Skip to content

Commit 8cdd188

Browse files
authored
Update according to feedback from @lynneoconnor and @Jak-MS
1 parent b9eb179 commit 8cdd188

File tree

1 file changed

+34
-34
lines changed

1 file changed

+34
-34
lines changed

articles/active-directory-b2c/partner-nok-nok.md

Lines changed: 34 additions & 34 deletions
Original file line numberDiff line numberDiff line change
@@ -12,54 +12,54 @@ ms.date: 06/21/2024
1212
ms.author: gasinh
1313
ms.subservice: b2c
1414

15-
# Customer intent: I'm a developer integrating Azure Active Directory B2C with a third-party authentication provider. I want to learn how to configure Nok Nok S3 Authentication Suite as an identity provider (IdP) in Azure AD B2C. My goal is to implement FIDO Passkey authentication for my users.
15+
# Customer intent: I'm a developer integrating Azure AD B2C with a third-party authentication provider. I want to learn how to configure Nok Nok S3 Authentication Suite as an identity provider (IdP) in Azure AD B2C. My goal is to implement FIDO Passkey authentication for my users.
1616
---
17-
# Tutorial: Configure Nok Nok S3 Authentication Suite with Azure Active Directory B2C for FIDO Passkey Authentication
17+
# Tutorial: Configure Nok Nok S3 Authentication Suite with Azure AD B2C for FIDO Passkey Authentication
1818

19-
Learn to integrate the Nok Nok S3 Authentication Suite into your Azure Active Directory B2C (Azure AD B2C) tenant. The Nok Nok solution enables FIDO-certified multifactor authentication such as FIDO UAF, FIDO U2F, WebAuthn, and FIDO2 for mobile and web applications. The Nok Nok solution strengthens your security while maintaining an optimal with user experience.
19+
Learn to integrate the Nok Nok S3 Authentication Suite into your Azure Active Directory (AD) B2C tenant. The Nok Nok solution enables FIDO-certified multifactor authentication such as FIDO UAF, FIDO U2F, WebAuthn, and FIDO2 for mobile and web applications. The Nok Nok solution strengthens your security while maintaining an optimal user experience.
2020

21-
Go to noknok.com to learn more: [Nok Nok Labs, Inc.](https://noknok.com/)
21+
Learn more at [Nok Nok](https://noknok.com/)
2222

2323
## Prerequisites
2424

2525
To get started, you need:
2626

27-
* An Azure subscription. If you don't have one, get an [Azure free account](https://azure.microsoft.com/free/)
28-
* An Azure AD B2C tenant linked to the Azure subscription [Tutorial: Create an Azure Active Directory B2C tenant](tutorial-create-tenant.md)
29-
* Nok Nok Cloud evaluation tenant to be used for registration and authentication
27+
* An Azure subscription. If you don't have one, get an [Azure free account](https://azure.microsoft.com/free/).
28+
* An Azure AD B2C tenant linked to the Azure subscription [Tutorial: Create an Azure AD B2C tenant](tutorial-create-tenant.md).
29+
* A Nok Nok Cloud evaluation tenant for FIDO registration and authentication.
3030

3131
## Scenario description
3232

33-
To enable Passkey authentication for your users, enable Nok Nok as an identity provider (IdP) in your Azure AD B2C (AAD B2C) tenant. The Nok Nok integration includes the following components:
33+
To enable Passkey authentication for your users, enable Nok Nok as an identity provider (IdP) in your Azure AD B2C tenant. The Nok Nok integration includes the following components:
3434

35-
* **Azure AD B2C** – authorization server that verifies user credentials
36-
* **Web and mobile applications** – mobile or web apps to protect with Nok Nok solutions and AAD B2C
37-
* **Nok Nok Tutorial Web App** – application used to register the passkey on your device
38-
* **Nok Nok Sign in App** – application used for authenticating AAD B2C applications using passkey.
35+
* **Azure AD B2C** – authorization server that verifies user credentials.
36+
* **Web and mobile applications** – mobile or web apps to protect with Nok Nok solutions and Azure AD B2C.
37+
* **Nok Nok Tutorial Web App** – application to register the passkey on your device.
38+
* **Nok Nok Sign in App** – application for authenticating Azure AD B2C applications using passkey.
3939

4040

41-
The following diagram illustrates the Nok Nok solution as an IdP for AAD B2C by using OpenID Connect (OIDC) for Passkey authentication.
41+
The following diagram illustrates the Nok Nok solution as an IdP for Azure AD B2C by using OpenID Connect (OIDC) for Passkey authentication.
4242

43-
![Diagram of Nok Nok as IdP for AAD B2C using OpenID Connect (OIDC) for Passkey authentication.](./media/partner-nok-nok/nok-nok-architecture-diagram.png)
43+
![Diagram of Nok Nok as IdP for Azure AD B2C using OpenID Connect (OIDC) for Passkey authentication.](./media/partner-nok-nok/nok-nok-architecture-diagram.png)
4444

4545
### Scenario 1: Passkey Registration
4646
1. The user navigates to the Nok Nok Tutorial Web App using the link provided by Nok Nok.
47-
2. They enter their AAD B2C username and default tutorial app password.
48-
3. They are prompted to register the passkey.
49-
4. The Nok Nok server validates the passkey credential and confirms successful registration to the user.
50-
5. The passkey is now registered on the user's device and is ready to authenticate.
47+
2. The user enters their Azure AD B2C username and default tutorial app password.
48+
3. The user receives a prompt to register the passkey.
49+
4. The Nok Nok server validates the passkey credential and confirms successful passkey registration to the user.
50+
5. The passkey on the user's device is ready for authentication.
5151

