Skip to content

Commit 2ec9766

Browse files
committed
Merge branch 'main' into release-service-bus-tls
2 parents 72725a9 + 54a1564 commit 2ec9766

File tree

627 files changed

+6526
-2525
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

627 files changed

+6526
-2525
lines changed

.openpublishing.redirection.active-directory.json

Lines changed: 0 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -10700,11 +10700,6 @@
1070010700
"redirect_url": "/azure/active-directory/privileged-identity-management/pim-create-azure-ad-roles-and-resource-roles-review",
1070110701
"redirect_document_id": false
1070210702
},
10703-
{
10704-
"source_path_from_root": "/articles/active-directory-b2c/partner-azure-web-application-firewall.md",
10705-
"redirect_url": "/azure/active-directory-b2c/partner-gallery",
10706-
"redirect_document_id": false
10707-
},
1070810703
{
1070910704
"source_path_from_root": "/articles/active-directory-b2c/troubleshoot-custom-policies.md",
1071010705
"redirect_url": "/azure/active-directory-b2c/troubleshoot",

.openpublishing.redirection.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -3228,6 +3228,11 @@
32283228
"redirect_url": "/azure/app-service",
32293229
"redirect_document_id": false
32303230
},
3231+
{
3232+
"source_path_from_root": "/articles/app-service/scenario-secure-app-clean-up-resources.md",
3233+
"redirect_url": "/azure/app-service/scenario-secure-app-access-storage#clean-up-resources",
3234+
"redirect_document_id": false
3235+
},
32313236
{
32323237
"source_path_from_root": "/articles/app-service/quickstart-nodejs-uiex.md",
32333238
"redirect_url": "/azure/app-service/quickstart-nodejs",

articles/active-directory-b2c/TOC.yml

Lines changed: 7 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -334,8 +334,8 @@
334334
displayName: TOTP, time-based-one-time password, time-based one-time password, authenticator app, Microsoft authenticator app, mfa, 2fa
335335
- name: Partner integration
336336
items:
337-
- name: Transmit Security
338-
href: partner-bindid.md
337+
- name: Asignio
338+
href: partner-asignio.md
339339
- name: BlokSec
340340
href: partner-bloksec.md
341341
- name: Haventec
@@ -352,6 +352,8 @@
352352
href: partner-nevis.md
353353
- name: Nok Nok
354354
href: partner-nok-nok.md
355+
- name: Transmit Security
356+
href: partner-bindid.md
355357
- name: Trusona
356358
href: partner-trusona.md
357359
- name: Twilio
@@ -386,6 +388,8 @@
386388
items:
387389
- name: Akamai
388390
href: partner-akamai.md
391+
- name: Azure WAF
392+
href: partner-azure-web-application-firewall.md
389393
- name: Cloudflare
390394
href: partner-cloudflare.md
391395
- name: Fraud protection partners
@@ -687,4 +691,4 @@
687691
href: find-help-open-support-ticket.md
688692
displayName: technical
689693
- name: Videos
690-
href: azure-ad-external-identities-videos.md
694+
href: azure-ad-external-identities-videos.md
104 KB
Loading
4.76 KB
Loading

