Skip to content

Commit b86ae63

Browse files
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into Patch-Update-defender-for-containers-vulnerability-assessment-azure
2 parents 07fdf61 + 016d6d4 commit b86ae63

File tree

2,663 files changed

+27784
-15756
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

2,663 files changed

+27784
-15756
lines changed

.gitattributes

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -6,6 +6,9 @@
66
*.c text
77
*.h text
88

9+
# Include Markdown in the GitHub language breakdown statistics
10+
*.md linguist-detectable
11+
912
# Denote all files that are truly binary and should not be modified.
1013
*.gif binary
1114
*.ico binary

.openpublishing.redirection.active-directory.json

Lines changed: 1197 additions & 1 deletion
Large diffs are not rendered by default.

.openpublishing.redirection.app-service.json

Lines changed: 25 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,30 @@
11
{
22
"redirections": [
3+
{
4+
"source_path_from_root": "/articles/app-service/scenario-secure-app-authentication-app-service-as-user.md",
5+
"redirect_url": "/azure/app-service/scenario-secure-app-authentication-app-service",
6+
"redirect_document_id": false
7+
},
8+
{
9+
"source_path_from_root": "/articles/app-service/deploy-resource-manager-template.md",
10+
"redirect_url": "/azure/app-service/quickstart-arm-template",
11+
"redirect_document_id": false
12+
},
13+
{
14+
"source_path_from_root": "/articles/app-service/deploy-complex-application-predictably.md",
15+
"redirect_url": "/azure/app-service/quickstart-arm-template",
16+
"redirect_document_id": false
17+
},
18+
{
19+
"source_path_from_root": "/articles/app-service/quickstart-html.md",
20+
"redirect_url": "/azure/static-web-apps/get-started-portal",
21+
"redirect_document_id": false
22+
},
23+
{
24+
"source_path_from_root": "/articles/app-service/quickstart-html-uiex.md",
25+
"redirect_url": "/azure/static-web-apps/get-started-portal",
26+
"redirect_document_id": false
27+
},
328
{
429
"source_path_from_root": "/articles/app-service-web/web-sites-restore.md",
530
"redirect_url": "/azure/app-service/manage-backup",

.openpublishing.redirection.json

Lines changed: 21 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1593,6 +1593,12 @@
15931593
"redirect_url": "/azure/frontdoor/how-to-configure-origin",
15941594
"redirect_document_id": false
15951595
},
1596+
{
1597+
"source_path_from_root": "/articles/frontdoor/front-door-application-security.md",
1598+
"redirect_url": "/azure/frontdoor/web-application-firewall",
1599+
"redirect_document_id": false
1600+
},
1601+
15961602
{
15971603
"source_path_from_root": "/articles/aks/aks-resource-health.md",
15981604
"redirect_url": "/troubleshoot/azure/azure-kubernetes/welcome-azure-kubernetes",
@@ -6488,6 +6494,11 @@
64886494
"redirect_url": "/azure/automation/change-tracking/manage-inventory-vms",
64896495
"redirect_document_id": false
64906496
},
6497+
{
6498+
"source_path_from_root": "/articles/automation/create-run-as-account.md",
6499+
"redirect_url": "/azure/automation/enable-managed-identity-for-automation",
6500+
"redirect_document_id": false
6501+
},
64916502
{
64926503
"source_path_from_root": "/articles/automation/automation-scope-configurations-change-tracking.md",
64936504
"redirect_url": "/azure/automation/change-tracking/manage-scope-configurations.md",
@@ -13583,6 +13594,16 @@
1358313594
"redirect_url": "/azure/notification-hubs/ios-sdk-legacy",
1358413595
"redirect_document_id": false
1358513596
},
13597+
{
13598+
"source_path_from_root": "/articles/notification-hubs/availability-zones.md",
13599+
"redirect_url": "/azure/notification-hubs/notification-hubs-high-availability",
13600+
"redirect_document_id": false
13601+
},
13602+
{
13603+
"source_path_from_root": "/articles/notification-hubs/cross-region-recovery.md",
13604+
"redirect_url": "/azure/notification-hubs/notification-hubs-high-availability",
13605+
"redirect_document_id": false
13606+
},
1358613607
{
1358713608
"source_path_from_root": "/articles/open-datasets/service/how-to-create-dataset-from-open-dataset.md",
1358813609
"redirect_url": "/azure/open-datasets/how-to-create-azure-machine-learning-dataset-from-open-dataset",

articles/active-directory-b2c/identity-provider-microsoft-account.md

Lines changed: 2 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: CelesteDG
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: how-to
12-
ms.date: 02/13/2023
12+
ms.date: 05/01/2023
1313
ms.custom: project-no-code
1414
ms.author: godonnell
1515
ms.subservice: B2C
@@ -30,14 +30,6 @@ zone_pivot_groups: b2c-policy-type
3030

