Skip to content

Commit 1dac23a

Browse files
authored
Merge pull request #223445 from Gargi-Sinha/patch-153
Update partner-gallery.md
2 parents 24771e6 + bc9a907 commit 1dac23a

File tree

6 files changed

+235
-1
lines changed

6 files changed

+235
-1
lines changed

articles/active-directory-b2c/TOC.yml

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -541,6 +541,8 @@
541541
href: partner-datawiza.md
542542
- name: F5
543543
href: partner-f5.md
544+
- name: Grit
545+
href: partner-grit-app-proxy.md
544546
- name: Ping Identity
545547
href: partner-ping-identity.md
546548
- name: Strata
@@ -572,6 +574,8 @@
572574
items:
573575
- name: Grit IEF editor
574576
href: partner-grit-editor.md
577+
- name: Grit biometric authentication
578+
href: partner-grit-authentication.md
575579
# Automate
576580
- name: Automate
577581
items:
89.4 KB
Loading
93.3 KB
Loading

articles/active-directory-b2c/partner-gallery.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: CelesteDG
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: how-to
12-
ms.date: 09/14/2022
12+
ms.date: 1/25/2023
1313
ms.author: kengaderdus
1414
ms.subservice: B2C
1515
---
@@ -79,6 +79,7 @@ Microsoft partners with the following ISVs to provide secure hybrid access to on
7979
| ![Screenshot of an Akamai logo.](./media/partner-gallery/akamai-logo.png) | [Akamai](./partner-akamai-secure-hybrid-access.md) provides a Zero Trust Network Access (ZTNA) solution that enables secure remote access to modern and legacy applications that reside in private datacenters. |
8080
| ![Screenshot of a Datawiza logo](./media/partner-gallery/datawiza-logo.png) | [Datawiza](./partner-datawiza.md) enables SSO and granular access control for your applications and extends Azure AD B2C to protect on-premises legacy applications. |
8181
| ![Screenshot of a F5 logo](./media/partner-gallery/f5-logo.png) | [F5](./partner-f5.md) enables legacy applications to securely expose to the internet through BIG-IP security combined with Azure AD B2C pre-authentication, Conditional Access (CA) and SSO. |
82+
| ![Screenshot of a Grit logo](./media/partner-gallery/grit-logo.png) | [Grit's app proxy](./partner-grit-app-proxy.md) enables migrating a legacy application using header-based authentication to Azure AD B2C with no application code change. |
8283
| ![Screenshot of a Ping logo](./media/partner-gallery/ping-logo.png) | [Ping Identity](./partner-ping-identity.md) enables secure hybrid access to on-premises legacy applications across multiple clouds. |
8384
| ![Screenshot of a strata logo](./media/partner-gallery/strata-logo.png) | [Strata](./partner-strata.md) provides secure hybrid access to on-premises applications by enforcing consistent access policies, keeping identities in sync, and making it simple to transition applications from legacy identity systems to standards-based authentication and access control provided by Azure AD B2C. |
8485
| ![Screenshot of a zscaler logo](./media/partner-gallery/zscaler-logo.png) | [Zscaler](./partner-zscaler.md) delivers policy-based, secure access to private applications and assets without the cost, hassle, or security risks of a VPN. |
@@ -110,6 +111,7 @@ Microsoft partners with the following ISVs for tools that can help with implemen
110111
| ISV partner | Description and integration walkthroughs |
111112
|:-------------------------|:--------------|
112113
| ![Screenshot of a grit ief editor logo.](./media/partner-gallery/grit-logo.png) | [Grit Visual Identity Experience Framework Editor](./partner-grit-editor.md) provides a low code/no code experience for developers to create sophisticated authentication user journeys. The tool comes with integrated debugger and templates for the most used scenarios.|
114+
| ![Screenshot of a grit biometric authentication logo.](./media/partner-gallery/grit-logo.png) | [Grit biometric authentication](./partner-grit-authentication.md) provides users the option to sign in using finger print, face ID or [Windows Hello](https://support.microsoft.com/windows/learn-about-windows-hello-and-set-it-up-dae28983-8242-bb2a-d3d1-87c9d265a5f0) for enhanced security.
113115

