Skip to content

Commit 7e84b80

Browse files
committed
Keep content fresh
1 parent 93d06d6 commit 7e84b80

File tree

1 file changed

+9
-9
lines changed

1 file changed

+9
-9
lines changed

articles/active-directory-b2c/partner-ping-identity.md

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,13 @@
11
---
2-
title: Tutorial to configure Azure AD B2C with Ping Identity
2+
title: Tutorial to configure Azure Active Directory B2C with Ping Identity
33
titleSuffix: Azure AD B2C
4-
description: Learn how to configure Azure AD B2C with Ping Identity for secure hybrid access using PingAccess and PingFederate. Extend Azure AD B2C capabilities.
4+
description: Learn how to integrate Azure AD B2C authentication with Ping Identity
55
author: gargi-sinha
66
manager: martinco
77
ms.reviewer: kengaderdus
88
ms.service: azure-active-directory
99
ms.topic: how-to
10-
ms.date: 02/17/2025
10+
ms.date: 01/26/2024
1111
ms.author: gasinh
1212
ms.subservice: b2c
1313

@@ -18,7 +18,7 @@ ms.subservice: b2c
1818

1919
In this tutorial, learn how to extend the capabilities of Azure Active Directory B2C (Azure AD B2C) with [PingAccess](https://www.pingidentity.com/en/platform/capabilities/web-api-access/pingaccess.html) and [PingFederate](https://www.pingidentity.com/en/platform/capabilities/authentication-authority/pingfederate.html). PingAccess provides access to applications and APIs, and a policy engine for authorized user access. PingFederate is an enterprise federation server for user authentication and single sign-on, an authority that permits customers, employees, and partners to access applications from devices. Use them together to enable secure hybrid access (SHA).
2020

21-
Many e-commerce sites and web applications exposed to the internet are deployed behind proxy systems, or a reverse-proxy system. These proxy systems preauthenticate, enforce policy, and route traffic. Typical scenarios include protecting web applications from inbound web traffic and providing a uniform session management across distributed server deployments.
21+
Many e-commerce sites and web applications exposed to the internet are deployed behind proxy systems, or a reverse-proxy system. These proxy systems pre-authenticate, enforce policy, and route traffic. Typical scenarios include protecting web applications from inbound web traffic and providing a uniform session management across distributed server deployments.
2222

2323
Generally, configurations include an authentication translation layer that externalizes the authentication from the web application. Reverse proxies provide the authenticated user context to the web applications, such as a header value in clear or digest form. The applications aren't using industry standard tokens such as Security Assertion Markup Language (SAML), OAuth, or OpenID Connect (OIDC). Instead, the proxy provides authentication context and maintains the session with the end-user agent such as browser or native application. As a service running as a man-in-the-middle, proxies provide significant session control. The proxy service is efficient and scalable, not a bottleneck for applications behind the proxy service. The diagram is a reverse-proxy implementation and communications flow.
2424

@@ -71,7 +71,7 @@ Use this function to contextually, dynamically, or declaratively switch an inbou
7171

7272
## Prerequisites
7373

74-
To get started, you need:
74+
To get started, you'll need:
7575

7676
- An Azure subscription
7777
- If you don't have one, get an [Azure free account](https://azure.microsoft.com/free/)
@@ -83,7 +83,7 @@ To get started, you need:
8383
Confirm the following connectivity and communication.
8484

8585
- **PingAccess server** – Communicates with the PingFederate server, client browser, OIDC, OAuth well-known and keys discovery published by the Azure AD B2C service and PingFederate server
86-
- **PingFederate server** – Communicates with the PingAccess server, client browser, OIDC, OAuth well-known, and keys discovery published by the Azure AD B2C service
86+
- **PingFederate server** – Communicates with the PingAccess server, client browser, OIDC, OAuth well-known and keys discovery published by the Azure AD B2C service
8787
- **Legacy or header-based AuthN application** – Communicates to and from PingAccess server
8888
- **SAML relying party application** – Reaches the browser traffic from the client. Accesses the SAML federation metadata published by the Azure AD B2C service.
8989
- **Modern application** – Reaches the browser traffic from the client. Accesses the OIDC, OAuth well-known, and keys discovery published by the Azure AD B2C service.
@@ -178,7 +178,7 @@ To create a site:
178178

179179
#### Create an application
180180

181-
To create an application in PingAccess for each application in Azure that you want to protect:
181+
To create an application in PingAccess for each application in Azure that you want to protect.
182182

183183
1. Go to **Main** > **Applications**
184184

@@ -188,7 +188,7 @@ To create an application in PingAccess for each application in Azure that you wa
188188

189189
4. Optionally, enter a **Description** for the application
190190

191-
5. Specify the **Context Root** for the application. For example, an application at https://mysite:9999/AppName has a context root of /AppName. The context root must begin with a slash (/), must not end with a slash (/), and can be more than one layer deep, for example, /Apps/MyApp.
191+
5. Specify the **Context Root** for the application. For example, an application at https://mysite:9999/AppName will have a context root of /AppName. The context root must begin with a slash (/), must not end with a slash (/), and can be more than one layer deep, for example, /Apps/MyApp.
192192

193193
6. Select the **virtual host** you created
194194

@@ -225,7 +225,7 @@ Configure the PingFederate authentication policy to federate to the multiple IdP
225225

226226
8. Work with the SP to connect to PingFederate, the federation hub as the IdP.
227227

228-
## Related content
228+
## Next steps
229229

230230
For additional information, review the following articles
231231

0 commit comments

Comments
 (0)