Skip to content

Commit c44f308

Browse files
author
jluk
committedNov 8, 2017
2 parents 58674fb + 36514b8 commit c44f308

File tree

718 files changed

+7662
-2863
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

718 files changed

+7662
-2863
lines changed
 

‎.openpublishing.redirection.json

+27-7
Original file line numberDiff line numberDiff line change
@@ -26,9 +26,14 @@
2626
"redirect_document_id": false
2727
},
2828
{
29-
"source_path": "articles/active-directory/cloudappdiscovery-overview.md",
30-
"redirect_url": "/azure/active-directory/cloudappdiscovery-get-started",
31-
"redirect_document_id": false
29+
"source_path": "articles/active-directory/cloudappdiscovery-overview.md",
30+
"redirect_url": "/azure/active-directory/cloudappdiscovery-get-started",
31+
"redirect_document_id": false
32+
},
33+
{
34+
"source_path": "articles/active-directory/active-directory-users-work-info-azure-portal.md",
35+
"redirect_url": "/azure/active-directory/active-directory-users-profile-azure-portal",
36+
"redirect_document_id": true
3237
},
3338
{
3439
"source_path": "articles/virtual-machines/linux/impactful-maintenance.md",
@@ -361,20 +366,25 @@
361366
"redirect_document_id": false
362367
},
363368
{
364-
"source_path": "articles//azure-resource-manager/resource-manager-policy-portal.md",
369+
"source_path": "articles/azure-resource-manager/resource-manager-policy-portal.md",
365370
"redirect_url": "/azure/azure-policy/assign-policy-definition",
366371
"redirect_document_id": false
367372
},
368373
{
369-
"source_path": "articles//azure-resource-manager/resource-manager-policy-network.md",
374+
"source_path": "articles/azure-resource-manager/resource-manager-policy-network.md",
370375
"redirect_url": "/azure/azure-policy/json-samples",
371376
"redirect_document_id": false
372377
},
373378
{
374-
"source_path": "articles//azure-resource-manager/resource-manager-policy-storage.md",
379+
"source_path": "articles/azure-resource-manager/resource-manager-policy-storage.md",
375380
"redirect_url": "/azure/azure-policy/json-samples",
376381
"redirect_document_id": false
377382
},
383+
{
384+
"source_path": "articles/azure-resource-manager/resource-manager-policy-create-assign.md",
385+
"redirect_url": "/azure/azure-policy/assign-policy-definition-ps",
386+
"redirect_document_id": false
387+
},
378388
{
379389
"source_path": "articles/resource-group-authenticate-service-principal-cli.md",
380390
"redirect_url": "/azure/azure-resource-manager/resource-group-authenticate-service-principal-cli",
@@ -5047,7 +5057,12 @@
50475057
},
50485058
{
50495059
"source_path": "articles/machine-learning/machine-learning-data-science-customize-hadoop-cluster.md",
5050-
"redirect_url": "/azure/machine-learning/team-data-science-process/customize-hadoop-cluster",
5060+
"redirect_url": "/azure/hdinsight/spark/apache-spark-jupyter-spark-sql",
5061+
"redirect_document_id": false
5062+
},
5063+
{
5064+
"source_path": "articles/machine-learning/team-data-science-process/customize-hadoop-cluster.md",
5065+
"redirect_url": "/azure/hdinsight/spark/apache-spark-jupyter-spark-sql",
50515066
"redirect_document_id": false
50525067
},
50535068
{
@@ -7191,6 +7206,11 @@
71917206
"redirect_url": "/azure/service-fabric/service-fabric-create-your-first-linux-application-with-java",
71927207
"redirect_document_id": false
71937208
},
7209+
{
7210+
"source_path": "articles/service-fabric/service-fabric-diagnostics-containers-windowsserver.md",
7211+
"redirect_url": "/azure/service-fabric/service-fabric-diagnostics-oms-containers",
7212+
"redirect_document_id": false
7213+
},
71947214
{
71957215
"source_path": "articles/service-fabric/service-fabric-cluster-creation-via-visual-studio.md",
71967216
"redirect_url": "/azure/service-fabric/service-fabric-cluster-creation-via-arm",
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: Test drive an Azure AD B2C web application | Microsoft Docs
2+
title: Test drive an Azure AD B2C enabled web app | Microsoft Docs
33
description: Test drive sign in, sign up, edit profile, and reset password user journeys using a test Azure AD B2C environment
44
services: active-directory-b2c
55
documentationcenter: .net
@@ -14,22 +14,23 @@ ms.tgt_pltfrm: na
1414
ms.devlang: dotnet
1515
ms.topic: article
1616
ms.date: 10/31/2017
17-
ms.author: saraford
17+
ms.author: patricka
1818

1919
---
20-
# Test drive a web application configured with Azure AD B2C
20+
# Test drive an Azure AD B2C enabled web app
2121

22-
Azure Active Directory B2C provides cloud identity management to keep your application, business, and customers protected. This quickstart uses a sample to-do list app to demonstrate:
22+
Azure Active Directory B2C provides cloud identity management to keep your application, business, and customers protected. This quickstart uses a sample to-do list app to demonstrate:
2323

