You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory-b2c/partner-nok-nok.md
+29-32Lines changed: 29 additions & 32 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,65 +1,62 @@
1
1
---
2
2
title: Tutorial to configure Nok Nok S3 Authentication Suite with Azure Active Directory B2C for FIDO passkey authentication
3
3
titleSuffix: Azure AD B2C
4
-
description: Configure Nok Nok S3 Authentication Suite with Azure AD B2C to enable FIDO passkey authentication
4
+
description: Configure Nok Nok S3 Authentication Suite with Azure AD B2C to enable FIDO passkey authentication.
5
5
author: gargi-sinha
6
6
manager: martinco
7
7
ms.reviewer: kengaderdus
8
8
ms.service: azure-active-directory
9
9
ms.topic: how-to
10
-
ms.date: 06/21/2024
11
-
10
+
ms.date: 12/09/2024
12
11
ms.author: gasinh
13
12
ms.subservice: b2c
14
13
15
-
# Customer intent: I'm a developer integrating Azure AD B2C with a third-party authentication provider. I want to learn how to configure Nok Nok S3 Authentication Suite as an identity provider (IdP) in Azure AD B2C. My goal is to implement FIDO Passkey authentication for my users.
14
+
# Customer intent: I'm a developer integrating Azure AD B2C with a third-party authentication provider. I want to learn how to configure Nok Nok S3 Authentication Suite as an identity provider (IdP) in Azure AD B2C. My goal is to implement FIDO passkey authentication for my users.
16
15
---
17
-
# Tutorial: Configure Nok Nok S3 Authentication Suite with Azure AD B2C for FIDO Passkey Authentication
16
+
# Tutorial: Configure Nok Nok S3 Authentication Suite with Azure AD B2C for FIDO passkey authentication
18
17
19
-
Learn to integrate the Nok Nok S3 Authentication Suite into your Azure Active Directory (AD) B2C tenant. The Nok Nok solution enables FIDO-certified multifactor authentication such as FIDO UAF, FIDO U2F, WebAuthn, and FIDO2 for mobile and web applications. The Nok Nok solution strengthens your security while maintaining an optimal user experience.
18
+
In this article, you learn to integrate the Nok Nok S3 Authentication Suite into your Azure Active Directory (AD) B2C tenant. The Nok Nok solution enables FIDO-certified multifactor authentication, such as FIDO Universal Authentication Framework (UAF), FIDO Universal Second Factor (U2F), WebAuthn, and FIDO2, for mobile and web applications. The Nok Nok solution strengthens your security while maintaining an optimal user experience.
20
19
21
-
Learn more at [Nok Nok](https://noknok.com/)
20
+
Learn more at [Nok Nok](https://noknok.com/).
22
21
23
22
## Prerequisites
24
23
25
24
To get started, you need:
26
25
27
26
* An Azure subscription. If you don't have one, get an [Azure free account](https://azure.microsoft.com/free/).
28
-
* An Azure AD B2C tenant linked to the Azure subscription[Tutorial: Create an Azure AD B2C tenant](tutorial-create-tenant.md).
27
+
* An Azure AD B2C tenant linked to the Azure subscription. Learn how to [Create an Azure AD B2C tenant](tutorial-create-tenant.md).
29
28
* A Nok Nok Cloud evaluation tenant for FIDO registration and authentication.
30
29
31
30
## Scenario description
32
31
33
-
To enable Passkey authentication for your users, enable Nok Nok as an identity provider (IdP) in your Azure AD B2C tenant. The Nok Nok integration includes the following components:
32
+
To enable passkey authentication for your users, enable Nok Nok as an identity provider (IdP) in your Azure AD B2C tenant. The Nok Nok integration includes the following components:
34
33
35
34
***Azure AD B2C** – authorization server that verifies user credentials.
36
35
***Web and mobile applications** – mobile or web apps to protect with Nok Nok solutions and Azure AD B2C.
37
-
***Nok Nok Tutorial Web App** – application to register the passkey on your device.
38
-
***Nok Nok Sign in App** – application for authenticating Azure AD B2C applications using passkey.
39
-
36
+
***Nok Nok tutorial web app** – application to register the passkey on your device.
37
+
***Nok Nok sign-in app** – application for authenticating Azure AD B2C applications with passkey.
40
38
41
-
The following diagram illustrates the Nok Nok solution as an IdP for Azure AD B2C by using OpenID Connect (OIDC) for Passkey authentication.
39
+
The following diagram illustrates the Nok Nok solution as an IdP for Azure AD B2C by using OpenID Connect (OIDC) for passkey authentication.
42
40
43
-

41
+

44
42
45
-
### Scenario 1: Passkey Registration
46
-
1. The user navigates to the Nok Nok Tutorial Web App using the link provided by Nok Nok.
43
+
### Scenario 1: Passkey registration
44
+
1. The user navigates to the Nok Nok tutorial web app using the link provided by Nok Nok.
47
45
2. The user enters their Azure AD B2C username and default tutorial app password.
48
46
3. The user receives a prompt to register the passkey.
49
47
4. The Nok Nok server validates the passkey credential and confirms successful passkey registration to the user.
50
48
5. The passkey on the user's device is ready for authentication.
51
49
52
-
### Scenario 2: Passkey Authentication
53
-
1. The user selects the Sign in with Nok Nok Cloud button on the Azure AD B2C Sign in page.
54
-
2. Azure AD B2C redirects the user to the Nok Nok Signin App.
55
-
3.User authenticates with their passkey.
