Skip to content

Commit 3dff45b

Browse files
authored
Merge pull request #190560 from kengaderdus/review-akamai
[Azure AD B2C]Copy edit partner Akamai
2 parents 092fd2f + 9be3f85 commit 3dff45b

File tree

2 files changed

+15
-15
lines changed

2 files changed

+15
-15
lines changed
8.38 KB
Loading

articles/active-directory-b2c/partner-akamai.md

Lines changed: 15 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
2-
title: Tutorial to configure Azure Active Directory B2C with Akamai Web Application Firewall
2+
title: Configure Azure Active Directory B2C with Akamai Web Application Firewall
33
titleSuffix: Azure AD B2C
4-
description: Tutorial to configure Akamai Web application firewall with Azure AD B2C
4+
description: Configure Akamai Web application firewall with Azure AD B2C
55
services: active-directory-b2c
66
author: gargi-sinha
77
manager: CelesteDG
@@ -10,14 +10,14 @@ ms.reviewer: kengaderdus
1010
ms.service: active-directory
1111
ms.workload: identity
1212
ms.topic: how-to
13-
ms.date: 07/15/2021
13+
ms.date: 04/03/2022
1414
ms.author: gasinh
1515
ms.subservice: B2C
1616
---
1717

18-
# Tutorial: Configure Akamai with Azure Active Directory B2C
18+
# Configure Akamai with Azure Active Directory B2C
1919

20-
In this sample tutorial, learn how to enable [Akamai Web Application Firewall (WAF)](https://www.akamai.com/us/en/resources/web-application-firewall.jsp) solution for Azure Active Directory (AD) B2C tenant using custom domains. Akamai WAF helps organization protect their web applications from malicious attacks that aim to exploit vulnerabilities such as SQL injection and Cross site scripting.
20+
In this sample article, learn how to enable [Akamai Web Application Firewall (WAF)](https://www.akamai.com/us/en/resources/web-application-firewall.jsp) solution for Azure Active Directory B2C (Azure AD B2C) tenant using custom domains. Akamai WAF helps organization protect their web applications from malicious attacks that aim to exploit vulnerabilities such as SQL injection and Cross site scripting.
2121

2222
>[!NOTE]
2323
>This feature is in public preview.
@@ -30,7 +30,7 @@ Benefits of using Akamai WAF solution:
3030

3131
- Allows fine grained manipulation of traffic to protect and secure your identity infrastructure.
3232

33-
This sample tutorial applies to both [Web Application Protector (WAP)](https://www.akamai.com/us/en/products/security/web-application-protector-enterprise-waf-firewall-ddos-protection.jsp) and [Kona Site Defender (KSD)](https://www.akamai.com/us/en/products/security/kona-site-defender.jsp) WAF solutions that Akamai offers.
33+
This article applies to both [Web Application Protector (WAP)](https://www.akamai.com/us/en/products/security/web-application-protector-enterprise-waf-firewall-ddos-protection.jsp) and [Kona Site Defender (KSD)](https://www.akamai.com/us/en/products/security/kona-site-defender.jsp) WAF solutions that Akamai offers.
3434

3535
## Prerequisites
3636

@@ -56,7 +56,7 @@ Akamai WAF integration includes the following components:
5656

5757
1. To use custom domains in Azure AD B2C, it's required to use custom domain feature provided by Azure Front Door. Learn how to [enable Azure AD B2C custom domains](./custom-domain.md?pivots=b2c-user-flow).
5858

59-
2. After custom domain for Azure AD B2C is successfully configured using Azure Front Door, [test the custom domain](./custom-domain.md?pivots=b2c-custom-policy#test-your-custom-domain) before proceeding further.
59+
1. After custom domain for Azure AD B2C is successfully configured using Azure Front Door, [test the custom domain](./custom-domain.md?pivots=b2c-custom-policy#test-your-custom-domain) before proceeding further.
6060

6161
## Onboard with Akamai
6262

@@ -66,14 +66,14 @@ Akamai WAF integration includes the following components:
6666

6767
1. [Create a new property](https://control.akamai.com/wh/CUSTOMER/AKAMAI/en-US/WEBHELP/property-manager/property-manager-help/GUID-14BB87F2-282F-4C4A-8043-B422344884E6.html).
6868

69-
2. Configure the property settings as:
69+
1. Configure the property settings as:
7070

7171
| Property | Value |
7272
|:---------------|:---------------|
7373
|Property version | Select Standard or Enhanced TLS (preferred) |
74-
|Property hostnames | Add a property hostname. This is the name of your custom domain, for example: login.domain.com. <BR> Create or modify a certificate with the appropriate settings for the custom domain name. For more information, see [this](https://learn.akamai.com/en-us/webhelp/property-manager/https-delivery-with-property-manager/GUID-9EE0EB6A-E62B-4F5F-9340-60CBD093A429.html). |
74+
|Property hostnames | Add a property hostname. This is the name of your custom domain, for example, `login.domain.com`. <BR> Create or modify a certificate with the appropriate settings for the custom domain name. Learn more about [creating a certificate](https://learn.akamai.com/en-us/webhelp/property-manager/https-delivery-with-property-manager/GUID-9EE0EB6A-E62B-4F5F-9340-60CBD093A429.html). |
7575

76-
3. Set the origin server property configuration settings as:
76+
1. Set the origin server property configuration settings as:
7777

7878
|Property| Value |
7979
|:-----------|:-----------|
@@ -84,27 +84,27 @@ Akamai WAF integration includes the following components:
8484

8585
### Configure DNS
8686

87-
Create a CNAME record in your DNS such as login.domain.com that points to the Edge hostname in the Property hostname field.
87+
Create a CNAME record in your DNS such as `login.domain.com` that points to the Edge hostname in the Property hostname field.
8888

8989
### Configure Akamai WAF
9090

9191
1. [Configure Akamai WAF](https://learn.akamai.com/en-us/webhelp/kona-site-defender/kona-site-defender-quick-start/GUID-6294B96C-AE8B-4D99-8F43-11B886E6C39A.html#GUID-6294B96C-AE8B-4D99-8F43-11B886E6C39A).
9292

93-
2. Ensure that **Rule Actions** for all items listed under the **Attack Group** are set to **Deny**.
93+
1. Ensure that **Rule Actions** for all items listed under the **Attack Group** are set to **Deny**.
9494

95-
![Image shows rule action set to deny](./media/partner-akamai/rule-action-deny.png)
95+
![Image shows rule action set to deny](./media/partner-akamai/rule-action-deny.png)
9696

9797
Learn more about [how the control works and configuration options](https://control.akamai.com/dl/security/GUID-81C0214B-602A-4663-839D-68BCBFF41292.html).
9898

9999
<!-- docutune:ignore "Security Center" -->
100100

101101
### Test the settings
102102

103-
Check the following to ensure all traffic to Azure AD B2C is now going through the custom domain:
103+
Check the following to ensure all traffic to Azure AD B2C is going through the custom domain:
104104

105105
- Make sure all incoming requests to Azure AD B2C custom domain are routed via Akamai WAF and using valid TLS connection.
106106
- Ensure all cookies are set correctly by Azure AD B2C for the custom domain.
107-
- The Akamai WAF dashboard available under Defender for Cloud console display charts for all traffic passing through the WAF along with any attack traffic.
107+
- The Akamai WAF dashboard available under Defender for Cloud console display charts for all traffic that pass through the WAF along with any attack traffic.
108108

109109
## Next steps
110110

0 commit comments

Comments
 (0)