You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory-b2c/partner-nok-nok.md
+49-57Lines changed: 49 additions & 57 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,7 +1,7 @@
1
1
---
2
-
title: Tutorial to configure Nok Nok Passport with Azure Active Directory B2C for passwordless FIDO2 authentication
2
+
title: Tutorial to configure Nok Nok S3 Authentication Suite with Azure Active Directory B2C for FIDO passkey authentication
3
3
titleSuffix: Azure AD B2C
4
-
description: Configure Nok Nok Passport with Azure AD B2C to enable passwordless FIDO2 authentication
4
+
description: Configure Nok Nok S3 Authentication Suite with Azure AD B2C to enable FIDO passkey authentication
5
5
author: gargi-sinha
6
6
manager: martinco
7
7
ms.reviewer: kengaderdus
@@ -12,54 +12,56 @@ ms.date: 06/21/2024
12
12
ms.author: gasinh
13
13
ms.subservice: b2c
14
14
15
-
# Customer intent: I'm a developer integrating Azure Active Directory B2C with a third-party authentication provider. I want to learn how to configure Nok Nok Passport as an identity provider (IdP) in Azure AD B2C. My goal is to enable passwordless FIDO authentication for my users.
15
+
# Customer intent: I'm a developer integrating Azure AD B2C with a third-party authentication provider. I want to learn how to configure Nok Nok S3 Authentication Suite as an identity provider (IdP) in Azure AD B2C. My goal is to implement FIDO Passkey authentication for my users.
16
16
---
17
-
# Tutorial: Configure Nok Nok Passport with Azure Active Directory B2C for passwordless FIDO2 authentication
17
+
# Tutorial: Configure Nok Nok S3 Authentication Suite with Azure AD B2C for FIDO Passkey Authentication
18
18
19
-
Learn to integrate the Nok Nok S3 Authentication Suite into your Azure Active Directory B2C (Azure AD B2C) tenant. The Nok Nok solutions enable FIDOcertified multi-factor authentication such as FIDO UAF, FIDO U2F, WebAuthn, and FIDO2 for mobile and web applications. Nok Nok solutions improve security posture while balancing user the experience.
19
+
Learn to integrate the Nok Nok S3 Authentication Suite into your Azure Active Directory (AD) B2C tenant. The Nok Nok solution enables FIDO-certified multifactor authentication such as FIDO UAF, FIDO U2F, WebAuthn, and FIDO2 for mobile and web applications. The Nok Nok solution strengthens your security while maintaining an optimal user experience.
20
20
21
-
Go to noknok.com to learn more: [Nok Nok Labs, Inc.](https://noknok.com/)
21
+
Learn more at [Nok Nok](https://noknok.com/)
22
22
23
23
## Prerequisites
24
24
25
25
To get started, you need:
26
26
27
-
* An Azure subscription
28
-
* If you don't have one, get a [Azure free account](https://azure.microsoft.com/free/)
29
-
* An Azure AD B2C tenant linked to the Azure subscription
30
-
*[Tutorial: Create an Azure Active Directory B2C tenant](tutorial-create-tenant.md)
31
-
* Go to [noknok.com](https://noknok.com/).
32
-
* On the top menu, select **Demo**.
27
+
* An Azure subscription. If you don't have one, get an [Azure free account](https://azure.microsoft.com/free/).
28
+
* An Azure AD B2C tenant linked to the Azure subscription [Tutorial: Create an Azure AD B2C tenant](tutorial-create-tenant.md).
29
+
* A Nok Nok Cloud evaluation tenant for FIDO registration and authentication.
33
30
34
31
## Scenario description
35
32
36
-
To enable passwordless FIDO authentication for your users, enable Nok Nok as an identity provider (IdP) in your Azure AD B2C tenant. The Nok Nok solution integration includes the following components:
33
+
To enable Passkey authentication for your users, enable Nok Nok as an identity provider (IdP) in your Azure AD B2C tenant. The Nok Nok integration includes the following components:
