Skip to content

Commit 28b186a

Browse files
committed
2 parents 5703f8b + fa5cb8f commit 28b186a

File tree

4,462 files changed

+30467
-45158
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

4,462 files changed

+30467
-45158
lines changed

.openpublishing.redirection.json

Lines changed: 551 additions & 1 deletion
Large diffs are not rendered by default.

articles/active-directory-b2c/configure-authentication-sample-angular-spa-app.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -62,7 +62,7 @@ The following diagram describes the app registrations and the app architecture.
6262
Before you follow the procedures in this article, make sure that your computer is running:
6363

6464
* [Visual Studio Code](https://code.visualstudio.com/) or any other code editor.
65-
* [Node.js runtime](https://nodejs.org/en/download/) and [npm](https://docs.npmjs.com/downloading-and-installing-node-js-and-npm/).
65+
* [Node.js runtime](https://nodejs.org/en/download/package-manager/) and [npm](https://docs.npmjs.com/downloading-and-installing-node-js-and-npm/).
6666
* [Angular CLI](https://angular.io/cli).
6767

6868
## Step 1: Configure your user flow

articles/active-directory-b2c/configure-authentication-sample-react-spa-app.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -62,7 +62,7 @@ The following diagram describes the app registrations and the app architecture.
6262
Before you follow the procedures in this article, make sure that your computer is running:
6363

6464
* [Visual Studio Code](https://code.visualstudio.com/) or another code editor.
65-
* [Node.js runtime](https://nodejs.org/en/download/) and [npm](https://docs.npmjs.com/downloading-and-installing-node-js-and-npm/). To test that you have Node.js and npm correctly installed on your machine, you can type `node --version` and `npm --version` in a terminal or command prompt.
65+
* [Node.js runtime](https://nodejs.org/en/download/package-manager/) and [npm](https://docs.npmjs.com/downloading-and-installing-node-js-and-npm/). To test that you have Node.js and npm correctly installed on your machine, you can type `node --version` and `npm --version` in a terminal or command prompt.
6666

6767
## Step 1: Configure your user flow
6868

articles/active-directory-b2c/configure-authentication-sample-spa-app.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -60,7 +60,7 @@ The app architecture and registrations are illustrated in the following diagram:
6060
A computer that's running:
6161

6262
* [Visual Studio Code](https://code.visualstudio.com/), or another code editor.
63-
* [Node.js runtime](https://nodejs.org/en/download/)
63+
* [Node.js runtime](https://nodejs.org/en/download/package-manager/)
6464

6565
## Step 1: Configure your user flow
6666

articles/active-directory-b2c/enable-authentication-in-node-web-app-with-api.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -29,7 +29,7 @@ In this article, you learn how to create your web app that calls your web API. T
2929

3030
- [Visual Studio Code](https://code.visualstudio.com/), or another code editor
3131

32-
- [Node.js runtime](https://nodejs.org/en/download/)
32+
- [Node.js runtime](https://nodejs.org/en/download/package-manager/)
3333

3434
## Step 1: Create a protected web API
3535

articles/active-directory-b2c/enable-authentication-web-api.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -76,7 +76,7 @@ In the next sections, you create a new web API project. Select your programming
7676
# [Node.js](#tab/nodejsgeneric)
7777
7878
* [Visual Studio Code](https://code.visualstudio.com/), or another code editor
79-
* [Node.js runtime](https://nodejs.org/en/download/)
79+
* [Node.js runtime](https://nodejs.org/en/download/package-manager/)
8080
8181
---
8282
4.88 KB
Loading

articles/active-directory-b2c/partner-bloksec.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -38,7 +38,7 @@ BlokSec integration includes the following components:
3838
* **BlokSec Decentralized Identity Router** – gateway for services that apply BlokSec DIaaS to route authentication and authorization requests to user Personal Identity Provider (PIdP) applications
3939
* It's an OpenID Connect (OIDC) identity provider in Azure AD B2C
4040
* **BlokSec SDK-based mobile app** – user PIdP in the decentralized authentication scenario.
41-
* If you're not using the BlokSec SDK, go to Google Play for the free [BlokSec yuID](https://play.google.com/store/apps/details?id=com.bloksec)
41+
* If you're not using the BlokSec SDK, go to Google Play for the free [BlokSec yuID](https://play.google.com/store/apps/details/Google?id=com.google.android.googlequicksearchbox&hl=en-US)
4242

