You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory-b2c/configure-a-sample-node-web-app.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,7 +8,7 @@ manager: CelesteDG
8
8
ms.service: active-directory
9
9
ms.workload: identity
10
10
ms.topic: how-to
11
-
ms.date: 02/09/2022
11
+
ms.date: 04/03/2022
12
12
ms.author: kengaderdus
13
13
ms.subservice: B2C
14
14
---
@@ -143,7 +143,7 @@ You can now test the sample app. You need to start the Node server and access it
143
143
### Test sign in
144
144
145
145
1. After the page with the **Sign in** button finishes loading, select**Sign in**. You're prompted to sign in.
146
-
1. Enter your sign-in credentials, such as email address and password. If you don't have an account, select**Sign up now** to create an account. If you have an account but have forgotten your password, select**Forgot your password?** to recover your password. After you successfully sign in or sign up, you should see the following page that shows sign-in status.
146
+
1. Enter your sign-in credentials, such as email address and password. If you don't have an account, select**Sign up now** to create an account. After you successfully sign in or sign up, you should see the following page that shows sign-in status.
147
147
148
148
:::image type="content" source="./media/configure-a-sample-node-web-app/tutorial-dashboard-page.png" alt-text="Screenshot shows web app sign-in status.":::
Copy file name to clipboardExpand all lines: articles/active-directory-b2c/configure-authentication-in-sample-node-web-app-with-api.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -9,7 +9,7 @@ manager: CelesteDG
9
9
ms.service: active-directory
10
10
ms.workload: identity
11
11
ms.topic: how-to
12
-
ms.date: 02/09/2022
12
+
ms.date: 04/03/2022
13
13
ms.author: kengaderdus
14
14
ms.subservice: B2C
15
15
---
@@ -250,7 +250,7 @@ You're now ready to test the web application's scoped access to the web API. Run
250
250
251
251
1. To call the protected API endpoint, selectthe**Sign in to call PROTECTED API** button. You're prompted to sign in.
252
252
253
-
1. Enter your sign-in credentials, such as email address and password. If you don't have an account, select**Sign up now** to create an account. If you have an account but have forgotten your password, select**Forgot your password?** to recover your password. After you successfully sign in or sign up, you should see the following page with **Call the PROTECTED API** button.
253
+
1. Enter your sign-in credentials, such as email address and password. If you don't have an account, select**Sign up now** to create an account. After you successfully sign in or sign up, you should see the following page with **Call the PROTECTED API** button.
254
254
255
255
256
256
:::image type="content" source="./media/tutorial-call-api-using-access-token/signed-in-to-call-api.png" alt-text="Web page for signed to call protected A P I.":::
Copy file name to clipboardExpand all lines: articles/active-directory-b2c/openid-connect-technical-profile.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -86,7 +86,7 @@ The technical profile also returns claims that aren't returned by the identity p
86
86
| ValidTokenIssuerPrefixes | No | A key that can be used to sign in to each of the tenants when using a multi-tenant identity provider such as Azure Active Directory. |
87
87
| UsePolicyInRedirectUri | No | Indicates whether to use a policy when constructing the redirect URI. When you configure your application in the identity provider, you need to specify the redirect URI. The redirect URI points to Azure AD B2C, `https://{your-tenant-name}.b2clogin.com/{your-tenant-name}.onmicrosoft.com/oauth2/authresp`. If you specify `true`, you need to add a redirect URI for each policy you use. For example: `https://{your-tenant-name}.b2clogin.com/{your-tenant-name}.onmicrosoft.com/{policy-name}/oauth2/authresp`. |
88
88
| MarkAsFailureOnStatusCode5xx | No | Indicates whether a request to an external service should be marked as a failure if the Http status code is in the 5xx range. The default is `false`. |
