Skip to content

Commit 3939760

Browse files
authored
Merge pull request #66144 from MicrosoftDocs/master
2/11 PM Publish
2 parents e69fc38 + 8a17c7a commit 3939760

File tree

601 files changed

+2402
-1917
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

601 files changed

+2402
-1917
lines changed

.openpublishing.redirection.json

Lines changed: 14 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -13119,22 +13119,22 @@
1311913119
},
1312013120
{
1312113121
"source_path": "articles/sql-database/sql-database-cloud-migrate-compatible-using-ssms-migration-wizard.md",
13122-
"redirect_url": "/azure/sql-database/sql-database-cloud-migrate",
13122+
"redirect_url": "/azure/sql-database/sql-database-single-database-migrate",
1312313123
"redirect_document_id": false
1312413124
},
1312513125
{
1312613126
"source_path": "articles/sql-database/sql-database-cloud-migrate-compatible-using-transactional-replication.md",
13127-
"redirect_url": "/azure/sql-database/sql-database-cloud-migrate",
13127+
"redirect_url": "/azure/sql-database/sql-database-single-database-migrate",
1312813128
"redirect_document_id": false
1312913129
},
1313013130
{
1313113131
"source_path": "articles/sql-database/sql-database-cloud-migrate-determine-compatibility-sqlpackage.md",
13132-
"redirect_url": "/azure/sql-database/sql-database-cloud-migrate",
13132+
"redirect_url": "/azure/sql-database/sql-database-single-database-migrate",
1313313133
"redirect_document_id": false
1313413134
},
1313513135
{
1313613136
"source_path": "articles/sql-database/sql-database-cloud-migrate-determine-compatibility-ssms.md",
13137-
"redirect_url": "/azure/sql-database/sql-database-cloud-migrate",
13137+
"redirect_url": "/azure/sql-database/sql-database-single-database-migrate",
1313813138
"redirect_document_id": false
1313913139
},
1314013140
{
@@ -13144,17 +13144,22 @@
1314413144
},
1314513145
{
1314613146
"source_path": "articles/sql-database/sql-database-cloud-migrate-fix-compatibility-issues-ssdt.md",
13147-
"redirect_url": "/azure/sql-database/sql-database-cloud-migrate",
13147+
"redirect_url": "/azure/sql-database/sql-database-single-database-migrate",
1314813148
"redirect_document_id": false
1314913149
},
1315013150
{
1315113151
"source_path": "articles/sql-database/sql-database-cloud-migrate-fix-compatibility-issues-ssms.md",
13152-
"redirect_url": "/azure/sql-database/sql-database-cloud-migrate",
13152+
"redirect_url": "/azure/sql-database/sql-database-single-database-migrate",
13153+
"redirect_document_id": false
13154+
},
13155+
{
13156+
"source_path": "articles/sql-database/sql-database-cloud-migrate.md",
13157+
"redirect_url": "/azure/sql-database/sql-database-single-database-migrate",
1315313158
"redirect_document_id": false
1315413159
},
1315513160
{
1315613161
"source_path": "articles/sql-database/sql-database-cloud-migrate-fix-compatibility-issues.md",
13157-
"redirect_url": "/azure/sql-database/sql-database-cloud-migrate",
13162+
"redirect_url": "/azure/sql-database/sql-database-single-database-migrate",
1315813163
"redirect_document_id": false
1315913164
},
1316013165
{
@@ -17356,12 +17361,12 @@
1735617361
},
1735717362
{
1735817363
"source_path": "articles/active-directory/active-directory-reporting-api-audit-reference.md",
17359-
"redirect_url": "https://developer.microsoft.com/en-us/graph/docs/api-reference/beta/resources/directoryaudit",
17364+
"redirect_url": "https://docs.microsoft.com/graph/api/resources/directoryaudit?view=graph-rest-beta",
1736017365
"redirect_document_id": false
1736117366
},
1736217367
{
1736317368
"source_path": "articles/active-directory/active-directory-reporting-api-sign-in-activity-reference.md",
17364-
"redirect_url": "https://developer.microsoft.com/en-us/graph/docs/api-reference/beta/resources/signin",
17369+
"redirect_url": "https://docs.microsoft.com/graph/api/resources/signin?view=graph-rest-beta",
1736517370
"redirect_document_id": false
1736617371
},
1736717372
{
Lines changed: 24 additions & 23 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: Password complexity in Azure Active Directory B2C | Microsoft Docs
2+
title: Password complexity - Azure Active Directory B2C | Microsoft Docs
33
description: How to configure complexity requirements for passwords supplied by consumers in Azure Active Directory B2C.
44
services: active-directory-b2c
55
author: davidmu1
@@ -8,33 +8,34 @@ manager: daveba
88
ms.service: active-directory
99
ms.workload: identity
1010
ms.topic: conceptual
11-
ms.date: 11/30/2018
11+
ms.date: 02/11/2019
1212
ms.author: davidmu
1313
ms.subservice: B2C
1414
---
1515

