Skip to content

Commit 20f94ff

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into mdb-combine-qs
2 parents 97f07bc + 60e0ff4 commit 20f94ff

File tree

776 files changed

+6554
-3879
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

776 files changed

+6554
-3879
lines changed

.openpublishing.redirection.healthcare-apis.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -586,7 +586,11 @@
586586
"redirect_document_id": false
587587
},
588588
{ "source_path_from_root": "/articles/healthcare-apis/iot/iot-data-flow.md",
589-
"redirect_url": "/azure/healthcare-apis/iot/data-flow",
589+
"redirect_url": "/azure/healthcare-apis/iot/understand-service",
590+
"redirect_document_id": false
591+
},
592+
{ "source_path_from_root": "/articles/healthcare-apis/iot/data-flow.md",
593+
"redirect_url": "/azure/healthcare-apis/iot/understand-service",
590594
"redirect_document_id": false
591595
},
592596
{ "source_path_from_root": "/articles/healthcare-apis/iot/how-to-use-device-mappings.md",

.openpublishing.redirection.json

Lines changed: 9 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -27981,9 +27981,14 @@
2798127981
"redirect_document_id": false
2798227982
},
2798327983
{
27984-
"source_path": "articles/load-balancer/protect-load-balancer-with-ddos-standard.md",
27985-
"redirect_URL": "/azure/load-balancer/tutorial-protect-load-balancer",
27986-
"redirect_document_id": false
27987-
}
27984+
"source_path": "articles/communication-services/quickstarts/voice-video-calling/get-started-android-webview.md",
27985+
"redirect_URL": "/azure/communication-services/quickstarts/voice-video-calling/get-started-webview?pivots=platform-android",
27986+
"redirect_document_id": false
27987+
},
27988+
{
27989+
"source_path": "articles/load-balancer/protect-load-balancer-with-ddos-standard.md",
27990+
"redirect_URL": "/azure/load-balancer/tutorial-protect-load-balancer",
27991+
"redirect_document_id": false
27992+
}
2798827993
]
2798927994
}

articles/active-directory-b2c/TOC.yml

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -541,6 +541,8 @@
541541
href: partner-datawiza.md
542542
- name: F5
543543
href: partner-f5.md
544+
- name: Grit
545+
href: partner-grit-app-proxy.md
544546
- name: Ping Identity
545547
href: partner-ping-identity.md
546548
- name: Strata
@@ -572,6 +574,8 @@
572574
items:
573575
- name: Grit IEF editor
574576
href: partner-grit-editor.md
577+
- name: Grit biometric authentication
578+
href: partner-grit-authentication.md
575579
# Automate
576580
- name: Automate
577581
items:
89.4 KB
Loading
93.3 KB
Loading

