Skip to content

Commit 9e4760f

Browse files
authored
Merge pull request #190566 from MicrosoftDocs/main
Merge Main to Live, 4 AM
2 parents d9332d6 + c6e7eb9 commit 9e4760f

File tree

199 files changed

+2841
-1104
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

199 files changed

+2841
-1104
lines changed

.openpublishing.redirection.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -38684,6 +38684,11 @@
3868438684
"redirect_url": "/azure/cognitive-services/Speech-Service/language-identification",
3868538685
"redirect_document_id": true
3868638686
},
38687+
{
38688+
"source_path_from_root": "/articles/cognitive-services/Speech-Service/phone-sets.md",
38689+
"redirect_url": "/azure/cognitive-services/Speech-Service/customize-pronunciation",
38690+
"redirect_document_id": true
38691+
},
3868738692
{
3868838693
"source_path_from_root": "/articles/cognitive-services/entitylinking/GettingStarted.md",
3868938694
"redirect_url": "/azure/cognitive-services/text-analytics",

articles/active-directory-b2c/add-password-reset-policy.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -342,3 +342,5 @@ Your application needs to handle certain errors coming from Azure B2C service. L
342342
## Next steps
343343

344344
Set up a [force password reset](force-password-reset.md).
345+
346+
[Sign-up and Sign-in with embedded password reset](https://github.com/azure-ad-b2c/samples/tree/master/policies/embedded-password-reset).

articles/active-directory-b2c/azure-ad-external-identities-videos.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,8 @@ titleSuffix: Azure AD B2C
44
description: Microsoft Azure Active Directory B2C Video Series
55
services: active-directory-b2c
66
author: gargi-sinha
7-
manager: martinco
7+
manager: CelesteDG
8+
ms.reviewer: kengaderdus
89
ms.service: active-directory
910
ms.workload: identity
1011
ms.topic: how-to

articles/active-directory-b2c/azure-sentinel.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,8 @@ titleSuffix: Azure AD B2C
44
description: In this tutorial, you use Microsoft Sentinel to perform security analytics for Azure Active Directory B2C data.
55
services: active-directory-b2c
66
author: gargi-sinha
7-
manager: martinco
7+
manager: CelesteDG
8+
ms.reviewer: kengaderdus
89

910
ms.service: active-directory
1011
ms.workload: identity

articles/active-directory-b2c/configure-a-sample-node-web-app.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ manager: CelesteDG
88
ms.service: active-directory
99
ms.workload: identity
1010
ms.topic: how-to
11-
ms.date: 02/09/2022
11+
ms.date: 04/03/2022
1212
ms.author: kengaderdus
1313
ms.subservice: B2C
1414
---
@@ -143,7 +143,7 @@ You can now test the sample app. You need to start the Node server and access it
143143
### Test sign in
144144

145145
1. After the page with the **Sign in** button finishes loading, select **Sign in**. You're prompted to sign in.
146-
1. Enter your sign-in credentials, such as email address and password. If you don't have an account, select **Sign up now** to create an account. If you have an account but have forgotten your password, select **Forgot your password?** to recover your password. After you successfully sign in or sign up, you should see the following page that shows sign-in status.
146+
1. Enter your sign-in credentials, such as email address and password. If you don't have an account, select **Sign up now** to create an account. After you successfully sign in or sign up, you should see the following page that shows sign-in status.
147147

148148
:::image type="content" source="./media/configure-a-sample-node-web-app/tutorial-dashboard-page.png" alt-text="Screenshot shows web app sign-in status.":::
149149

articles/active-directory-b2c/configure-authentication-in-sample-node-web-app-with-api.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: CelesteDG
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: how-to
12-
ms.date: 02/09/2022
12+
ms.date: 04/03/2022
1313
ms.author: kengaderdus
1414
ms.subservice: B2C
1515
---
@@ -250,7 +250,7 @@ You're now ready to test the web application's scoped access to the web API. Run
250250

251251
1. To call the protected API endpoint, select the **Sign in to call PROTECTED API** button. You're prompted to sign in.
252252
253-
1. Enter your sign-in credentials, such as email address and password. If you don't have an account, select **Sign up now** to create an account. If you have an account but have forgotten your password, select **Forgot your password?** to recover your password. After you successfully sign in or sign up, you should see the following page with **Call the PROTECTED API** button.
253+
1. Enter your sign-in credentials, such as email address and password. If you don't have an account, select **Sign up now** to create an account. After you successfully sign in or sign up, you should see the following page with **Call the PROTECTED API** button.
254254

255255

256256
:::image type="content" source="./media/tutorial-call-api-using-access-token/signed-in-to-call-api.png" alt-text="Web page for signed to call protected A P I.":::

articles/active-directory-b2c/identity-verification-proofing.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,8 @@ titleSuffix: Azure AD B2C
44
description: Learn about our partners who integrate with Azure AD B2C to provide identity proofing and verification solutions
55
services: active-directory-b2c
66
author: gargi-sinha
7-
manager: martinco
7+
manager: CelesteDG
8+
ms.reviewer: kengaderdus
89

