You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory-b2c/partner-datawiza.md
+12-12Lines changed: 12 additions & 12 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -16,7 +16,7 @@ ms.subservice: B2C
16
16
17
17
# Tutorial: Configure Azure Active Directory B2C with Datawiza to provide secure hybrid access
18
18
19
-
In this tutorial, learn how to integrate Azure Active Directory B2C (Azure AD B2C) with [Datawiza Access Broker (DAB)](https://www.datawiza.com/access-broker). DAB enables single sign-on (SSO) and granular access control, helping Azure AD B2C protect on-premises legacy applications. With this solution, enterprises can transition from legacy to Azure AD B2C without rewriting applications.
19
+
In this tutorial, learn how to integrate Azure Active Directory B2C (Azure AD B2C) with [Datawiza Access Proxy (DAP)](https://www.datawiza.com/), which enables single sign-on (SSO) and granular access control, helping Azure AD B2C protect on-premises legacy applications. With this solution, enterprises can transition from legacy to Azure AD B2C without rewriting applications.
20
20
21
21
## Prerequisites
22
22
@@ -29,7 +29,7 @@ To get started, you'll need:
29
29
- Your applications can run on platforms such as virtual machine and bare metal
30
30
- An on-premises application to transition from a legacy identity system, to Azure AD B2C
31
31
- In this tutorial, DAB is deployed on the same server as the application
32
-
- The application runs on localhost: 3001 and DAB proxies traffic to applications via localhost: 9772
32
+
- The application runs on localhost: 3001 and DAP proxies traffic to applications via localhost: 9772
33
33
- The application traffic reaches DAB first and then is proxied to the application
34
34
35
35
## Scenario description
@@ -38,17 +38,17 @@ Datawiza integration includes the following components:
38
38
39
39
-**Azure AD B2C**: The authorization server to verify user credentials
40
40
- Authenticated users access on-premises applications using a local account stored in the Azure AD B2C directory
41
-
-**Datawiza Access Broker (DAB)**: The service that passes identity to applications through HTTP headers
41
+
-**Datawiza Access Proxy (DAP)**: The service that passes identity to applications through HTTP headers
42
42
-**Datawiza Cloud Management Console (DCMC)**: A management console for DAB. DCMC UI and RESTful APIs help manage DAB configurations and access control policies
43
43
44
44
The following architecture diagram shows the implementation.
45
45
46
46

47
47
48
48
1. The user requests access to an on-premises application. DAB proxies the request to the application.
49
-
2.DAB checks user authentication state. With no session token, or an invalid token, the user goes to Azure AD B2C for authentication.
50
-
3. Azure AD B2C sends the user request to the endpoint specified during DAB registration in the Azure AD B2C tenant.
51
-
4. The DAB evaluates access policies and calculates attribute values in HTTP headers forwarded to the application. The DAB might call to the identity provider (IdP) to retrieve information to set the header values. The DAB sets the header values and sends the request to the application.
49
+
2.DAP checks user authentication state. With no session token, or an invalid token, the user goes to Azure AD B2C for authentication.
50
+
3. Azure AD B2C sends the user request to the endpoint specified during DAP registration in the Azure AD B2C tenant.
51
+
4. The DAP evaluates access policies and calculates attribute values in HTTP headers forwarded to the application. The DAP might call to the identity provider (IdP) to retrieve information to set the header values. The DAP sets the header values and sends the request to the application.
52
52
5. The user is authenticated with access to the application.
53
53
54
54
## Onboard with Datawiza
@@ -74,11 +74,11 @@ Go to docs.datawiza.com to:
74
74
75
75
## Run DAB with a header-based application
76
76
77
-
You can use Docker or Kubernetes to run DAB. Use the Docker image for users to create a sample header-based application.
77
+
You can use Docker or Kubernetes to run DAP. Use the Docker image for users to create a sample header-based application.
78
78
79
-
Learn more: To configure DAB and SSO integration, see [Deploy Datawiza Access Proxy With Your App](https://docs.datawiza.com/step-by-step/step3.html)
79
+
Learn more: To configure DAP and SSO integration, see [Deploy Datawiza Access Proxy With Your App](https://docs.datawiza.com/step-by-step/step3.html)
80
80
81
-
A sample docker image `docker-compose.yml file` is provided. Sign in to the container registry to download DAB images and the header-based application.
81
+
A sample docker image `docker-compose.yml file` is provided. Sign in to the container registry to download DAP images and the header-based application.
82
82
83
83
1.[Deploy Datawiza Access Proxy With Your App](https://docs.datawiza.com/step-by-step/step3.html#important-step).
84
84
@@ -114,17 +114,17 @@ A sample docker image `docker-compose.yml file` is provided. Sign in to the cont
114
114
115
115
DAB gets user attributes from IdP and passes them to the application with header or cookie. After you configure user attributes, the green check sign appears for user attributes.
116
116
117
-

