Skip to content

Commit 2aeb5f2

Browse files
author
Pablo Gonzalez
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into refstring
2 parents e1ecdb5 + ed42d07 commit 2aeb5f2

File tree

540 files changed

+2269
-2049
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

540 files changed

+2269
-2049
lines changed
4.88 KB
Loading

articles/active-directory-b2c/partner-nok-nok.md

Lines changed: 49 additions & 57 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
2-
title: Tutorial to configure Nok Nok Passport with Azure Active Directory B2C for passwordless FIDO2 authentication
2+
title: Tutorial to configure Nok Nok S3 Authentication Suite with Azure Active Directory B2C for FIDO passkey authentication
33
titleSuffix: Azure AD B2C
4-
description: Configure Nok Nok Passport with Azure AD B2C to enable passwordless FIDO2 authentication
4+
description: Configure Nok Nok S3 Authentication Suite with Azure AD B2C to enable FIDO passkey authentication
55
author: gargi-sinha
66
manager: martinco
77
ms.reviewer: kengaderdus
@@ -12,54 +12,56 @@ ms.date: 06/21/2024
1212
ms.author: gasinh
1313
ms.subservice: b2c
1414

15-
# Customer intent: I'm a developer integrating Azure Active Directory B2C with a third-party authentication provider. I want to learn how to configure Nok Nok Passport as an identity provider (IdP) in Azure AD B2C. My goal is to enable passwordless FIDO authentication for my users.
15+
# Customer intent: I'm a developer integrating Azure AD B2C with a third-party authentication provider. I want to learn how to configure Nok Nok S3 Authentication Suite as an identity provider (IdP) in Azure AD B2C. My goal is to implement FIDO Passkey authentication for my users.
1616
---
17-
# Tutorial: Configure Nok Nok Passport with Azure Active Directory B2C for passwordless FIDO2 authentication
17+
# Tutorial: Configure Nok Nok S3 Authentication Suite with Azure AD B2C for FIDO Passkey Authentication
1818

19-
Learn to integrate the Nok Nok S3 Authentication Suite into your Azure Active Directory B2C (Azure AD B2C) tenant. The Nok Nok solutions enable FIDO certified multi-factor authentication such as FIDO UAF, FIDO U2F, WebAuthn, and FIDO2 for mobile and web applications. Nok Nok solutions improve security posture while balancing user the experience.
19+
Learn to integrate the Nok Nok S3 Authentication Suite into your Azure Active Directory (AD) B2C tenant. The Nok Nok solution enables FIDO-certified multifactor authentication such as FIDO UAF, FIDO U2F, WebAuthn, and FIDO2 for mobile and web applications. The Nok Nok solution strengthens your security while maintaining an optimal user experience.
2020

21-
Go to noknok.com to learn more: [Nok Nok Labs, Inc.](https://noknok.com/)
21+
Learn more at [Nok Nok](https://noknok.com/)
2222

2323
## Prerequisites
2424

2525
To get started, you need:
2626

27-
* An Azure subscription
28-
* If you don't have one, get a [Azure free account](https://azure.microsoft.com/free/)
29-
* An Azure AD B2C tenant linked to the Azure subscription
30-
* [Tutorial: Create an Azure Active Directory B2C tenant](tutorial-create-tenant.md)
31-
* Go to [noknok.com](https://noknok.com/).
32-
* On the top menu, select **Demo**.
27+
* An Azure subscription. If you don't have one, get an [Azure free account](https://azure.microsoft.com/free/).
28+
* An Azure AD B2C tenant linked to the Azure subscription [Tutorial: Create an Azure AD B2C tenant](tutorial-create-tenant.md).
29+
* A Nok Nok Cloud evaluation tenant for FIDO registration and authentication.
3330

3431
## Scenario description
3532

36-
To enable passwordless FIDO authentication for your users, enable Nok Nok as an identity provider (IdP) in your Azure AD B2C tenant. The Nok Nok solution integration includes the following components:
33+
To enable Passkey authentication for your users, enable Nok Nok as an identity provider (IdP) in your Azure AD B2C tenant. The Nok Nok integration includes the following components:
3734

