You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
In this sample tutorial, learn how to integrate Azure Active Directory (AD) B2C authentication with [BlokSec](https://bloksec.com/). BlokSec simplifies the end-user login experience by providing customers passwordless authentication and tokenless multifactor authentication (MFA). BlokSec protects customers against identity-centric cyber-attacks such as password stuffing, phishing, and man-in-the-middle attacks.
@@ -55,6 +53,7 @@ The following architecture diagram shows the implementation.
55
53
Request a demo tenant with BlokSec by filling out [the form](https://bloksec.com/request-a-demo/). In the message field indicates that you would like to onboard with Azure AD B2C. Download and install the free BlokSec yuID mobile app from the app store. Once your demo tenant has been prepared, you'll receive an email. On your mobile device where the BlokSec application is installed, select the link to register your admin account with your yuID app.
56
54
57
55
::: zone pivot="b2c-user-flow"
56
+
58
57
## Prerequisites
59
58
60
59
To get started, you'll need:
@@ -69,6 +68,7 @@ To get started, you'll need:
69
68
::: zone-end
70
69
71
70
::: zone pivot="b2c-custom-policy"
71
+
72
72
## Prerequisites
73
73
74
74
To get started, you'll need:
@@ -112,10 +112,10 @@ To get started, you'll need:
112
112
1. Sign-in to the [Azure portal](https://portal.azure.com/#home) as the global administrator of your Azure AD B2C tenant.
113
113
1. Make sure you're using the directory that contains your Azure AD B2C tenant. Select the **Directories + subscriptions** icon in the portal toolbar.
114
114
1. On the **Portal settings | Directories + subscriptions** page, find your Azure AD B2C directory in the **Directory name** list, and then select **Switch**.
115
-
1. Choose **All services** in the top-left corner of the Azure portal, search for and select **Azure AD B2C**
116
-
1. Navigate to **Dashboard > Azure Active Directory B2C > Identity providers**
117
-
1. Select New **OpenID Connect Provider**
118
-
1. Select **Add**
115
+
1. Choose **All services** in the top-left corner of the Azure portal, then search for and select **Azure AD B2C**.
116
+
1. Navigate to **Dashboard** > **Azure Active Directory B2C** > **Identity providers**.
117
+
1. Select New **OpenID Connect Provider**.
118
+
1. Select **Add**.
119
119
120
120
### Part 3 - Configure an Identity provider
121
121
@@ -126,14 +126,14 @@ To get started, you'll need:
126
126
|Property |Value |
127
127
|:---------|:---------|
128
128
|Name |Enter BlokSec yuID – Passwordless or a name of your choice|
|Client ID|The application ID from the BlokSec admin UI captured in **Part 1**|
131
131
|Client Secret|The application Secret from the BlokSec admin UI captured in **Part 1**|
132
132
|Scope|OpenID email profile|
133
133
|Response type|Code|
134
134
|Domain hint|yuID|
135
135
136
-
1. Select **OK**
136
+
1. Select **OK**.
137
137
138
138
1. Select **Map this identity provider’s claims**.
139
139
@@ -177,13 +177,13 @@ You should now see BlokSec as a new OIDC Identity provider listed within your B2
177
177
178
178
1. Select **Run user flow**
179
179
180
-
1. In the form, enter the Replying URL, for example, https://jwt.ms
180
+
1. In the form, enter the Replying URL, such as `https://jwt.ms`.
181
181
182
182
1. The browser will be redirected to the BlokSec login page. Enter the account name registered during User registration. The user will receive a push notification to their mobile device where the BlokSec yuID application is installed; upon opening the notification, the user will be presented with an authentication challenge
183
183
184
-
1. Once the authentication challenge is accepted, the browser will redirect the user to the replying URL.
184
+
1. Once the authentication challenge is accepted, the browser will redirect the user to the replying URL.
185
185
186
-
## Next steps
186
+
## Next steps
187
187
188
188
For additional information, review the following articles:
189
189
@@ -320,7 +320,8 @@ The following XML demonstrates the first two orchestration steps of a user journ
320
320
321
321
The relying party policy, for example [SignUpSignIn.xml](https://github.com/Azure-Samples/active-directory-b2c-custom-policy-starterpack/blob/master/SocialAndLocalAccounts/SignUpOrSignin.xml), specifies the user journey which Azure AD B2C will execute. Find the **DefaultUserJourney** element within relying party. Update the **ReferenceId** to match the user journey ID, in which you added the identity provider.