articles/active-directory-b2c/partner-gallery.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: CelesteDG
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: how-to
12-
ms.date: 09/14/2022
12+
ms.date: 1/25/2023
1313
ms.author: kengaderdus
1414
ms.subservice: B2C
1515
---
@@ -45,6 +45,7 @@ Microsoft partners with the following ISVs for MFA and Passwordless authenticati
4545
|:-------------------------|:--------------|
4646
| ![Screenshot of a asignio logo](./media/partner-gallery/asignio-logo.png) | [Asignio](./partner-asignio.md) is a passwordless, soft biometric, and MFA solution. Asignio uses a combination of the patented Asignio Signature and live facial verification for user authentication. The changeable biometric signature eliminates passwords, fraud, phishing, and credential reuse through omni-channel authentication. |
4747
| ![Screenshot of a bloksec logo](./media/partner-gallery/bloksec-logo.png) | [BlokSec](./partner-bloksec.md) is a passwordless authentication and tokenless MFA solution, which provides real-time consent-based services and protects customers against identity-centric cyber-attacks such as password stuffing, phishing, and man-in-the-middle attacks. |
48+
| ![Screenshot of a grit biometric authentication logo.](./media/partner-gallery/grit-logo.png) | [Grit biometric authentication](./partner-grit-authentication.md) provides users the option to sign in using finger print, face ID or [Windows Hello](https://support.microsoft.com/windows/learn-about-windows-hello-and-set-it-up-dae28983-8242-bb2a-d3d1-87c9d265a5f0) for enhanced security.
4849
| ![Screenshot of a haventec logo](./media/partner-gallery/haventec-logo.png) | [Haventec](./partner-haventec.md) is a passwordless authentication provider, which provides decentralized identity platform that eliminates passwords, shared secrets, and friction. |
4950
| ![Screenshot of a hypr logo](./media/partner-gallery/hypr-logo.png) | [Hypr](./partner-hypr.md) is a passwordless authentication provider, which replaces passwords with public key encryptions eliminating fraud, phishing, and credential reuse. |
5051
| ![Screenshot of a idemia logo](./media/partner-gallery/idemia-logo.png) | [IDEMIA](./partner-idemia.md) is a passwordless authentication provider, which provides real-time consent-based services with biometric authentication like faceID and fingerprinting eliminating fraud and credential reuse. |
@@ -79,6 +80,7 @@ Microsoft partners with the following ISVs to provide secure hybrid access to on
7980
| ![Screenshot of an Akamai logo.](./media/partner-gallery/akamai-logo.png) | [Akamai](./partner-akamai-secure-hybrid-access.md) provides a Zero Trust Network Access (ZTNA) solution that enables secure remote access to modern and legacy applications that reside in private datacenters. |
8081
| ![Screenshot of a Datawiza logo](./media/partner-gallery/datawiza-logo.png) | [Datawiza](./partner-datawiza.md) enables SSO and granular access control for your applications and extends Azure AD B2C to protect on-premises legacy applications. |
8182
| ![Screenshot of a F5 logo](./media/partner-gallery/f5-logo.png) | [F5](./partner-f5.md) enables legacy applications to securely expose to the internet through BIG-IP security combined with Azure AD B2C pre-authentication, Conditional Access (CA) and SSO. |
83+
| ![Screenshot of a Grit logo](./media/partner-gallery/grit-logo.png) | [Grit's app proxy](./partner-grit-app-proxy.md) enables migrating a legacy application using header-based authentication to Azure AD B2C with no application code change. |
8284
| ![Screenshot of a Ping logo](./media/partner-gallery/ping-logo.png) | [Ping Identity](./partner-ping-identity.md) enables secure hybrid access to on-premises legacy applications across multiple clouds. |
8385
| ![Screenshot of a strata logo](./media/partner-gallery/strata-logo.png) | [Strata](./partner-strata.md) provides secure hybrid access to on-premises applications by enforcing consistent access policies, keeping identities in sync, and making it simple to transition applications from legacy identity systems to standards-based authentication and access control provided by Azure AD B2C. |
8486
| ![Screenshot of a zscaler logo](./media/partner-gallery/zscaler-logo.png) | [Zscaler](./partner-zscaler.md) delivers policy-based, secure access to private applications and assets without the cost, hassle, or security risks of a VPN. |
@@ -111,6 +113,7 @@ Microsoft partners with the following ISVs for tools that can help with implemen
111113
|:-------------------------|:--------------|
112114
| ![Screenshot of a grit ief editor logo.](./media/partner-gallery/grit-logo.png) | [Grit Visual Identity Experience Framework Editor](./partner-grit-editor.md) provides a low code/no code experience for developers to create sophisticated authentication user journeys. The tool comes with integrated debugger and templates for the most used scenarios.|
113115