5252
### Scenario 2: Passkey Authentication
53-
1. The user clicks on the Sign in with Nok Nok Cloud button on the AAD B2C Sign in page.
54-
2. AAD B2C redirects the user to the Nok Nok Signin App.
53+
1. The user selects the Sign in with Nok Nok Cloud button on the Azure AD B2C Sign in page.
54+
2. Azure AD B2C redirects the user to the Nok Nok Signin App.
5555
3. User authenticates with their passkey.
56-
4. The Nok Nok server validates the passkey assertion and sends an OIDC authentication response to AAD B2C.
57-
5. Based on the authentication result, AAD B2C either grants or denies access to the target application.
56+
4. The Nok Nok server validates the passkey assertion and sends an OIDC authentication response to Azure AD B2C.
57+
5. Based on the authentication result, Azure AD B2C either grants or denies access to the target application.
5858

5959

6060
## Get started with Nok Nok
6161

62-
1. Go to noknok.com [Contact](https://noknok.com/contact/).
62+
1. [Contact](https://noknok.com/contact/) Nok Nok.
6363
2. Fill out the form for a Nok Nok tenant.
6464
3. An email arrives with tenant access information and links to documentation.
6565
4. Use the Nok Nok integration documentation to complete the tenant OIDC configuration.
@@ -70,10 +70,10 @@ Use the following instructions to add and configure an IdP, and then configure a
7070

7171
### Add a new Identity provider
7272

73-
For the following instructions, use the directory with the AAD B2C tenant. To add a new IdP:
73+
For the following instructions, use the directory with the Azure AD B2C tenant. To add a new IdP:
7474

75-
1. Sign in to the [Azure portal](https://portal.azure.com/#home) as at least as the B2C IEF Policy Administrator of the AAD B2C tenant.
76-
2. In the portal toolbar, select the **Directories + subscriptions**.
75+
1. Sign in to the [Azure portal](https://portal.azure.com/#home) as at least as the B2C IEF Policy Administrator of the Azure AD B2C tenant.
76+
2. In the portal toolbar, select **Directories + subscriptions**.
7777
3. On **Portal settings, Directories + subscriptions**, in the **Directory name** list, locate the Azure AD B2C directory.
7878
4. Select **Switch**.
7979
5. In the top-left corner of the Azure portal, select **All services**.
@@ -88,7 +88,7 @@ To configure an IdP:
8888

8989
1. Select **Identity provider type** > **OpenID Connect (Preview)**.
9090
2. For **Name**, enter the Nok Nok Authentication Provider, or another name.
91-
3. For **Metadata URL**, enter the following url after replacing the placeholder with the tenant id provided by Nok Nok: `https://cloud.noknok.com/<tenant_id>/webapps/nnlfed/realms/<tenant_id>/.well-known/openid-configuration`.
91+
3. For **Metadata URL**, enter the following URL after replacing the placeholder with the tenant ID provided by Nok Nok: `https://cloud.noknok.com/<tenant_id>/webapps/nnlfed/realms/<tenant_id>/.well-known/openid-configuration`.
9292
4. For **Client Secret**, use the Client Secret from Nok Nok.
9393
5. For **Client ID**, use the Client ID provided by Nok Nok.
9494
6. For **Scope**, use **openid**.
@@ -102,27 +102,27 @@ To configure an IdP:
102102

103103
For the following instructions, Nok Nok is a new OIDC IdP in the B2C identity providers list.
104104

105-
1. In your AAD B2C tenant, under **Policies**, select **User flows**.
105+
1. In your Azure AD B2C tenant, under **Policies**, select **User flows**.
106106
2. Select **New**.
107107
3. Select **Sign up and sign in**.
108108
4. Select a **Version**.
109109
5. Select **Create**.
110110
6. Enter a policy **Name**.
111111
7. In **Identity providers**, select the created Nok Nok IdP.
112-
8. Check **Email signup** under Local accounts to display an intermediate AAD B2C signin/signup page with a button that redirects the user to the Nok Nok Signin App.
112+
8. Check **Email signup** under **Local accounts** to display an intermediate Azure AD B2C signin/signup page with a button that redirects the user to the Nok Nok Signin App.
113113
9. Leave the **Multi-factor Authentication** field.
114-
10. Click on **Create** to save.
114+
10. Click **Create** to save.
115115

116116
## Test the user flow
117117

118-
1. Open the AAD B2C tenant. Under **Policies** select **Identity Experience Framework**.
118+
1. Open the Azure AD B2C tenant. Under **Policies**, select **Identity Experience Framework**.
119119
2. Select the created **SignUpSignIn**.
120120
3. Select **Run user flow**.
121121
4. For **Application**, select the registered app. The example is JWT.
122-
5. For **Reply URL**, select the redirect URL of the application selected at the previous step.
122+
5. For **Reply URL**, select the redirect URL of the application that you previously selected at the previous step.
123123
6. Select **Run user flow**.
124-
7. Perform signin using the AAD B2C username and the previously registered passkey for the same user.
125-
8. Verify the token received after authentication.
124+
7. Perform signin using the Azure AD B2C username and the passkey that you previously registered for the same user.
125+
8. Verify that you received the token after authentication.
126126

127127
If the flow is incomplete, confirm the user is or isn't saved in the directory.
128128

0 commit comments

Comments
 (0)