Skip to content

Commit 068829c

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into itsm
2 parents 790690c + 9333a83 commit 068829c

File tree

144 files changed

+3223
-536
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

144 files changed

+3223
-536
lines changed

articles/active-directory-b2c/partner-biocatch.md

Lines changed: 66 additions & 68 deletions
Original file line numberDiff line numberDiff line change
@@ -4,82 +4,78 @@ titleSuffix: Azure AD B2C
44
description: Tutorial to configure Azure Active Directory B2C with BioCatch to identify risky and fraudulent users
55
services: active-directory-b2c
66
author: gargi-sinha
7-
manager: CelesteDG
7+
manager: martinco
88
ms.reviewer: kengaderdus
9-
109
ms.service: active-directory
1110
ms.workload: identity
1211
ms.topic: how-to
13-
ms.date: 09/20/2021
12+
ms.date: 03/13/2023
1413
ms.author: gasinh
1514
ms.subservice: B2C
1615
---
1716

1817
# Tutorial: Configure BioCatch with Azure Active Directory B2C
1918

20-
In this sample tutorial, learn how to integrate Azure Active Directory (AD) B2C authentication with [BioCatch](https://www.biocatch.com/) to further augment your Customer Identity and Access Management (CIAM) security posture. BioCatch analyzes a user's physical and cognitive digital behaviors to generate insights that distinguish between legitimate customers and cyber-criminals.
21-
22-
## Prerequisites
19+
Learn how to integrate Azure Active Directory B2C (Azure AD B2C) authentication with BioCatch technology to augment your Customer Identity and Access Management (CIAM) security posture. BioCatch products analyze user physical and cognitive digital behaviors for insights that help distinguish legitimate customers.
2320

24-
To get started, you'll need:
21+
Go to biocatch.com to learn more [BioCatch](https://www.biocatch.com/)
2522

26-
- An Azure subscription. If you don't have a subscription, you can get a [free account](https://azure.microsoft.com/free/).
23+
## Prerequisites
2724

28-
- [An Azure AD B2C tenant](tutorial-create-tenant.md) that is linked to your Azure subscription.
25+
To get started, you need:
2926

30-
- A [BioCatch](https://www.biocatch.com/contact-us) account.
27+
* An Azure subscription
28+
* If you don't have one, get an [Azure free account](https://azure.microsoft.com/free/)
29+
* An Azure AD B2C tenant linked to the Azure subscription
30+
* See, [Tutorial: Create an Azure Active Directory B2C tenant](tutorial-create-tenant.md)
31+
* Go to the biocatch.com [Contact Us](https://www.biocatch.com/contact-us) page to request an account
32+
* Mention Azure AD B2C integration
3133

3234
## Scenario description
3335

3436
BioCatch integration includes the following components:
3537

36-
- **A web app or web service** - The user first browses to this web service. This web service instantiates a unique client session ID that is sent to BioCatch. The client session ID then immediately begins transmitting user behavior characteristics to BioCatch.
37-
38-
- **A method** - Sends the unique client session ID to Azure AD B2C. In the provided example, JavaScript is used to input the value into a hidden HTML field.
39-
40-
- **An Azure AD B2C customized UI** - Hides an HTML field for the client session ID input from JavaScript, if using the above method
41-
42-
- **Azure AD B2C custom policy**
38+
* **A web app or web service** - users browse to this web service that instantiates a unique client session ID that goes to BioCatch
39+
* The session ID transmits user behavior characteristics to BioCatch
40+
* **A method** - sends the session ID to Azure AD B2C. In the example, JavaScript inputs the value into a hidden HTML field.
41+
* **An Azure AD B2C customized UI** - hides an HTML field for the session ID input from JavaScript
42+
* **Azure AD B2C custom policy**:
43+
* Takes the session ID as a claim via a self-asserted technical profile
44+
* Integrates with BioCatch via a REST API claims provider and passes the session ID to BioCatch
45+
* Multiple custom claims return from BioCatch for the custom policy logic
46+
* A user journey evaluates a returned claim, and executes a conditional action, such as multi-factor authentication
4347

44-
- Takes the custom client session ID from the UI in the form of a claim. This is achieved via a self-asserted technical profile
48+
Learn more:
4549