4343
The following architecture diagram illustrates the sign-up, sign-in flow in the BlokSec solution implementation.
4444

articles/active-directory-b2c/partner-nok-nok.md

Lines changed: 51 additions & 62 deletions
Original file line numberDiff line numberDiff line change
@@ -1,77 +1,76 @@
11
---
2-
title: Tutorial to configure Nok Nok Passport with Azure Active Directory B2C for passwordless FIDO2 authentication
2+
title: Tutorial to configure Nok Nok S3 Authentication Suite with Azure Active Directory B2C for FIDO passkey authentication
33
titleSuffix: Azure AD B2C
4-
description: Configure Nok Nok Passport with Azure AD B2C to enable passwordless FIDO2 authentication
4+
description: Configure Nok Nok S3 Authentication Suite with Azure AD B2C to enable FIDO passkey authentication.
55
author: gargi-sinha
66
manager: martinco
77
ms.reviewer: kengaderdus
88
ms.service: azure-active-directory
99
ms.topic: how-to
10-
ms.date: 06/21/2024
11-
10+
ms.date: 12/09/2024
1211
ms.author: gasinh
1312
ms.subservice: b2c
1413

15-
# Customer intent: I'm a developer integrating Azure Active Directory B2C with a third-party authentication provider. I want to learn how to configure Nok Nok Passport as an identity provider (IdP) in Azure AD B2C. My goal is to enable passwordless FIDO authentication for my users.
14+
# Customer intent: I'm a developer integrating Azure AD B2C with a third-party authentication provider. I want to learn how to configure Nok Nok S3 Authentication Suite as an identity provider (IdP) in Azure AD B2C. My goal is to implement FIDO passkey authentication for my users.
1615
---
17-
# Tutorial: Configure Nok Nok Passport with Azure Active Directory B2C for passwordless FIDO2 authentication
16+
# Tutorial: Configure Nok Nok S3 Authentication Suite with Azure AD B2C for FIDO passkey authentication
1817

19-
Learn to integrate the Nok Nok S3 Authentication Suite into your Azure Active Directory B2C (Azure AD B2C) tenant. The Nok Nok solutions enable FIDO certified multi-factor authentication such as FIDO UAF, FIDO U2F, WebAuthn, and FIDO2 for mobile and web applications. Nok Nok solutions improve security posture while balancing user the experience.
18+
In this article, you learn to integrate the Nok Nok S3 Authentication Suite into your Azure Active Directory (AD) B2C tenant. The Nok Nok solution enables FIDO-certified multifactor authentication, such as FIDO Universal Authentication Framework (UAF), FIDO Universal Second Factor (U2F), WebAuthn, and FIDO2, for mobile and web applications. The Nok Nok solution strengthens your security while maintaining an optimal user experience.
2019

21-
Go to noknok.com to learn more: [Nok Nok Labs, Inc.](https://noknok.com/)
20+
Learn more at [Nok Nok](https://noknok.com/).
2221

2322
## Prerequisites
2423

2524
To get started, you need:
2625

27-
* An Azure subscription
28-
* If you don't have one, get a [Azure free account](https://azure.microsoft.com/free/)
29-
* An Azure AD B2C tenant linked to the Azure subscription
30-
* [Tutorial: Create an Azure Active Directory B2C tenant](tutorial-create-tenant.md)
31-
* Go to [noknok.com](https://noknok.com/).
32-
* On the top menu, select **Demo**.
26+
* An Azure subscription. If you don't have one, get an [Azure free account](https://azure.microsoft.com/free/).
27+
* An Azure AD B2C tenant linked to the Azure subscription. Learn how to [Create an Azure AD B2C tenant](tutorial-create-tenant.md).
28+
* A Nok Nok Cloud evaluation tenant for FIDO registration and authentication.
3329

3430
## Scenario description
3531

36-
To enable passwordless FIDO authentication for your users, enable Nok Nok as an identity provider (IdP) in your Azure AD B2C tenant. The Nok Nok solution integration includes the following components:
32+
To enable passkey authentication for your users, enable Nok Nok as an identity provider (IdP) in your Azure AD B2C tenant. The Nok Nok integration includes the following components:
33+
34+
* **Azure AD B2C** – authorization server that verifies user credentials.
35+
* **Web and mobile applications** – mobile or web apps to protect with Nok Nok solutions and Azure AD B2C.
36+
* **Nok Nok tutorial web app** – application to register the passkey on your device.
37+
* **Nok Nok sign-in app** – application for authenticating Azure AD B2C applications with passkey.
3738

