Skip to content

Commit 8777fe7

Browse files
authored
Merge branch 'MicrosoftDocs:main' into healthcareapis-fix-profiles-post-put
2 parents b72db0a + dbd0490 commit 8777fe7

File tree

546 files changed

+3903
-2437
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

546 files changed

+3903
-2437
lines changed

.openpublishing.redirection.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
"redirections": [
33
{
44
"source_path": "articles/iot-hub/iot-hub-rm-template.md",
5-
"redirect_url": "articles/iot-hub/iot-hub-rm-rest",
5+
"redirect_url": "/azure/iot-hub/iot-hub-rm-template-powershell",
66
"redirect_document_id": false
77
},
88
{

CODEOWNERS

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -73,7 +73,7 @@ articles/service-health @rboucher
7373
/articles/lighthouse/ @JnHs
7474

7575
# Healthcare APIs
76-
/articles/healthcare-apis/ @ginalee-dotcom
76+
/articles/healthcare-apis/ @ranvijaykumar @mikaelweave
7777

7878
# Configuration
7979
*.json @SyntaxC4 @snoviking

articles/active-directory-b2c/TOC.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -528,6 +528,8 @@
528528
displayName: bulk import
529529
- name: Partner integration
530530
items:
531+
- name: Grit IAM B2B2C
532+
href: partner-grit-iam.md
531533
- name: N8identity
532534
href: partner-n8identity.md
533535
- name: Saviynt
1.99 KB
Loading
144 KB
Loading

articles/active-directory-b2c/partner-gallery.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: CelesteDG
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: how-to
12-
ms.date: 04/21/2022
12+
ms.date: 09/14/2022
1313
ms.author: kengaderdus
1414
ms.subservice: B2C
1515
---
@@ -65,6 +65,7 @@ Microsoft partners with the following ISVs for role-based access control.
6565

