You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory-b2c/partner-transmit-security.md
+20-24Lines changed: 20 additions & 24 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -32,9 +32,9 @@ In this tutorial, learn to integrate Azure Active Directory B2C (Azure AD B2C) a
32
32
33
33
A Transmit Detection and Response integration includes the following components:
34
34
35
-
-**Azure AD B2C tenant**: Authenticates the user and hosts a script that collects device telemetry as users execute a target policy. It blocks or challenges sign-in/up attempts based on the risk recommendation returned by Transmit.
35
+
-**Azure AD B2C tenant**: Authenticates the user and hosts a script that collects device information as users execute a target policy. It blocks or challenges sign-in/up attempts based on the risk recommendation returned by Transmit.
36
36
-**Custom UI templates**: Customizes HTML content of the pages rendered by Azure AD B2C. These pages include the JavaScript snippets required for Transmit risk detection.
37
-
-**Transmit data collection service**: Dynamically embedded script that logs device telemetry, which is used to continuously assess risk during user interactions.
37
+
-**Transmit data collection service**: Dynamically embedded script that logs device information, which is used to continuously assess risk during user interactions.
38
38
-**Transmit DRS API endpoint**: Provides the risk recommendation based on collected data. Azure AD B2C communicates with this endpoint using a REST API connector.
39
39
-**Azure Functions**: Your hosted API endpoint that is used to obtain a recommendation from the Transmit DRS API endpoint via the API connector.
40
40
@@ -43,21 +43,21 @@ The following architecture diagram illustrates the implementation described in t
43
43

44
44
45
45
1. The user signs-in with Azure AD B2C.
46
-
2.The sign-in page initializes the Transmit SDK, which starts streaming device telemetry to Transmit.
46
+
2.A custom page initializes the Transmit SDK, which starts streaming device information to Transmit.
47
47
3. Azure AD B2C reports a sign-in action event to Transmit in order to obtain an action token.
48
48
4. Transmit returns an action token, and Azure AD B2C proceeds with the user sign-up or sign-in.
49
-
5. After authenticating the user, Azure AD B2C requests a risk recommendation from Transmit via Azure Functions.
49
+
5. After the user signs-in, Azure AD B2C requests a risk recommendation from Transmit via the Azure Function.
50
50
6. The Azure Function sends Transmit the recommendation request with the action token.
51
-
7. Transmit returns a recommendation (challenge/allow/deny) based on the collected device telemetry.
51
+
7. Transmit returns a recommendation (challenge/allow/deny) based on the collected device information.
52
52
8. The Azure Function passes the recommendation result to Azure AD B2C to handle accordingly.
53
53
9. Azure AD B2C performs more steps if needed, like multifactor authentication and completes the sign-up or sign-in flow.
54
54
55
55
## Prerequisites
56
56
57
57
* A Microsoft Entra subscription. If you don't have one, get a [free account](https://azure.microsoft.com/free/)
58
-
*[An Azure AD B2C tenant](https://docs.microsoft.com/en-us/azure/active-directory-b2c/tutorial-create-tenant) linked to the Entra subscription
59
-
*[A registered web application](https://docs.microsoft.com/en-us/azure/active-directory-b2c/tutorial-create-tenant) in your Azure AD B2C tenant
60
-
*[Azure AD B2C custom policies](https://learn.microsoft.com/en-us/azure/active-directory-b2c/tutorial-create-user-flows?pivots=b2c-custom-policy)
58
+
*[An Azure AD B2C tenant](./tutorial-create-tenant.md) linked to the Entra subscription
59
+
*[A registered web application](./tutorial-register-applications.md) in your Azure AD B2C tenant
60
+
*[Azure AD B2C custom policies](./tutorial-create-user-flows.md?pivots=b2c-custom-policy)
61
61
* A Transmit Security tenant. Go to [transmitsecurity.com](https://transmitsecurity.com/)
62
62
63
63
## Step 1: Create a Transmit app
@@ -71,21 +71,21 @@ Sign in to the [Transmit Admin Portal](https://portal.transmitsecurity.io/) and
71
71
|:---------|:---------------------|
72
72
|**Application name**| Application name|
73
73
|**Client name**| Client name|
74
-
|**Redirect URIs**| Enter your website URL. The redirect URIs is a required field but not used for this flow|
74
+
|**Redirect URIs**| Enter your website URL. This attribute is a required field but not used for this flow|
75
75
76
76
3. Select **Add**.
77
77
78
78
4. Upon registration, a **Client ID** and **Client Secret** appear. Record the values for use later.
79
79
80
80
## Step 2: Create your custom UI
81
81
82
-
Start by integrating Transmit DRS into the B2C frontend application. This involves creating a custom sign-in page that integrates the [Transmit SDK](https://developer.transmitsecurity.com/sdk-ref/platform/introduction/), and replaces the default Azure AD B2C sign-in page.