89
-
| DiscoverMetadataByTokenIssuer | No | Indicates whether the OIDC metadata should be discovered by using the issuer in the JWT token.|
89
+
| DiscoverMetadataByTokenIssuer | No | Indicates whether the OIDC metadata should be discovered by using the issuer in the JWT token.If you need to build the metadata endpoint URL based on Issuer, set this to `true`.|
90
90
| IncludeClaimResolvingInClaimsHandling | No | For input and output claims, specifies whether [claims resolution](claim-resolver-overview.md) is included in the technical profile. Possible values: `true`, or `false` (default). If you want to use a claims resolver in the technical profile, set this to `true`. |
91
91
|token_endpoint_auth_method| No | Specifies how Azure AD B2C sends the authentication header to the token endpoint. Possible values: `client_secret_post` (default), and `client_secret_basic` (public preview), `private_key_jwt` (public preview). For more information, see [OpenID Connect client authentication section](https://openid.net/specs/openid-connect-core-1_0.html#ClientAuthentication). |
92
92
|token_signing_algorithm| No | Specifies the signing algorithm to use when `token_endpoint_auth_method` is set to `private_key_jwt`. Possible values: `RS256` (default) or `RS512`.|
Copy file name to clipboardExpand all lines: articles/active-directory-b2c/partner-akamai.md
+17-16Lines changed: 17 additions & 16 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,22 +1,23 @@
1
1
---
2
-
title: Tutorial to configure Azure Active Directory B2C with Akamai Web Application Firewall
2
+
title: Configure Azure Active Directory B2C with Akamai Web Application Firewall
3
3
titleSuffix: Azure AD B2C
4
-
description: Tutorial to configure Akamai Web application firewall with Azure AD B2C
4
+
description: Configure Akamai Web application firewall with Azure AD B2C
5
5
services: active-directory-b2c
6
6
author: gargi-sinha
7
-
manager: martinco
7
+
manager: CelesteDG
8
+
ms.reviewer: kengaderdus
8
9
9
10
ms.service: active-directory
10
11
ms.workload: identity
11
12
ms.topic: how-to
12
-
ms.date: 07/15/2021
13
+
ms.date: 04/03/2022
13
14
ms.author: gasinh
14
15
ms.subservice: B2C
15
16
---
16
17
17
-
# Tutorial: Configure Akamai with Azure Active Directory B2C
18
+
# Configure Akamai with Azure Active Directory B2C
18
19
19
-
In this sample tutorial, learn how to enable [Akamai Web Application Firewall (WAF)](https://www.akamai.com/us/en/resources/web-application-firewall.jsp) solution for Azure Active Directory (AD) B2C tenant using custom domains. Akamai WAF helps organization protect their web applications from malicious attacks that aim to exploit vulnerabilities such as SQL injection and Cross site scripting.
20
+
In this sample article, learn how to enable [Akamai Web Application Firewall (WAF)](https://www.akamai.com/us/en/resources/web-application-firewall.jsp) solution for Azure Active Directory B2C (Azure AD B2C) tenant using custom domains. Akamai WAF helps organization protect their web applications from malicious attacks that aim to exploit vulnerabilities such as SQL injection and Cross site scripting.
20
21
21
22
>[!NOTE]
22
23
>This feature is in public preview.
@@ -29,7 +30,7 @@ Benefits of using Akamai WAF solution:
29
30
30
31
- Allows fine grained manipulation of traffic to protect and secure your identity infrastructure.
31
32
32
-
This sample tutorial applies to both [Web Application Protector (WAP)](https://www.akamai.com/us/en/products/security/web-application-protector-enterprise-waf-firewall-ddos-protection.jsp) and [Kona Site Defender (KSD)](https://www.akamai.com/us/en/products/security/kona-site-defender.jsp) WAF solutions that Akamai offers.
33
+
This article applies to both [Web Application Protector (WAP)](https://www.akamai.com/us/en/products/security/web-application-protector-enterprise-waf-firewall-ddos-protection.jsp) and [Kona Site Defender (KSD)](https://www.akamai.com/us/en/products/security/kona-site-defender.jsp) WAF solutions that Akamai offers.
