You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory-b2c/partner-f5.md
+12-13Lines changed: 12 additions & 13 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,15 +2,14 @@
2
2
title: Tutorial to configure Azure Active Directory B2C with F5 BIG-IP
3
3
titleSuffix: Azure AD B2C
4
4
description: Learn how to integrate Azure AD B2C authentication with F5 BIG-IP for secure hybrid access
5
-
services: active-directory-b2c
6
5
author: gargi-sinha
6
+
ms.author: gasinh
7
7
manager: martinco
8
8
ms.service: active-directory
9
+
ms.subservice: B2C
9
10
ms.workload: identity
10
11
ms.topic: how-to
11
12
ms.date: 10/15/2021
12
-
ms.author: gasinh
13
-
ms.subservice: B2C
14
13
---
15
14
16
15
# Tutorial: Extend Azure Active Directory B2C to protect on-premises applications using F5 BIG-IP
@@ -26,9 +25,9 @@ It provides an abundance of features including application-level inspection and
26
25
27
26
To get started, you'll need:
28
27
29
-
- An [Azure AD B2C tenant](https://docs.microsoft.com/azure/active-directory-b2c/tutorial-create-tenant) linked to your Azure subscription
28
+
- An [Azure AD B2C tenant](tutorial-create-tenant.md) linked to your Azure subscription
30
29
31
-
- An existing BIG-IP or deploy a trial [BIG-IP Virtual Environment (VE) on Azure](https://docs.microsoft.com/azure/active-directory/manage-apps/f5-bigip-deployment-guide)
30
+
- An existing BIG-IP or deploy a trial [BIG-IP Virtual Environment (VE) on Azure](../active-directory/manage-apps/f5-bigip-deployment-guide.md)
32
31
33
32
- Any of the following F5 BIG-IP license SKUs
34
33
@@ -40,9 +39,9 @@ To get started, you'll need:
40
39
41
40
- 90-day BIG-IP full feature [trial license](https://www.f5.com/trial/big-ip-trial.php)
42
41
43
-
- An existing header-based web application or [setup an IIS app](https://docs.microsoft.com/previous-versions/iis/6.0-sdk/ms525396(v=vs.90)) for testing
42
+
- An existing header-based web application or [setup an IIS app](/previous-versions/iis/6.0-sdk/ms525396(v=vs.90)) for testing
44
43
45
-
-[SSL certificate](https://docs.microsoft.com/azure/active-directory/manage-apps/f5-bigip-deployment-guide#ssl-profile) for publishing services over HTTPS or use default while testing.
44
+
-[SSL certificate](../active-directory/manage-apps/f5-bigip-deployment-guide.md#ssl-profile) for publishing services over HTTPS or use default while testing.
46
45
47
46
## Scenario description
48
47
@@ -81,7 +80,7 @@ For increased security, organizations using this pattern could also consider blo
81
80
82
81
## Azure AD B2C Configuration
83
82
84
-
Enabling a BIG-IP with Azure AD B2C authentication requires an Azure AD B2C tenant with a suitable user flow or custom policy. [Set up an Azure AD B2C user flow](https://docs.microsoft.com/azure/active-directory-b2c/tutorial-create-user-flows).
83
+
Enabling a BIG-IP with Azure AD B2C authentication requires an Azure AD B2C tenant with a suitable user flow or custom policy. [Set up an Azure AD B2C user flow](tutorial-create-user-flows.md).
85
84
86
85
### Create custom attributes
87
86
@@ -108,7 +107,7 @@ displays them all.
108
107
109
108
4. Select **Application claims** and add both custom attributes plus also the **Display Name**. These are the attributes that will be sent to the BIG-IP.
110
109
111
-
You can use the [Run user flow](https://docs.microsoft.com/azure/active-directory-b2c/tutorial-create-user-flows) feature
110
+
You can use the [Run user flow](tutorial-create-user-flows.md) feature
112
111
in the user flow menu on the left navigation bar to verify it prompts for all defined attributes.
113
112
114
113
### Azure AD B2C federation
@@ -132,7 +131,7 @@ federating, so the BIG-IP must be registered in the Azure AD B2C tenant as an OI
132
131
133
132
8. Note down the client secret, you'll need this later for configuring the BIG-IP.
134
133
135
-
The redirect URI is the BIG-IP endpoint to which a user is sent back to by the authorization server - Azure AD B2C, after authenticating. [Register an application](https://docs.microsoft.com/azure/active-directory-b2c/tutorial-register-applications) for Azure AD B2C.
134
+
The redirect URI is the BIG-IP endpoint to which a user is sent back to by the authorization server - Azure AD B2C, after authenticating. [Register an application](tutorial-register-applications.md) for Azure AD B2C.
136
135
137
136
## BIG-IP configuration
138
137
@@ -328,7 +327,7 @@ Here, we'll configure Azure AD B2C as the OAuth2 IdP. You’ll notice that the G
328
327
## Related information
329
328
330
329
The last step provides an overview of configurations. Hitting Deploy will commit your settings and create all necessary BIG-IP and APM objects to enable secure hybrid access to the application.