24-
* Using the **Sign Up or Sign In** policy to create or sign in with a social identity provider or a local account using an email address.
25-
* Calling an API secured by Azure AD B2C to create and edit to-do items.
24+
> [!div class="checklist"]
25+
> * Sign-in with a custom login page.
26+
> * Sign-in using a social identity provider.
27+
> * Creating and managing your Azure AD B2C account and user profile.
28+
> * Calling a web API secured by Azure AD B2C.
2629
2730
## Prerequisites
2831

29-
* Install [Visual Studio 2017](https://www.visualstudio.com/downloads/) with the following workloads:
30-
- **ASP.NET and web development**
31-
32-
* A social account from either Facebook, Google, Microsoft, or Twitter. If you don't have a social account, a valid email address is required.
32+
* [Visual Studio 2017](https://www.visualstudio.com/downloads/) with the **ASP.NET and web development** workload.
33+
* A social account from either Facebook, Google, Microsoft, or Twitter.
3334

3435
[!INCLUDE [quickstarts-free-trial-note](../../includes/quickstarts-free-trial-note.md)]
3536

@@ -41,87 +42,53 @@ Azure Active Directory B2C provides cloud identity management to keep your appli
4142

4243
In the sample application project folder, open the `B2C-WebAPI-DotNet.sln` solution in Visual Studio.
4344

44-
The solution consists of two projects:
45+
The solution is a sample to-do list application consisting of two projects:
4546

4647
* **TaskWebApp** – An ASP.NET MVC web application where a user can manage their to-do list items.
47-
* **TaskService** – An ASP.NET Web API backend that manages all CRUD operations performed on a user's To-do list items. The web app calls this API and displays the results.
48+
* **TaskService** – An ASP.NET Web API backend that manages operations performed on a user's To-do list items. The web app calls this web API and displays the results.
4849

4950
For this quickstart, you need to run both the `TaskWebApp` and `TaskService` projects at the same time.
5051

51-
1. In Solution Explorer, right-click on the solution and select **Set StartUp Projects...**.
52+
1. In the Visual Studio menu, select **Projects > Set StartUp Projects...**.
5253
2. Select **Multiple startup projects** radio button.
5354
3. Change the **Action** for both projects to **Start**. Click **OK**.
5455

5556
![Set Startup Page in Visual Studio](media/active-directory-b2c-quickstarts-web-app/setup-startup-projects.png)
5657

5758
Select **Debug > Start Debugging** to build and run both applications. Each application opens in its own browser tab:
5859

59-
* `https://localhost:44316/` - This page is the ASP.NET web application. You interact directly with this application in the quickstart.
60-
* `https://localhost:44332/` - This page is the web API that is called by the ASP.NET web application.
60+
`https://localhost:44316/` - This page is the ASP.NET web application. You interact directly with this application in the quickstart.
61+
`https://localhost:44332/` - This page is the web API that is called by the ASP.NET web application.
6162

6263
## Create an account
6364

64-
Click the **Sign up / Sign in** link in the ASP.NET web application to start the **Sign Up or Sign In** workflow. When creating an account, you can use an existing social identity provider account or an email account.
65+
Click the **Sign up / Sign in** link in the ASP.NET web application to start the **Sign Up or Sign In** workflow. When creating an account, you can use an existing social identity provider account or an email account. For this quickstart, use a social identity provider account from either Facebook, Google, Microsoft, or Twitter.
6566

6667
![Sample ASP.NET web app](media/active-directory-b2c-quickstarts-web-app/web-app-sign-in.png)
6768

6869
### Sign up using a social identity provider
6970

70-
To sign up using a social identity provider, click the button of the identity provider you want to use. If you prefer to use an email address, jump to the [Sign up using an email address](#sign-up-using-an-email-address) section.
71+
To sign up using a social identity provider, click the button of the identity provider you want to use.
7172

7273
![Sign In or Sign Up provider](media/active-directory-b2c-quickstarts-web-app/sign-in-or-sign-up-web.png)
7374

7475
You need to authenticate (sign-in) using your social account credentials and authorize the application to read information from your social account. By granting access, the application can retrieve profile information from the social account such as your name and city.
7576

76-
![Authenticate and authorize using a social account](media/active-directory-b2c-quickstarts-web-app/twitter-authenticate-authorize-web.png)
77+
Finish the sign-in process for the identity provider. For example, if you chose Twitter, enter your Twitter credentials and click **Sign in**.
7778

78-
Finish the sign-in process for the identity provider. For example, click **Sign in** button for Twitter.
79+
![Authenticate and authorize using a social account](media/active-directory-b2c-quickstarts-web-app/twitter-authenticate-authorize-web.png)
7980

80-
Your new account profile details are pre-populated with information from your social account.
81-
82-
![New account sign-up profile details](media/active-directory-b2c-quickstarts-web-app/new-account-sign-up-profile-details-web.png)
81+
Your new Azure AD B2C account profile details are pre-populated with information from your social account.
8382

