Skip to content

Commit 501f622

Browse files
authored
Merge pull request #225171 from MicrosoftDocs/main
Merge main to live, 4 AM
2 parents 9288c34 + 3faee72 commit 501f622

File tree

128 files changed

+901
-508
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

128 files changed

+901
-508
lines changed

.openpublishing.redirection.healthcare-apis.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -586,7 +586,11 @@
586586
"redirect_document_id": false
587587
},
588588
{ "source_path_from_root": "/articles/healthcare-apis/iot/iot-data-flow.md",
589-
"redirect_url": "/azure/healthcare-apis/iot/data-flow",
589+
"redirect_url": "/azure/healthcare-apis/iot/understand-service",
590+
"redirect_document_id": false
591+
},
592+
{ "source_path_from_root": "/articles/healthcare-apis/iot/data-flow.md",
593+
"redirect_url": "/azure/healthcare-apis/iot/understand-service",
590594
"redirect_document_id": false
591595
},
592596
{ "source_path_from_root": "/articles/healthcare-apis/iot/how-to-use-device-mappings.md",

articles/active-directory-b2c/TOC.yml

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -541,6 +541,8 @@
541541
href: partner-datawiza.md
542542
- name: F5
543543
href: partner-f5.md
544+
- name: Grit
545+
href: partner-grit-app-proxy.md
544546
- name: Ping Identity
545547
href: partner-ping-identity.md
546548
- name: Strata
@@ -572,6 +574,8 @@
572574
items:
573575
- name: Grit IEF editor
574576
href: partner-grit-editor.md
577+
- name: Grit biometric authentication
578+
href: partner-grit-authentication.md
575579
# Automate
576580
- name: Automate
577581
items:
89.4 KB
Loading
93.3 KB
Loading

articles/active-directory-b2c/partner-gallery.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: CelesteDG
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: how-to
12-
ms.date: 09/14/2022
12+
ms.date: 1/25/2023
1313
ms.author: kengaderdus
1414
ms.subservice: B2C
1515
---
@@ -79,6 +79,7 @@ Microsoft partners with the following ISVs to provide secure hybrid access to on
7979
| ![Screenshot of an Akamai logo.](./media/partner-gallery/akamai-logo.png) | [Akamai](./partner-akamai-secure-hybrid-access.md) provides a Zero Trust Network Access (ZTNA) solution that enables secure remote access to modern and legacy applications that reside in private datacenters. |
8080
| ![Screenshot of a Datawiza logo](./media/partner-gallery/datawiza-logo.png) | [Datawiza](./partner-datawiza.md) enables SSO and granular access control for your applications and extends Azure AD B2C to protect on-premises legacy applications. |
8181
| ![Screenshot of a F5 logo](./media/partner-gallery/f5-logo.png) | [F5](./partner-f5.md) enables legacy applications to securely expose to the internet through BIG-IP security combined with Azure AD B2C pre-authentication, Conditional Access (CA) and SSO. |
82+
| ![Screenshot of a Grit logo](./media/partner-gallery/grit-logo.png) | [Grit's app proxy](./partner-grit-app-proxy.md) enables migrating a legacy application using header-based authentication to Azure AD B2C with no application code change. |
8283
| ![Screenshot of a Ping logo](./media/partner-gallery/ping-logo.png) | [Ping Identity](./partner-ping-identity.md) enables secure hybrid access to on-premises legacy applications across multiple clouds. |
8384
| ![Screenshot of a strata logo](./media/partner-gallery/strata-logo.png) | [Strata](./partner-strata.md) provides secure hybrid access to on-premises applications by enforcing consistent access policies, keeping identities in sync, and making it simple to transition applications from legacy identity systems to standards-based authentication and access control provided by Azure AD B2C. |
8485
| ![Screenshot of a zscaler logo](./media/partner-gallery/zscaler-logo.png) | [Zscaler](./partner-zscaler.md) delivers policy-based, secure access to private applications and assets without the cost, hassle, or security risks of a VPN. |
@@ -110,6 +111,7 @@ Microsoft partners with the following ISVs for tools that can help with implemen
110111
| ISV partner | Description and integration walkthroughs |
111112
|:-------------------------|:--------------|
112113
| ![Screenshot of a grit ief editor logo.](./media/partner-gallery/grit-logo.png) | [Grit Visual Identity Experience Framework Editor](./partner-grit-editor.md) provides a low code/no code experience for developers to create sophisticated authentication user journeys. The tool comes with integrated debugger and templates for the most used scenarios.|
114+
| ![Screenshot of a grit biometric authentication logo.](./media/partner-gallery/grit-logo.png) | [Grit biometric authentication](./partner-grit-authentication.md) provides users the option to sign in using finger print, face ID or [Windows Hello](https://support.microsoft.com/windows/learn-about-windows-hello-and-set-it-up-dae28983-8242-bb2a-d3d1-87c9d265a5f0) for enhanced security.
113115