114116
## Additional information
115117

Lines changed: 129 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,129 @@
1+
---
2+
title: Migrate applications to Azure AD B2C with Grit's app proxy
3+
titleSuffix: Azure AD B2C
4+
description: Learn how Grit's app proxy can migrate your applications to Azure AD B2C with no code change
5+
services: active-directory-b2c
6+
author: gargi-sinha
7+
manager: martinco
8+
ms.service: active-directory
9+
ms.workload: identity
10+
ms.topic: how-to
11+
ms.date: 1/25/2023
12+
ms.author: gasinh
13+
ms.reviewer: kengaderdus
14+
ms.subservice: B2C
15+
---
16+
17+
# Migrate applications using header-based authentication to Azure Active Directory B2C with Grit's app proxy
18+
19+
In this sample tutorial, learn how to migrate a legacy application using header-based authentication to Azure Active Directory B2C (Azure AD B2C) with [Grit's app proxy](https://www.gritiam.com/appProxy.html).
20+
21+
Benefits of using Grit's app proxy are as follows:
22+
23+
- No application code change and easy deployment resulting in faster ROI
24+
25+
- Enables users to use modern authentication experiences such as Multi-Factor authentication, biometrics, and password-less resulting in enhanced security.
26+
27+
- Significant savings on the license cost of the legacy authentication solution
28+
29+
## Prerequisites
30+
31+
To get started, you'll need:
32+
33+
- License to Grit’s app proxy. Contact [Grit support](mailto:[email protected]) for license details. For this tutorial, you don't need a license.
34+
35+
- An Azure subscription. If you don't have one, get a [free account](https://azure.microsoft.com/free/).
36+
37+
- An [Azure AD B2C tenant](tutorial-create-tenant.md) that is linked to your Azure subscription.
38+
39+
## Scenario description
40+
41+
Grit integration includes the following components:
42+
43+
- **Azure AD B2C**: The authorization server to verify user credentials - Authenticated users access on-premises applications using a local account stored in the Azure AD B2C directory.
44+
45+
- **Grit app proxy**: The service that passes identity to applications through HTTP headers.
46+
47+
- **Web application**: The legacy application to which user requests access.
48+
49+
The following architecture diagram shows the implementation.
50+
51+
![Screenshot shows the architecture diagram of the implementation.](./media/partner-grit-app-proxy/grit-app-proxy-architecture.png)
52+
53+
1. The user requests access to an on-premises application.
54+
55+
2. Grit app proxy receives the request through [Azure Web Application Firewall (WAF)](https://azure.microsoft.com/products/web-application-firewall/) and sends it to the application.
56+
57+
3. Grit app proxy checks user authentication state. With no session token, or an invalid token, the user goes to Azure AD B2C for authentication.
58+
59+
4. Azure AD B2C sends the user request to the endpoint specified during Grit app proxy registration in the Azure AD B2C tenant.
60+
61+
4. Grit app proxy evaluates access policies and calculates attribute values in HTTP headers forwarded to the application. Grit app proxy sets the header values and sends the request to the application.
62+
63+
5. The user is authenticated with access granted/denied to the application.
64+
65+
## Onboard with Grit app proxy
66+
67+
Contact [Grit support](mailto:[email protected]) for details to get onboarded.
68+
69+
### Configure Grit's app proxy solution with Azure AD B2C
70+
71+
For this tutorial, Grit already has a backend application and an Azure AD B2C policy. This tutorial will be about configuring the proxy to access the backend application.
72+
73+
You can use the UX to configure each page of the backend application for security. You can configure the type of auth required by each page and the header values needed.
74+
75+
If the users need to be denied permission to certain pages based on group membership or some other criteria, it's handled by the auth user journey.
76+
77+
1. Navigate to https://proxyeditor.z13.web.core.windows.net/.
