Skip to content

Commit d3f3e36

Browse files
Merge pull request #224603 from v-edmckillop/patch-90
Update partner-ping-identity.md
2 parents 99408be + 851b9bd commit d3f3e36

File tree

1 file changed

+11
-11
lines changed

1 file changed

+11
-11
lines changed

articles/active-directory-b2c/partner-ping-identity.md

Lines changed: 11 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.reviewer: kengaderdus
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: how-to
12-
ms.date: 12/9/2022
12+
ms.date: 01/20/2023
1313
ms.author: gasinh
1414
ms.subservice: B2C
1515
---
@@ -22,7 +22,7 @@ Many e-commerce sites and web applications exposed to the internet are deployed
2222

2323
Generally, configurations include an authentication translation layer that externalizes the authentication from the web application. Reverse proxies provide the authenticated user context to the web applications, such as a header value in clear or digest form. The applications aren't using industry standard tokens such as Security Assertion Markup Language (SAML), OAuth, or Open ID Connect (OIDC). Instead, the proxy provides authentication context and maintains the session with the end-user agent such as browser or native application. As a service running as a man-in-the-middle, proxies provide significant session control. The proxy service is efficient and scalable, not a bottleneck for applications behind the proxy service. The diagram is a reverse-proxy implementation and communications flow.
2424

25-
![Reverse proxy implementation](./media/partner-ping/reverse-proxy.png)
25+
![Diagram of the reverse proxy implementation.](./media/partner-ping/reverse-proxy.png)
2626

2727
## Modernization
2828

@@ -45,7 +45,7 @@ Proxies support the modern authentication protocols and use the redirect-based (
4545
In Azure AD B2C, you define policies that drive user experiences and behaviors, also called user journeys. Each such policy exposes a protocol endpoint that can perform the authentication as an IdP. On the application side, there's no special handling required for certain policies. An application makes a standard authentication request to the protocol-specific authentication endpoint exposed by a policy.
4646
You can configure Azure AD B2C to share the same issuer across policies or unique issuer for each policy. Each application can point to policies by making a protocol-native authentication request, which drives user behaviors such as sign-in, sign-up, and profile edits. The diagram shows OIDC and SAML application workflows.
4747

48-
![O I D C and S A M L implementation](./media/partner-ping/azure-ad-identity-provider.png)
48+
![Diagram of the OIDC and SAML application workflows.](./media/partner-ping/azure-ad-identity-provider.png)
4949

5050
The scenario can be challenging for the legacy applications to redirect the user accurately. The access request to the applications might not include the user experience context. In most cases, the proxy layer, or an integrated agent on the web application, intercepts the access request.
5151

@@ -55,27 +55,27 @@ You can deploy PingAccess as the reverse proxy. PingAccess intercepts a direct r
5555

5656
Configure PingAccess with OIDC, OAuth2, or SAML for authentication with an upstream authentication provider. You can configure an upstream IdP for this purpose on the PingAccess server. See the following diagram.
5757

58-
![PingAccess with O I D C implementation](./media/partner-ping/authorization-flow.png)
58+
![Diagram of an upstream IDP on a PingAccess server.](./media/partner-ping/authorization-flow.png)
5959

6060
In a typical Azure AD B2C deployment with policies exposing IdPs, there's a challenge. PingAccess is configured with one, upstream IdP.
6161

6262
### PingFederate federation proxy
6363

64-
You can configure PingFederate as an authentication provider, or a proxy. for upstream IdPs. See the following diagram.
64+
You can configure PingFederate as an authentication provider, or a proxy, for upstream IdPs. See the following diagram.
6565

66-
![PingFederate implementation](./media/partner-ping/pingfederate.png)
66+
![Diagram of PingFederate configured an authentication provider, or a proxy, for upstream IDPs.](./media/partner-ping/pingfederate.png)
6767

6868
Use this function to contextually, dynamically, or declaratively switch an inbound request to an Azure AD B2C policy. See the following diagram of protocol sequence flow.
6969

70-
![image shows the PingAccess and PingFederate workflow](./media/partner-ping/pingaccess-pingfederate-workflow.png)
70+
![Diagram of the protocol sequence flow for PingAccess, PingFederate, Azure AD B2C, and the applicaiton.](./media/partner-ping/pingaccess-pingfederate-workflow.png)
7171

7272
## Prerequisites
7373

7474
To get started, you'll need:
7575

7676
- An Azure subscription
7777
- If you don't have one, get an [Azure free account](https://azure.microsoft.com/free/)
78-
- An [Azure AD B2C tenant](/tutorial-create-tenant.md) linked to your Azure subscription
78+
- An [Azure AD B2C tenant](tutorial-create-tenant.md) linked to your Azure subscription
7979
- PingAccess and PingFederate deployed in Docker containers or on Azure virtual machines (VMs)
8080

8181
## Connectivity and communication
@@ -93,15 +93,15 @@ Confirm the following connectivity and communication.
9393

9494
You can use basic user flows or advanced Identity Enterprise Framework (IEF) policies. PingAccess generates the metadata endpoint, based on the issuer value, by using the [WebFinger](https://tools.ietf.org/html/rfc7033) protocol for discovery convention. To follow this convention, update the Azure AD B2C issuer using user-flow policy properties.
9595

96-
![image shows the token settings](./media/partner-ping/token-setting.png)
96+
![Screenshot of the subject sub claim URL on the Token compatibility dialog.](./media/partner-ping/token-setting.png)
9797

9898
In the advanced policies, configuration includes the IssuanceClaimPattern metadata element to AuthorityWithTfp value in the [JWT token issuer technical profile](./jwt-issuer-technical-profile.md).
9999

100100
## Configure PingAccess and PingFederate
101101

102102
Use the instructions in the following sections to configure PingAccess and PingFederate. See the following diagram of the overall integration user flow.
103103

104-
![PingAccess and PingFederate integration](./media/partner-ping/pingaccess.png)
104+
![Diagram of the PingAccess and PingFederate integration user flow](./media/partner-ping/pingaccess.png)
105105

106106
### Configure PingFederate as the token provider
107107

@@ -116,7 +116,7 @@ Use the following instructions to create a PingAccess application for the target
116116
#### Create a virtual host
117117

118118
>[!IMPORTANT]
119-
>Create a virtual host for every application. For more information, see [What can I configure with PingAccess?]([https://docs.pingidentity.com/bundle/pingaccess-43/page/reference/pa_c_KeyConsiderations.html](https://docs.pingidentity.com/bundle/pingaccess-71/page/kkj1564006722708.html).
119+
>Create a virtual host for every application. For more information, see [What can I configure with PingAccess?]([https://docs.pingidentity.com/bundle/pingaccess-43/page/reference/pa_c_KeyConsiderations.html].
120120
121121
To create a virtual host:
122122

0 commit comments

Comments
 (0)