114116
## Additional information
115117

Lines changed: 129 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,129 @@
1+
---
2+
title: Migrate applications to Azure AD B2C with Grit's app proxy
3+
titleSuffix: Azure AD B2C
4+
description: Learn how Grit's app proxy can migrate your applications to Azure AD B2C with no code change
5+
services: active-directory-b2c
6+
author: gargi-sinha
7+
manager: martinco
8+
ms.service: active-directory
9+
ms.workload: identity
10+
ms.topic: how-to
11+
ms.date: 1/25/2023
12+
ms.author: gasinh
13+
ms.reviewer: kengaderdus
14+
ms.subservice: B2C
15+
---
16+
17+
# Migrate applications using header-based authentication to Azure Active Directory B2C with Grit's app proxy
18+
19+
In this sample tutorial, learn how to migrate a legacy application using header-based authentication to Azure Active Directory B2C (Azure AD B2C) with [Grit's app proxy](https://www.gritiam.com/appProxy.html).
20+
21+
Benefits of using Grit's app proxy are as follows:
22+
23+
- No application code change and easy deployment resulting in faster ROI
24+
25+
- Enables users to use modern authentication experiences such as Multi-Factor authentication, biometrics, and password-less resulting in enhanced security.
26+
27+
- Significant savings on the license cost of the legacy authentication solution
28+
29+
## Prerequisites
30+
31+
To get started, you'll need:
32+
33+
- License to Grit’s app proxy. Contact [Grit support](mailto:[email protected]) for license details. For this tutorial, you don't need a license.
34+
35+
- An Azure subscription. If you don't have one, get a [free account](https://azure.microsoft.com/free/).
36+
37+
- An [Azure AD B2C tenant](tutorial-create-tenant.md) that is linked to your Azure subscription.
38+
39+
## Scenario description
40+
41+
Grit integration includes the following components:
42+
43+
- **Azure AD B2C**: The authorization server to verify user credentials - Authenticated users access on-premises applications using a local account stored in the Azure AD B2C directory.
44+
45+
- **Grit app proxy**: The service that passes identity to applications through HTTP headers.
46+
47+
- **Web application**: The legacy application to which user requests access.
48+
49+
The following architecture diagram shows the implementation.
50+
51+
![Screenshot shows the architecture diagram of the implementation.](./media/partner-grit-app-proxy/grit-app-proxy-architecture.png)
52+
53+
1. The user requests access to an on-premises application.
54+
55+
2. Grit app proxy receives the request through [Azure Web Application Firewall (WAF)](https://azure.microsoft.com/products/web-application-firewall/) and sends it to the application.
56+
57+
3. Grit app proxy checks user authentication state. With no session token, or an invalid token, the user goes to Azure AD B2C for authentication.
58+
59+
4. Azure AD B2C sends the user request to the endpoint specified during Grit app proxy registration in the Azure AD B2C tenant.
60+
61+
4. Grit app proxy evaluates access policies and calculates attribute values in HTTP headers forwarded to the application. Grit app proxy sets the header values and sends the request to the application.
62+
63+
5. The user is authenticated with access granted/denied to the application.
64+
65+
## Onboard with Grit app proxy
66+
67+
Contact [Grit support](mailto:[email protected]) for details to get onboarded.
68+
69+
### Configure Grit's app proxy solution with Azure AD B2C
70+
71+
For this tutorial, Grit already has a backend application and an Azure AD B2C policy. This tutorial will be about configuring the proxy to access the backend application.
72+
73+
You can use the UX to configure each page of the backend application for security. You can configure the type of auth required by each page and the header values needed.
74+
75+
If the users need to be denied permission to certain pages based on group membership or some other criteria, it's handled by the auth user journey.
76+
77+
1. Navigate to https://proxyeditor.z13.web.core.windows.net/.
