You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory-b2c/partner-ping-identity.md
+9-9Lines changed: 9 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,13 +1,13 @@
1
1
---
2
-
title: Tutorial to configure Azure AD B2C with Ping Identity
2
+
title: Tutorial to configure Azure Active Directory B2C with Ping Identity
3
3
titleSuffix: Azure AD B2C
4
-
description: Learn how to configure Azure AD B2C with Ping Identity for secure hybrid access using PingAccess and PingFederate. Extend Azure AD B2C capabilities.
4
+
description: Learn how to integrate Azure AD B2C authentication with Ping Identity
5
5
author: gargi-sinha
6
6
manager: martinco
7
7
ms.reviewer: kengaderdus
8
8
ms.service: azure-active-directory
9
9
ms.topic: how-to
10
-
ms.date: 02/17/2025
10
+
ms.date: 01/26/2024
11
11
ms.author: gasinh
12
12
ms.subservice: b2c
13
13
@@ -18,7 +18,7 @@ ms.subservice: b2c
18
18
19
19
In this tutorial, learn how to extend the capabilities of Azure Active Directory B2C (Azure AD B2C) with [PingAccess](https://www.pingidentity.com/en/platform/capabilities/web-api-access/pingaccess.html) and [PingFederate](https://www.pingidentity.com/en/platform/capabilities/authentication-authority/pingfederate.html). PingAccess provides access to applications and APIs, and a policy engine for authorized user access. PingFederate is an enterprise federation server for user authentication and single sign-on, an authority that permits customers, employees, and partners to access applications from devices. Use them together to enable secure hybrid access (SHA).
20
20
21
-
Many e-commerce sites and web applications exposed to the internet are deployed behind proxy systems, or a reverse-proxy system. These proxy systems preauthenticate, enforce policy, and route traffic. Typical scenarios include protecting web applications from inbound web traffic and providing a uniform session management across distributed server deployments.
21
+
Many e-commerce sites and web applications exposed to the internet are deployed behind proxy systems, or a reverse-proxy system. These proxy systems pre-authenticate, enforce policy, and route traffic. Typical scenarios include protecting web applications from inbound web traffic and providing a uniform session management across distributed server deployments.
22
22
23
23
Generally, configurations include an authentication translation layer that externalizes the authentication from the web application. Reverse proxies provide the authenticated user context to the web applications, such as a header value in clear or digest form. The applications aren't using industry standard tokens such as Security Assertion Markup Language (SAML), OAuth, or OpenID Connect (OIDC). Instead, the proxy provides authentication context and maintains the session with the end-user agent such as browser or native application. As a service running as a man-in-the-middle, proxies provide significant session control. The proxy service is efficient and scalable, not a bottleneck for applications behind the proxy service. The diagram is a reverse-proxy implementation and communications flow.
24
24
@@ -71,7 +71,7 @@ Use this function to contextually, dynamically, or declaratively switch an inbou
71
71
72
72
## Prerequisites
73
73
74
-
To get started, you need:
74
+
To get started, you'll need:
75
75
76
76
- An Azure subscription
77
77
- If you don't have one, get an [Azure free account](https://azure.microsoft.com/free/)
@@ -83,7 +83,7 @@ To get started, you need:
83
83
Confirm the following connectivity and communication.
84
84
85
85
-**PingAccess server** – Communicates with the PingFederate server, client browser, OIDC, OAuth well-known and keys discovery published by the Azure AD B2C service and PingFederate server
86
-
-**PingFederate server** – Communicates with the PingAccess server, client browser, OIDC, OAuth well-known, and keys discovery published by the Azure AD B2C service
86
+
-**PingFederate server** – Communicates with the PingAccess server, client browser, OIDC, OAuth well-known and keys discovery published by the Azure AD B2C service
87
87
-**Legacy or header-based AuthN application** – Communicates to and from PingAccess server
88
88
-**SAML relying party application** – Reaches the browser traffic from the client. Accesses the SAML federation metadata published by the Azure AD B2C service.
89
89
-**Modern application** – Reaches the browser traffic from the client. Accesses the OIDC, OAuth well-known, and keys discovery published by the Azure AD B2C service.
@@ -178,7 +178,7 @@ To create a site:
178
178
179
179
#### Create an application
180
180
181
-
To create an application in PingAccess for each application in Azure that you want to protect:
181
+
To create an application in PingAccess for each application in Azure that you want to protect.
182
182
183
183
1. Go to **Main** > **Applications**
184
184
@@ -188,7 +188,7 @@ To create an application in PingAccess for each application in Azure that you wa
188
188
189
189
4. Optionally, enter a **Description** for the application
190
190
191
-
5. Specify the **Context Root** for the application. For example, an application at https://mysite:9999/AppNamehas a context root of /AppName. The context root must begin with a slash (/), must not end with a slash (/), and can be more than one layer deep, for example, /Apps/MyApp.
191
+
5. Specify the **Context Root** for the application. For example, an application at https://mysite:9999/AppNamewill have a context root of /AppName. The context root must begin with a slash (/), must not end with a slash (/), and can be more than one layer deep, for example, /Apps/MyApp.
192
192
193
193
6. Select the **virtual host** you created
194
194
@@ -225,7 +225,7 @@ Configure the PingFederate authentication policy to federate to the multiple IdP
225
225
226
226
8. Work with the SP to connect to PingFederate, the federation hub as the IdP.
227
227
228
-
## Related content
228
+
## Next steps
229
229
230
230
For additional information, review the following articles
0 commit comments