116+
114117
## Additional information
115118

116119
- [Custom policies in Azure AD B2C](./custom-policy-overview.md)
Lines changed: 129 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,129 @@
1+
---
2+
title: Migrate applications to Azure AD B2C with Grit's app proxy
3+
titleSuffix: Azure AD B2C
4+
description: Learn how Grit's app proxy can migrate your applications to Azure AD B2C with no code change
5+
services: active-directory-b2c
6+
author: gargi-sinha
7+
manager: martinco
8+
ms.service: active-directory
9+
ms.workload: identity
10+
ms.topic: how-to
11+
ms.date: 1/25/2023
12+
ms.author: gasinh
13+
ms.reviewer: kengaderdus
14+
ms.subservice: B2C
15+
---
16+
17+
# Migrate applications using header-based authentication to Azure Active Directory B2C with Grit's app proxy
18+
19+
In this sample tutorial, learn how to migrate a legacy application using header-based authentication to Azure Active Directory B2C (Azure AD B2C) with [Grit's app proxy](https://www.gritiam.com/appProxy.html).
20+
21+
Benefits of using Grit's app proxy are as follows:
22+
23+
- No application code change and easy deployment resulting in faster ROI
24+
25+
- Enables users to use modern authentication experiences such as Multi-Factor authentication, biometrics, and password-less resulting in enhanced security.
26+
27+
- Significant savings on the license cost of the legacy authentication solution
28+
29+
## Prerequisites
30+
31+
To get started, you'll need:
32+
33+
- License to Grit’s app proxy. Contact [Grit support](mailto:[email protected]) for license details. For this tutorial, you don't need a license.
34+
35+
- An Azure subscription. If you don't have one, get a [free account](https://azure.microsoft.com/free/).
36+
37+
- An [Azure AD B2C tenant](tutorial-create-tenant.md) that is linked to your Azure subscription.
38+
39+
## Scenario description
40+
41+
Grit integration includes the following components:
42+
43+
- **Azure AD B2C**: The authorization server to verify user credentials - Authenticated users access on-premises applications using a local account stored in the Azure AD B2C directory.
44+
45+
- **Grit app proxy**: The service that passes identity to applications through HTTP headers.
46+
47+
- **Web application**: The legacy application to which user requests access.
48+
49+
The following architecture diagram shows the implementation.
50+
51+
![Screenshot shows the architecture diagram of the implementation.](./media/partner-grit-app-proxy/grit-app-proxy-architecture.png)
52+
53+
1. The user requests access to an on-premises application.
54+
55+
2. Grit app proxy receives the request through [Azure Web Application Firewall (WAF)](https://azure.microsoft.com/products/web-application-firewall/) and sends it to the application.
56+
57+
3. Grit app proxy checks user authentication state. With no session token, or an invalid token, the user goes to Azure AD B2C for authentication.
58+
59+
4. Azure AD B2C sends the user request to the endpoint specified during Grit app proxy registration in the Azure AD B2C tenant.
60+
61+
4. Grit app proxy evaluates access policies and calculates attribute values in HTTP headers forwarded to the application. Grit app proxy sets the header values and sends the request to the application.
62+
63+
5. The user is authenticated with access granted/denied to the application.
64+
65+
## Onboard with Grit app proxy
66+
67+
Contact [Grit support](mailto:[email protected]) for details to get onboarded.
68+
69+
### Configure Grit's app proxy solution with Azure AD B2C
70+
71+
For this tutorial, Grit already has a backend application and an Azure AD B2C policy. This tutorial will be about configuring the proxy to access the backend application.
72+
73+
You can use the UX to configure each page of the backend application for security. You can configure the type of auth required by each page and the header values needed.
74+
75+
If the users need to be denied permission to certain pages based on group membership or some other criteria, it's handled by the auth user journey.
76+
77+
1. Navigate to https://proxyeditor.z13.web.core.windows.net/.
78+
79+
2. Once the dropdown appears, select the dropdown, and select **Create New**.
80+
81+
3. Enter a name for the page that contains only letters and numbers.
82+
83+
4. Enter **B2C_1A_SIGNUP_SIGNIN** into the B2C Policy box.
84+
85+
5. Select **GET** at the HTTP method.
86+
87+
6. Enter 'https://anj-grit-legacy-backend.azurewebsites.net/Home/Page' into the endpoint field and that would be the endpoint to your legacy application.
88+
89+
>[!NOTE]
90+
>This demo is publicly available, values you enter will be visible to public. Don't configure a secure application with this demo.
91+
92+
![Screenshot shows the proxy configuration UI.](./media/partner-grit-app-proxy/proxy-configuration.png)
93+
94+
7. Select **ADD HEADER**.
95+
96+
8. Enter **x-iss** in the destination header field to configure the valid HTTP header that must be sent to the application.
97+
98+
9. Enter **given_name** into the Value field that is the name of a claim in the B2C policy. The value of the claim will be passed into the header.
99+
100+
10. Select **Token** as the source.
101+
102+
11. Select **SAVE SETTINGS**.
103+
104+
12. Select the link in the popup. It will take you to a sign-in page. Select the sign-up link and enter the required information. Once you complete the sign-up process, you'll be redirected to the legacy application. The application displays the name you provided in the **Given name** field during sign-up.
105+
106+
## Test the flow
107+
108+
1. Navigate to the on-premises application URL.
109+
110+
2. The Grit app proxy redirects to the page you configured in your user flow.
111+
From the list, select the IdP.
112+
113+
3. At the prompt, enter your credentials. If necessary, include an Azure AD Multi-Factor authentication (MFA) token.
114+
115+
4. You're redirected to Azure AD B2C, which forwards the application request to the Grit's app proxy redirect URI.
116+
117+
5. The Grit's app proxy evaluates policies, calculates headers, and sends the user to the upstream application.