33
34
34
35
## Prerequisites
35
36
@@ -55,7 +56,7 @@ Akamai WAF integration includes the following components:
55
56
56
57
1. To use custom domains in Azure AD B2C, it's required to use custom domain feature provided by Azure Front Door. Learn how to [enable Azure AD B2C custom domains](./custom-domain.md?pivots=b2c-user-flow).
57
58
58
-
2. After custom domain for Azure AD B2C is successfully configured using Azure Front Door, [test the custom domain](./custom-domain.md?pivots=b2c-custom-policy#test-your-custom-domain) before proceeding further.
59
+
1. After custom domain for Azure AD B2C is successfully configured using Azure Front Door, [test the custom domain](./custom-domain.md?pivots=b2c-custom-policy#test-your-custom-domain) before proceeding further.
59
60
60
61
## Onboard with Akamai
61
62
@@ -65,14 +66,14 @@ Akamai WAF integration includes the following components:
65
66
66
67
1.[Create a new property](https://control.akamai.com/wh/CUSTOMER/AKAMAI/en-US/WEBHELP/property-manager/property-manager-help/GUID-14BB87F2-282F-4C4A-8043-B422344884E6.html).
67
68
68
-
2. Configure the property settings as:
69
+
1. Configure the property settings as:
69
70
70
71
| Property | Value |
71
72
|:---------------|:---------------|
72
73
|Property version | Select Standard or Enhanced TLS (preferred) |
73
-
|Property hostnames | Add a property hostname. This is the name of your custom domain, for example: login.domain.com. <BR> Create or modify a certificate with the appropriate settings for the custom domain name. For more information, see [this](https://learn.akamai.com/en-us/webhelp/property-manager/https-delivery-with-property-manager/GUID-9EE0EB6A-E62B-4F5F-9340-60CBD093A429.html). |
74
+
|Property hostnames | Add a property hostname. This is the name of your custom domain, for example, `login.domain.com`. <BR> Create or modify a certificate with the appropriate settings for the custom domain name. Learn more about [creating a certificate](https://learn.akamai.com/en-us/webhelp/property-manager/https-delivery-with-property-manager/GUID-9EE0EB6A-E62B-4F5F-9340-60CBD093A429.html). |
74
75
75
-
3. Set the origin server property configuration settings as:
76
+
1. Set the origin server property configuration settings as:
76
77
77
78
|Property| Value |
78
79
|:-----------|:-----------|
@@ -83,27 +84,27 @@ Akamai WAF integration includes the following components:
83
84
84
85
### Configure DNS
85
86
86
-
Create a CNAME record in your DNS such as login.domain.com that points to the Edge hostname in the Property hostname field.
87
+
Create a CNAME record in your DNS such as `login.domain.com` that points to the Edge hostname in the Property hostname field.
2. Ensure that **Rule Actions** for all items listed under the **Attack Group** are set to **Deny**.
93
+
1. Ensure that **Rule Actions** for all items listed under the **Attack Group** are set to **Deny**.
93
94
94
-

95
+

95
96
96
97
Learn more about [how the control works and configuration options](https://control.akamai.com/dl/security/GUID-81C0214B-602A-4663-839D-68BCBFF41292.html).
97
98
98
99
<!-- docutune:ignore "Security Center" -->
99
100
100
101
### Test the settings
101
102
102
-
Check the following to ensure all traffic to Azure AD B2C is now going through the custom domain:
103
+
Check the following to ensure all traffic to Azure AD B2C is going through the custom domain:
103
104
104
105
- Make sure all incoming requests to Azure AD B2C custom domain are routed via Akamai WAF and using valid TLS connection.
105
106
- Ensure all cookies are set correctly by Azure AD B2C for the custom domain.
106
-
- The Akamai WAF dashboard available under Defender for Cloud console display charts for all traffic passing through the WAF along with any attack traffic.
107
+
- The Akamai WAF dashboard available under Defender for Cloud console display charts for all traffic that pass through the WAF along with any attack traffic.
0 commit comments