3131
[!INCLUDE [active-directory-b2c-customization-prerequisites](../../includes/active-directory-b2c-customization-prerequisites.md)]
3232

33-
### Verify the application's publisher domain
34-
As of November 2020, new application registrations show up as unverified in the user consent prompt unless [the application's publisher domain is verified](../active-directory/develop/howto-configure-publisher-domain.md) ***and*** the company’s identity has been verified with the Microsoft Partner Network and associated with the application. ([Learn more](../active-directory/develop/publisher-verification-overview.md) about this change.) Note that for Azure AD B2C user flows, the publisher’s domain appears only when using a Microsoft account or other [Azure AD](../active-directory-b2c/identity-provider-azure-ad-single-tenant.md) tenant as the identity provider. To meet these new requirements, do the following:
35-
36-
1. [Verify your company identity using your Microsoft Partner Network (MPN) account](/partner-center/verification-responses). This process verifies information about your company and your company’s primary contact.
37-
1. Complete the publisher verification process to associate your MPN account with your app registration using one of the following options:
38-
- If the app registration for the Microsoft account identity provider is in an Azure AD tenant, [verify your app in the App Registration portal](../active-directory/develop/mark-app-as-publisher-verified.md).
39-
- If your app registration for the Microsoft account identity provider is in an Azure AD B2C tenant, [mark your app as publisher verified using Microsoft Graph APIs](../active-directory/develop/troubleshoot-publisher-verification.md#making-microsoft-graph-api-calls) (for example, using Graph Explorer). The UI for setting an app’s verified publisher is currently disabled for Azure AD B2C tenants.
40-
4133
## Create a Microsoft account application
4234

4335
To enable sign-in for users with a Microsoft account in Azure Active Directory B2C (Azure AD B2C), you need to create an application in [Azure portal](https://portal.azure.com). For more information, see [Register an application with the Microsoft identity platform](../active-directory/develop/quickstart-register-app.md). If you don't already have a Microsoft account, you can get one at [https://www.live.com/](https://www.live.com/).
@@ -209,4 +201,4 @@ You've now configured your policy so that Azure AD B2C knows how to communicate
209201

210202
If the sign-in process is successful, your browser is redirected to `https://jwt.ms`, which displays the contents of the token returned by Azure AD B2C.
211203

212-
::: zone-end
204+
::: zone-end

articles/active-directory-b2c/manage-user-access.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -46,7 +46,7 @@ The following is an example of a user flow for gathering parental consent:
4646

4747
2. The application processes the JSON token and shows a screen to the minor, notifying them that parental consent is required and requesting the consent of a parent online.
4848

49-
3. Azure AD B2C shows a sign-in journey that the user can sign in to normally and issues a token to the application that is set to include **legalAgeGroupClassification = "minorWithParentalConsent"**. The application collects the email address of the parent and verifies that the parent is an adult. To do so, it uses a trusted source, such as a national ID office, license verification, or credit card proof. If verification is successful, the application prompts the minor to sign in by using the Azure AD B2C user flow. If consent is denied (for example, if **legalAgeGroupClassification = "minorWithoutParentalConsent"**), Azure AD B2C returns a JSON token (not a login) to the application to restart the consent process. It is optionally possible to customize the user flow so that a minor or an adult can regain access to a minor's account by sending a registration code to the minor's email address or the adult's email address on record.
49+
3. Azure AD B2C shows a sign-in journey that the user can sign in to normally and issues a token to the application that is set to include **legalAgeGroupClassification = "minorWithParentalConsent"**. The application collects the email address of the parent and verifies that the parent is an adult. To do so, it uses a trusted source, such as a national/regional ID office, license verification, or credit card proof. If verification is successful, the application prompts the minor to sign in by using the Azure AD B2C user flow. If consent is denied (for example, if **legalAgeGroupClassification = "minorWithoutParentalConsent"**), Azure AD B2C returns a JSON token (not a login) to the application to restart the consent process. It is optionally possible to customize the user flow so that a minor or an adult can regain access to a minor's account by sending a registration code to the minor's email address or the adult's email address on record.
5050