6666
| ISV partner | Description and integration walkthroughs |
6767
|:-------------------------|:--------------|
68+
| ![Screenshot of a grit IAM logo.](./media/partner-gallery/grit-logo.png) | [Grit IAM B2B2C](./partner-grit-iam.md) provides authentication, authorization, profile and role management, and delegated B2B SaaS application administration. It also enables role-based access control (RBAC) for end-users of Azure AD B2C.|
6869
| ![Screenshot of a n8identity logo](./media/partner-gallery/n8identity-logo.png) | [N8Identity](./partner-n8identity.md) is an Identity-as-a-Service governance platform that provides solution to address customer accounts migration and Customer Service Requests (CSR) administration running on Microsoft Azure. |
6970
| ![Screenshot of a Saviynt logo](./media/partner-gallery/saviynt-logo.png) | [Saviynt](./partner-Saviynt.md) cloud-native platform promotes better security, compliance, and governance through intelligent analytics and cross application integration for streamlining IT modernization. |
7071
| ![Screenshot of a WhoIAM Rampart logo](./media/partner-gallery/whoiam-logo.png) | [WhoIAM Rampart](./partner-whoiam-rampart.md) provides a fully integrated helpdesk and invitation-gated user registration experience. It allows support specialists to efficiently perform tasks like resetting passwords and multi-factor authentication without using Azure. It also enables apps and role-based access control (RBAC) for end-users of Azure AD B2C. |
Lines changed: 116 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,116 @@
1+
---
2+
title: Configure the Grit IAM B2B2C solution with Azure Active Directory B2C
3+
titleSuffix: Azure AD B2C
4+
description: Learn how to integrate Azure AD B2C authentication with the Grit IAM B2B2C solution
5+
services: active-directory-b2c
6+
author: gargi-sinha
7+
manager: martinco
8+
ms.service: active-directory
9+
ms.workload: identity
10+
ms.topic: how-to
11+
ms.date: 9/15/2022
12+
ms.author: gasinh
13+
ms.reviewer: kengaderdus
14+
ms.subservice: B2C
15+
---
16+
17+
# Tutorial: Configure the Grit IAM B2B2C solution with Azure Active Directory B2C
18+
19+
In this tutorial, you learn how to integrate Azure Active Directory B2C (Azure AD B2C) authentication with a [Grit IAM B2B2C](https://www.gritiam.com/b2b2c) solution. You can use the solution to provide secure, reliable, self-serviceable, and user-friendly identity and access management to your customers. Shared profile data such as first name, last name, home address, and email used in web and mobile applications are stored in a centralized manner with consideration to compliance and regulatory needs.
20+
21+
22+
Use Grit's B2BB2C solution for:
23+
24+
- Authentication, authorization, profile and role management, and delegated B2B SaaS application administration.
25+
- Role-based access control for Azure AD B2C applications.
26+
27+
## Prerequisites
28+
29+
To get started, ensure the following prerequisites are met:
30+
31+
- A Grit IAM account. You can go to [Grit IAM B2B2C solution](https://www.gritiam.com/b2b2c) to get a demo.
32+
- An Azure AD subscription. If you don't have one, you can create a [free Azure account](https://azure.microsoft.com/free/).
33+
- An Azure AD B2C tenant linked to the Azure subscription. You can learn more at [Tutorial: Create an Azure Active Directory B2C tenant](tutorial-create-tenant.md).
34+
- Configure your application in the Azure portal.
35+
36+
## Scenario description
37+
38+
Contoso does business with end customers and large enterprises, like Fabrikam_big1 and Fabrikam_big2. There're small enterprise customers like Fabrikam_small1 and Fabrikam_small2 and direct business is done with end customers like Smith1 and Smith2.
39+
40+
*Contoso* has web and mobile applications and develops new applications. The applications rely on user shared profile data such as, first name, last name, address, and email. They want to centralize the profile data, so applications aren't collecting and storing the data. They want to store the profile information in accordance with certain compliance and regulations.
41+
42+
![Screenshot that shows the architecture diagram of how the components are connected to each other.](./media/partner-grit-iam/grit-b2b2c-architecture.png)
43+
44+
This integration is composed of the following components:
45+
46+
- **Azure AD B2C Identity Experience Framework (IEF)**: An engine that executes user journeys, which can include validating credentials, performing MFA, checking user access. It's aided by the Azure AD database and the API layer, which's configured using XML.
47+
48+
- **Grit API layer**: This layer exposes user profile data and metadata about organizations and applications. The data is stored in Azure AD and Cosmos DB.
49+
50+
- **Grit Onboarding portal**: Used by admins to onboard applications and organizations.
51+
52+
- **Grit Admin portal**: Used by the *Contoso* admin and by admins of *fabrikam_big1*, and *fabirkam_small1*. Delegated admins can manage users and their access. Super admins of the organizations manage all users.
53+
54+
55+
- **Grit Visual IEF editor**: A low code/no code editor that customizes the user journey and is provided by Grit. It produces the XML used by IEF. *Contoso* developers use it to customize user journeys.
56+
57+
58+
- **Applications**: Developed by *Contoso* or third parties. Applications use Open ID or SAML to connect to the customer identity and access management (CIAM) system. The tokens they receive contain user-profile information, but can make API calls, with the token as the auth mechanism, to do user-profile data create, read, update and delete (CRUD) operations.
59+
60+
61+
> [!NOTE]
62+
> Components developed by Grit, except the visual IEF editor, will be deployed in the Contoso Azure environment.
63+
64+
## Configure Grit B2B2C with Azure AD B2C
65+
66+
Use the guidance provided in the following sections to get started with configuration.
67+
68+
### Step 1 - Setup infrastructure
69+
70+
To get started with setup:
71+
72+
- Contact [Grit support](mailto:[email protected]) to obtain access.
73+
- For evaluation, the Grit support team will deploy the infrastructure in the Grit Azure subscription and they'll give you admin rights.
74+
- After you purchase the solution, Grit engineers will install the production version in your Azure subscription.
75+
- The infrastructure integrates with your virtual network (VNet) setup, supports APIM (third-party API management) and the firewall.
76+
- Grit implementation engineers can provide custom recommendations based on your infrastructure.
77+
78+
### Step 2 - Create admins in the Admin Portal
79+
80+
Use the Grit Admin portal to assign administrators access to the portal where they can perform the following tasks -
81+
82+
- Add other admins such as super, organization, application admin in the hierarchy depending on their permission level.
83+
84+
- View/accept/reject all the user's requests for the application registration.
85+
86+
- Search users.
87+
88+
To learn how to assign admin roles, check the [tutorial.](https://app.archbee.com/doc/j1VX2J3B3xJ-zMqnmlDA5/9IW3PgI2yn1cCpPGm1vVN)
89+
90+
### Step 3 - Onboard organizations
91+
92+
Use the Onboarding portal for one or more of your customers and their identity provider (IdP) that supports OpenID Connect (OIDC) and SAML. Onboard customers without an IdP, for local account authentication. For B2C applications, enable social authentications.
93+
94+
In the Grit Onboarding portal, create a super admin for the tenant. The Onboarding portal defines the claims per application and per organization. Thereafter, the portal creates an endpoint URL for the sign-in and sign-up user flow.
95+
96+
To learn how to onboard an organization, check this [tutorial](https://app.archbee.com/doc/G_YZFq_VwvgMlmX-_efmX/8m90WVb2M6Yi0gCe7yor2).
97+
98+
### Step 4 - Integrate applications using OIDC or SAML
99+
100+
After you onboard the customer, the Grit Onboarding portal provides URLs to onboard the applications.
101+
102+
Learn [how your customers can sign up, sign in, and manage their profiles](add-sign-up-and-sign-in-policy.md?pivots=b2c-custom-policy).
103+
104+
## Test the scenarios
105+
106+
Check the authentication [scenarios](#scenario-description) in your applications. Use the Grit Admin portal to change roles and user properties. Provide delegated access to Admin portal by inviting users.
107+
108+
## Next steps
109+
110+
- [Azure AD B2C custom policy overview](custom-policy-overview.md)
111+
112+
- [Tutorial: Create user flows and custom policies in Azure Active Directory B2C](custom-policy-get-started.md?tabs=applications)
113+
114+
- [SAAS Platform - Organization Application Onboarding Portal](https://app.archbee.com/doc/G_YZFq_VwvgMlmX-_efmX/8m90WVb2M6Yi0gCe7yor2)
115+
116+
- [SAAS Platform - Admin Portal](https://app.archbee.com/doc/j1VX2J3B3xJ-zMqnmlDA5/9IW3PgI2yn1cCpPGm1vVN)