38-
* **Azure AD B2C** – authorization server that verifies user credentials
39-
* **Web and mobile applications** – mobile or web apps to protect with Nok Nok solutions and Azure AD B2C
40-
* **Nok Nok app SDK or Passport app** – authenticate Azure AD B2C enabled applications.
41-
* Go to the Apple App Store for [Nok Nok Passport](https://apps.apple.com/us/app/nok-nok-passport/id1050437340)
42-
* Or, Google Play [Nok Nok Passport](https://play.google.com/store/apps/details?id=com.noknok.android.passport2&hl=en&gl=US)
39+
The following diagram illustrates the Nok Nok solution as an IdP for Azure AD B2C by using OpenID Connect (OIDC) for passkey authentication.
4340

44-
The following diagram illustrates the Nok Nok solution as an IdP for Azure AD B2C by using OpenID Connect (OIDC) for passwordless authentication.
41+
![Diagram of Nok Nok as IdP for Azure AD B2C using OpenID Connect (OIDC) for passkey authentication.](./media/partner-nok-nok/nok-nok-architecture-diagram.png)
4542

46-
![Diagram of Nok Nok as IdP for Azure AD B2C using OpenID Connect (OIDC) for passwordless authentication.](./media/partner-nok-nok/nok-nok-architecture-diagram.png)
43+
### Scenario 1: Passkey registration
44+
1. The user navigates to the Nok Nok tutorial web app using the link provided by Nok Nok.
45+
2. The user enters their Azure AD B2C username and default tutorial app password.
46+
3. The user receives a prompt to register the passkey.
47+
4. The Nok Nok server validates the passkey credential and confirms successful passkey registration to the user.
48+
5. The passkey on the user's device is ready for authentication.
4749

48-
1. At the sign-in page, select sign-in or sign-up and enters the username.
49-
2. Azure AD B2C redirects to the Nok Nok OIDC authentication provider.
50-
3. For mobile authentications, a QR code appears or push notification goes to the user device. For desktop sign-in, the user is redirected to the web app sign-in page for passwordless authentication.
51-
4. Scan the QR code with the Nok Nok app SDK or Passport app. Or, username is the sign-in page input.
52-
5. A prompt appears for authentication. Perform passwordless authentication: biometrics, device PIN, or any roaming authenticator.
53-
6. The authentication prompt appears on the web application.
54-
7. Perform passwordless authentication: biometrics, device PIN, or any roaming authenticator.
55-
8. The Nok Nok server validates FIDO assertion and sends OIDC authentication response to Azure AD B2C.
56-
9. The user is granted or denied access.
50+
### Scenario 2: Passkey authentication
51+
1. The user selects the sign-in with Nok Nok Cloud button on the Azure AD B2C sign-in page.
52+
2. Azure AD B2C redirects the user to the Nok Nok sign-in app.
53+
3. The user authenticates with their passkey.
54+
4. The Nok Nok server validates the passkey assertion and sends an OIDC authentication response to Azure AD B2C.
55+
5. Based on the authentication result, Azure AD B2C either grants or denies access to the target application.
5756

5857
## Get started with Nok Nok
5958

60-
1. Go to noknok.com [Contact](https://noknok.com/contact/).
61-
2. Fill out the form for a Nok Nok tenant.
62-
3. An email arrives with tenant access information and links to documentation.
59+
1. [Contact Nok Nok](https://noknok.com/contact/).
60+
2. Fill out the form for a Nok Nok tenant.
61+
3. An email arrives with tenant access information and links to documentation.
6362
4. Use the Nok Nok integration documentation to complete the tenant OIDC configuration.
6463

6564
## Integrate with Azure AD B2C
6665

6766
Use the following instructions to add and configure an IdP, and then configure a user flow.
6867

69-
### Add a new Identity provider
68+
### Add a new identity provider
7069

7170
For the following instructions, use the directory with the Azure AD B2C tenant. To add a new IdP:
7271

73-
1. Sign in to the [Azure portal](https://portal.azure.com/#home) as at least B2C IEF Policy Administrator of the Azure AD B2C tenant.
74-
2. In the portal toolbar, select the **Directories + subscriptions**.
72+
1. Sign in to the [Azure portal](https://portal.azure.com/#home) as at least as the B2C Identity Experience Framework (IEF) Policy Administrator of the Azure AD B2C tenant.
73+
2. In the portal toolbar, select **Directories + subscriptions**.
7574
3. On **Portal settings, Directories + subscriptions**, in the **Directory name** list, locate the Azure AD B2C directory.
7675
4. Select **Switch**.
7776
5. In the top-left corner of the Azure portal, select **All services**.
@@ -80,24 +79,21 @@ For the following instructions, use the directory with the Azure AD B2C tenant.
8079
8. Select **Identity providers**.
8180
9. Select **Add**.
8281

83-
### Configure an Identity provider
82+
### Configure an identity provider
8483

