You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory-b2c/partner-ping-identity.md
+11-11Lines changed: 11 additions & 11 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -9,7 +9,7 @@ ms.reviewer: kengaderdus
9
9
ms.service: active-directory
10
10
ms.workload: identity
11
11
ms.topic: how-to
12
-
ms.date: 12/9/2022
12
+
ms.date: 01/20/2023
13
13
ms.author: gasinh
14
14
ms.subservice: B2C
15
15
---
@@ -22,7 +22,7 @@ Many e-commerce sites and web applications exposed to the internet are deployed
22
22
23
23
Generally, configurations include an authentication translation layer that externalizes the authentication from the web application. Reverse proxies provide the authenticated user context to the web applications, such as a header value in clear or digest form. The applications aren't using industry standard tokens such as Security Assertion Markup Language (SAML), OAuth, or Open ID Connect (OIDC). Instead, the proxy provides authentication context and maintains the session with the end-user agent such as browser or native application. As a service running as a man-in-the-middle, proxies provide significant session control. The proxy service is efficient and scalable, not a bottleneck for applications behind the proxy service. The diagram is a reverse-proxy implementation and communications flow.

26
26
27
27
## Modernization
28
28
@@ -45,7 +45,7 @@ Proxies support the modern authentication protocols and use the redirect-based (
45
45
In Azure AD B2C, you define policies that drive user experiences and behaviors, also called user journeys. Each such policy exposes a protocol endpoint that can perform the authentication as an IdP. On the application side, there's no special handling required for certain policies. An application makes a standard authentication request to the protocol-specific authentication endpoint exposed by a policy.
46
46
You can configure Azure AD B2C to share the same issuer across policies or unique issuer for each policy. Each application can point to policies by making a protocol-native authentication request, which drives user behaviors such as sign-in, sign-up, and profile edits. The diagram shows OIDC and SAML application workflows.
47
47
48
-

48
+

49
49
50
50
The scenario can be challenging for the legacy applications to redirect the user accurately. The access request to the applications might not include the user experience context. In most cases, the proxy layer, or an integrated agent on the web application, intercepts the access request.
51
51
@@ -55,27 +55,27 @@ You can deploy PingAccess as the reverse proxy. PingAccess intercepts a direct r
55
55
56
56
Configure PingAccess with OIDC, OAuth2, or SAML for authentication with an upstream authentication provider. You can configure an upstream IdP for this purpose on the PingAccess server. See the following diagram.
57
57
58
-

58
+

59
59
60
60
In a typical Azure AD B2C deployment with policies exposing IdPs, there's a challenge. PingAccess is configured with one, upstream IdP.
61
61
62
62
### PingFederate federation proxy
63
63
64
-
You can configure PingFederate as an authentication provider, or a proxy. for upstream IdPs. See the following diagram.
64
+
You can configure PingFederate as an authentication provider, or a proxy, for upstream IdPs. See the following diagram.

67
67
68
68
Use this function to contextually, dynamically, or declaratively switch an inbound request to an Azure AD B2C policy. See the following diagram of protocol sequence flow.
69
69
70
-

70
+

71
71
72
72
## Prerequisites
73
73
74
74
To get started, you'll need:
75
75
76
76
- An Azure subscription
77
77
- If you don't have one, get an [Azure free account](https://azure.microsoft.com/free/)
78
-
- An [Azure AD B2C tenant](/tutorial-create-tenant.md) linked to your Azure subscription
78
+
- An [Azure AD B2C tenant](tutorial-create-tenant.md) linked to your Azure subscription
79
79
- PingAccess and PingFederate deployed in Docker containers or on Azure virtual machines (VMs)
80
80
81
81
## Connectivity and communication
@@ -93,15 +93,15 @@ Confirm the following connectivity and communication.
93
93
94
94
You can use basic user flows or advanced Identity Enterprise Framework (IEF) policies. PingAccess generates the metadata endpoint, based on the issuer value, by using the [WebFinger](https://tools.ietf.org/html/rfc7033) protocol for discovery convention. To follow this convention, update the Azure AD B2C issuer using user-flow policy properties.
95
95
96
-

96
+

97
97
98
98
In the advanced policies, configuration includes the IssuanceClaimPattern metadata element to AuthorityWithTfp value in the [JWT token issuer technical profile](./jwt-issuer-technical-profile.md).
99
99
100
100
## Configure PingAccess and PingFederate
101
101
102
102
Use the instructions in the following sections to configure PingAccess and PingFederate. See the following diagram of the overall integration user flow.
103
103
104
-

104
+

105
105
106
106
### Configure PingFederate as the token provider
107
107
@@ -116,7 +116,7 @@ Use the following instructions to create a PingAccess application for the target
116
116
#### Create a virtual host
117
117
118
118
>[!IMPORTANT]
119
-
>Create a virtual host for every application. For more information, see [What can I configure with PingAccess?]([https://docs.pingidentity.com/bundle/pingaccess-43/page/reference/pa_c_KeyConsiderations.html](https://docs.pingidentity.com/bundle/pingaccess-71/page/kkj1564006722708.html).
119
+
>Create a virtual host for every application. For more information, see [What can I configure with PingAccess?]([https://docs.pingidentity.com/bundle/pingaccess-43/page/reference/pa_c_KeyConsiderations.html].
0 commit comments