118+
119+
6. The requested application appears.
120+
121+
## Additional resources
122+
123+
- [Grit app proxy documentation](https://www.gritiam.com/appProxy.html)
124+
125+
- [Configure the Grit IAM B2B2C solution with Azure AD B2C](partner-grit-iam.md)
126+
127+
- [Edit Azure AD B2C Identity Experience Framework (IEF) XML with Grit Visual IEF Editor](partner-grit-editor.md)
128+
129+
- [Configure Grit biometric authentication with Azure AD B2C](partner-grit-authentication.md)
Lines changed: 99 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,99 @@
1+
---
2+
title: Configure Grit's biometric authentication with Azure Active Directory B2C
3+
titleSuffix: Azure AD B2C
4+
description: Learn how Grit's biometric authentication with Azure AD B2C secures your account
5+
services: active-directory-b2c
6+
author: gargi-sinha
7+
manager: martinco
8+
ms.service: active-directory
9+
ms.workload: identity
10+
ms.topic: how-to
11+
ms.date: 1/25/2023
12+
ms.author: gasinh
13+
ms.reviewer: kengaderdus
14+
ms.subservice: B2C
15+
---
16+
17+
# Configure Grit's biometric authentication with Azure Active Directory B2C
18+
19+
In this sample tutorial, learn how to integrate [Grit's](https://www.gritiam.com) Biometric authentication with Azure Active Directory B2C (Azure AD B2C). Biometric authentication provides users the option to sign in using finger print, face ID or [Windows Hello](https://support.microsoft.com/windows/learn-about-windows-hello-and-set-it-up-dae28983-8242-bb2a-d3d1-87c9d265a5f0). It works both on desktop and mobile applications, provided the device is capable of doing biometric authentication.
20+
21+
Biometric authentication has the following benefits:
22+
23+
1. For users who sign in infrequently or forget passwords often resulting in frequent password resets, biometric authentication reduces friction.
24+
25+
2. Compared to Multi-factor authentication (MFA), biometric authentication is cheaper and more secure.
26+
27+
3. Improved security prevents phishing attack for high valued customers.
28+
29+
4. Adds an additional layer of authentication before the user performs a high value operation like credit card transaction.
30+
31+
## Prerequisites
32+
33+
To get started, you'll need:
34+
35+
- License to [Grit's Visual IEF builder](https://www.gritiefedit.com/). Contact [Grit support](mailto:[email protected]) for licensing details. For this tutorial you don't need a license.
36+
37+
- An Azure subscription. If you don't have one, get a [free account](https://azure.microsoft.com/free/).
38+
39+
- An [Azure AD B2C tenant](tutorial-create-tenant.md) that is linked to your Azure subscription.
40+
41+
## Scenario description
42+
43+
In this tutorial, we'll cover the following scenario:
44+
45+
The end user creates an account with username and password (and MFA if needed). If their device supports biometric, they're enrolled in biometrics, and their account is linked to the biometric authentication of the device. Any future logins in that device, unless the user chooses not to, will happen through biometrics.
46+
47+
The user can link multiple devices to the same account. User will have to sign in through their email/password (and MFA if needed), they'll then be presented with an option to link a new device.
48+
49+
For example, user has an account with Contoso. User accesses the account from the computer at work that supports Windows Hello. User also accesses the account from the home computer that doesn't support Windows Hello and an Android phone.
50+
51+
1. After logging in with the work computer, user will be presented with an option to enroll in Windows Hello. If user chooses to do so, any future logins will happen through Windows Hello.
52+
53+
1. After logging in with the home computer, user won't be prompted to enroll in biometrics as the device doesn't support biometrics.
54+
55+
1. After logging in with the Android phone, user will be asked to enroll in biometrics. Any future logins will happen through biometrics.
56+
57+
Using Grit's visual flow chart multiple other scenarios can be implemented. Contact [Grit support](mailto:[email protected]) to discuss your scenarios.
58+
59+
## Onboard with Grit's biometric authentication
60+
61+
Contact [Grit support](mailto:[email protected]) for details to get onboarded.
62+
63+
### Configure Grit's biometric authentication with Azure AD B2C
64+
65+
1. Navigate to <https://www.gritiefedit.com> and enter your email if you're asked for it.
66+
67+
1. Press cancel in the quick start wizard.
68+
69+
1. In the pop-up, select **Customize User Journey**. Under Bio Metric, select the checkbox for **Enable Biometric**.
70+
71+
1. Scroll down and select **Generate template**, a flow chart appears.
72+
73+
1. From the left menu, select **Run Flowcharts** > **Deploy flow charts**.
74+
75+
1. If your device supports Windows Hello or biometric authenticator,
76+
select **Test Authentication Journey Builder** link, otherwise send
77+
the link to a device that supports biometric authentication.
78+
79+
1. A web page will open on a new tab. Under **Sign in with your social account**, select **createNewAccount**.
80+
81+
1. Go through the steps to create an account. When asked for **Setup Biometric Device sign in**, select **yes**.
82+
83+
1. Steps to perform the biometric depends on the device you are in.
84+
85+
1. A page appears that displays the token. Open the provided link.
86+
87+
1. This time the sign-in will happen through biometrics.
88+
89+
Repeat the same steps for another device. No need to sign up again, use the credentials created to sign in.
90+
91+
## Additional resources
92+
93+
- [Grit documentation](https://app.archbee.com/public/PREVIEW-ddjwV0RI2eVfcBOylxFGI/PREVIEW-bjH2arQd1Kn4le6z_zH84)
94+
95+
- [Configure the Grit IAM B2B2C solution with Azure AD B2C](partner-grit-iam.md)
96+
97+
- [Edit Azure AD B2C Identity Experience Framework (IEF) XML with Grit Visual IEF Editor](partner-grit-editor.md)
98+
99+
- [Migrate legacy apps to Azure AD B2C with Grit's app proxy](partner-grit-app-proxy.md)