37
34
38
-
***Azure AD B2C** – authorization server that verifies user credentials
39
-
***Web and mobile applications** – mobile or web apps to protect with Nok Nok solutions and Azure AD B2C
40
-
***Nok Nok app SDK or Passport app** – authenticate Azure AD B2C enabled applications.
41
-
* Go to the Apple App Store for [Nok Nok Passport](https://apps.apple.com/us/app/nok-nok-passport/id1050437340)
42
-
* Or, Google Play [Nok Nok Passport](https://play.google.com/store/apps/details?id=com.noknok.android.passport2&hl=en&gl=US)
35
+
***Azure AD B2C** – authorization server that verifies user credentials.
36
+
***Web and mobile applications** – mobile or web apps to protect with Nok Nok solutions and Azure AD B2C.
37
+
***Nok Nok Tutorial Web App** – application to register the passkey on your device.
38
+
***Nok Nok Sign in App** – application for authenticating Azure AD B2C applications using passkey.
43
39
44
-
The following diagram illustrates the Nok Nok solution as an IdP for Azure AD B2C by using OpenID Connect (OIDC) for passwordless authentication.
45
40
46
-

41
+
The following diagram illustrates the Nok Nok solution as an IdP for Azure AD B2C by using OpenID Connect (OIDC) for Passkey authentication.
42
+
43
+

44
+
45
+
### Scenario 1: Passkey Registration
46
+
1. The user navigates to the Nok Nok Tutorial Web App using the link provided by Nok Nok.
47
+
2. The user enters their Azure AD B2C username and default tutorial app password.
48
+
3. The user receives a prompt to register the passkey.
49
+
4. The Nok Nok server validates the passkey credential and confirms successful passkey registration to the user.
50
+
5. The passkey on the user's device is ready for authentication.
51
+
52
+
### Scenario 2: Passkey Authentication
53
+
1. The user selects the Sign in with Nok Nok Cloud button on the Azure AD B2C Sign in page.
54
+
2. Azure AD B2C redirects the user to the Nok Nok Signin App.
55
+
3. User authenticates with their passkey.
56
+
4. The Nok Nok server validates the passkey assertion and sends an OIDC authentication response to Azure AD B2C.
57
+
5. Based on the authentication result, Azure AD B2C either grants or denies access to the target application.
47
58
48
-
1. At the sign-in page, select sign-in or sign-up and enters the username.
49
-
2. Azure AD B2C redirects to the Nok Nok OIDC authentication provider.
50
-
3. For mobile authentications, a QR code appears or push notification goes to the user device. For desktop sign-in, the user is redirected to the web app sign-in page for passwordless authentication.
51
-
4. Scan the QR code with the Nok Nok app SDK or Passport app. Or, username is the sign-in page input.
52
-
5. A prompt appears for authentication. Perform passwordless authentication: biometrics, device PIN, or any roaming authenticator.
53
-
6. The authentication prompt appears on the web application.
54
-
7. Perform passwordless authentication: biometrics, device PIN, or any roaming authenticator.
55
-
8. The Nok Nok server validates FIDO assertion and sends OIDC authentication response to Azure AD B2C.
56
-
9. The user is granted or denied access.
57
59
58
60
## Get started with Nok Nok
59
61
60
-
1.Go to noknok.com [Contact](https://noknok.com/contact/).
61
-
2. Fill out the form for a Nok Nok tenant.
62
-
3. An email arrives with tenant access information and links to documentation.
62
+
1.[Contact](https://noknok.com/contact/) Nok Nok.
63
+
2. Fill out the form for a Nok Nok tenant.
64
+
3. An email arrives with tenant access information and links to documentation.
63
65
4. Use the Nok Nok integration documentation to complete the tenant OIDC configuration.
64
66
65
67
## Integrate with Azure AD B2C
@@ -70,8 +72,8 @@ Use the following instructions to add and configure an IdP, and then configure a
70
72
71
73
For the following instructions, use the directory with the Azure AD B2C tenant. To add a new IdP:
72
74
73
-
1. Sign in to the [Azure portal](https://portal.azure.com/#home) as at least B2C IEF Policy Administrator of the Azure AD B2C tenant.
74
-
2. In the portal toolbar, select the **Directories + subscriptions**.
75
+
1. Sign in to the [Azure portal](https://portal.azure.com/#home) as at least as the B2C IEF Policy Administrator of the Azure AD B2C tenant.
76
+
2. In the portal toolbar, select **Directories + subscriptions**.
75
77
3. On **Portal settings, Directories + subscriptions**, in the **Directory name** list, locate the Azure AD B2C directory.