38-
* **Azure AD B2C** – authorization server that verifies user credentials
39-
* **Web and mobile applications** – mobile or web apps to protect with Nok Nok solutions and Azure AD B2C
40-
* **Nok Nok app SDK or Passport app** – authenticate Azure AD B2C enabled applications.
41-
* Go to the Apple App Store for [Nok Nok Passport](https://apps.apple.com/us/app/nok-nok-passport/id1050437340)
42-
* Or, Google Play [Nok Nok Passport](https://play.google.com/store/apps/details?id=com.noknok.android.passport2&hl=en&gl=US)
35+
* **Azure AD B2C** – authorization server that verifies user credentials.
36+
* **Web and mobile applications** – mobile or web apps to protect with Nok Nok solutions and Azure AD B2C.
37+
* **Nok Nok Tutorial Web App** – application to register the passkey on your device.
38+
* **Nok Nok Sign in App** – application for authenticating Azure AD B2C applications using passkey.
4339

44-
The following diagram illustrates the Nok Nok solution as an IdP for Azure AD B2C by using OpenID Connect (OIDC) for passwordless authentication.
4540

46-
![Diagram of Nok Nok as IdP for Azure AD B2C using OpenID Connect (OIDC) for passwordless authentication.](./media/partner-nok-nok/nok-nok-architecture-diagram.png)
41+
The following diagram illustrates the Nok Nok solution as an IdP for Azure AD B2C by using OpenID Connect (OIDC) for Passkey authentication.
42+
43+
![Diagram of Nok Nok as IdP for Azure AD B2C using OpenID Connect (OIDC) for Passkey authentication.](./media/partner-nok-nok/nok-nok-architecture-diagram.png)
44+
45+
### Scenario 1: Passkey Registration
46+
1. The user navigates to the Nok Nok Tutorial Web App using the link provided by Nok Nok.
47+
2. The user enters their Azure AD B2C username and default tutorial app password.
48+
3. The user receives a prompt to register the passkey.
49+
4. The Nok Nok server validates the passkey credential and confirms successful passkey registration to the user.
50+
5. The passkey on the user's device is ready for authentication.
51+
52+
### Scenario 2: Passkey Authentication
53+
1. The user selects the Sign in with Nok Nok Cloud button on the Azure AD B2C Sign in page.
54+
2. Azure AD B2C redirects the user to the Nok Nok Signin App.
55+
3. User authenticates with their passkey.
56+
4. The Nok Nok server validates the passkey assertion and sends an OIDC authentication response to Azure AD B2C.
57+
5. Based on the authentication result, Azure AD B2C either grants or denies access to the target application.
4758

48-
1. At the sign-in page, select sign-in or sign-up and enters the username.
49-
2. Azure AD B2C redirects to the Nok Nok OIDC authentication provider.
50-
3. For mobile authentications, a QR code appears or push notification goes to the user device. For desktop sign-in, the user is redirected to the web app sign-in page for passwordless authentication.
51-
4. Scan the QR code with the Nok Nok app SDK or Passport app. Or, username is the sign-in page input.
52-
5. A prompt appears for authentication. Perform passwordless authentication: biometrics, device PIN, or any roaming authenticator.
53-
6. The authentication prompt appears on the web application.
54-
7. Perform passwordless authentication: biometrics, device PIN, or any roaming authenticator.
55-
8. The Nok Nok server validates FIDO assertion and sends OIDC authentication response to Azure AD B2C.
56-
9. The user is granted or denied access.
5759

5860
## Get started with Nok Nok
5961

60-
1. Go to noknok.com [Contact](https://noknok.com/contact/).
61-
2. Fill out the form for a Nok Nok tenant.
62-
3. An email arrives with tenant access information and links to documentation.
62+
1. [Contact](https://noknok.com/contact/) Nok Nok.
63+
2. Fill out the form for a Nok Nok tenant.
64+
3. An email arrives with tenant access information and links to documentation.
6365
4. Use the Nok Nok integration documentation to complete the tenant OIDC configuration.
6466

6567
## Integrate with Azure AD B2C
@@ -70,8 +72,8 @@ Use the following instructions to add and configure an IdP, and then configure a
7072