16-
# Azure AD B2C: Configure complexity requirements for passwords
16+
# Configure complexity requirements for passwords in Azure Active Directory B2C
1717

18-
> [!NOTE]
19-
> **This feature is in public preview.**
18+
Azure Active Directory (Azure AD) B2C supports changing the complexity requirements for passwords supplied by an end user when creating an account. By default, Azure AD B2C uses `Strong` passwords. Azure AD B2C also supports configuration options to control the complexity of passwords that customers can use.
2019

21-
Azure Active Directory B2C (Azure AD B2C) supports changing the complexity requirements for passwords supplied by an end user when creating an account. By default, Azure AD B2C uses `Strong` passwords. Azure AD B2C also supports configuration options to control the complexity of passwords that customers can use.
20+
## Password rule enforcement
2221

23-
## When password rules are enforced
22+
During sign-up or password reset, an end user must supply a password that meets the complexity rules. Password complexity rules are enforced per user flow. It is possible to have one user flow require a four-digit pin during sign-up while another user flow requires a eight character string during sign-up. For example, you may use a user flow with different password complexity for adults than for children.
2423

25-
During sign-up or password reset, an end user must supply a password that meets the complexity rules. Password complexity rules are enforced per user flow. It is possible to have one user flow require a four-digit pin during sign-up while another user flow requires a eight character string during sign-up. For example, you may use a user flow with different password complexity for adults than for children.
24+
Password complexity is never enforced during sign-in. Users are never prompted during sign-in to change their password because it doesn't meet the current complexity requirement.
2625

27-
Password complexity is never enforced during sign-in. Users are never prompted during sign-in to change their password because it doesn't meet the current complexity requirement.
26+
Password complexity can be configured in the following types of user flows:
2827

29-
Here are the types of user flows where password complexity can be configured:
28+
- Sign-up or Sign-in user flow
29+
- Password Reset user flow
3030

31-
* Sign-up or Sign-in user flow
32-
* Password Reset user flow
33-
* Custom Policy ([Configure password complexity in custom policy](active-directory-b2c-reference-password-complexity-custom.md))
31+
If you are using custom policies, you can ([configure password complexity in a custom policy](active-directory-b2c-reference-password-complexity-custom.md)).
3432

35-
## How to configure password complexity
33+
## Configure password complexity
3634

37-
1. Open **User flows**.
35+
1. Sign in to the [Azure portal](https://portal.azure.com).
36+
2. Make sure you're using the directory that contains your Azure AD B2C tenant by clicking the **Directory and subscription filter** in the top menu and choosing the directory that contains your tenant.
37+
3. Choose **All services** in the top-left corner of the Azure portal, and then search for and select **Azure AD B2C**.
38+
4. Select **User flows**.
3839
2. Select a user flow, and click **Properties**.
3940
3. Under **Password complexity**, change the password complexity for this user flow to **Simple**, **Strong**, or **Custom**.
4041

@@ -46,29 +47,29 @@ Here are the types of user flows where password complexity can be configured:
4647
| Strong | A password that is at least 8 to 64 characters. It requires 3 out of 4 of lowercase, uppercase, numbers, or symbols. |
4748
| Custom | This option provides the most control over password complexity rules. It allows configuring a custom length. It also allows accepting number-only passwords (pins). |
4849

49-
## Options available under custom
50+
## Custom options
5051

5152
### Character Set
5253

5354
Allows you to accept digits only (pins) or the full character set.
5455

55-
* **Numbers only** allows digits only (0-9) while entering a password.
56-
* **All** allows any letter, number, or symbol.
56+
- **Numbers only** allows digits only (0-9) while entering a password.
57+
- **All** allows any letter, number, or symbol.
5758