50
+
### Scenario 2: Passkey authentication
51
+
1. The user selects the sign-in with Nok Nok Cloud button on the Azure AD B2C sign-in page.
52
+
2. Azure AD B2C redirects the user to the Nok Nok sign-in app.
53
+
3.The user authenticates with their passkey.
56
54
4. The Nok Nok server validates the passkey assertion and sends an OIDC authentication response to Azure AD B2C.
57
55
5. Based on the authentication result, Azure AD B2C either grants or denies access to the target application.
58
56
59
-
60
57
## Get started with Nok Nok
61
58
62
-
1.[Contact](https://noknok.com/contact/) Nok Nok.
59
+
1.[Contact Nok Nok](https://noknok.com/contact/).
63
60
2. Fill out the form for a Nok Nok tenant.
64
61
3. An email arrives with tenant access information and links to documentation.
65
62
4. Use the Nok Nok integration documentation to complete the tenant OIDC configuration.
@@ -68,11 +65,11 @@ The following diagram illustrates the Nok Nok solution as an IdP for Azure AD B2
68
65
69
66
Use the following instructions to add and configure an IdP, and then configure a user flow.
70
67
71
-
### Add a new Identity provider
68
+
### Add a new identity provider
72
69
73
70
For the following instructions, use the directory with the Azure AD B2C tenant. To add a new IdP:
74
71
75
-
1. Sign in to the [Azure portal](https://portal.azure.com/#home) as at least as the B2C IEF Policy Administrator of the Azure AD B2C tenant.
72
+
1. Sign in to the [Azure portal](https://portal.azure.com/#home) as at least as the B2C Identity Experience Framework (IEF) Policy Administrator of the Azure AD B2C tenant.
76
73
2. In the portal toolbar, select **Directories + subscriptions**.
77
74
3. On **Portal settings, Directories + subscriptions**, in the **Directory name** list, locate the Azure AD B2C directory.
78
75
4. Select **Switch**.
@@ -82,13 +79,13 @@ For the following instructions, use the directory with the Azure AD B2C tenant.
2. For **Name**, enter the Nok Nok Authentication Provider, or another name.
91
-
3. For **Metadata URL**, enter the following URL after replacing the placeholder with the tenant ID provided by Nok Nok: `https://cloud.noknok.com/<tenant_id>/webapps/nnlfed/realms/<tenant_id>/.well-known/openid-configuration`.
87
+
2. For **Name**, enter the Nok Nok Authentication Provider or another name.
88
+
3. For **Metadata URL**, enter the following URL after replacing the placeholder with the tenant ID that Nok Nok provides: `https://cloud.noknok.com/<tenant_id>/webapps/nnlfed/realms/<tenant_id>/.well-known/openid-configuration`.
92
89
4. For **Client Secret**, use the Client Secret from Nok Nok.
93
90
5. For **Client ID**, use the Client ID provided by Nok Nok.
94
91
6. For **Scope**, use **openid**.
@@ -109,19 +106,19 @@ For the following instructions, Nok Nok is a new OIDC IdP in the B2C identity pr
109
106
5. Select **Create**.
110
107
6. Enter a policy **Name**.
111
108
7. In **Identity providers**, select the created Nok Nok IdP.
112
-
8. Check **Email signup** under **Local accounts** to display an intermediate Azure AD B2C signin/signup page with a button that redirects the user to the Nok Nok Signin App.
109
+
8. Check **Email signup** under **Local accounts** to display an intermediate Azure AD B2C signin/signup page with a button that redirects the user to the Nok Nok sign-in app.
113
110
9. Leave the **Multi-factor Authentication** field.
114
-
10.Click**Create** to save.
111
+
10.Select**Create** to save.
115
112
116
113
## Test the user flow
117
114
118
115
1. Open the Azure AD B2C tenant. Under **Policies**, select **Identity Experience Framework**.
119
116
2. Select the created **SignUpSignIn**.
120
117
3. Select **Run user flow**.
121
-
4. For **Application**, select the registered app. The example is JWT.
122
-
5. For **Reply URL**, select the redirect URL of the application that you previously selected at the previous step.
118
+
4. For **Application**, select the registered app. The example is JSON Web Token (JWT).
119
+
5. For **Reply URL**, select the redirect URL of the application that you selected at the previous step.
123
120
6. Select **Run user flow**.
124
-
7. Perform signin using the Azure AD B2C username and the passkey that you previously registered for the same user.
121
+
7. Perform sign-in using the Azure AD B2C username and the passkey that you previously registered for the same user.
125
122
8. Verify that you received the token after authentication.
126
123
127
124
If the flow is incomplete, confirm the user is or isn't saved in the directory.