articles/active-directory-b2c/partner-asignio.md

Lines changed: 485 additions & 0 deletions
Large diffs are not rendered by default.
Lines changed: 102 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,102 @@
1+
---
2+
title: Tutorial to configure Azure Active Directory B2C with Azure Web Application Firewall
3+
titleSuffix: Azure AD B2C
4+
description: Tutorial to configure Azure Active Directory B2C with Azure Web application firewall to protect your applications from malicious attacks
5+
services: active-directory-b2c
6+
author: gargi-sinha
7+
manager: CelesteDG
8+
ms.reviewer: kengaderdus
9+
10+
ms.service: active-directory
11+
ms.workload: identity
12+
ms.topic: how-to
13+
ms.date: 08/17/2021
14+
ms.author: gasinh
15+
ms.subservice: B2C
16+
---
17+
18+
# Tutorial: Configure Azure Web Application Firewall with Azure Active Directory B2C
19+
20+
In this sample tutorial, learn how to enable [Azure Web Application Firewall (WAF)](https://azure.microsoft.com/services/web-application-firewall/#overview) solution for Azure Active Directory (AD) B2C tenant with custom domain. Azure WAF provides centralized protection of your web applications from common exploits and vulnerabilities.
21+
22+
>[!NOTE]
23+
>This feature is in public preview.
24+
25+
## Prerequisites
26+
27+
To get started, you'll need:
28+
29+
- An Azure subscription – If you don't have a subscription, you can get a [free account](https://azure.microsoft.com/free/).
30+
31+
- [An Azure AD B2C tenant](tutorial-create-tenant.md) – The authorization server, responsible for verifying the user’s credentials using the custom policies defined in the tenant. It's also known as the identity provider.
32+
33+
- [Azure Front Door (AFD)](../frontdoor/index.yml) – Responsible for enabling custom domains for Azure AD B2C tenant.
34+
35+
- [Azure WAF](https://azure.microsoft.com/services/web-application-firewall/#overview) – Manages all traffic that is sent to the authorization server.
36+
37+
## Azure AD B2C setup
38+
39+
To use custom domains in Azure AD B2C, it's required to use custom domain feature provided by AFD. Learn how to [enable Azure AD B2C custom domains](./custom-domain.md?pivots=b2c-user-flow).
40+
41+
After custom domain for Azure AD B2C is successfully configured using AFD, [test the custom domain](./custom-domain.md?pivots=b2c-custom-policy#test-your-custom-domain) before proceeding further.
42+
43+
## Onboard with Azure WAF
44+
45+
To enable Azure WAF, configure a WAF policy and associate that policy to the AFD for protection.
46+
47+
### Create a WAF policy
48+
49+
Create a basic WAF policy with managed Default Rule Set (DRS) in the [Azure portal](https://portal.azure.com).
50+
51+
1. Go to the [Azure portal](https://portal.azure.com). Select **Create a resource** and then search for Azure WAF. Select **Azure Web Application Firewall (WAF)** > **Create**.
52+
53+
2. Go to the **Create a WAF policy** page, select the **Basics** tab. Enter the following information, accept the defaults for the remaining settings.
54+
55+
| Value | Description |
56+
|:--------|:-------|
57+
| Policy for | Global WAF (Front Door)|
58+
| Front Door SKU | Select between Basic, Standard, or Premium SKU |
59+
|Subscription | Select your Front Door subscription name |
60+
| Resource group | Select your Front Door resource group name |
61+
| Policy name | Enter a unique name for your WAF policy |
62+
| Policy state | Set as Enabled |
63+
| Policy mode | Set as Detection |
64+
65+
3. Select **Review + create**
66+
67+
4. Go to the **Association** tab of the Create a WAF policy page, select + **Associate a Front Door profile**, enter the following settings
68+
69+
| Value | Description |
70+
|:----|:------|
71+
| Front Door | Select your Front Door name associated with Azure AD B2C custom domain |
72+
| Domains | Select the Azure AD B2C custom domains you want to associate the WAF policy to|
73+
74+
5. Select **Add**.
75+
76+
6. Select **Review + create**, then select **Create**.
77+
78+
### Change policy mode from detection to prevention
79+
80+
When a WAF policy is created, by default the policy is in Detection mode. In Detection mode, WAF doesn't block any requests, instead, requests matching the WAF rules are logged in the WAF logs. For more information about WAF logging, see [Azure WAF monitoring and logging](../web-application-firewall/afds/waf-front-door-monitor.md).
81+
82+
The sample query shows all the requests that were blocked by the WAF policy in the past 24 hours. The details include, rule name, request data, action taken by the policy, and the policy mode.
83+
84+
![Image shows the blocked requests](./media/partner-azure-web-application-firewall/blocked-requests-query.png)
85+
86+
![Image shows the blocked requests details](./media/partner-azure-web-application-firewall/blocked-requests-details.png)
87+
88+
It's recommended that you let the WAF capture requests in Detection mode. Review the WAF logs to determine if there are any rules in the policy that are causing false positive results. Then after [exclude the WAF rules based on the WAF logs](../web-application-firewall/afds/waf-front-door-exclusion.md#define-exclusion-based-on-web-application-firewall-logs).
89+
90+
To see WAF in action, use Switch to prevention mode to change from Detection to Prevention mode. All requests that match the rules defined in the Default Rule Set (DRS) are blocked and logged in the WAF logs.
91+
92+
![Image shows the switch to prevention mode](./media/partner-azure-web-application-firewall/switch-to-prevention-mode.png)
93+
94+
In case you want to switch back to the detection mode, you can do so by using Switch to detection mode option.
95+
96+
![Image shows the switch to detection mode](./media/partner-azure-web-application-firewall/switch-to-detection-mode.png)
97+
98+
## Next steps
99+
100+
- [Azure WAF monitoring and logging](../web-application-firewall/afds/waf-front-door-monitor.md)
101+
102+
- [WAF with Front Door service exclusion lists](../web-application-firewall/afds/waf-front-door-exclusion.md)

articles/active-directory-b2c/partner-gallery.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -42,7 +42,7 @@ Microsoft partners with the following ISVs for MFA and Passwordless authenticati
4242