7173
For the following instructions, use the directory with the Azure AD B2C tenant. To add a new IdP:
7274

73-
1. Sign in to the [Azure portal](https://portal.azure.com/#home) as at least B2C IEF Policy Administrator of the Azure AD B2C tenant.
74-
2. In the portal toolbar, select the **Directories + subscriptions**.
75+
1. Sign in to the [Azure portal](https://portal.azure.com/#home) as at least as the B2C IEF Policy Administrator of the Azure AD B2C tenant.
76+
2. In the portal toolbar, select **Directories + subscriptions**.
7577
3. On **Portal settings, Directories + subscriptions**, in the **Directory name** list, locate the Azure AD B2C directory.
7678
4. Select **Switch**.
7779
5. In the top-left corner of the Azure portal, select **All services**.
@@ -80,24 +82,21 @@ For the following instructions, use the directory with the Azure AD B2C tenant.
8082
8. Select **Identity providers**.
8183
9. Select **Add**.
8284

83-
### Configure an Identity provider
85+
### Configure an Identity provider
8486

8587
To configure an IdP:
8688

8789
1. Select **Identity provider type** > **OpenID Connect (Preview)**.
8890
2. For **Name**, enter the Nok Nok Authentication Provider, or another name.
89-
3. For **Metadata URL**, enter the hosted Nok Nok Authentication app URI, followed by the path such as `https://demo.noknok.com/mytenant/oidc/.well-known/openid-configuration`.
91+
3. For **Metadata URL**, enter the following URL after replacing the placeholder with the tenant ID provided by Nok Nok: `https://cloud.noknok.com/<tenant_id>/webapps/nnlfed/realms/<tenant_id>/.well-known/openid-configuration`.
9092
4. For **Client Secret**, use the Client Secret from Nok Nok.
9193
5. For **Client ID**, use the Client ID provided by Nok Nok.
92-
6. For **Scope**, use **OpenID profile email**.
94+
6. For **Scope**, use **openid**.
9395
7. For **Response type**, use **code**.
9496
8. For **Response mode**, use **form_post**.
95-
9. Select **OK**.
96-
10. Select **Map this identity provider’s claims**.
97-
11. For **UserID**, select **From subscription**.
98-
12. For **Display name**, select **From subscription**.
99-
13. For **Response mode**, select **From subscription**.
100-
14. Select **Save**.
97+
9. For **User ID**, use **sub**.
98+
10. For **Display name**, use **sub**.
99+
11. Select **Save**.
101100

102101
### Create a user flow policy
103102

@@ -106,31 +105,24 @@ For the following instructions, Nok Nok is a new OIDC IdP in the B2C identity pr
106105
1. In your Azure AD B2C tenant, under **Policies**, select **User flows**.
107106
2. Select **New**.
108107
3. Select **Sign up and sign in**.
109-
4. Select a **version**.
108+
4. Select a **Version**.
110109
5. Select **Create**.
111110
6. Enter a policy **Name**.
112111
7. In **Identity providers**, select the created Nok Nok IdP.
113-
8. You can add an email address. Azure won't redirect sign-in to Nok Nok; a screen appears with user options.
112+
8. Check **Email signup** under **Local accounts** to display an intermediate Azure AD B2C signin/signup page with a button that redirects the user to the Nok Nok Signin App.
114113
9. Leave the **Multi-factor Authentication** field.
115-
10. Select **Enforce conditional access policies**.
116-
11. Under **User attributes and token claims**, in the Collect attribute option, select **Email Address**.
117-
12. Add user attributes for Microsoft Entra ID to collect, with claims that Azure AD B2C returns to the client application.
118-
13. Select **Create**.
119-
14. Select the new **User flow**.
120-
15. On the left panel, select **Application Claims**.
121-
16. Under options, select the **email** checkbox
122-
17. Select **Save**.
114+
10. Click **Create** to save.
123115

124116
## Test the user flow
125117

126-
1. Open the Azure AD B2C tenant. Under **Policies** select **Identity Experience Framework**.
118+
1. Open the Azure AD B2C tenant. Under **Policies**, select **Identity Experience Framework**.
127119
2. Select the created **SignUpSignIn**.
128120
3. Select **Run user flow**.
129121
4. For **Application**, select the registered app. The example is JWT.
130-
5. For **Reply URL**, select the redirect URL.
122+
5. For **Reply URL**, select the redirect URL of the application that you previously selected at the previous step.
131123
6. Select **Run user flow**.
132-
7. Perform a sign-up flow and create an account.
133-
8. After the user attribute is created, Nok Nok is called.
124+
7. Perform signin using the Azure AD B2C username and the passkey that you previously registered for the same user.
125+
8. Verify that you received the token after authentication.
134126