76
78
4. Select **Switch**.
77
79
5. In the top-left corner of the Azure portal, select **All services**.
@@ -80,24 +82,21 @@ For the following instructions, use the directory with the Azure AD B2C tenant.
2. For **Name**, enter the Nok Nok Authentication Provider, or another name.
89
-
3. For **Metadata URL**, enter the hosted Nok Nok Authentication app URI, followed by the path such as `https://demo.noknok.com/mytenant/oidc/.well-known/openid-configuration`.
91
+
3. For **Metadata URL**, enter the following URL after replacing the placeholder with the tenant ID provided by Nok Nok: `https://cloud.noknok.com/<tenant_id>/webapps/nnlfed/realms/<tenant_id>/.well-known/openid-configuration`.
90
92
4. For **Client Secret**, use the Client Secret from Nok Nok.
91
93
5. For **Client ID**, use the Client ID provided by Nok Nok.
92
-
6. For **Scope**, use **OpenID profile email**.
94
+
6. For **Scope**, use **openid**.
93
95
7. For **Response type**, use **code**.
94
96
8. For **Response mode**, use **form_post**.
95
-
9. Select **OK**.
96
-
10. Select **Map this identity provider’s claims**.
97
-
11. For **UserID**, select **From subscription**.
98
-
12. For **Display name**, select **From subscription**.
99
-
13. For **Response mode**, select **From subscription**.
100
-
14. Select **Save**.
97
+
9. For **User ID**, use **sub**.
98
+
10. For **Display name**, use **sub**.
99
+
11. Select **Save**.
101
100
102
101
### Create a user flow policy
103
102
@@ -106,31 +105,24 @@ For the following instructions, Nok Nok is a new OIDC IdP in the B2C identity pr
106
105
1. In your Azure AD B2C tenant, under **Policies**, select **User flows**.
107
106
2. Select **New**.
108
107
3. Select **Sign up and sign in**.
109
-
4. Select a **version**.
108
+
4. Select a **Version**.
110
109
5. Select **Create**.
111
110
6. Enter a policy **Name**.
112
111
7. In **Identity providers**, select the created Nok Nok IdP.
113
-
8.You can add an email address. Azure won't redirect sign-in to Nok Nok; a screen appears with user options.
112
+
8.Check **Email signup** under **Local accounts** to display an intermediate Azure AD B2C signin/signup page with a button that redirects the user to the Nok Nok Signin App.
114
113
9. Leave the **Multi-factor Authentication** field.
Copy file name to clipboardExpand all lines: articles/app-service/deploy-container-github-action.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -182,7 +182,7 @@ Define secrets to use with the Docker Login action. The example in this document
182
182
183
183
## Build the Container image
184
184
185
-
The following example show part of the workflow that builds a Node.JS Docker image. Use [Docker Login](https://github.com/azure/docker-login) to log into a private container registry. This example uses Azure Container Registry but the same action works for other registries.
185
+
The following example show part of the workflow that builds a Node.js Docker image. Use [Docker Login](https://github.com/azure/docker-login) to log into a private container registry. This example uses Azure Container Registry but the same action works for other registries.
- Have an Azure account with an active subscription. [Create an account for free](https://azure.microsoft.com/free/?utm_source=campaign&utm_campaign=vscode-tutorial-app-service-extension&mktingSource=vscode-tutorial-app-service-extension).
33
-
- Install [Node.js and npm](https://nodejs.org). Run the command `node --version` to verify that Node.js is installed.
33
+
- Install [Node.js LTS](https://nodejs.org). Run the command `node --version` to verify that Node.js is installed.
34
34
- Install [Visual Studio Code](https://code.visualstudio.com/).
35
35
- Install the [Azure App Service extension](https://marketplace.visualstudio.com/items?itemName=ms-azuretools.vscode-azureappservice) for Visual Studio Code.
- Have an Azure account with an active subscription. [Create an account for free](https://azure.microsoft.com/free/?utm_source=campaign&utm_campaign=vscode-tutorial-app-service-extension&mktingSource=vscode-tutorial-app-service-extension).
43
-
- Install [Node.js LTS and npm](https://nodejs.org). Run the command `node --version` to verify that Node.js is installed.
43
+
- Install [Node.js LTS](https://nodejs.org). Run the command `node --version` to verify that Node.js is installed.