5151
4. The application offers an option to the minor to revoke consent.
5252

articles/active-directory-b2c/partner-akamai.md

Lines changed: 65 additions & 60 deletions
Original file line numberDiff line numberDiff line change
@@ -1,113 +1,118 @@
11
---
2-
title: Configure Azure Active Directory B2C with Akamai Web Application Firewall
2+
title: Configure Azure Active Directory B2C with Akamai Web Application Protector
33
titleSuffix: Azure AD B2C
4-
description: Configure Akamai Web application firewall with Azure AD B2C
4+
description: Configure Akamai Web Application Protector with Azure AD B2C
55
services: active-directory-b2c
66
author: gargi-sinha
7-
manager: CelesteDG
7+
manager: martinco
88
ms.reviewer: kengaderdus
9-
109
ms.service: active-directory
1110
ms.workload: identity
1211
ms.topic: how-to
13-
ms.date: 04/03/2022
12+
ms.date: 05/04/2023
1413
ms.author: gasinh
1514
ms.subservice: B2C
1615
---
1716

18-
# Configure Akamai with Azure Active Directory B2C
19-
20-
In this sample article, learn how to enable [Akamai Web Application Firewall (WAF)](https://www.akamai.com/us/en/resources/web-application-firewall.jsp) solution for Azure Active Directory B2C (Azure AD B2C) tenant using custom domains. Akamai WAF helps organization protect their web applications from malicious attacks that aim to exploit vulnerabilities such as SQL injection and Cross site scripting.
17+
# Configure Azure Active Directory B2C with Akamai Web Application Protector
2118

22-
>[!NOTE]
23-
>This feature is in public preview.
19+
Learn to enable Akamai Web Application Protector (WAP) for Azure Active Directory B2C (Azure AD B2C) tenant using custom domains. Akamai WAP helps organization protect their web applications from malicious attacks that aim to exploit vulnerabilities such as SQL injection and Cross site scripting.
2420

25-
Benefits of using Akamai WAF solution:
21+
Learn more on akamai.com: [What Is a Web Application Firewall (WAF)?](https://www.akamai.com/glossary/what-is-a-waf)
2622

27-
- An edge platform that allows traffic management to your services.
23+
Benefits of using WAF:
2824

29-
- Can be configured in front of your Azure AD B2C tenant.
25+
* Control traffic management to your services
26+
* Configure in front of an Azure AD B2C tenant
27+
* Manipulate traffic to protect and secure your identity infrastructure
3028

31-
- Allows fine grained manipulation of traffic to protect and secure your identity infrastructure.
29+
This article applies to:
3230

33-
This article applies to both [Web Application Protector (WAP)](https://www.akamai.com/us/en/products/security/web-application-protector-enterprise-waf-firewall-ddos-protection.jsp) and [Kona Site Defender (KSD)](https://www.akamai.com/us/en/products/security/kona-site-defender.jsp) WAF solutions that Akamai offers.
31+
WAP: [Web Application Protector](https://www.akamai.com/products/web-application-protector)
32+
KSD: [Kona Site Defender](https://www.akamai.com/us/en/products/security/kona-site-defender.jsp)
3433

3534
## Prerequisites
3635

37-
To get started, you'll need:
38-
39-
- An Azure subscription. If you don't have a subscription, you can get a [free account](https://azure.microsoft.com/free/).
40-
41-
- [An Azure AD B2C tenant](tutorial-create-tenant.md) that is linked to your Azure subscription.
42-
43-
- An [Akamai WAF](https://www.akamai.com/us/en/akamai-free-trials.jsp) account.
36+
* An Azure subscription
37+
* If you don't have one, get an [Azure free account](https://azure.microsoft.com/free/)
38+
* An Azure AD B2C tenant linked to your Azure subscription
39+
* See, [Tutorial: Create an Azure Active Directory B2C tenant](tutorial-create-tenant.md)
40+
* An Akamai WAP account
41+
* Go to akamai.com for [Explore all Akamai products and trials](https://www.akamai.com/us/en/akamai-free-trials.jsp)
4442