5859
### Length
5960

6061
Allows you to control the length requirements of the password.
6162

62-
* **Minimum Length** must be at least 4.
63-
* **Maximum Length** must be greater or equal to minimum length and at most can be 64 characters.
63+
- **Minimum Length** must be at least 4.
64+
- **Maximum Length** must be greater or equal to minimum length and at most can be 64 characters.
6465

6566
### Character classes
6667

6768
Allows you to control the different character types used in the password.
6869

69-
* **2 of 4: Lowercase character, Uppercase character, Number (0-9), Symbol** ensures the password contains at least two character types. For example, a number and a lowercase character.
70-
* **3 of 4: Lowercase character, Uppercase character, Number (0-9), Symbol** ensures the password contains at least two character types. For example, a number, a lowercase character and an uppercase character.
71-
* **4 of 4: Lowercase character, Uppercase character, Number (0-9), Symbol** ensures the password contains all for character types.
70+
- **2 of 4: Lowercase character, Uppercase character, Number (0-9), Symbol** ensures the password contains at least two character types. For example, a number and a lowercase character.
71+
- **3 of 4: Lowercase character, Uppercase character, Number (0-9), Symbol** ensures the password contains at least two character types. For example, a number, a lowercase character and an uppercase character.
72+
- **4 of 4: Lowercase character, Uppercase character, Number (0-9), Symbol** ensures the password contains all for character types.
7273

7374
> [!NOTE]
7475
> Requiring **4 of 4** can result in end-user frustration. Some studies have shown that this requirement does not improve password entropy. See [NIST Password Guidelines](https://pages.nist.gov/800-63-3/sp800-63b.html#appA)

articles/active-directory-b2c/user-overview.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -43,29 +43,29 @@ When you add a new work account, you need to consider the following configuratio
4343
You can use the following information to create a new work account:
4444

4545
- [Azure portal](../active-directory/fundamentals/add-users-azure-active-directory.md)
46-
- [Microsoft Graph](https://developer.microsoft.com/en-us/graph/docs/api-reference/v1.0/api/user_post_users)
46+
- [Microsoft Graph](https://docs.microsoft.com/graph/api/user-post-users?view=graph-rest-1.0)
4747

4848
### Update a user profile
4949

5050
You can use the following information to update the profile of a user:
5151

5252
- [Azure portal](../active-directory/fundamentals/active-directory-users-profile-azure-portal.md)
53-
- [Microsoft Graph](https://developer.microsoft.com/en-us/graph/docs/api-reference/v1.0/api/user_update)
53+
- [Microsoft Graph](https://docs.microsoft.com/graph/api/user-update?view=graph-rest-1.0)
5454

5555
### Reset a password for a user
5656

5757
You can use the following information to reset the password of a user:
5858

5959
- [Azure portal](../active-directory/fundamentals/active-directory-users-reset-password-azure-portal.md)
60-
- [Microsoft Graph](https://developer.microsoft.com/en-us/graph/docs/api-reference/v1.0/api/user_update)
60+
- [Microsoft Graph](https://docs.microsoft.com/graph/api/user-update?view=graph-rest-1.0)
6161

6262
## Guest user
6363

6464
You can invite external users to your tenant as a guest user. A typical scenario for inviting a guest user to your Azure AD B2C tenant is to share administration responsibilities. For an example of using a guest account, see [Properties of an Azure Active Directory B2B collaboration user](../active-directory/b2b/user-properties.md).
6565

6666
When you invite a guest user to your tenant, you provide the email address of the recipient and a message describing the invitation. The invitation link takes the user to the consent page where the **Get Started** button is selected and the review of permissions is accepted. If an inbox isn't attached to the email address, the user can navigate to the consent page by going to a Microsoft page using the invited credentials. The user is then forced to redeem the invitation the same way as clicking on the link in the email. For example: `https://myapps.microsoft.com/B2CTENANTNAME`.
6767

68-
You can also use the [Microsoft Graph API](https://developer.microsoft.com/en-us/graph/docs/api-reference/beta/api/invitation_post) to invite a guest user.
68+
You can also use the [Microsoft Graph API](https://docs.microsoft.com/graph/api/invitation-post?view=graph-rest-beta) to invite a guest user.
6969

7070
## Consumer user
7171

0 commit comments

Comments
 (0)