78+
79+
2. Once the dropdown appears, select the dropdown, and select **Create New**.
80+
81+
3. Enter a name for the page that contains only letters and numbers.
82+
83+
4. Enter **B2C_1A_SIGNUP_SIGNIN** into the B2C Policy box.
84+
85+
5. Select **GET** at the HTTP method.
86+
87+
6. Enter 'https://anj-grit-legacy-backend.azurewebsites.net/Home/Page' into the endpoint field and that would be the endpoint to your legacy application.
88+
89+
>[!NOTE]
90+
>This demo is publicly available, values you enter will be visible to public. Don't configure a secure application with this demo.
91+
92+
![Screenshot shows the proxy configuration UI.](./media/partner-grit-app-proxy/proxy-configuration.png)
93+
94+
7. Select **ADD HEADER**.
95+
96+
8. Enter **x-iss** in the destination header field to configure the valid HTTP header that must be sent to the application.
97+
98+
9. Enter **given_name** into the Value field that is the name of a claim in the B2C policy. The value of the claim will be passed into the header.
99+
100+
10. Select **Token** as the source.
101+
102+
11. Select **SAVE SETTINGS**.
103+
104+
12. Select the link in the popup. It will take you to a sign-in page. Select the sign-up link and enter the required information. Once you complete the sign-up process, you'll be redirected to the legacy application. The application displays the name you provided in the **Given name** field during sign-up.
105+
106+
## Test the flow
107+
108+
1. Navigate to the on-premises application URL.
109+
110+
2. The Grit app proxy redirects to the page you configured in your user flow.
111+
From the list, select the IdP.
112+
113+
3. At the prompt, enter your credentials. If necessary, include an Azure AD Multi-Factor authentication (MFA) token.
114+
115+
4. You're redirected to Azure AD B2C, which forwards the application request to the Grit's app proxy redirect URI.
116+
117+
5. The Grit's app proxy evaluates policies, calculates headers, and sends the user to the upstream application.
118+
119+
6. The requested application appears.
120+
121+
## Additional resources
122+
123+
- [Grit app proxy documentation](https://www.gritiam.com/appProxy.html)
124+
125+
- [Configure the Grit IAM B2B2C solution with Azure AD B2C](partner-grit-iam.md)
126+
127+
- [Edit Azure AD B2C Identity Experience Framework (IEF) XML with Grit Visual IEF Editor](partner-grit-editor.md)
128+
129+
- [Configure Grit biometric authentication with Azure AD B2C](partner-grit-authentication.md)
Lines changed: 99 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,99 @@
1+
---
2+
title: Configure Grit's biometric authentication with Azure Active Directory B2C
3+
titleSuffix: Azure AD B2C
4+
description: Learn how Grit's biometric authentication with Azure AD B2C secures your account
5+
services: active-directory-b2c
6+
author: gargi-sinha
7+
manager: martinco
8+
ms.service: active-directory
9+
ms.workload: identity
10+
ms.topic: how-to
11+
ms.date: 1/25/2023
12+
ms.author: gasinh
13+
ms.reviewer: kengaderdus
14+
ms.subservice: B2C
15+
---
16+
17+
# Configure Grit's biometric authentication with Azure Active Directory B2C
18+
19+
In this sample tutorial, learn how to integrate [Grit's](https://www.gritiam.com) Biometric authentication with Azure Active Directory B2C (Azure AD B2C). Biometric authentication provides users the option to sign in using finger print, face ID or [Windows Hello](https://support.microsoft.com/windows/learn-about-windows-hello-and-set-it-up-dae28983-8242-bb2a-d3d1-87c9d265a5f0). It works both on desktop and mobile applications, provided the device is capable of doing biometric authentication.
20+
21+
Biometric authentication has the following benefits:
22+
23+
1. For users who sign in infrequently or forget passwords often resulting in frequent password resets, biometric authentication reduces friction.
24+
25+
2. Compared to Multi-factor authentication (MFA), biometric authentication is cheaper and more secure.
26+
27+
3. Improved security prevents phishing attack for high valued customers.
28+