117
+

118
118
119
119
Learn more: [Pass User Attributes](https://docs.datawiza.com/step-by-step/step4.html) such as email address, firstname, and lastname to the header-based application.
120
120
121
121
## Test the flow
122
122
123
123
1. Navigate to the on-premises application URL.
124
-
2. The DAB redirects to the page you configured in your user flow.
124
+
2. The DAP redirects to the page you configured in your user flow.
125
125
3. From the list, select the IdP.
126
126
4. At the prompt, enter your credentials. If necessary, include an Azure AD Multi-Factor Authentication (MFA) token.
127
-
5. You're redirected to Azure AD B2C, which forwards the application request to the DAB redirect URI.
127
+
5. You're redirected to Azure AD B2C, which forwards the application request to the DAP redirect URI.
128
128
6. The DAB evaluates policies, calculates headers, and sends the user to the upstream application.
Copy file name to clipboardExpand all lines: articles/active-directory-b2c/partner-ping-identity.md
+11-11Lines changed: 11 additions & 11 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -9,7 +9,7 @@ ms.reviewer: kengaderdus
9
9
ms.service: active-directory
10
10
ms.workload: identity
11
11
ms.topic: how-to
12
-
ms.date: 12/9/2022
12
+
ms.date: 01/20/2023
13
13
ms.author: gasinh
14
14
ms.subservice: B2C
15
15
---
@@ -22,7 +22,7 @@ Many e-commerce sites and web applications exposed to the internet are deployed
22
22
23
23
Generally, configurations include an authentication translation layer that externalizes the authentication from the web application. Reverse proxies provide the authenticated user context to the web applications, such as a header value in clear or digest form. The applications aren't using industry standard tokens such as Security Assertion Markup Language (SAML), OAuth, or Open ID Connect (OIDC). Instead, the proxy provides authentication context and maintains the session with the end-user agent such as browser or native application. As a service running as a man-in-the-middle, proxies provide significant session control. The proxy service is efficient and scalable, not a bottleneck for applications behind the proxy service. The diagram is a reverse-proxy implementation and communications flow.

26
26
27
27
## Modernization
28
28
@@ -45,7 +45,7 @@ Proxies support the modern authentication protocols and use the redirect-based (
45
45
In Azure AD B2C, you define policies that drive user experiences and behaviors, also called user journeys. Each such policy exposes a protocol endpoint that can perform the authentication as an IdP. On the application side, there's no special handling required for certain policies. An application makes a standard authentication request to the protocol-specific authentication endpoint exposed by a policy.
46
46
You can configure Azure AD B2C to share the same issuer across policies or unique issuer for each policy. Each application can point to policies by making a protocol-native authentication request, which drives user behaviors such as sign-in, sign-up, and profile edits. The diagram shows OIDC and SAML application workflows.
47
47
48
-

48
+

49
49
50
50
The scenario can be challenging for the legacy applications to redirect the user accurately. The access request to the applications might not include the user experience context. In most cases, the proxy layer, or an integrated agent on the web application, intercepts the access request.
51
51
@@ -55,27 +55,27 @@ You can deploy PingAccess as the reverse proxy. PingAccess intercepts a direct r
55
55
56
56
Configure PingAccess with OIDC, OAuth2, or SAML for authentication with an upstream authentication provider. You can configure an upstream IdP for this purpose on the PingAccess server. See the following diagram.
57
57
58
-

58
+

59
59
60
60
In a typical Azure AD B2C deployment with policies exposing IdPs, there's a challenge. PingAccess is configured with one, upstream IdP.
61
61
62
62
### PingFederate federation proxy
63
63
64
-
You can configure PingFederate as an authentication provider, or a proxy. for upstream IdPs. See the following diagram.
64
+
You can configure PingFederate as an authentication provider, or a proxy, for upstream IdPs. See the following diagram.