articles/active-directory/app-proxy/application-proxy-configure-cookie-settings.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -24,7 +24,7 @@ Azure Active Directory (Azure AD) has access and session cookies for accessing o
2424
| Cookie setting | Default | Description | Recommendations |
2525
| -------------- | ------- | ----------- | --------------- |
2626
| Use HTTP-Only Cookie | **No** | **Yes** allows Application Proxy to include the HTTPOnly flag in HTTP response headers. This flag provides additional security benefits, for example, it prevents client-side scripting (CSS) from copying or modifying the cookies.<br></br><br></br>Before we supported the HTTP-Only setting, Application Proxy encrypted and transmitted cookies over a secured TLS channel to protect against modification. | Use **Yes** because of the additional security benefits.<br></br><br></br>Use **No** for clients or user agents that do require access to the session cookie. For example, use **No** for an RDP or MTSC client that connects to a Remote Desktop Gateway server through Application Proxy.|
27-
| Use Secure Cookie | **No** | **Yes** allows Application Proxy to include the Secure flag in HTTP response headers. Secure Cookies enhances security by transmitting cookies over a TLS secured channel such as HTTPS. This prevents cookies from being observed by unauthorized parties due to the transmission of the cookie in clear text. | Use **Yes** because of the additional security benefits.|
27+
| Use Secure Cookie | **Yes** | **Yes** allows Application Proxy to include the Secure flag in HTTP response headers. Secure Cookies enhances security by transmitting cookies over a TLS secured channel such as HTTPS. This prevents cookies from being observed by unauthorized parties due to the transmission of the cookie in clear text. | Use **Yes** because of the additional security benefits.|
2828
| Use Persistent Cookie | **No** | **Yes** allows Application Proxy to set its access cookies to not expire when the web browser is closed. The persistence lasts until the access token expires, or until the user manually deletes the persistent cookies. | Use **No** because of the security risk associated with keeping users authenticated.<br></br><br></br>We suggest only using **Yes** for older applications that can't share cookies between processes. It's better to update your application to handle sharing cookies between processes instead of using persistent cookies. For example, you might need persistent cookies to allow a user to open Office documents in explorer view from a SharePoint site. Without persistent cookies, this operation might fail if the access cookies aren't shared between the browser, the explorer process, and the Office process. |
2929

3030
## SameSite Cookies

articles/active-directory/cloud-infrastructure-entitlement-management/all-reports.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -2,13 +2,13 @@
22
title: View a list and description of all system reports available in Permissions Management reports
33
description: View a list and description of all system reports available in Permissions Management.
44
services: active-directory
5-
author: kenwith
6-
manager: rkarlin
5+
author: jenniferf-skc
6+
manager: amycolannino
77
ms.service: ciem
88
ms.workload: identity
99
ms.topic: overview
1010
ms.date: 02/23/2022
11-
ms.author: kenwith
11+
ms.author: jfields
1212
---
1313

1414
# View a list and description of system reports

articles/active-directory/cloud-infrastructure-entitlement-management/faqs.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -2,13 +2,13 @@
22
title: Frequently asked questions (FAQs) about Permissions Management
33
description: Frequently asked questions (FAQs) about Permissions Management.
44
services: active-directory
5-
author: kenwith
6-
manager: rkarlin
5+
author: jenniferf-skc
6+
manager: amycolannino
77
ms.service: ciem
88
ms.workload: identity
99
ms.topic: faq
1010
ms.date: 04/20/2022
11-
ms.author: kenwith
11+
ms.author: jfields
1212
---
1313

1414
# Frequently asked questions (FAQs)

0 commit comments

Comments
 (0)