78+
79+
2. Once the dropdown appears, select the dropdown, and select **Create New**.
80+
81+
3. Enter a name for the page that contains only letters and numbers.
82+
83+
4. Enter **B2C_1A_SIGNUP_SIGNIN** into the B2C Policy box.
84+
85+
5. Select **GET** at the HTTP method.
86+
87+
6. Enter 'https://anj-grit-legacy-backend.azurewebsites.net/Home/Page' into the endpoint field and that would be the endpoint to your legacy application.
88+
89+
>[!NOTE]
90+
>This demo is publicly available, values you enter will be visible to public. Don't configure a secure application with this demo.
91+
92+
![Screenshot shows the proxy configuration UI.](./media/partner-grit-app-proxy/proxy-configuration.png)
93+
94+
7. Select **ADD HEADER**.
95+
96+
8. Enter **x-iss** in the destination header field to configure the valid HTTP header that must be sent to the application.
97+
98+
9. Enter **given_name** into the Value field that is the name of a claim in the B2C policy. The value of the claim will be passed into the header.
99+
100+
10. Select **Token** as the source.
101+
102+
11. Select **SAVE SETTINGS**.
103+
104+
12. Select the link in the popup. It will take you to a sign-in page. Select the sign-up link and enter the required information. Once you complete the sign-up process, you'll be redirected to the legacy application. The application displays the name you provided in the **Given name** field during sign-up.
105+
106+
## Test the flow
107+
108+
1. Navigate to the on-premises application URL.
109+
110+
2. The Grit app proxy redirects to the page you configured in your user flow.
111+
From the list, select the IdP.
112+
113+
3. At the prompt, enter your credentials. If necessary, include an Azure AD Multi-Factor authentication (MFA) token.
114+
115+
4. You're redirected to Azure AD B2C, which forwards the application request to the Grit's app proxy redirect URI.
116+
117+
5. The Grit's app proxy evaluates policies, calculates headers, and sends the user to the upstream application.
118+
119+
6. The requested application appears.
120+
121+
## Additional resources
122+
123+
- [Grit app proxy documentation](https://www.gritiam.com/appProxy.html)
124+
125+
- [Configure the Grit IAM B2B2C solution with Azure AD B2C](partner-grit-iam.md)
126+
127+
- [Edit Azure AD B2C Identity Experience Framework (IEF) XML with Grit Visual IEF Editor](partner-grit-editor.md)
128+
129+
- [Configure Grit biometric authentication with Azure AD B2C](partner-grit-authentication.md)
Lines changed: 99 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,99 @@
1+
---
2+
title: Configure Grit's biometric authentication with Azure Active Directory B2C
3+
titleSuffix: Azure AD B2C
4+
description: Learn how Grit's biometric authentication with Azure AD B2C secures your account
5+
services: active-directory-b2c
6+
author: gargi-sinha
7+
manager: martinco
8+
ms.service: active-directory
9+
ms.workload: identity
10+
ms.topic: how-to
11+
ms.date: 1/25/2023
12+
ms.author: gasinh
13+
ms.reviewer: kengaderdus
14+
ms.subservice: B2C
15+
---
16+
17+
# Configure Grit's biometric authentication with Azure Active Directory B2C
18+
19+
In this sample tutorial, learn how to integrate [Grit's](https://www.gritiam.com) Biometric authentication with Azure Active Directory B2C (Azure AD B2C). Biometric authentication provides users the option to sign in using finger print, face ID or [Windows Hello](https://support.microsoft.com/windows/learn-about-windows-hello-and-set-it-up-dae28983-8242-bb2a-d3d1-87c9d265a5f0). It works both on desktop and mobile applications, provided the device is capable of doing biometric authentication.
20+
21+
Biometric authentication has the following benefits:
22+
23+
1. For users who sign in infrequently or forget passwords often resulting in frequent password resets, biometric authentication reduces friction.
24+
25+
2. Compared to Multi-factor authentication (MFA), biometric authentication is cheaper and more secure.
26+
27+
3. Improved security prevents phishing attack for high valued customers.