46-
- Integrates with BioCatch via a REST API claims provider and passes the client session ID to the BioCatch platform
50+
* [Azure AD B2C custom policy overview](custom-policy-overview.md)
51+
* [Tutorial: Create user flows and custom policies in Azure AD B2C](./tutorial-create-user-flows.md?pivots=b2c-custom-policy&tabs=applications)
4752

48-
- Multiple custom claims are returned from BioCatch for the custom policy logic to then act upon
53+
The following diagram illustrates user flows with session information.
4954

50-
- A userjourney, which evaluates a returned claim, for example, session risk, and conditionally executes an action, such as invoke Multi-factor authentication (MFA).
55+
![Diagram of user flows with session information.](media/partner-biocatch/biocatch-architecture-diagram.png)
5156

52-
![Diagram of the bio catch architecture.](media/partner-biocatch/biocatch-architecture-diagram.png)
57+
1. The user browses to the web service, which returns HTML, CSS, or JavaScript values, then loads the BioCatch JavaScript SDK. Client-side JavaScript configures a client session ID for the BioCatch SDK. Alternately, the web service pre-configures client session ID and sends it to the client. You can configure the instantiated BioCatch JavaScript SDK for BioCatch, which sends user behavior to BioCatch from the client device, using the client session ID.
58+
2. User signs-up or signs-in and is redirected to Azure AD B2C.
59+
3. The user journey includes a self-asserted claims provider, which inputs the client session ID. This field is hidden. Use JavaScript to input the session ID into the field. Select **Next**, to continue sign-up or sign-in. The session ID goes to BioCatch for a risk score. BioCatch returns session information, and recommends allow or block. The user journey has a conditional check, which acts upon the returned claims.
60+
4. Based on the conditional check result, an action is invoked.
61+
5. The web service can use the session ID to query BioCatch API to determine risk and session information.
5362

54-
| Step | Description |
55-
|:---|:-----------------------|
56-
|1a | The user browses the web service. The web service then returns HTML, CSS, or JavaScript values and configures to load the BioCatch JavaScript SDK. Client-side JavaScript configures/sets client session ID for the BioCatch SDK. Alternately, the web service can pre-configure client session ID and send to the client. |
57-
|1b | Configure the instantiated BioCatch JavaScript SDK against the BioCatch platform. Immediately begin to send user behavior characteristics to BioCatch from the client device, using the client session ID from step 1a. |
58-
|2 | User tries to sign-up/sign-in and is redirected to Azure AD B2C. |
59-
|3a | Part of the userjourney is a self-asserted claimsprovider, which takes the client session ID as input. This field is hidden on the screen. You can use JavaScript to input the session ID into the field. Select the *next* button, to continue the sign-up/sign-in process.|
60-
|3b | The client session ID is submitted to the BioCatch platform to determine a risk score. |
61-
|3c | BioCatch returns information about the session, such as risk score, and a recommendation on what to do – allow or block |
62-
|3d |The userjourney has a conditional check step, which acts upon the returned claims|
63-
| 4 | Based on the conditional check result, an action such as *step-up MFA* is invoked|
64-
|5 | At any time from when the user first hits the web service page, the web service can use the client session ID to query the BioCatch API to determine risk score and session information in real-time. |
63+
## Get started with BioCatch
6564

66-
## Onboard with BioCatch
67-
68-
Contact [BioCatch](https://www.biocatch.com/contact-us) and create an account.
65+
Go to the biocatch.com [Contact Us](https://www.biocatch.com/contact-us) page to initiate an account.
6966

7067
## Configure the custom UI
7168

72-
It's recommended to hide the client session ID field. Use CSS, JavaScript, or any other method to hide the field. For testing purposes, you may unhide the field. For example, JavaScript is used to hide the input field as:
69+
We recommended you hide the Client Session ID field with CSS, JavaScript, or another method. For testing, unhide the field. For example, JavaScript hides the input field as:
7370

7471
```JavaScript
7572
document.getElementById("clientSessionId").style.display='none';
7673
```
7774

78-
## Configure Azure AD B2C Identity Experience Framework policies
79-
80-
1. Configure the initial [custom policy configuration](./tutorial-create-user-flows.md?pivots=b2c-custom-policy).
75+
## Configure Azure AD B2C Identity Experience Framework policies
8176

