Skip to content

Commit c405233

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into WI171222-clarify-billing-is-for-commerical-customers-only
2 parents c39af79 + 9ab5762 commit c405233

2 files changed

Lines changed: 34 additions & 10 deletions

File tree

articles/active-directory-b2c/phone-based-mfa.md

Lines changed: 33 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ author: kengaderdus
77
manager: CelesteDG
88
ms.service: azure-active-directory
99
ms.topic: how-to
10-
ms.date: 10/23/2024
10+
ms.date: 11/05/2025
1111
ms.author: kengaderdus
1212
ms.subservice: b2c
1313
ms.custom: sfi-image-nochange
@@ -93,7 +93,7 @@ Take the following actions to help mitigate fraudulent sign-ups.
9393
- [Configure a Conditional Access policy](conditional-access-user-flow.md) to block sign-ins based on location (applies to sign-in flows only, not sign-up flows).
9494
- To prevent automated attacks on your consumer-facing apps, [enable CAPTCHA](add-captcha.md). Azure AD B2C’s CAPTCHA supports both audio and visual CAPTCHA challenges, and applies to both sign-up and sign-in flows for your local accounts.
9595

96-
- Remove country codes that aren't relevant to your organization from the drop-down menu where the user verifies their phone number (this change will apply to future sign-ups):
96+
- Remove country/region codes that aren't relevant to your organization from the drop-down menu where the user verifies their phone number (this change will apply to future sign-ups):
9797

9898
1. Sign in to the [Azure portal](https://portal.azure.com) as the [External ID User Flow Administrator](/entra/identity/role-based-access-control/permissions-reference#external-id-user-flow-administrator) of your Azure AD B2C tenant.
9999
1. If you have access to multiple tenants, select the **Settings** icon in the top menu to switch to your Azure AD B2C tenant from the **Directories + subscriptions** menu.
@@ -104,9 +104,9 @@ Take the following actions to help mitigate fraudulent sign-ups.
104104

105105
1. Open the JSON file that was downloaded in the previous step. In the file, search for `DEFAULT`, and replace the line with `"Value": "{\"DEFAULT\":\"Country/Region\",\"US\":\"United States\"}"`. Be sure to set `Overrides` to `true`.
106106

107-
To implement SMS blocking effectively, make sure the Overrides setting is enabled (set to true) only for your organization’s primary or default language. Do not enable Overrides for any secondary or non-primary languages, as this can cause unexpected SMS blocking. Since the countryList in the JSON file acts as an allow list, be sure to include all countries that should be permitted to send SMS in this list for the primary language configuration when Overrides is true.
107+
To implement SMS blocking effectively, make sure the Overrides setting is enabled (set to true) only for your organization’s primary or default language. Do not enable Overrides for any secondary or non-primary languages, as this can cause unexpected SMS blocking. Since the countryList in the JSON file acts as an allow list, be sure to include all countries/regions that should be permitted to send SMS in this list for the primary language configuration when Overrides is true.
108108
> [!NOTE]
109-
> You can customize the list of allowed country codes in the `countryList` element (see the [Phone factor authentication page example](localization-string-ids.md#phone-factor-authentication-page-example)).
109+
> You can customize the list of allowed country/region codes in the `countryList` element (see the [Phone factor authentication page example](localization-string-ids.md#phone-factor-authentication-page-example)).
110110
111111
1. Save the JSON file. In the language details panel, under **Upload new overrides**, select the modified JSON file to upload it.
112112
1. Close the panel and select **Run user flow**. For this example, confirm that **United States** is the only country code available in the dropdown:
@@ -115,11 +115,32 @@ Take the following actions to help mitigate fraudulent sign-ups.
115115

116116
## Mitigate fraudulent sign-ups for custom policy
117117

118-
To help prevent fraudulent sign-ups, remove any country codes that do not apply to your organization by following these steps:
118+
To help prevent fraudulent sign-ups, remove any country/region codes that do not apply to your organization by following these steps:
119119

120-
1. Locate the policy file that defines the `RelyingParty`. For example, in the [Starter Pack](https://github.com/Azure-Samples/active-directory-b2c-custom-policy-starterpack), this is usually the SignUpOrSignin.xml file.
120+
1. Locate the policy file that defines the `RelyingParty`. For example, in the [Starter Pack](https://github.com/Azure-Samples/active-directory-b2c-custom-policy-starterpack), this is usually the SignUpOrSignin.xml file. See the following snippet.
121121

122-
1. In the `BuildingBlocks` section of this policy file, add the following code. Make sure to include only the country codes relevant to your organization:
122+
```xml
123+
<?xml version="1.0" encoding="UTF-8" standalone="yes"?>
124+
<TrustFrameworkPolicy xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
125+
xmlns:xsd="http://www.w3.org/2001/XMLSchema"
126+
xmlns="http://schemas.microsoft.com/online/cpim/schemas/2013/06" PolicySchemaVersion="0.3.0.0" TenantId="yourtenant.onmicrosoft.com" PolicyId="B2C_1A_signup_signin" PublicPolicyUri="http://yourtenant.onmicrosoft.com/B2C_1A_signup_signin">
127+
128+
<BasePolicy>
129+
<TenantId>yourtenant.onmicrosoft.com</TenantId>
130+
<PolicyId>B2C_1A_TrustFrameworkExtensions</PolicyId>
131+
</BasePolicy>
132+
133+
<BuildingBlocks>
134+
<!-- Add the XML code outlined in Step 2 if this section. -->
135+
</BuildingBlocks>
136+
137+
<RelyingParty>
138+
...
139+
</RelyingParty>
140+
</TrustFrameworkPolicy>
141+
```
142+
143+
1. In the `BuildingBlocks` section of this policy file, add the following code. Make sure to include only the country/region codes relevant to your organization:
123144

124145
```xml
125146
<BuildingBlocks>
@@ -155,10 +176,13 @@ To help prevent fraudulent sign-ups, remove any country codes that do not apply
155176
</BuildingBlocks>
156177
```
157178

158-
The countryList acts as an allow list. Only the countries you specify in this list (for example, Japan, Bulgaria, and the United States) are permitted to use MFA. All other countries are blocked.
179+
The countryList acts as an allow list. Only the countries/regions you specify in this list (for example, Japan, Bulgaria, and the United States) are permitted to use MFA. All other countries/regions are blocked.
180+
181+
> [!IMPORTANT]
182+
> This code must be added to the relying party policy to ensure the country/region code restrictions are properly enforced on the server side.
159183

160184
## Related content
161185

162186
- Learn about [Identity Protection and Conditional Access for Azure AD B2C](conditional-access-identity-protection-overview.md)
163187

164-
- Apply [Conditional Access to user flows in Azure Active Directory B2C](conditional-access-user-flow.md)
188+
- Apply [Conditional Access to user flows in Azure Active Directory B2C](conditional-access-user-flow.md)

articles/backup/backup-azure-mysql-flexible-server-about.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: Overview - Retention of Azure Database for MySQL - Flexible Server for the Long Term by Using Azure Backup
33
description: This article provides an overview of Azure Database for MySQL - Flexible Server retention for the long term.
44
ms.topic: overview
5-
ms.date: 11/21/2024
5+
ms.date: 01/27/2025
66
ms.service: azure-backup
77
ms.custom: engagement-fy23
88
author: AbhishekMallick-MS

0 commit comments

Comments
 (0)