29+
4. Adds an additional layer of authentication before the user performs a high value operation like credit card transaction.
30+
31+
## Prerequisites
32+
33+
To get started, you'll need:
34+
35+
- License to [Grit's Visual IEF builder](https://www.gritiefedit.com/). Contact [Grit support](mailto:[email protected]) for licensing details. For this tutorial you don't need a license.
36+
37+
- An Azure subscription. If you don't have one, get a [free account](https://azure.microsoft.com/free/).
38+
39+
- An [Azure AD B2C tenant](tutorial-create-tenant.md) that is linked to your Azure subscription.
40+
41+
## Scenario description
42+
43+
In this tutorial, we'll cover the following scenario:
44+
45+
The end user creates an account with username and password (and MFA if needed). If their device supports biometric, they're enrolled in biometrics, and their account is linked to the biometric authentication of the device. Any future logins in that device, unless the user chooses not to, will happen through biometrics.
46+
47+
The user can link multiple devices to the same account. User will have to sign in through their email/password (and MFA if needed), they'll then be presented with an option to link a new device.
48+
49+
For example, user has an account with Contoso. User accesses the account from the computer at work that supports Windows Hello. User also accesses the account from the home computer that doesn't support Windows Hello and an Android phone.
50+
51+
1. After logging in with the work computer, user will be presented with an option to enroll in Windows Hello. If user chooses to do so, any future logins will happen through Windows Hello.
52+
53+
1. After logging in with the home computer, user won't be prompted to enroll in biometrics as the device doesn't support biometrics.
54+
55+
1. After logging in with the Android phone, user will be asked to enroll in biometrics. Any future logins will happen through biometrics.
56+
57+
Using Grit's visual flow chart multiple other scenarios can be implemented. Contact [Grit support](mailto:[email protected]) to discuss your scenarios.
58+
59+
## Onboard with Grit's biometric authentication
60+
61+
Contact [Grit support](mailto:[email protected]) for details to get onboarded.
62+
63+
### Configure Grit's biometric authentication with Azure AD B2C
64+
65+
1. Navigate to <https://www.gritiefedit.com> and enter your email if you're asked for it.
66+
67+
1. Press cancel in the quick start wizard.
68+
69+
1. In the pop-up, select **Customize User Journey**. Under Bio Metric, select the checkbox for **Enable Biometric**.
70+
71+
1. Scroll down and select **Generate template**, a flow chart appears.
72+
73+
1. From the left menu, select **Run Flowcharts** > **Deploy flow charts**.
74+
75+
1. If your device supports Windows Hello or biometric authenticator,
76+
select **Test Authentication Journey Builder** link, otherwise send
77+
the link to a device that supports biometric authentication.
78+
79+
1. A web page will open on a new tab. Under **Sign in with your social account**, select **createNewAccount**.
80+
81+
1. Go through the steps to create an account. When asked for **Setup Biometric Device sign in**, select **yes**.
82+
83+
1. Steps to perform the biometric depends on the device you are in.
84+
85+
1. A page appears that displays the token. Open the provided link.
86+
87+
1. This time the sign-in will happen through biometrics.
88+
89+
Repeat the same steps for another device. No need to sign up again, use the credentials created to sign in.
90+
91+
## Additional resources
92+
93+
- [Grit documentation](https://app.archbee.com/public/PREVIEW-ddjwV0RI2eVfcBOylxFGI/PREVIEW-bjH2arQd1Kn4le6z_zH84)
94+
95+
- [Configure the Grit IAM B2B2C solution with Azure AD B2C](partner-grit-iam.md)
96+
97+
- [Edit Azure AD B2C Identity Experience Framework (IEF) XML with Grit Visual IEF Editor](partner-grit-editor.md)
98+
99+
- [Migrate legacy apps to Azure AD B2C with Grit's app proxy](partner-grit-app-proxy.md)

0 commit comments

Comments
 (0)