create an Azure AD B2C tenant?
94
94
answer: |
95
-
You might not have permission to create an Azure AD B2C tenant. Only users with **Global administrator** or **Tenant Creator** roles can create the tenant. You need to contact your **Global administrator**.
95
+
You might not have permission to create an Azure AD B2C tenant. Only users with at least **Tenant Creator** roles can create the tenant.
96
96
97
97
- question: |
98
98
How do I customize verification emails (the content and the "From:" field) sent by Azure AD B2C?
Copy file name to clipboardExpand all lines: articles/active-directory-b2c/https-cipher-tls-requirements.md
+2-2
Original file line number
Diff line number
Diff line change
@@ -9,7 +9,7 @@ manager: CelesteDG
9
9
ms.service: azure-active-directory
10
10
11
11
ms.topic: reference
12
-
ms.date: 01/11/2024
12
+
ms.date: 11/27/2024
13
13
ms.author: kengaderdus
14
14
ms.subservice: b2c
15
15
@@ -66,7 +66,7 @@ The following endpoints used in your Azure AD B2C environment must comply with t
66
66
67
67
## Check your endpoint compatibility
68
68
69
-
To verify that your endpoints comply with the requirements described in this article, perform a test using a TLS cipher and scanner tool. Test your endpoint using [SSLLABS](https://www.ssllabs.com/ssltest/analyze.html).
69
+
To verify that your endpoints comply with the requirements described in this article, perform a test using a TLS cipher and scanner tool. Test your endpoint using [SSL LABS](https://www.ssllabs.com/ssltest/analyze.html).
Copy file name to clipboardExpand all lines: articles/active-directory-b2c/identity-provider-adfs.md
+2-2
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ author: garrodonnell
6
6
manager: CelesteDG
7
7
ms.service: azure-active-directory
8
8
ms.topic: how-to
9
-
ms.date: 01/24/2024
9
+
ms.date: 01/24/2025
10
10
ms.author: godonnell
11
11
ms.subservice: b2c
12
12
zone_pivot_groups: b2c-policy-type
@@ -73,7 +73,7 @@ In this step, configure the claims AD FS application returns to Azure AD B2C.
73
73
74
74
## Configure AD FS as an identity provider
75
75
76
-
1. Sign in to the [Azure portal](https://portal.azure.com/)as the global administrator of your Azure AD B2C tenant.
76
+
1. Sign in to the [Azure portal](https://portal.azure.com/)with an account that has at least [External Identity Provider Administrator](/entra/identity/role-based-access-control/permissions-reference#external-identity-provider-administrator) privileges.
77
77
1. If you have access to multiple tenants, select the **Settings** icon in the top menu to switch to your Azure AD B2C tenant from the **Directories + subscriptions** menu.
78
78
1. Choose **All services** in the top-left corner of the Azure portal, and then search for and select **Azure AD B2C**.
79
79
1. Select **Identity providers**, and then select **New OpenID Connect provider**.
Copy file name to clipboardExpand all lines: articles/active-directory-b2c/identity-provider-amazon.md
+1-1
Original file line number
Diff line number
Diff line change
@@ -49,7 +49,7 @@ To enable sign-in for users with an Amazon account in Azure Active Directory B2C
49
49
50
50
## Configure Amazon as an identity provider
51
51
52
-
1. Sign in to the [Azure portal](https://portal.azure.com/)as the global administrator of your Azure AD B2C tenant.
52
+
1. Sign in to the [Azure portal](https://portal.azure.com/)with an account that has at least [External Identity Provider Administrator](/entra/identity/role-based-access-control/permissions-reference#external-identity-provider-administrator) privileges.
53
53
1. If you have access to multiple tenants, select the **Settings** icon in the top menu to switch to your Azure AD B2C tenant from the **Directories + subscriptions** menu.
54
54
1. Choose **All services** in the top-left corner of the Azure portal, search for and select **Azure AD B2C**.
55
55
1. Select **Identity providers**, then select **Amazon**.
Copy file name to clipboardExpand all lines: articles/active-directory-b2c/identity-provider-apple-id.md
+1-1
Original file line number
Diff line number
Diff line change
@@ -72,7 +72,7 @@ To enable sign-in for users with an Apple ID in Azure Active Directory B2C (Azur
72
72
73
73
## Configure Apple as an identity provider
74
74
75
-
1. Sign in to the [Azure portal](https://portal.azure.com/)as a global administrator of your Azure AD B2C tenant.
75
+
1. Sign in to the [Azure portal](https://portal.azure.com/)with an account that has at least [External Identity Provider Administrator](/entra/identity/role-based-access-control/permissions-reference#external-identity-provider-administrator) privileges.
76
76
1. If you have access to multiple tenants, select the **Settings** icon in the top menu to switch to your Azure AD B2C tenant from the **Directories + subscriptions** menu.
77
77
1. Under **Azure services**, select **Azure AD B2C**. Or use the search box to find and select **Azure AD B2C**.
78
78
1. Select **Identity providers**, then select **Apple**.
Copy file name to clipboardExpand all lines: articles/active-directory-b2c/identity-provider-facebook.md
+2-2
Original file line number
Diff line number
Diff line change
@@ -60,8 +60,8 @@ If you don't already have a Facebook account, sign up at [https://www.facebook.c
60
60
61
61
## Configure Facebook as an identity provider
62
62
63
-
1. Sign in to the [Azure portal](https://portal.azure.com/)as the global administrator of your Azure AD B2C tenant.
64
-
1. If you have access to multiple tenants, select the **Settings** icon in the top menu to switch to your Azure AD B2C tenant from the **Directories + subscriptions** menu.
63
+
1. Sign in to the [Azure portal](https://portal.azure.com/)with an account that has at least [External Identity Provider Administrator](/entra/identity/role-based-access-control/permissions-reference#external-identity-provider-administrator) privileges.
64
+
1.1.If you have access to multiple tenants, select the **Settings** icon in the top menu to switch to your Azure AD B2C tenant from the **Directories + subscriptions** menu.
65
65
1. Choose **All services** in the top-left corner of the Azure portal, search for and select **Azure AD B2C**.
66
66
1. Select **Identity providers**, then select **Facebook**.
0 commit comments