44
44
- Install <ahref="/cli/azure/install-azure-cli"target="_blank">Azure CLI</a>, with which you run commands in a shell to create and configure Azure resources.
45
45
46
46
::: zone-end
@@ -49,7 +49,7 @@ The steps in the video are also described in the following sections.
- Have an Azure account with an active subscription. [Create an account for free](https://azure.microsoft.com/free/?utm_source=campaign&utm_campaign=vscode-tutorial-app-service-extension&mktingSource=vscode-tutorial-app-service-extension).
52
-
- Install [Node.js LTS and npm](https://nodejs.org). Run the command `node --version` to verify that Node.js is installed.
52
+
- Install [Node.js LTS](https://nodejs.org). Run the command `node --version` to verify that Node.js is installed.
53
53
- Have an FTP client (for example, [FileZilla](https://filezilla-project.org)), to connect to your app.
54
54
55
55
::: zone-end
@@ -60,18 +60,26 @@ In this step, you create a basic Node.js application and ensure it runs on your
60
60
> [!TIP]
61
61
> If you have already completed the [Node.js tutorial](https://code.visualstudio.com/docs/nodejs/nodejs-tutorial), you can skip ahead to [Deploy to Azure](#deploy-to-azure).
62
62
63
-
1. Create a Node.js application using the [Express Generator](https://expressjs.com/starter/generator.html), which is installed by default with Node.js and npm.
63
+
1. Create a Node.js application using the [Express Generator](https://expressjs.com/starter/generator.html), which is installed by default with Node.js and npm.
64
64
65
65
```bash
66
66
npx express-generator myExpressApp --view ejs
67
67
```
68
68
69
+
If this is the first time you've installed the generator, npx will ask you to agree to the installation.
70
+
69
71
1. Change to the application's directory and install the npm packages.
70
72
71
73
```bash
72
74
cd myExpressApp && npm install
73
75
```
74
76
77
+
1. Update dependencies to the most secure version.
78
+
79
+
```bash
80
+
npm audit fix --force
81
+
```
82
+
75
83
1. Start the development server with debug information.
Copy file name to clipboardExpand all lines: articles/azure-netapp-files/whats-new.md
+11-1Lines changed: 11 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,14 +6,24 @@ author: b-hchen
6
6
ms.service: azure-netapp-files
7
7
ms.custom: linux-related-content
8
8
ms.topic: overview
9
-
ms.date: 11/12/2024
9
+
ms.date: 12/03/2024
10
10
ms.author: anfdocs
11
11
---
12
12
13
13
# What's new in Azure NetApp Files
14
14
15
15
Azure NetApp Files is updated regularly. This article provides a summary about the latest new features and enhancements.
16
16
17
+
## December 2024
18
+
19
+
*[Cloud Backup for Virtual Machines on Azure NetApp Files datastores for Azure VMware Solution:](../azure-vmware/install-cloud-backup-virtual-machines.md) enhanced backup capabilities (Preview)
20
+
21
+
Cloud Backup for Virtual Machines now integrates with [Azure NetApp Files backup](backup-introduction.md), significantly enhancing data protection by offering a fully managed backup solution for long-term recovery, archiving, and compliance. This integration allows you to mount a datastore from a snapshot or Azure NetApp Files backup to restore files. You can [mount the backup](../azure-vmware/configure-cloud-backup-virtual-machine.md) to either the Azure VMware Solution host where it was created or to an alternate host.
22
+
23
+
Cloud Backup for Virtual Machines now also includes the capability to [attach one or more VMDKs](../azure-vmware/configure-cloud-backup-virtual-machine.md) from a backup to the parent VM, to an alternate VM on the same Azure VMware Solution host, or to an alternate VM on an alternate host managed by the same vCenter instance.
24
+
25
+
Cloud Backup for Virtual Machines also enables you [to restore a virtual machine](../azure-vmware/restore-azure-netapp-files-vms.md) to an alternate location on the same Azure VMware Solution host or a different host managed by the same vCenter instance. Additionally, it supports [restoring guest files and folders from a snapshot or an Azure NetApp Files backup](../azure-vmware/restore-guest-files-folders.md).
26
+
17
27
## November 2024
18
28
19
29
*[Cool access support for large volumes](large-volumes-requirements-considerations.md#register-the-feature)
0 commit comments