331
-
The application should also be visible as a target resource in CA. See the [guidance for building CA policies for Azure AD B2C](https://docs.microsoft.com/azure/active-directory-b2c/conditional-access-identity-protection-overview).
330
+
The application should also be visible as a target resource in CA. See the [guidance for building CA policies for Azure AD B2C](conditional-access-identity-protection-overview.md).
332
331
For increased security, organizations using this pattern could also consider blocking all direct access to the application, thereby forcing a strict path through the BIG-IP.
333
332
334
333
## Next steps
@@ -345,14 +344,14 @@ You will then be redirected to sign up and authenticate against your Azure AD B2
345
344
346
345
**Single Log-Out (SLO)**
347
346
348
-
Azure AD B2C fully supports IdP and application sign out through various [mechanisms](https://docs.microsoft.com/azure/active-directory-b2c/session-behavior?pivots=b2c-custom-policy#single-sign-out).
347
+
Azure AD B2C fully supports IdP and application sign out through various [mechanisms](session-behavior.md?pivots=b2c-custom-policy#single-sign-out).
349
348
Having your application’s sign-out function call the Azure AD B2C log-out endpoint would be one way of achieving SLO. That way we can be sure Azure AD B2C issues a final redirect to the BIG-IP to ensure the APM session between the user and the application has also been terminated.
350
349
Another alternative is to have the BIG-IP listen for the request when selecting the applications sign out button, and upon detecting the request it makes a simultaneous call to the Azure AD B2C logoff endpoint. This approach would avoid having to make any changes to the application itself yet achieves SLO. More details on using BIG-IP iRules to implement this are [available](https://support.f5.com/csp/article/K42052145).
351
350
In either case your Azure AD B2C tenant would need to know the APM’s logout endpoint.
352
351
353
352
1. Navigate to **Manage** > **Manifest** in your Azure AD B2C portal and locate the logoutUrl property. It should read null.
354
353
355
-
2. Add the APM’s post logout URI: https://<mysite.com>/my.logout.php3, where <mysite.com> is the BIG-IP FQDN for your own header-based application.
354
+
2. Add the APM’s post logout URI: `https://<mysite.com>/my.logout.php3`, where `<mysite.com>` is the BIG-IP FQDN for your own header-based application.
Copy file name to clipboardExpand all lines: articles/active-directory/external-identities/one-time-passcode.md
+53-1Lines changed: 53 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -7,7 +7,7 @@ services: active-directory
7
7
ms.service: active-directory
8
8
ms.subservice: B2B
9
9
ms.topic: how-to
10
-
ms.date: 10/13/2021
10
+
ms.date: 10/15/2021
11
11
12
12
ms.author: mimart
13
13
author: msmimart
@@ -148,3 +148,55 @@ To enable the email one-time passcode feature in Azure US Government cloud:
148
148
5. Select **Save**.
149
149
150
150
For more information about current limitations, see [Azure US Government clouds](current-limitations.md#azure-us-government-clouds).
151
+
152
+
## Frequently asked questions
153
+
154
+
**Why do I still see “Automatically enable email one-time passcode for guests starting October 2021” selected in my email one-time passcode settings?**
155
+
156
+
Due to our deployment schedules, we will start rolling out the change to enable email one-time passcode by default globally on November 1, 2021. Until then, you might still see “Automatically enable email one-time passcode for guests starting October 2021” selected in my email one-time passcode settings.
157
+
158
+
**What is the user experience for guests during global rollout?**
159
+
160
+
During global rollout, the user experience for guests depends on your email one-time passcode configuration and your guest's scenario.
161
+
162
+
Before the change is rolled out to your region, guests will see the following behavior.
163
+
164
+
- With email one-time passcode enabled:
165
+
166
+
- If a guest has an existing unmanaged Azure AD account, they'll continue signing in with their unmanaged Azure AD account.
167
+
- If a guest previously redeemed an invitation to your tenant using an unmanaged Azure AD account, and you reset their redemption status and reinvite them, they'll continue signing in with their unmanaged Azure AD account.
168
+
- If a guest doesn't have an existing unmanaged Azure AD account, they'll redeem using email one-time passcode authentication.
169
+
170
+
- With email one-time passcode disabled:
171
+
172
+
- If a guest has an existing unmanaged Azure AD account, they'll continue signing in with their unmanaged Azure AD account.
173
+
- If a guest previously redeemed an invitation to your tenant using an unmanaged Azure AD account, and you reset their redemption status and reinvite them, they'll continue signing in with their unmanaged Azure AD account.
174
+
- If a guest doesn't have an existing unmanaged Azure AD account, they'll redeem using an email one-time passcode link, but they may get a sign-in error if they're not added to the Azure portal in advance.
175
+
176
+
After the change is rolled out to your region, guests will see the following behavior.
177
+
178
+
- With email one-time passcode enabled:
179
+
180
+
- If a guest has an existing unmanaged Azure AD account, they'll use email one-time passcode to redeem and sign in going forward.