82
+
Start by integrating Transmit DRS into the B2C frontend application. Create a custom sign-in page that integrates the [Transmit SDK](https://developer.transmitsecurity.com/sdk-ref/platform/introduction/), and replaces the default Azure AD B2C sign-in page.
83
83
84
-
Once activated, Transmit DRS starts collecting telemetry data for the user interacting with your app. Transmit DRS returns an action token that Azure AD B2C needs for risk recommendation.
84
+
Once activated, Transmit DRS starts collecting information for the user interacting with your app. Transmit DRS returns an action token that Azure AD B2C needs for risk recommendation.
85
85
86
86
To integrating Transmit DRS into the B2C sign-in page, follow these steps:
87
87
88
-
1. Prepare a custom HTML file for your sign-in page based on the [sample templates](https://learn.microsoft.com/en-us/azure/active-directory-b2c/customize-ui-with-html?pivots=b2c-custom-policy#sample-templates). Add the following script to load and initialize the Transmit SDK, and to obtain an action token. The returned action token should be stored in a hidden HTML element (`ts-drs-response` in this example).
88
+
1. Prepare a custom HTML file for your sign-in page based on the [sample templates](./customize-ui-with-html.md#sample-templates). Add the following script to load and initialize the Transmit SDK, and to obtain an action token. The returned action token should be stored in a hidden HTML element (`ts-drs-response` in this example).
89
89
90
90
```html
91
91
<!-- Function that obtains an action token -->
@@ -119,11 +119,11 @@ To integrating Transmit DRS into the B2C sign-in page, follow these steps:
119
119
120
120
1.[Enable JavaScript and page layout versions in Azure AS B2C](./javascript-and-page-layout.md).
121
121
122
-
1. Host the HTML page on a Cross-Origin Resource Sharing (CORS) enabled web endpoint by [creating a storage account](https://learn.microsoft.com/en-us/azure/storage/common/storage-account-create?tabs=azure-portal&toc=%2Fazure%2Fstorage%2Fblobs%2Ftoc.json) and [adding CORS support for Azure Storage](https://learn.microsoft.com/en-us/rest/api/storageservices/cross-origin-resource-sharing--cors--support-for-the-azure-storage-services).
122
+
1. Host the HTML page on a Cross-Origin Resource Sharing (CORS) enabled web endpoint by [creating a storage account](/azure/storage/common/storage-account-create.md?tabs=azure-portal&toc=%2Fazure%2Fstorage%2Fblobs%2Ftoc.json) and [adding CORS support for Azure Storage](/rest/api/storageservices/cross-origin-resource-sharing--cors--support-for-the-azure-storage-services).
123
123
124
124
## Step 3: Create an Azure Function
125
125
126
-
Azure AD B2C can obtain a risk recommendation from Transmit using a [API connector](./add-api-connector). Passing this request through an intermediate web API (such as using [Azure Functions](https://learn.microsoft.com/en-us/azure/azure-functions/)) provides more flexibility in your implementation logic.
126
+
Azure AD B2C can obtain a risk recommendation from Transmit using a [API connector](./add-api-connector.md). Passing this request through an intermediate web API (such as using [Azure Functions](/azure/azure-functions/)) provides more flexibility in your implementation logic.
127
127
128
128
Follow these steps to create an Azure function that uses the action token from the frontend application to get a recommendation from the [Transmit DRS endpoint](https://developer.transmitsecurity.com/openapi/risk/recommendations/#operation/getRiskRecommendation).
129
129
@@ -136,7 +136,7 @@ Follow these steps to create an Azure function that uses the action token from t
136
136
}
137
137
```
138
138
139
-
2. Extracttheactiontokenfromtherequest. Yourcustompolicydefineswhetherit's passed in the query or body.
1. Downloadthe [custompolicystarterpack](https://github.com/Azure-Samples/active-directory-b2c-custom-policy-starterpack/archive/master.zip) to get started (see [Create custom policies in Azure AD B2C](./tutorial-create-user-flows?pivots=b2c-custom-policy))
206
+
1. Downloadthe [custompolicystarterpack](https://github.com/Azure-Samples/active-directory-b2c-custom-policy-starterpack/archive/master.zip) to get started (see [Create custom policies in Azure AD B2C](./tutorial-create-user-flows.md?pivots=b2c-custom-policy))
0 commit comments