articles/active-directory-b2c/userjourneys.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ manager: CelesteDG
88
ms.service: active-directory
99
ms.workload: identity
1010
ms.topic: reference
11-
ms.date: 08/31/2021
11+
ms.date: 01/27/2023
1212
ms.author: kengaderdus
1313
ms.subservice: B2C
1414
---
@@ -232,7 +232,7 @@ Preconditions can check multiple preconditions. The following example checks whe
232232

233233
## Claims provider selection
234234

235-
Identity provider selection lets users select an action from a list of options. The identity provider selection consists of a pair of two orchestration steps:
235+
Claims provider selection lets users select an action from a list of options. The identity provider selection consists of a pair of two orchestration steps:
236236

237237
1. **Buttons** - It starts with type of `ClaimsProviderSelection`, or `CombinedSignInAndSignUp` that contains a list of options a user can choose from. The order of the options inside the `ClaimsProviderSelections` element controls the order of the buttons presented to the user.
238238
2. **Actions** - Followed by type of `ClaimsExchange`. The ClaimsExchange contains list of actions. The action is a reference to a technical profile, such as [OAuth2](oauth2-technical-profile.md), [OpenID Connect](openid-connect-technical-profile.md), [claims transformation](claims-transformation-technical-profile.md), or [self-asserted](self-asserted-technical-profile.md). When a user clicks on one of the buttons, the corresponding action is executed.
51.6 KB
Loading

0 commit comments

Comments
 (0)