You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory-b2c/partner-akamai.md
+15-15Lines changed: 15 additions & 15 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,7 +1,7 @@
1
1
---
2
-
title: Tutorial to configure Azure Active Directory B2C with Akamai Web Application Firewall
2
+
title: Configure Azure Active Directory B2C with Akamai Web Application Firewall
3
3
titleSuffix: Azure AD B2C
4
-
description: Tutorial to configure Akamai Web application firewall with Azure AD B2C
4
+
description: Configure Akamai Web application firewall with Azure AD B2C
5
5
services: active-directory-b2c
6
6
author: gargi-sinha
7
7
manager: CelesteDG
@@ -10,14 +10,14 @@ ms.reviewer: kengaderdus
10
10
ms.service: active-directory
11
11
ms.workload: identity
12
12
ms.topic: how-to
13
-
ms.date: 07/15/2021
13
+
ms.date: 04/03/2022
14
14
ms.author: gasinh
15
15
ms.subservice: B2C
16
16
---
17
17
18
-
# Tutorial: Configure Akamai with Azure Active Directory B2C
18
+
# Configure Akamai with Azure Active Directory B2C
19
19
20
-
In this sample tutorial, learn how to enable [Akamai Web Application Firewall (WAF)](https://www.akamai.com/us/en/resources/web-application-firewall.jsp) solution for Azure Active Directory (AD) B2C tenant using custom domains. Akamai WAF helps organization protect their web applications from malicious attacks that aim to exploit vulnerabilities such as SQL injection and Cross site scripting.
20
+
In this sample article, learn how to enable [Akamai Web Application Firewall (WAF)](https://www.akamai.com/us/en/resources/web-application-firewall.jsp) solution for Azure Active Directory B2C (Azure AD B2C) tenant using custom domains. Akamai WAF helps organization protect their web applications from malicious attacks that aim to exploit vulnerabilities such as SQL injection and Cross site scripting.
21
21
22
22
>[!NOTE]
23
23
>This feature is in public preview.
@@ -30,7 +30,7 @@ Benefits of using Akamai WAF solution:
30
30
31
31
- Allows fine grained manipulation of traffic to protect and secure your identity infrastructure.
32
32
33
-
This sample tutorial applies to both [Web Application Protector (WAP)](https://www.akamai.com/us/en/products/security/web-application-protector-enterprise-waf-firewall-ddos-protection.jsp) and [Kona Site Defender (KSD)](https://www.akamai.com/us/en/products/security/kona-site-defender.jsp) WAF solutions that Akamai offers.
33
+
This article applies to both [Web Application Protector (WAP)](https://www.akamai.com/us/en/products/security/web-application-protector-enterprise-waf-firewall-ddos-protection.jsp) and [Kona Site Defender (KSD)](https://www.akamai.com/us/en/products/security/kona-site-defender.jsp) WAF solutions that Akamai offers.
34
34
35
35
## Prerequisites
36
36
@@ -56,7 +56,7 @@ Akamai WAF integration includes the following components:
56
56
57
57
1. To use custom domains in Azure AD B2C, it's required to use custom domain feature provided by Azure Front Door. Learn how to [enable Azure AD B2C custom domains](./custom-domain.md?pivots=b2c-user-flow).
58
58
59
-
2. After custom domain for Azure AD B2C is successfully configured using Azure Front Door, [test the custom domain](./custom-domain.md?pivots=b2c-custom-policy#test-your-custom-domain) before proceeding further.
59
+
1. After custom domain for Azure AD B2C is successfully configured using Azure Front Door, [test the custom domain](./custom-domain.md?pivots=b2c-custom-policy#test-your-custom-domain) before proceeding further.
60
60
61
61
## Onboard with Akamai
62
62
@@ -66,14 +66,14 @@ Akamai WAF integration includes the following components:
66
66
67
67
1.[Create a new property](https://control.akamai.com/wh/CUSTOMER/AKAMAI/en-US/WEBHELP/property-manager/property-manager-help/GUID-14BB87F2-282F-4C4A-8043-B422344884E6.html).
68
68
69
-
2. Configure the property settings as:
69
+
1. Configure the property settings as:
70
70
71
71
| Property | Value |
72
72
|:---------------|:---------------|
73
73
|Property version | Select Standard or Enhanced TLS (preferred) |
74
-
|Property hostnames | Add a property hostname. This is the name of your custom domain, for example: login.domain.com. <BR> Create or modify a certificate with the appropriate settings for the custom domain name. For more information, see [this](https://learn.akamai.com/en-us/webhelp/property-manager/https-delivery-with-property-manager/GUID-9EE0EB6A-E62B-4F5F-9340-60CBD093A429.html). |
74
+
|Property hostnames | Add a property hostname. This is the name of your custom domain, for example, `login.domain.com`. <BR> Create or modify a certificate with the appropriate settings for the custom domain name. Learn more about [creating a certificate](https://learn.akamai.com/en-us/webhelp/property-manager/https-delivery-with-property-manager/GUID-9EE0EB6A-E62B-4F5F-9340-60CBD093A429.html). |
75
75
76
-
3. Set the origin server property configuration settings as:
76
+
1. Set the origin server property configuration settings as:
77
77
78
78
|Property| Value |
79
79
|:-----------|:-----------|
@@ -84,27 +84,27 @@ Akamai WAF integration includes the following components:
84
84
85
85
### Configure DNS
86
86
87
-
Create a CNAME record in your DNS such as login.domain.com that points to the Edge hostname in the Property hostname field.
87
+
Create a CNAME record in your DNS such as `login.domain.com` that points to the Edge hostname in the Property hostname field.
2. Ensure that **Rule Actions** for all items listed under the **Attack Group** are set to **Deny**.
93
+
1. Ensure that **Rule Actions** for all items listed under the **Attack Group** are set to **Deny**.
94
94
95
-

95
+

96
96
97
97
Learn more about [how the control works and configuration options](https://control.akamai.com/dl/security/GUID-81C0214B-602A-4663-839D-68BCBFF41292.html).
98
98
99
99
<!-- docutune:ignore "Security Center" -->
100
100
101
101
### Test the settings
102
102
103
-
Check the following to ensure all traffic to Azure AD B2C is now going through the custom domain:
103
+
Check the following to ensure all traffic to Azure AD B2C is going through the custom domain:
104
104
105
105
- Make sure all incoming requests to Azure AD B2C custom domain are routed via Akamai WAF and using valid TLS connection.
106
106
- Ensure all cookies are set correctly by Azure AD B2C for the custom domain.
107
-
- The Akamai WAF dashboard available under Defender for Cloud console display charts for all traffic passing through the WAF along with any attack traffic.
107
+
- The Akamai WAF dashboard available under Defender for Cloud console display charts for all traffic that pass through the WAF along with any attack traffic.
0 commit comments