82-
2. Create a new file, which inherits from the extensions file.
77+
1. To get started, See [Tutorial: Create user flows and custom policies in Azure AD B2C](./tutorial-create-user-flows.md?pivots=b2c-custom-policy).
78+
2. Create a new file that inherits from the extensions file.
8379

8480
```xml
8581
<BasePolicy>
@@ -107,7 +103,7 @@ document.getElementById("clientSessionId").style.display = 'none';
107103
</ContentDefinitions>
108104
```
109105

110-
4. Add the following claims under the BuildingBlocks resource.
106+
4. Under the BuildingBlocks resource, add the following claims.
111107

112108
```xml
113109
<ClaimsSchema>
@@ -141,7 +137,7 @@ document.getElementById("clientSessionId").style.display = 'none';
141137
</ClaimsSchema>
142138
```
143139

144-
5. Configure self-asserted claims provider for the client session ID field.
140+
5. Configure a self-asserted claims provider for the client session ID field.
145141

146142
```xml
147143
<ClaimsProvider>
@@ -185,7 +181,7 @@ document.getElementById("clientSessionId").style.display = 'none';
185181
</ClaimsProvider>
186182
```
187183

188-
6. Configure REST API claims provider for BioCatch.
184+
6. Configure a REST API claims provider for BioCatch.
189185

190186
```xml
191187
<TechnicalProfile Id="BioCatch-API-GETSCORE">
@@ -234,15 +230,13 @@ document.getElementById("clientSessionId").style.display = 'none';
234230
```
235231

236232
> [!NOTE]
237-
> BioCatch will provide you the URL, customer ID and unique user ID (UUID) to configure. The customer SessionID claim is passed through as a query string parameter to BioCatch. You can choose the activity type, for example *MAKE_PAYMENT*.
238-
239-
7. Configure the userjourney; follow the example
240-
241-
1. Get the clientSessionID as a claim
233+
> BioCatch provides the URL, customer ID, and unique user ID (UUID). The customer SessionID claim passes through as a query string parameter to BioCatch. You can select the activity type, for example **MAKE_PAYMENT**.
242234

243-
1. Call the BioCatch API to get the session information
235+
7. Configure the user journey using the following example:
244236

245-
1. If the returned claim *risk* equals *low*, skip the step for MFA, else force user MFA
237+
* Get the clientSessionID as a claim.
238+
* Call BioCatch API to get the session information.
239+
* If the returned claim risk is **low**, skip the step for MFA, otherwise enforce user MFA.
246240

247241
```xml
248242
<OrchestrationStep Order="8" Type="ClaimsExchange">
@@ -288,9 +282,7 @@ document.getElementById("clientSessionId").style.display = 'none';
288282
</ClaimsExchanges>
289283
```
290284

291-
8. Configure on relying party configuration (optional)
292-
293-
It is useful to pass the BioCatch returned information to your application as claims in the token, specifically *risklevel* and *score*.
285+
8. Configure relying party (optional). You can pass the BioCatch returned information to your application as claims in the token: risklevel and score.
294286