8584
To configure an IdP:
8685

8786
1. Select **Identity provider type** > **OpenID Connect (Preview)**.
88-
2. For **Name**, enter the Nok Nok Authentication Provider, or another name.
89-
3. For **Metadata URL**, enter the hosted Nok Nok Authentication app URI, followed by the path such as `https://demo.noknok.com/mytenant/oidc/.well-known/openid-configuration`.
87+
2. For **Name**, enter the Nok Nok Authentication Provider or another name.
88+
3. For **Metadata URL**, enter the following URL after replacing the placeholder with the tenant ID that Nok Nok provides: `https://cloud.noknok.com/<tenant_id>/webapps/nnlfed/realms/<tenant_id>/.well-known/openid-configuration`.
9089
4. For **Client Secret**, use the Client Secret from Nok Nok.
9190
5. For **Client ID**, use the Client ID provided by Nok Nok.
92-
6. For **Scope**, use **OpenID profile email**.
91+
6. For **Scope**, use **openid**.
9392
7. For **Response type**, use **code**.
9493
8. For **Response mode**, use **form_post**.
95-
9. Select **OK**.
96-
10. Select **Map this identity provider’s claims**.
97-
11. For **UserID**, select **From subscription**.
98-
12. For **Display name**, select **From subscription**.
99-
13. For **Response mode**, select **From subscription**.
100-
14. Select **Save**.
94+
9. For **User ID**, use **sub**.
95+
10. For **Display name**, use **sub**.
96+
11. Select **Save**.
10197

10298
### Create a user flow policy
10399

@@ -106,31 +102,24 @@ For the following instructions, Nok Nok is a new OIDC IdP in the B2C identity pr
106102
1. In your Azure AD B2C tenant, under **Policies**, select **User flows**.
107103
2. Select **New**.
108104
3. Select **Sign up and sign in**.
109-
4. Select a **version**.
105+
4. Select a **Version**.
110106
5. Select **Create**.
111107
6. Enter a policy **Name**.
112108
7. In **Identity providers**, select the created Nok Nok IdP.
113-
8. You can add an email address. Azure won't redirect sign-in to Nok Nok; a screen appears with user options.
109+
8. Check **Email signup** under **Local accounts** to display an intermediate Azure AD B2C signin/signup page with a button that redirects the user to the Nok Nok sign-in app.
114110
9. Leave the **Multi-factor Authentication** field.
115-
10. Select **Enforce conditional access policies**.
116-
11. Under **User attributes and token claims**, in the Collect attribute option, select **Email Address**.
117-
12. Add user attributes for Microsoft Entra ID to collect, with claims that Azure AD B2C returns to the client application.
118-
13. Select **Create**.
119-
14. Select the new **User flow**.
120-
15. On the left panel, select **Application Claims**.
121-
16. Under options, select the **email** checkbox
122-
17. Select **Save**.
111+
10. Select **Create** to save.
123112

124113
## Test the user flow
125114

126-
1. Open the Azure AD B2C tenant. Under **Policies** select **Identity Experience Framework**.
115+
1. Open the Azure AD B2C tenant. Under **Policies**, select **Identity Experience Framework**.
127116
2. Select the created **SignUpSignIn**.
128117
3. Select **Run user flow**.
129-
4. For **Application**, select the registered app. The example is JWT.
130-
5. For **Reply URL**, select the redirect URL.
118+
4. For **Application**, select the registered app. The example is JSON Web Token (JWT).
119+
5. For **Reply URL**, select the redirect URL of the application that you selected at the previous step.
131120
6. Select **Run user flow**.
132-
7. Perform a sign-up flow and create an account.
133-
8. After the user attribute is created, Nok Nok is called.
121+
7. Perform sign-in using the Azure AD B2C username and the passkey that you previously registered for the same user.
122+
8. Verify that you received the token after authentication.
134123

135124
If the flow is incomplete, confirm the user is or isn't saved in the directory.
136125

articles/active-directory-b2c/quickstart-single-page-app.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -28,7 +28,7 @@ In this quickstart, you use a single-page application to sign in using a social
2828
## Prerequisites
2929

3030
- [Visual Studio Code](https://code.visualstudio.com/)
31-
- [Node.js](https://nodejs.org/en/download/)
31+
- [Node.js](https://nodejs.org/en/download/package-manager/)
3232
- Social account from Facebook, Google, or Microsoft
3333
- Code sample from GitHub: [ms-identity-b2c-javascript-spa](https://github.com/Azure-Samples/ms-identity-b2c-javascript-spa):
3434

0 commit comments

Comments
 (0)