Copy file name to clipboardExpand all lines: articles/app-service/overview-vnet-integration.md
+14-8Lines changed: 14 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -76,12 +76,6 @@ Because subnet size can't be changed after assignment, use a subnet that's large
76
76
77
77
With multi plan subnet join (MPSJ), you can join multiple App Service plans in to the same subnet. All App Service plans must be in the same subscription but the virtual network/subnet can be in a different subscription. Each instance from each App Service plan requires an IP address from the subnet and to use MPSJ a minimum size of `/26` subnet is required. If you plan to join many and/or large scale plans, you should plan for larger subnet ranges.
78
78
79
-
> [!IMPORTANT]
80
-
> Due to a known bug, MPSJ fails if multiple sites are created and attempt to integrate with the virtual network at the same time. A fix will be deployed soon. In the meantime, you can work around the issue with either of the following methods:
81
-
> * If you create sites manually, create and integrate the sites one by one.
82
-
> * If you create sites programmatically, for example using Terraform or ARM templates, add a [dependsOn](/azure/azure-resource-manager/templates/resource-dependency#dependson) element to each site in your templates to depend on the creation of the previous site for all but the first site in the template. This creates a delay between the site creation and the virtual network integration for each site and therefore isn't blocked by the known bug. For more information see, [Define the order for deploying resources in ARM templates](/azure/azure-resource-manager/templates/resource-dependency).
83
-
>
84
-
85
79
### Windows Containers specific limits
86
80
87
81
Windows Containers uses an extra IP address per app for each App Service plan instance, and you need to size the subnet accordingly. If you have, for example, 10 Windows Container App Service plan instances with four apps running, you need 50 IP addresses and extra addresses to support horizontal (in/out) scale.
@@ -176,9 +170,21 @@ You can use route tables to route outbound traffic from your app without restric
176
170
177
171
Route tables and network security groups only apply to traffic routed through the virtual network integration. See [application routing](#application-routing) and [configuration routing](#configuration-routing) for details. Routes don't apply to replies from inbound app requests and inbound rules in an NSG don't apply to your app. Virtual network integration affects only outbound traffic from your app. To control inbound traffic to your app, use the [access restrictions](./overview-access-restrictions.md) feature or [private endpoints](./networking/private-endpoint.md).
178
172
179
-
When configuring network security groups or route tables that applies to outbound traffic, you must make sure you consider your application dependencies. Application dependencies include endpoints that your app needs during runtime. Besides APIs and services the app is calling, these endpoints could also be derived endpoints like certificate revocation list (CRL) check endpoints and identity/authentication endpoint, for example Microsoft Entra ID. If you're using [continuous deployment in App Service](./deploy-continuous-deployment.md), you might also need to allow endpoints depending on type and language. Specifically for [Linux continuous deployment](https://github.com/microsoft/Oryx/blob/main/doc/hosts/appservice.md#network-dependencies), you need to allow `oryx-cdn.microsoft.io:443`. For Python you additionally need to allow `files.pythonhosted.org`, `pypi.org`.
173
+
When configuring network security groups or route tables that applies to outbound traffic, you must make sure you consider your application dependencies. Application dependencies include endpoints that your app needs during runtime. Besides APIs and services the app is calling, these endpoints could also be derived endpoints like certificate revocation list (CRL) check endpoints and identity/authentication endpoint, for example Microsoft Entra ID. If you're using [continuous deployment in App Service](./deploy-continuous-deployment.md), you might also need to allow endpoints depending on type and language.
174
+
175
+
#### Linux continuous deployment
176
+
177
+
Specifically for [Linux continuous deployment](https://github.com/microsoft/Oryx/blob/main/doc/hosts/appservice.md#network-dependencies), you need to allow `oryx-cdn.microsoft.io:443`. For Python you additionally need to allow `files.pythonhosted.org`, `pypi.org`.
178
+
179
+
#### Health checks
180
+
181
+
Azure uses UDP port 30,000 to do network health checks. If you block this traffic, it will not directly impact your app, but it will be more difficult for Azure support to detect and troubleshoot network related issues.
182
+
183
+
#### Private ports
184
+
185
+
The App Service private ports feature uses ports 20,000 to 30,000 on both TCP and UDP to route traffic between instances through the integrated network. The mentioned port range need to be open both inbound and outbound.
180
186
181
-
Azure uses UDP port 30,000 to do network health checks. If you block this traffic, it will not directly impact your app, but it will be more difficult for Azure support to detect and troubleshoot network related issues.
187
+
#### On-premises traffic
182
188
183
189
When you want to route outbound traffic on-premises, you can use a route table to send outbound traffic to your Azure ExpressRoute gateway. If you do route traffic to a gateway, set routes in the external network to send any replies back. Border Gateway Protocol (BGP) routes also affect your app traffic. If you have BGP routes from something like an ExpressRoute gateway, your app outbound traffic is affected. Similar to user-defined routes, BGP routes affect traffic according to your routing scope setting.
0 commit comments