295287
```xml
296288
<RelyingParty>
@@ -346,21 +338,28 @@ document.getElementById("clientSessionId").style.display = 'none';
346338

347339
## Integrate with Azure AD B2C
348340

349-
Follow these steps to add the policy files to Azure AD B2C
341+
Add the policy files to Azure AD B2C. For the following instructions, use the directory with the Azure AD B2C tenant.
350342

351-
1. Sign in to the [**Azure portal**](https://portal.azure.com/) as the global administrator of your Azure AD B2C tenant.
352-
1. Make sure you're using the directory that contains your Azure AD B2C tenant. Select the **Directories + subscriptions** icon in the portal toolbar.
353-
1. On the **Portal settings | Directories + subscriptions** page, find your Azure AD B2C directory in the **Directory name** list, and then select **Switch**.
354-
1. Choose **All services** in the top-left corner of the Azure portal, search for and select Azure AD B2C.
355-
1. Navigate to **Azure AD B2C** > **Identity Experience Framework**
356-
1. Upload all the policy files to your tenant.
343+
1. Sign in to the [**Azure portal**](https://portal.azure.com/) as the Global Administrator of the Azure AD B2C tenant.
344+
1. In the portal toolbar, select **Directories + subscriptions**.
345+
1. On the **Portal settings, Directories + subscriptions** page, in the **Directory name** list, locate the Azure AD B2C directory.
346+
2. Select **Switch**.
347+
3. In the top-left corner of the Azure portal, select **All services**.
348+
4. Search for and select **Azure AD B2C**.
349+
5. Navigate to **Azure AD B2C** > **Identity Experience Framework**.
350+
6. Upload the policy files to the tenant.
357351

358352
## Test the solution
359353

360-
1. [Register a dummy application, which redirects to JWT.MS](./tutorial-register-applications.md?tabs=app-reg-ga)
361-
1. Under the **Identity Experience Framework**, select the policy you created
362-
1. In the policy window, select the dummy JWT.MS application, and select **run now**
363-
1. Go through sign-up flow and create an account. Token returned to JWT.MS should have 2x claims for riskLevel and score. Follow the example.
354+
For the following instructions, see [Tutorial: Register a web application in Azure Active Directory B2C](./tutorial-register-applications.md?tabs=app-reg-ga)
355+
356+
1. Register a dummy application that redirects to JWT.MS.
357+
2. Under **Identity Experience Framework**, select the policy you created.
358+
3. In the policy window, select the dummy JWT.MS application
359+
4. Select **run now**.
360+
5. Perform a sign-up flow and create an account.
361+
6. The token returned to JWT.MS has 2x claims for riskLevel and score.
362+
7. Use the following example.
364363

365364
```JavaScript
366365
{
@@ -413,6 +412,5 @@ Follow these steps to add the policy files to Azure AD B2C
413412

414413
## Additional resources
415414

416-
- [Custom policies in Azure AD B2C](./custom-policy-overview.md)
417-
418-
- [Get started with custom policies in Azure AD B2C](./tutorial-create-user-flows.md?pivots=b2c-custom-policy&tabs=applications)
415+
* [Azure AD B2C custom policy overview](./custom-policy-overview.md)
416+
* [Tutorial: Create user flows and custom policies in Azure AD B2C](./tutorial-create-user-flows.md?pivots=b2c-custom-policy&tabs=applications)

articles/active-directory/app-provisioning/user-provisioning.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ ms.service: active-directory
77
ms.subservice: app-provisioning
88
ms.topic: overview
99
ms.workload: identity
10-
ms.date: 03/13/2023
10+
ms.date: 03/14/2023
1111
ms.author: kenwith
1212
ms.reviewer: arvinh
1313
---

articles/active-directory/app-proxy/active-directory-app-proxy-protect-ndes.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.subservice: app-proxy
99
ms.workload: identity
1010
ms.topic: how-to
11-
ms.date: 11/17/2022
11+
ms.date: 03/14/2023
1212
ms.author: kenwith
1313
---
1414

@@ -77,7 +77,7 @@ Azure AD Application Proxy is built on Azure. It gives you a massive amount of n
7777

7878
1. As a final test, add the *mscep.dll* path to the existing URL you pasted in the previous step:
7979

80-
https://scep-test93635307549127448334.msappproxy.net/certsrv/mscep/mscep.dll
80+
`https://scep-test93635307549127448334.msappproxy.net/certsrv/mscep/mscep.dll`
8181

8282
1. You should see an **HTTP Error 403 – Forbidden** response.
8383

articles/active-directory/develop/reference-claims-mapping-policy-type.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -357,7 +357,7 @@ The ID element identifies which property on the source provides the value for th
357357
- The JwtClaimType must contain the name of the claim to be emitted in JWTs.
358358
- The SamlClaimType must contain the URI of the claim to be emitted in SAML tokens.
359359

360-
* **onPremisesUserPrincipalName attribute:** When using an Alternate ID, the on-premises attribute userPrincipalName is synchronized with the Azure AD attribute onPremisesUserPrincipalName. This attribute is only available when Alternate ID is configured but is also available through MS Graph Beta: https://graph.microsoft.com/beta/me/.
360+
* **onPremisesUserPrincipalName attribute:** When using an Alternate ID, the on-premises attribute userPrincipalName is synchronized with the Azure AD attribute onPremisesUserPrincipalName. This attribute is only available when Alternate ID is configured.
361361

362362
> [!NOTE]
363363
> Names and URIs of claims in the restricted claim set cannot be used for the claim type elements. For more information, see the "Exceptions and restrictions" section later in this article.

0 commit comments

Comments
 (0)