135127
If the flow is incomplete, confirm the user is or isn't saved in the directory.
136128

articles/api-management/developer-portal-extend-custom-functionality.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -60,7 +60,7 @@ For more advanced use cases, you can create and upload a custom widget to the de
6060

6161
### Prerequisites
6262

63-
* Install [Node.JS runtime](https://nodejs.org/en/) locally
63+
* Install [Node.js runtime](https://nodejs.org/en/) locally
6464
* Basic knowledge of programming and web development
6565

6666
### Create widget

articles/api-management/v2-service-tiers-overview.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -72,6 +72,7 @@ The following API Management capabilities are currently unavailable in the v2 ti
7272

7373
**Infrastructure and networking**
7474
* Multi-region deployment
75+
* Availability zone support
7576
* Multiple custom domain names
7677
* Capacity metric - *replaced by CPU Percentage of Gateway and Memory Percentage of Gateway metrics*
7778
* Built-in analytics - *replaced by Azure Monitor-based dashboard*

articles/app-service/app-service-web-configure-tls-mutual-auth.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -130,7 +130,7 @@ public class Startup
130130
public void ConfigureServices(IServiceCollection services)
131131
{
132132
services.AddControllersWithViews();
133-
// Configure the application to use the protocol and client ip address forwared by the frontend load balancer
133+
// Configure the application to use the protocol and client ip address forwarded by the frontend load balancer
134134
services.Configure<ForwardedHeadersOptions>(options =>
135135
{
136136
options.ForwardedHeaders =
@@ -295,7 +295,7 @@ public class Startup
295295

296296
if (!foundIssuerCN || !foundIssuerO) return false;
297297

298-
// 4. Check thumprint of certificate
298+
// 4. Check thumbprint of certificate
299299
if (String.Compare(certificate.Thumbprint.Trim().ToUpper(), "30757A2E831977D8BD9C8496E4C99AB26CB9622B") != 0) return false;
300300

301301
return true;

articles/app-service/configure-basic-auth-disable.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -53,7 +53,7 @@ az resource update --resource-group <resource-group> --name scm --namespace Micr
5353

5454
-----
5555

56-
To confirm that FTP access is blocked, try [connecting to your app using FTP/S](deploy-ftp.md). You should get a `401 Unauthenticted` message.
56+
To confirm that FTP access is blocked, try [connecting to your app using FTP/S](deploy-ftp.md). You should get a `401 Unauthenticated` message.
5757

5858
To confirm that Git access is blocked, try [local Git deployment](deploy-local-git.md). You should get an `Authentication failed` message.
5959

@@ -80,7 +80,7 @@ The following table shows how various deployment methods behave when basic authe
8080

8181
## Create a custom role with no permissions for basic authentication
8282

83-
To prevent a lower-priveldged user from enabling basic authentication for any app, you can create a custom role and assign the user to the role.
83+
To prevent a lower-privileged user from enabling basic authentication for any app, you can create a custom role and assign the user to the role.
8484

8585
### [Azure portal](#tab/portal)
8686

articles/app-service/configure-error-pages.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ In this tutorial, we're adding a custom 403 error page to our web app hosted on
1818
- an html file under 10 kb in size
1919

2020
## Upload an error page
21-
For this example, we're uploading and testing a 403 error page to present to the user. Name your html file to match the error code (for example, `403.hmtl`). Once you have your html file prepared, you can upload it to your web app. In the configuration blade, you should see an **Error pages (preview)** tab. Click on this tab to view the error page options. If the options are greyed out, you need to upgrade to at least a Premium SKU to use this feature.
21+
For this example, we're uploading and testing a 403 error page to present to the user. Name your html file to match the error code (for example, `403.html`). Once you have your html file prepared, you can upload it to your web app. In the configuration blade, you should see an **Error pages (preview)** tab. Click on this tab to view the error page options. If the options are greyed out, you need to upgrade to at least a Premium SKU to use this feature.
2222