4343
| ISV partner | Description and integration walkthroughs |
4444
|:-------------------------|:--------------|
45-
|![Screenshot of a bindid logo](./media/partner-gallery/bindid-logo.png) | [Transmit Security's](./partner-bindid.md) solution BindID is a passwordless authentication service that uses strong FIDO2 biometric authentication for a reliable omni-channel authentication experience, which ensures a smooth login experience for customers across every device and channel eliminating fraud, phishing, and credential reuse. |
45+
| ![Screenshot of a asignio logo](./media/partner-gallery/asignio-logo.png) | [Asignio](./partner-asignio.md) is a passwordless, soft biometric, and MFA solution. Asignio uses a combination of the patented Asignio Signature and live facial verification for user authentication. The changeable biometric signature eliminates passwords, fraud, phishing, and credential reuse through omni-channel authentication. |
4646
| ![Screenshot of a bloksec logo](./media/partner-gallery/bloksec-logo.png) | [BlokSec](./partner-bloksec.md) is a passwordless authentication and tokenless MFA solution, which provides real-time consent-based services and protects customers against identity-centric cyber-attacks such as password stuffing, phishing, and man-in-the-middle attacks. |
4747
| ![Screenshot of a haventec logo](./media/partner-gallery/haventec-logo.png) | [Haventec](./partner-haventec.md) is a passwordless authentication provider, which provides decentralized identity platform that eliminates passwords, shared secrets, and friction. |
4848
| ![Screenshot of a hypr logo](./media/partner-gallery/hypr-logo.png) | [Hypr](./partner-hypr.md) is a passwordless authentication provider, which replaces passwords with public key encryptions eliminating fraud, phishing, and credential reuse. |
@@ -51,6 +51,7 @@ Microsoft partners with the following ISVs for MFA and Passwordless authenticati
5151
|![Screenshot of a Keyless logo.](./media/partner-gallery/keyless-logo.png) | [Keyless](./partner-keyless.md) is a passwordless authentication provider that provides authentication in the form of a facial biometric scan and eliminates fraud, phishing, and credential reuse.
5252
| ![Screenshot of a nevis logo](./media/partner-gallery/nevis-logo.png) | [Nevis](./partner-nevis.md) enables passwordless authentication and provides a mobile-first, fully branded end-user experience with Nevis Access app for strong customer authentication and to comply with PSD2 transaction requirements. |
5353
| ![Screenshot of a nok nok logo](./media/partner-gallery/nok-nok-logo.png) | [Nok Nok](./partner-nok-nok.md) provides passwordless authentication and enables FIDO certified multifactor authentication such as FIDO UAF, FIDO U2F, WebAuthn, and FIDO2 for mobile and web applications. Using Nok Nok customers can improve their security posture while balancing user experience.
54+
|![Screenshot of a bindid logo](./media/partner-gallery/bindid-logo.png) | [Transmit Security's](./partner-bindid.md) solution BindID is a passwordless authentication service that uses strong FIDO2 biometric authentication for a reliable omni-channel authentication experience, which ensures a smooth login experience for customers across every device and channel eliminating fraud, phishing, and credential reuse. |
5455
| ![Screenshot of a trusona logo](./media/partner-gallery/trusona-logo.png) | [Trusona](./partner-trusona.md) integration helps you sign in securely and enables passwordless authentication, MFA, and digital license scanning. |
5556
| ![Screenshot of a twilio logo.](./media/partner-gallery/twilio-logo.png) | [Twilio Verify app](./partner-twilio.md) provides multiple solutions to enable MFA through SMS one-time password (OTP), time-based one-time password (TOTP), and push notifications, and to comply with SCA requirements for PSD2. |
5657
| ![Screenshot of a typingDNA logo](./media/partner-gallery/typingdna-logo.png) | [TypingDNA](./partner-typingdna.md) enables strong customer authentication by analyzing a user’s typing pattern. It helps companies enable a silent MFA and comply with SCA requirements for PSD2. |
@@ -95,6 +96,7 @@ Microsoft partners with the following ISVs for Web Application Firewall (WAF).
9596
| ISV partner | Description and integration walkthroughs |
9697
|:-------------------------|:--------------|
9798
| ![Screenshot of Akamai logo](./media/partner-gallery/akamai-logo.png) | [Akamai WAF](./partner-akamai.md) allows fine grained manipulation of traffic to protect and secure your identity infrastructure against malicious attacks. |
99+
| ![Screenshot of Azure WAF logo](./media/partner-gallery/azure-web-application-firewall-logo.png) | [Azure WAF](./partner-azure-web-application-firewall.md) provides centralized protection of your web applications from common exploits and vulnerabilities. |
98100
![Screenshot of Cloudflare logo](./media/partner-gallery/cloudflare-logo.png) | [Cloudflare](./partner-cloudflare.md) is a WAF provider that helps organizations protect against malicious attacks that aim to exploit vulnerabilities such as SQLi, and XSS. |
99101

100102

0 commit comments

Comments
 (0)