28+
29+
4. Adds an additional layer of authentication before the user performs a high value operation like credit card transaction.
30+
31+
## Prerequisites
32+
33+
To get started, you'll need:
34+
35+
- License to [Grit's Visual IEF builder](https://www.gritiefedit.com/). Contact [Grit support](mailto:[email protected]) for licensing details. For this tutorial you don't need a license.
36+
37+
- An Azure subscription. If you don't have one, get a [free account](https://azure.microsoft.com/free/).
38+
39+
- An [Azure AD B2C tenant](tutorial-create-tenant.md) that is linked to your Azure subscription.
40+
41+
## Scenario description
42+
43+
In this tutorial, we'll cover the following scenario:
44+
45+
The end user creates an account with username and password (and MFA if needed). If their device supports biometric, they're enrolled in biometrics, and their account is linked to the biometric authentication of the device. Any future logins in that device, unless the user chooses not to, will happen through biometrics.
46+
47+
The user can link multiple devices to the same account. User will have to sign in through their email/password (and MFA if needed), they'll then be presented with an option to link a new device.
48+
49+
For example, user has an account with Contoso. User accesses the account from the computer at work that supports Windows Hello. User also accesses the account from the home computer that doesn't support Windows Hello and an Android phone.
50+
51+
1. After logging in with the work computer, user will be presented with an option to enroll in Windows Hello. If user chooses to do so, any future logins will happen through Windows Hello.
52+
53+
1. After logging in with the home computer, user won't be prompted to enroll in biometrics as the device doesn't support biometrics.
54+
55+
1. After logging in with the Android phone, user will be asked to enroll in biometrics. Any future logins will happen through biometrics.
56+
57+
Using Grit's visual flow chart multiple other scenarios can be implemented. Contact [Grit support](mailto:[email protected]) to discuss your scenarios.
58+
59+
## Onboard with Grit's biometric authentication
60+
61+
Contact [Grit support](mailto:[email protected]) for details to get onboarded.
62+
63+
### Configure Grit's biometric authentication with Azure AD B2C
64+
65+
1. Navigate to <https://www.gritiefedit.com> and enter your email if you're asked for it.
66+
67+
1. Press cancel in the quick start wizard.
68+
69+
1. In the pop-up, select **Customize User Journey**. Under Bio Metric, select the checkbox for **Enable Biometric**.
70+
71+
1. Scroll down and select **Generate template**, a flow chart appears.
72+
73+
1. From the left menu, select **Run Flowcharts** > **Deploy flow charts**.
74+
75+
1. If your device supports Windows Hello or biometric authenticator,
76+
select **Test Authentication Journey Builder** link, otherwise send
77+
the link to a device that supports biometric authentication.
78+
79+
1. A web page will open on a new tab. Under **Sign in with your social account**, select **createNewAccount**.
80+
81+
1. Go through the steps to create an account. When asked for **Setup Biometric Device sign in**, select **yes**.
82+
83+
1. Steps to perform the biometric depends on the device you are in.
84+
85+
1. A page appears that displays the token. Open the provided link.
86+
87+
1. This time the sign-in will happen through biometrics.
88+
89+
Repeat the same steps for another device. No need to sign up again, use the credentials created to sign in.
90+
91+
## Additional resources
92+
93+
- [Grit documentation](https://app.archbee.com/public/PREVIEW-ddjwV0RI2eVfcBOylxFGI/PREVIEW-bjH2arQd1Kn4le6z_zH84)
94+
95+
- [Configure the Grit IAM B2B2C solution with Azure AD B2C](partner-grit-iam.md)
96+
97+
- [Edit Azure AD B2C Identity Experience Framework (IEF) XML with Grit Visual IEF Editor](partner-grit-editor.md)
98+
99+
- [Migrate legacy apps to Azure AD B2C with Grit's app proxy](partner-grit-app-proxy.md)
51.6 KB
Loading