322
322
323
-
In the following example, for the `CustomSignUpOrSignIn` user journey, the ReferenceId is set to `CustomSignUpOrSignIn`.
323
+
In the following example, for the `CustomSignUpOrSignIn` user journey, the ReferenceId is set to `CustomSignUpOrSignIn`.
@@ -346,12 +347,12 @@ Select **Upload Custom Policy**, and then upload the two policy files that you c
346
347
347
348
If the sign-in process is successful, your browser is redirected to `https://jwt.ms`, which displays the contents of the token returned by Azure AD B2C.
348
349
349
-
## Next steps
350
+
## Next steps
350
351
351
352
For additional information, review the following articles:
352
353
353
354
-[Custom policies in Azure AD B2C](./custom-policy-overview.md)
354
355
355
356
-[Get started with custom policies in Azure AD B2C](./tutorial-create-user-flows.md?pivots=b2c-custom-policy)
Copy file name to clipboardExpand all lines: articles/active-directory/authentication/concept-sspr-policy.md
+2Lines changed: 2 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -127,6 +127,7 @@ After the module is installed, use the following steps to complete each task as
127
127
### Check the expiration policy for a password
128
128
129
129
1. Open a PowerShell prompt and [connect to your Azure AD tenant](/powershell/module/azuread/connect-azuread#examples) using a *global administrator* or *user administrator* account.
130
+
130
131
1. Run one of the following commands for either an individual user or for all users:
131
132
132
133
* To see if a single user's password is set to never expire, run the following cmdlet. Replace `<user ID>` with the user ID of the user you want to check, such as *driley\@contoso.onmicrosoft.com*:
@@ -144,6 +145,7 @@ After the module is installed, use the following steps to complete each task as
144
145
### Set a password to expire
145
146
146
147
1. Open a PowerShell prompt and [connect to your Azure AD tenant](/powershell/module/azuread/connect-azuread#examples) using a *global administrator* or *user administrator* account.
148
+
147
149
1. Run one of the following commands for either an individual user or for all users:
148
150
149
151
* To set the password of one user so that the password expires, run the following cmdlet. Replace `<user ID>` with the user ID of the user you want to check, such as *driley\@contoso.onmicrosoft.com*
Copy file name to clipboardExpand all lines: articles/active-directory/authentication/howto-authentication-passwordless-faqs.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -15,7 +15,7 @@ ms.reviewer: aakapo
15
15
16
16
ms.collection: M365-identity-device-management
17
17
---
18
-
# Deployment frequently asked questions (FAQs) for hybrid FIDO2 security keys in Azure AD
18
+
# Deployment frequently asked questions (FAQs) for hybrid FIDO2 security keys in Azure AD
19
19
20
20
This article covers deployment frequently asked questions (FAQs) for hybrid Azure AD joined devices and passwordless sign-in to on-prem resources. With this passwordless feature, you can enable Azure AD authentication on Windows 10 devices for hybrid Azure AD joined devices using FIDO2 security keys. Users can sign into Windows on their devices with modern credentials like FIDO2 keys and access traditional Active Directory Domain Services (AD DS) based resources with a seamless single sign-on (SSO) experience to their on-prem resources.
21
21
@@ -175,14 +175,14 @@ To unblock the accounts, use **Active Directory Users and Computers** to modify
175
175
176
176
### How is Azure AD Kerberos linked to my on-premises Active Directory Domain Services environment?
177
177
178
-
There are two parts - the on-premises AD DS environment, and the Azure AD tenant.
178
+
There are two parts: the on-premises AD DS environment and the Azure AD tenant.
179
179
180
180
**Active Directory Domain Services (AD DS)**
181
181
182
182
The Azure AD Kerberos server is represented in an on-premises AD DS environment as a domain controller (DC) object. This DC object is made up of multiple objects:
A *Computer* object that represents a Read-Only Domain Controller (RODC) in AD DS. There's no computer associated with this object. Instead, it's a logical representation of a DC.
0 commit comments