910
ms.service: active-directory
1011
ms.workload: identity
8.38 KB
Loading

articles/active-directory-b2c/openid-connect-technical-profile.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -86,7 +86,7 @@ The technical profile also returns claims that aren't returned by the identity p
8686
| ValidTokenIssuerPrefixes | No | A key that can be used to sign in to each of the tenants when using a multi-tenant identity provider such as Azure Active Directory. |
8787
| UsePolicyInRedirectUri | No | Indicates whether to use a policy when constructing the redirect URI. When you configure your application in the identity provider, you need to specify the redirect URI. The redirect URI points to Azure AD B2C, `https://{your-tenant-name}.b2clogin.com/{your-tenant-name}.onmicrosoft.com/oauth2/authresp`. If you specify `true`, you need to add a redirect URI for each policy you use. For example: `https://{your-tenant-name}.b2clogin.com/{your-tenant-name}.onmicrosoft.com/{policy-name}/oauth2/authresp`. |
8888
| MarkAsFailureOnStatusCode5xx | No | Indicates whether a request to an external service should be marked as a failure if the Http status code is in the 5xx range. The default is `false`. |
89-
| DiscoverMetadataByTokenIssuer | No | Indicates whether the OIDC metadata should be discovered by using the issuer in the JWT token. |
89+
| DiscoverMetadataByTokenIssuer | No | Indicates whether the OIDC metadata should be discovered by using the issuer in the JWT token.If you need to build the metadata endpoint URL based on Issuer, set this to `true`.|
9090
| IncludeClaimResolvingInClaimsHandling  | No | For input and output claims, specifies whether [claims resolution](claim-resolver-overview.md) is included in the technical profile. Possible values: `true`, or `false` (default). If you want to use a claims resolver in the technical profile, set this to `true`. |
9191
|token_endpoint_auth_method| No | Specifies how Azure AD B2C sends the authentication header to the token endpoint. Possible values: `client_secret_post` (default), and `client_secret_basic` (public preview), `private_key_jwt` (public preview). For more information, see [OpenID Connect client authentication section](https://openid.net/specs/openid-connect-core-1_0.html#ClientAuthentication). |
9292
|token_signing_algorithm| No | Specifies the signing algorithm to use when `token_endpoint_auth_method` is set to `private_key_jwt`. Possible values: `RS256` (default) or `RS512`.|

articles/active-directory-b2c/partner-akamai.md

Lines changed: 17 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -1,22 +1,23 @@
11
---
2-
title: Tutorial to configure Azure Active Directory B2C with Akamai Web Application Firewall
2+
title: Configure Azure Active Directory B2C with Akamai Web Application Firewall
33
titleSuffix: Azure AD B2C
4-
description: Tutorial to configure Akamai Web application firewall with Azure AD B2C
4+
description: Configure Akamai Web application firewall with Azure AD B2C
55
services: active-directory-b2c
66
author: gargi-sinha
7-
manager: martinco
7+
manager: CelesteDG
8+
ms.reviewer: kengaderdus
89

910
ms.service: active-directory
1011
ms.workload: identity
1112
ms.topic: how-to
12-
ms.date: 07/15/2021
13+
ms.date: 04/03/2022
1314
ms.author: gasinh
1415
ms.subservice: B2C
1516
---
1617

17-
# Tutorial: Configure Akamai with Azure Active Directory B2C
18+
# Configure Akamai with Azure Active Directory B2C
1819

19-
In this sample tutorial, learn how to enable [Akamai Web Application Firewall (WAF)](https://www.akamai.com/us/en/resources/web-application-firewall.jsp) solution for Azure Active Directory (AD) B2C tenant using custom domains. Akamai WAF helps organization protect their web applications from malicious attacks that aim to exploit vulnerabilities such as SQL injection and Cross site scripting.
20+
In this sample article, learn how to enable [Akamai Web Application Firewall (WAF)](https://www.akamai.com/us/en/resources/web-application-firewall.jsp) solution for Azure Active Directory B2C (Azure AD B2C) tenant using custom domains. Akamai WAF helps organization protect their web applications from malicious attacks that aim to exploit vulnerabilities such as SQL injection and Cross site scripting.
2021

2122
>[!NOTE]
2223
>This feature is in public preview.
@@ -29,7 +30,7 @@ Benefits of using Akamai WAF solution:
2930

3031
- Allows fine grained manipulation of traffic to protect and secure your identity infrastructure.
3132