articles/active-directory/app-provisioning/user-provisioning-sync-attributes-for-mapping.md

Lines changed: 20 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,8 @@ Adding missing attributes needed for an application will start in either on-prem
2323

2424
First, identify which users in your Azure AD tenant will need access to the application and therefore are going to be in scope of being provisioned into the application.
2525

26-
If any of those users originate in on-premises Active Directory, then you must sync the attributes with the users from Active Directory to Azure AD. You will need to perform the following tasks before configuring provisioning to your application.
26+
>[!NOTE]
27+
> For users in on-premises Active Directory, you must sync the users to Azure AD. You can sync users and attributes using [Azure AD Connect](../hybrid/whatis-azure-ad-connect.md) or [Azure AD Connect cloud sync](../cloud-sync/what-is-cloud-sync.md). Both of these solutions automatically synchronizes certain attributes to Azure AD, but not all attributes. Furthermore, some attributes (such as SAMAccountName) that are synchronized by default might not be exposed using the Graph API. In these cases, you can [use the Azure AD Connect directory extension feature to synchronize the attribute to Azure AD](#create-an-extension-attribute-using-azure-ad-connect) or [use Azure AD Connect cloud sync](#create-an-extension-attribute-using-cloud-sync). That way, the attribute will be visible to the Graph API and the Azure AD provisioning service.
2728
2829
1. Check with the on-premises Active Directory domain admins whether the required attributes are part of the AD DS schema, and if they are not, extend the AD DS schema in the domains where those users have accounts.
2930
1. Configure [Azure AD Connect](../hybrid/whatis-azure-ad-connect.md) or Azure AD Connect cloud sync to synchronize the users with their extension attribute from Active Directory to Azure AD. Azure AD Connect automatically synchronizes certain attributes to Azure AD, but not all attributes. Furthermore, some attributes (such as `sAMAccountName`) that are synchronized by default might not be exposed using the Graph API. In these cases, you can [use the Azure AD Connect directory extension feature to synchronize the attribute to Azure AD](#create-an-extension-attribute-using-azure-ad-connect). That way, the attribute will be visible to the Graph API and the Azure AD provisioning service.
@@ -113,6 +114,24 @@ Set-AzureADUserExtension -objectid 0ccf8df6-62f1-4175-9e55-73da9e742690 -Extensi
113114
Get-AzureADUser -ObjectId 0ccf8df6-62f1-4175-9e55-73da9e742690 | Select -ExpandProperty ExtensionProperty
114115
115116
```
117+
## Create an extension attribute using cloud sync
118+
Cloud sync will automatically discover your extensions in on-premises Active Directory when you go to add a new mapping. Use the steps below to auto-discover these attributes and set up a corresponding mapping to Azure AD.
119+
120+
1. Sign-in to the Azure portal with a hybrid administrator account
121+
2. Select Azure AD Connect
122+
3. Select **Manage Azure AD cloud sync**
123+
4. Select the configuration you wish to add the extension attribute and mapping
124+
5. Under **Manage attributes** select **click to edit mappings**
125+
6. Click **Add attribute mapping**. The attributes will automatically be discovered.
126+
7. The new attributes will be available in the drop-down under **source attribute**.
127+
8. Fill in the type of mapping you want and click **Apply**.
128+
[![Custom attribute mapping](media/user-provisioning-sync-attributes-for-mapping/schema-1.png)](media/user-provisioning-sync-attributes-for-mapping/schema-1.png#lightbox)
129+
130+
For more information, see [Cloud Sync Custom Attribute Mapping](../cloud-sync/custom-attribute-mapping.md)
131+
132+
133+
134+
116135

117136
## Create an extension attribute using Azure AD Connect
118137

0 commit comments

Comments
 (0)