2323
Select the error code that you'd like to upload an error page for and click **Edit**. On the next screen, click the folder icon to select your html file. The file must be in html format and within the 10 kb size limit. Find your .html file and click on the **Upload** button at the bottom of the screen. Notice the Status in the table updates from Not Configured to Configured. Then click **Save** to complete the upload.
2424

articles/app-service/configure-language-java-data-sources.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -146,7 +146,7 @@ The following example XSL file adds a new connector node to the Tomcat server.xm
146146
</xsl:copy>
147147
</xsl:template>
148148
149-
<!-- Add the new connector after the last existing Connnector if there's one -->
149+
<!-- Add the new connector after the last existing Connector if there's one -->
150150
<xsl:template match="Connector[last()]" mode="insertConnector">
151151
<xsl:call-template name="Copy" />
152152
@@ -317,7 +317,7 @@ Add an XSL transform file called *configure.ps1* to the *%HOME%_\site* directory
317317
</xsl:copy>
318318
</xsl:template>
319319
320-
<!-- Add the new connector after the last existing Connnector if there's one -->
320+
<!-- Add the new connector after the last existing Connector if there's one -->
321321
<xsl:template match="Connector[last()]" mode="insertConnector">
322322
<xsl:call-template name="Copy" />
323323

articles/app-service/configure-language-java-deploy-run.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -593,14 +593,14 @@ The latest versions of Tomcat have server.xml (8.5.58 and 9.0.38 onward). Older
593593
```
594594
* `maxHttpHeaderSize` is set to `16384`
595595
* `URIEncoding` is set to `UTF-8`
596-
* `conectionTimeout` is set to `WEBSITE_TOMCAT_CONNECTION_TIMEOUT`, which defaults to `240000`
596+
* `connectionTimeout` is set to `WEBSITE_TOMCAT_CONNECTION_TIMEOUT`, which defaults to `240000`
597597
* `maxThreads` is set to `WEBSITE_CATALINA_MAXTHREADS`, which defaults to `200`
598598
* `maxConnections` is set to `WEBSITE_CATALINA_MAXCONNECTIONS`, which defaults to `10000`
599599

600600
> [!NOTE]
601601
> The connectionTimeout, maxThreads and maxConnections settings can be tuned with app settings
602602
603-
Following are example CLI commands that you might use to alter the values of conectionTimeout, maxThreads, or maxConnections:
603+
Following are example CLI commands that you might use to alter the values of connectionTimeout, maxThreads, or maxConnections:
604604

605605
```azurecli-interactive
606606
az webapp config appsettings set --resource-group myResourceGroup --name myApp --settings WEBSITE_TOMCAT_CONNECTION_TIMEOUT=120000

articles/app-service/configure-ssl-app-service-certificate.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -209,7 +209,7 @@ The downloaded PFX file is a raw PKCS12 file that contains both the public and p
209209

210210
## Use Azure Advisor for App Service certificate
211211

212-
App Service certificate is integrated with [Azure Advisor](/azure/advisor/advisor-overview) to provide reliability recommendations for when your certificate requires domain verification. You must verify domain ownership for your certificate during renew, auto-renew, or rekey process if you haven't verified the domain in the last 395 days. To ensure you do not miss any certificate that requires verification or risk any certificate from expiring, you can utlize Azure Advisor to view and set up alerts for App Service certificate.
212+
App Service certificate is integrated with [Azure Advisor](/azure/advisor/advisor-overview) to provide reliability recommendations for when your certificate requires domain verification. You must verify domain ownership for your certificate during renew, auto-renew, or rekey process if you haven't verified the domain in the last 395 days. To ensure you do not miss any certificate that requires verification or risk any certificate from expiring, you can utilize Azure Advisor to view and set up alerts for App Service certificate.
213213

214214
### View Advisor recommendation
215215

@@ -223,7 +223,7 @@ To view Advisor recommendation for App Service certificate:
223223

224224
### Create Advisor Alerts
225225

226-
You [create Azure Advisor alerts on new recommendations] using different configurations. To set up Advisor Alerts specifically for App Serivice certificate so you can get notifications when your certificate requires domain ownership validation:
226+
You [create Azure Advisor alerts on new recommendations] using different configurations. To set up Advisor Alerts specifically for App Service certificate so you can get notifications when your certificate requires domain ownership validation:
227227

228228
1. Navigate to the [Azure Advisor page](https://portal.azure.com/#view/Microsoft_Azure_Expert/AdvisorMenuBlade/~/overview).
229229

0 commit comments

Comments
 (0)