67
67
68
68
Use this function to contextually, dynamically, or declaratively switch an inbound request to an Azure AD B2C policy. See the following diagram of protocol sequence flow.
69
69
70
-

70
+

71
71
72
72
## Prerequisites
73
73
74
74
To get started, you'll need:
75
75
76
76
- An Azure subscription
77
77
- If you don't have one, get an [Azure free account](https://azure.microsoft.com/free/)
78
-
- An [Azure AD B2C tenant](/tutorial-create-tenant.md) linked to your Azure subscription
78
+
- An [Azure AD B2C tenant](tutorial-create-tenant.md) linked to your Azure subscription
79
79
- PingAccess and PingFederate deployed in Docker containers or on Azure virtual machines (VMs)
80
80
81
81
## Connectivity and communication
@@ -93,15 +93,15 @@ Confirm the following connectivity and communication.
93
93
94
94
You can use basic user flows or advanced Identity Enterprise Framework (IEF) policies. PingAccess generates the metadata endpoint, based on the issuer value, by using the [WebFinger](https://tools.ietf.org/html/rfc7033) protocol for discovery convention. To follow this convention, update the Azure AD B2C issuer using user-flow policy properties.
95
95
96
-

96
+

97
97
98
98
In the advanced policies, configuration includes the IssuanceClaimPattern metadata element to AuthorityWithTfp value in the [JWT token issuer technical profile](./jwt-issuer-technical-profile.md).
99
99
100
100
## Configure PingAccess and PingFederate
101
101
102
102
Use the instructions in the following sections to configure PingAccess and PingFederate. See the following diagram of the overall integration user flow.
103
103
104
-

104
+

105
105
106
106
### Configure PingFederate as the token provider
107
107
@@ -116,7 +116,7 @@ Use the following instructions to create a PingAccess application for the target
116
116
#### Create a virtual host
117
117
118
118
>[!IMPORTANT]
119
-
>Create a virtual host for every application. For more information, see [What can I configure with PingAccess?]([https://docs.pingidentity.com/bundle/pingaccess-43/page/reference/pa_c_KeyConsiderations.html](https://docs.pingidentity.com/bundle/pingaccess-71/page/kkj1564006722708.html).
119
+
>Create a virtual host for every application. For more information, see [What can I configure with PingAccess?]([https://docs.pingidentity.com/bundle/pingaccess-43/page/reference/pa_c_KeyConsiderations.html].
> | mobileNetworks | No | No | Yes<br><br>[Move your private mobile network resources to a different region](../../private-5g-core/region-move-private-mobile-network-resources.md)|
1258
+
> | mobileNetworks / dataNetworks | No | No | Yes<br><br>[Move your private mobile network resources to a different region](../../private-5g-core/region-move-private-mobile-network-resources.md)|
1259
+
> | mobileNetworks / simPolicies | No | No | Yes<br><br>[Move your private mobile network resources to a different region](../../private-5g-core/region-move-private-mobile-network-resources.md)|
1260
+
> | mobileNetworks / sites | No | No | Yes<br><br>[Move your private mobile network resources to a different region](../../private-5g-core/region-move-private-mobile-network-resources.md)|
1261
+
> | mobileNetworks / slices | No | No | Yes<br><br>[Move your private mobile network resources to a different region](../../private-5g-core/region-move-private-mobile-network-resources.md)|
1262
+
> | packetCoreControlPlanes | No | No | Yes<br><br>[Move your private mobile network resources to a different region](../../private-5g-core/region-move-private-mobile-network-resources.md)|
1263
+
> | packetCoreControlPlanes / packetCoreDataPlanes | No | No | Yes<br><br>[Move your private mobile network resources to a different region](../../private-5g-core/region-move-private-mobile-network-resources.md)|
1264
+
> | packetCoreControlPlanes / packetCoreDataPlanes / attachedDataNetworks | No | No | Yes<br><br>[Move your private mobile network resources to a different region](../../private-5g-core/region-move-private-mobile-network-resources.md)|
1265
+
> | sims | No | No | Yes<br><br>[Move your private mobile network resources to a different region](../../private-5g-core/region-move-private-mobile-network-resources.md)|
1266
+
> | simGroups | No | No | Yes<br><br>[Move your private mobile network resources to a different region](../../private-5g-core/region-move-private-mobile-network-resources.md)|
1267
+
> | simGroups / sims | No | No | Yes<br><br>[Move your private mobile network resources to a different region](../../private-5g-core/region-move-private-mobile-network-resources.md)|
1268
+
> | packetCoreControlPlaneVersions | No | No | Yes<br><br>[Move your private mobile network resources to a different region](../../private-5g-core/region-move-private-mobile-network-resources.md)|
0 commit comments