4543
## Scenario description
4644

47-
Akamai WAF integration includes the following components:
45+
Akamai WAP integration includes the following components:
4846

49-
- **Azure AD B2C Tenant** – The authorization server, responsible for verifying the user’s credentials using the custom policies defined in the tenant. It's also known as the identity provider.
50-
51-
- [**Azure Front Door**](../frontdoor/front-door-overview.md) – Responsible for enabling custom domains for Azure B2C tenant. All traffic from Akamai WAF will be routed to Azure Front Door before arriving at Azure AD B2C tenant.
52-
53-
- [**Akamai WAF**](https://www.akamai.com/us/en/resources/waf.jsp) – The web application firewall, which manages all traffic that is sent to the authorization server.
47+
* **Azure AD B2C** – the authorization server that verifies user credentials with custom policies in the tenant. Also known as the identity provider (IdP).
48+
* **Azure Front Door** – enables custom domains for the Azure B2C tenant
49+
* Traffic from Akamai WAP routs to Azure Front Door then goes to the Azure AD B2C tenant
50+
* [What is Azure Front Door?](../frontdoor/front-door-overview.md)
51+
* **Akamai WAP** – The web application firewall that manages traffic sent to the authorization server
52+
* See, [Web Application Protector](https://www.akamai.com/us/en/resources/waf.jsp)
5453

5554
## Integrate with Azure AD B2C
5655

57-
1. To use custom domains in Azure AD B2C, it's required to use custom domain feature provided by Azure Front Door. Learn how to [enable Azure AD B2C custom domains](./custom-domain.md?pivots=b2c-user-flow).
56+
For custom domains in Azure AD B2C, use the custom domain feature in Azure Front Door.
5857

59-
1. After custom domain for Azure AD B2C is successfully configured using Azure Front Door, [test the custom domain](./custom-domain.md?pivots=b2c-custom-policy#test-your-custom-domain) before proceeding further.
58+
See, [Enable custom domains for Azure AD B2C](./custom-domain.md?pivots=b2c-user-flow).
6059

61-
## Onboard with Akamai
60+
When the custom domain for Azure AD B2C is configured using Azure Front Door, use the following instructions to test the custom domain.
6261

63-
[Sign-up](https://www.akamai.com) and create an Akamai account.
62+
See, [Test your custom domain](./custom-domain.md?pivots=b2c-custom-policy#test-your-custom-domain), then proceed to the next section.
6463

65-
### Create and configure property
64+
## Create an Akamai account
6665

67-
1. [Create a new property](https://control.akamai.com/wh/CUSTOMER/AKAMAI/en-US/WEBHELP/property-manager/property-manager-help/GUID-14BB87F2-282F-4C4A-8043-B422344884E6.html).
66+
1. Go to [akamai.com](https://www.akamai.com).
67+
2. Select **Learn more**.
68+
3. On the **Cloud Computing Services** page, select **Create account**.
6869

69-
1. Configure the property settings as:
70+
### Create and configure a property
7071

71-
| Property | Value |
72-
|:---------------|:---------------|
73-
|Property version | Select Standard or Enhanced TLS (preferred) |
74-
|Property hostnames | Add a property hostname. This is the name of your custom domain, for example, `login.domain.com`. <BR> Create or modify a certificate with the appropriate settings for the custom domain name. Learn more about [creating a certificate](https://learn.akamai.com/en-us/webhelp/property-manager/https-delivery-with-property-manager/GUID-9EE0EB6A-E62B-4F5F-9340-60CBD093A429.html). |
72+
A property is a configuration file that tells our edge servers how to handle and respond to incoming requests from your end users. Properties are created and maintained in Property Manager.
7573

76-
1. Set the origin server property configuration settings as:
74+
To learn more, go to techdocs.akamai.com for [What is a Property?](https://techdocs.akamai.com/start/docs/prop)
7775