8483
Update the Display Name, Job Title, and City fields and click **Continue**. The values you enter are used for your Azure AD B2C user account profile.
8584

86-
You have successfully created a new Azure AD B2C user account that uses an identity provider.
87-
88-
Next step: [Jump to view your claims](#view-your-claims) section.
89-
90-
### Sign up using an email address
91-
92-
If you choose to not use a social account to provide authentication, you can create an Azure AD B2C user account using a valid email address. An Azure AD B2C local user account uses Azure Active Directory as the identity provider. To use your email address, click the **Don't have an account? Sign up now** link.
93-
94-
![Sign In or Sign Up using email](media/active-directory-b2c-quickstarts-web-app/sign-in-or-sign-up-email-web.png)
95-
96-
Enter a valid email address and click **Send verification code**. A valid email address is required to receive the verification code from Azure AD B2C.
97-
98-
Enter the verification code you receive in email and click **Verify code**.
99-
100-
Add your profile information and click **Create**.
101-
102-
![Sign up with new account using email](media/active-directory-b2c-quickstarts-web-app/sign-up-new-account-profile-email-web.png)
103-
104-
You have successfully created a new Azure AD B2C local user account.
105-
106-
## Reset your password
107-
108-
If you created your account using an email address, Azure AD B2C has functionality to allow users to reset their password. To edit the profile you created, click your profile name in the menu bar and select **Reset Password**.
109-
110-
Verify your email address by entering it and clicking **Send verification code**. A verification code is sent to your email address.
111-
112-
Enter the verification code you received in email and click **Verify code**.
113-
114-
After your email address is verified, click **Continue**.
115-
116-
Enter your new password and click **Continue**.
117-
118-
## View your claims
119-
120-
Click **Claims** in the web application menu bar to view the claims associated with your last action.
85+
![New account sign-up profile details](media/active-directory-b2c-quickstarts-web-app/new-account-sign-up-profile-details-web.png)
12186

122-
![Sign up with new account using email](media/active-directory-b2c-quickstarts-web-app/view-claims-sign-up-web.png)
87+
You have successfully:
12388

124-
In this example, the last action was for the *sign in or sign up* experience. Notice the **Claim type** `http://schemas.microsoft.com/claims/authnclassreference` is `b2c_1_susi` indicating the last action was sign-up or sign-in. If the last action was password reset, the **Claim type** would be `b2c_1_reset`.
89+
> [!div class="checklist"]
90+
> * Authenticated using an identity provider.
91+
> * Created an Azure AD B2C user account.
12592
12693
## Edit your profile
12794

@@ -133,32 +100,26 @@ Change your **Display name** and **City**. Click **Continue** to update your pr
133100

134101
![Update profile](media/active-directory-b2c-quickstarts-web-app/update-profile-web.png)
135102

136-
Notice your display name updates in the upper right portion of the page after changing your name.
137-
138-
Click **Claims**. Changes you made to **Display name** and **City** are reflected in the claims.
139-
140-
![View claims](media/active-directory-b2c-quickstarts-web-app/view-claims-update-web.png)
103+
Notice your display name in the upper right portion of the page shows the updated name.
141104

142-
Notice the **Claim type** `http://schemas.microsoft.com/claims/authnclassreference` has updated to `b2c_1_edit_profile` indicating the last action performed was a profile edit. Also note, the name and city are the new values *Sara S.* and *Seattle*.
143-
144-
## Access a resource
105+
## Access a secured web API resource
145106

146107
Click **To-Do List** to enter and modify your to-do list items. The ASP.NET web application includes an access token in the request to the web API resource requesting permission to perform operations on the user's to-do list items.
147108

148109
Enter text in the **New Item** text box. Click **Add** to call the Azure AD B2C secured web API that adds a to-do list item.
149110

150111
![Add a to-do list item](media/active-directory-b2c-quickstarts-web-app/add-todo-item-web.png)
151112

152-
## Other scenarios
113+
You have successfully used your Azure AD B2C user account to make an authorized call an Azure AD B2C secured web API.
153114

154-
Other scenarios to test drive are as follows:
115+
## Next steps
155116

156-
* Sign out of the application and click **To-do list**. Notice how you are prompted to sign in and your list items are persisted.
157-
* Create a new account using a different type of account. For example, use a social identity provider if you created an account using an email address previously.
117+
The sample used in this quickstart can be used to try other Azure AD B2C scenarios including:
158118

159-
## Next steps
119+
* Creating a new local account using an email address.
120+
* Resetting your local account password.
160121

161-
The next step is to create your own Azure AD B2C tenant and configure the sample to run using your tenant.
122+
If you're ready to delve into creating your own Azure AD B2C tenant and configure the sample to run using your own tenant, try out the following tutorial.
162123

163124
> [!div class="nextstepaction"]
164-
> [Create an Azure Active Directory B2C tenant in the Azure portal](active-directory-b2c-get-started.md)
125+
> [Create an ASP.NET web app with Azure Active Directory B2C sign-up, sign-in, profile edit, and password reset](active-directory-b2c-devquickstarts-web-dotnet-susi.md)

0 commit comments

Comments
 (0)
Please sign in to comment.