181
+
- If a guest previously redeemed an invitation to your tenant using an unmanaged Azure AD account, and you reset their redemption status and reinvite them, they'll use email one-time passcode to redeem and sign in going forward.
182
+
- If a guest doesn't have an unmanaged Azure AD account, they'll use email one-time passcode to redeem and sign in going forward.
183
+
184
+
- With email one-time passcode disabled:
185
+
186
+
- If a guest has an existing unmanaged Azure AD account, they'll use a Microsoft account to redeem. They'll end up with two accounts (the unmanaged Azure AD account and the Microsoft account). To prevent this from happening, we strongly encourage you to enable email one-time passcode.
187
+
- If a guest previously redeemed an invitation to your tenant using an unmanaged Azure AD account, and you reset their redemption status and reinvite them, they'll use a Microsoft account to redeem. They'll end up with two accounts (the unmanaged Azure AD account and the Microsoft account). To prevent this from happening, we strongly encourage you to enable email one-time passcode.
188
+
- If a guest doesn't have an unmanaged Azure AD account, they'll use a Microsoft account to redeem and sign in going forward.
189
+
190
+
For more information about the different redemption pathways, see [B2B collaboration invitation redemption](redemption-experience.md).
191
+
192
+
**Does this mean the “No account? Create one!” option for self-service sign-up is going away?**
193
+
194
+
It’s easy to get [self-service sign-up in the context of External Identities](self-service-sign-up-overview.md) confused with self-service sign-up for email-verified users, but they are two different features. The feature that's going away is [self-service sign-up with email-verified users](../enterprise-users/directory-self-service-signup.md), which results in your guests creating an unmanaged Azure AD account. However, self-service sign-up for External Identities will continue to be available, which results in your guests signing up to your organization with a [variety of identity providers](identity-providers.md).
195
+
196
+
**What does Microsoft recommend we do with existing Microsoft accounts (MSA)?**
197
+
198
+
When we support the ability to disable Microsoft Account in the Identity providers settings (not available today), we strongly recommend you disable Microsoft Account and enable email one-time passcode. Then you should reset the redemption status of existing guests with Microsoft accounts so that they can re-redeem using email one-time passcode authentication and use email one-time passcode to sign in going forward.
199
+
200
+
**Does this change include SharePoint and OneDrive integration with Azure AD B2B?**
201
+
202
+
No, the global rollout of the change to enable email one-time passcode by default that begins on November 1, 2021 doesn't include SharePoint and OneDrive integration with Azure AD B2B. To learn how to enable integration so that collaboration on SharePoint and OneDrive uses B2B capabilities, or how to disable this integration, see [SharePoint and OneDrive Integration with Azure AD B2B](/sharepoint/sharepoint-azureb2b-integration).
Copy file name to clipboardExpand all lines: articles/active-directory/managed-identities-azure-resources/tutorial-vm-managed-identities-cosmos.md
+5-10Lines changed: 5 additions & 10 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,21 +1,16 @@
1
1
---
2
2
title: Use managed identities from a virtual machine to access Cosmos DB | Microsoft Docs
3
3
description: Learn how to use managed identities with Windows VMs using the Azure portal, CLI, PowerShell, Azure Resource Manager template
4
-
services: active-directory
5
4
author: barclayn
6
5
manager: karenh444
7
-
editor: ''
8
-
9
6
ms.service: active-directory
10
7
ms.subservice: msi
11
8
ms.workload: integration
12
9
ms.topic: tutorial
13
10
ms.date: 10/14/2021
14
11
ms.author: barclayn
15
12
ms.custom: ep-miar
16
-
17
13
#Customer intent: As an administrator I want to know how to access Cosmos DB from a virtual machine using a managed identity
18
-
19
14
---
20
15
21
16
# How to use managed identities to connect to Cosmos DB from an Azure virtual machine
@@ -297,7 +292,7 @@ az cosmosdb sql role assignment create --account-name $accountName --resource-gr
297
292
298
293
## Access data
299
294
300
-
Getting access to Cosmos using managed identities may be achieved using the Azure.identity library to enable authentication in your application. You can call [ManagedIdentityCredential](/dotnet/api/azure.identity.managedidentitycredential?view=azure-dotnet) directly or use [DefaultAzureCredential](/dotnet/api/azure.identity.defaultazurecredential?view=azure-dotnet).
295
+
Getting access to Cosmos using managed identities may be achieved using the Azure.identity library to enable authentication in your application. You can call [ManagedIdentityCredential](/dotnet/api/azure.identity.managedidentitycredential) directly or use [DefaultAzureCredential](/dotnet/api/azure.identity.defaultazurecredential).
301
296
302
297
The ManagedIdentityCredential class attempts to authentication using a managed identity assigned to the deployment environment. The [DefaultAzureCredential](/dotnet/api/overview/azure/identity-readme) class goes through different authentication options in order. The second authentication option that DefaultAzureCredential attempts is Managed identities.
303
298
@@ -387,7 +382,7 @@ Initialize your Cosmos DB client:
0 commit comments