78-
|Property| Value |
79-
|:-----------|:-----------|
80-
| Origin type | Your origin |
81-
| Origin server hostname | yourafddomain.azurefd.net |
82-
| Forward host header | Incoming Host Header |
83-
| Cache key hostname| Incoming Host Header |
76+
1. Go to control.akamai.com to sign in: [Akamai Control Center sign in page](https://control.akamai.com/wh/CUSTOMER/AKAMAI/en-US/WEBHELP/property-manager/property-manager-help/GUID-14BB87F2-282F-4C4A-8043-B422344884E6.html).
77+
2. Go to Property Manager.
78+
3. For **Property version**, select **Standard** or **Enhanced TLS** (recommended).
79+
4. For **Property hostnames**, add a property hostname, your custom domain. For example, `login.domain.com`.
8480

85-
### Configure DNS
81+
> [!IMPORTANT]
82+
> Create or modify certificates with correct custom domain name settings. </br> Go to techdocs.akamai.com for [Configure HTTPS hostnames](https://learn.akamai.com/en-us/webhelp/property-manager/https-delivery-with-property-manager/GUID-9EE0EB6A-E62B-4F5F-9340-60CBD093A429.html).
8683
87-
Create a CNAME record in your DNS such as `login.domain.com` that points to the Edge hostname in the Property hostname field.
84+
#### Origin server property configuration settings
8885

89-
### Configure Akamai WAF
86+
Use the following settings for origin server.
9087

91-
1. [Configure Akamai WAF](https://learn.akamai.com/en-us/webhelp/kona-site-defender/kona-site-defender-quick-start/GUID-6294B96C-AE8B-4D99-8F43-11B886E6C39A.html#GUID-6294B96C-AE8B-4D99-8F43-11B886E6C39A).
88+
1. For **Origin type**, enter your type.
89+
2. For **Origin server hostname** enter your hostname. For example, `yourafddomain.azurefd.net`
90+
3. For **Forward host header**, use **Incoming Host Header**.
91+
4. For **Cache key hostname** use **Incoming Host Header**.
92+
93+
### Configure DNS
9294

93-
1. Ensure that **Rule Actions** for all items listed under the **Attack Group** are set to **Deny**.
95+
Create a Canonical Name (CNAME) record in your DNS, such as `login.domain.com`, which points to the Edge hostname in the **Property hostname** field.
9496

95-
![Image shows rule action set to deny](./media/partner-akamai/rule-action-deny.png)
97+
### Configure Akamai WAP
9698

97-
Learn more about [how the control works and configuration options](https://control.akamai.com/dl/security/GUID-81C0214B-602A-4663-839D-68BCBFF41292.html).
99+
1. To get started with WAP configuration, go to techdocs.akamai.com for [App & API Protector](https://techdocs.akamai.com/cloud-security/docs/app-api-protector).
100+
2. During configuration, for items in **Attack Group**, under **Rule Actions**, select **Deny**.
98101

99-
<!-- docutune:ignore "Security Center" -->
102+
![Screenshot of denied attack groups, in the Rule Action column.](./media/partner-akamai/rule-action-deny.png)
100103

101104
### Test the settings
102105

103-
Check the following to ensure all traffic to Azure AD B2C is going through the custom domain:
106+
To ensure traffic to Azure AD B2C goes through the custom domain:
104107

105-
- Make sure all incoming requests to Azure AD B2C custom domain are routed via Akamai WAF and using valid TLS connection.
106-
- Ensure all cookies are set correctly by Azure AD B2C for the custom domain.
107-
- The Akamai WAF dashboard available under Defender for Cloud console display charts for all traffic that pass through the WAF along with any attack traffic.
108+
* Confirm WAP routes incoming requests to the Azure AD B2C custom domain
109+
* Ensure a valid TLS connection
110+
* Ensure Azure AD B2C sets cookies correctly for the custom domain
111+
* The WAP dashboard in Defender for Cloud console has WAP traffic charts
112+
* Attack traffic also appears
108113

109114
## Next steps
110115

111-
- [Configure a custom domain in Azure AD B2C](./custom-domain.md?pivots=b2c-user-flow)
116+
* [Enable custom domains for Azure Active Directory B2C](./custom-domain.md?pivots=b2c-user-flow)
117+
* [Tutorial: Create user flows and custom policies in Azure AD B2C](./tutorial-create-user-flows.md?pivots=b2c-custom-policy&tabs=applications)
112118

113-
- [Get started with custom policies in Azure AD B2C](./tutorial-create-user-flows.md?pivots=b2c-custom-policy&tabs=applications)

0 commit comments

Comments
 (0)