32-
This sample tutorial applies to both [Web Application Protector (WAP)](https://www.akamai.com/us/en/products/security/web-application-protector-enterprise-waf-firewall-ddos-protection.jsp) and [Kona Site Defender (KSD)](https://www.akamai.com/us/en/products/security/kona-site-defender.jsp) WAF solutions that Akamai offers.
33+
This article applies to both [Web Application Protector (WAP)](https://www.akamai.com/us/en/products/security/web-application-protector-enterprise-waf-firewall-ddos-protection.jsp) and [Kona Site Defender (KSD)](https://www.akamai.com/us/en/products/security/kona-site-defender.jsp) WAF solutions that Akamai offers.
3334

3435
## Prerequisites
3536

@@ -55,7 +56,7 @@ Akamai WAF integration includes the following components:
5556

5657
1. To use custom domains in Azure AD B2C, it's required to use custom domain feature provided by Azure Front Door. Learn how to [enable Azure AD B2C custom domains](./custom-domain.md?pivots=b2c-user-flow).
5758

58-
2. After custom domain for Azure AD B2C is successfully configured using Azure Front Door, [test the custom domain](./custom-domain.md?pivots=b2c-custom-policy#test-your-custom-domain) before proceeding further.
59+
1. After custom domain for Azure AD B2C is successfully configured using Azure Front Door, [test the custom domain](./custom-domain.md?pivots=b2c-custom-policy#test-your-custom-domain) before proceeding further.
5960

6061
## Onboard with Akamai
6162

@@ -65,14 +66,14 @@ Akamai WAF integration includes the following components:
6566

6667
1. [Create a new property](https://control.akamai.com/wh/CUSTOMER/AKAMAI/en-US/WEBHELP/property-manager/property-manager-help/GUID-14BB87F2-282F-4C4A-8043-B422344884E6.html).
6768

68-
2. Configure the property settings as:
69+
1. Configure the property settings as:
6970

7071
| Property | Value |
7172
|:---------------|:---------------|
7273
|Property version | Select Standard or Enhanced TLS (preferred) |
73-
|Property hostnames | Add a property hostname. This is the name of your custom domain, for example: login.domain.com. <BR> Create or modify a certificate with the appropriate settings for the custom domain name. For more information, see [this](https://learn.akamai.com/en-us/webhelp/property-manager/https-delivery-with-property-manager/GUID-9EE0EB6A-E62B-4F5F-9340-60CBD093A429.html). |
74+
|Property hostnames | Add a property hostname. This is the name of your custom domain, for example, `login.domain.com`. <BR> Create or modify a certificate with the appropriate settings for the custom domain name. Learn more about [creating a certificate](https://learn.akamai.com/en-us/webhelp/property-manager/https-delivery-with-property-manager/GUID-9EE0EB6A-E62B-4F5F-9340-60CBD093A429.html). |
7475

75-
3. Set the origin server property configuration settings as:
76+
1. Set the origin server property configuration settings as:
7677

7778
|Property| Value |
7879
|:-----------|:-----------|
@@ -83,27 +84,27 @@ Akamai WAF integration includes the following components:
8384

8485
### Configure DNS
8586

86-
Create a CNAME record in your DNS such as login.domain.com that points to the Edge hostname in the Property hostname field.
87+
Create a CNAME record in your DNS such as `login.domain.com` that points to the Edge hostname in the Property hostname field.
8788

8889
### Configure Akamai WAF
8990

9091
1. [Configure Akamai WAF](https://learn.akamai.com/en-us/webhelp/kona-site-defender/kona-site-defender-quick-start/GUID-6294B96C-AE8B-4D99-8F43-11B886E6C39A.html#GUID-6294B96C-AE8B-4D99-8F43-11B886E6C39A).
9192

92-
2. Ensure that **Rule Actions** for all items listed under the **Attack Group** are set to **Deny**.
93+
1. Ensure that **Rule Actions** for all items listed under the **Attack Group** are set to **Deny**.
9394

94-
![Image shows rule action set to deny](./media/partner-akamai/rule-action-deny.png)
95+
![Image shows rule action set to deny](./media/partner-akamai/rule-action-deny.png)
9596

9697
Learn more about [how the control works and configuration options](https://control.akamai.com/dl/security/GUID-81C0214B-602A-4663-839D-68BCBFF41292.html).
9798

9899
<!-- docutune:ignore "Security Center" -->
99100

100101
### Test the settings
101102

102-
Check the following to ensure all traffic to Azure AD B2C is now going through the custom domain:
103+
Check the following to ensure all traffic to Azure AD B2C is going through the custom domain:
103104

104105
- Make sure all incoming requests to Azure AD B2C custom domain are routed via Akamai WAF and using valid TLS connection.
105106
- Ensure all cookies are set correctly by Azure AD B2C for the custom domain.
106-
- The Akamai WAF dashboard available under Defender for Cloud console display charts for all traffic passing through the WAF along with any attack traffic.
107+
- The Akamai WAF dashboard available under Defender for Cloud console display charts for all traffic that pass through the WAF along with any attack traffic.
107108

108109
## Next steps
109110

0 commit comments

Comments
 (0)