You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory-b2c/partner-azure-web-application-firewall.md
+18-16Lines changed: 18 additions & 16 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -16,36 +16,38 @@ ms.subservice: B2C
16
16
17
17
# Tutorial: Configure Azure Active Directory B2C with Azure Web Application Firewall
18
18
19
-
In this sample tutorial, learn how to enable [Azure Web Application Firewall (WAF)](https://azure.microsoft.com/services/web-application-firewall/#overview) solution for Azure Active Directory (AD) B2C tenant with custom domain. Azure WAF provides centralized protection of your web applications from common exploits and vulnerabilities.
19
+
Learn how to enable the Azure Web Application Firewall (WAF) service for Azure Active Directory B2C (Azure AD B2C) tenant with custom domain. WAF has centralized protection of web applications from common exploits and vulnerabilities.
20
20
21
-
>[!NOTE]
22
-
>This feature is in public preview.
21
+
Learn more about [Azure Web Application Firewall](https://azure.microsoft.com/services/web-application-firewall/#overview)
23
22
24
23
## Prerequisites
25
24
26
-
To get started, you'll need:
25
+
To get started, you need:
27
26
28
-
- An Azure subscription – If you don't have a subscription, you can get a [free account](https://azure.microsoft.com/free/).
29
-
30
-
-[An Azure AD B2C tenant](tutorial-create-tenant.md) – The authorization server, responsible for verifying the user’s credentials using the custom policies defined in the tenant. It's also known as the identity provider.
31
-
32
-
-[Azure Front Door (AFD)](../frontdoor/index.yml) – Responsible for enabling custom domains for Azure AD B2C tenant.
33
-
34
-
-[Azure WAF](https://azure.microsoft.com/services/web-application-firewall/#overview) – Manages all traffic that is sent to the authorization server.
27
+
* An Azure subscription
28
+
* If you don't have one, get an [Azure free account](https://azure.microsoft.com/free/)
29
+
* An Azure AD B2C tenant – authorization server that verifies user credentials using custom policies defined in the tenant
30
+
* Also known as the identity provider (IdP)
31
+
* See, [Tutorial: Create an Azure Active Directory B2C tenant](tutorial-create-tenant.md)
32
+
* Azure Front Door (AFD) – enables custom domains for the Azure AD B2C tenant
33
+
* See, [Azure Front Door and CDN documentation](../frontdoor/index.yml)
34
+
* WAF – Manages traffic sent to the authorization server
35
+
*[Azure Web Application Firewall](https://azure.microsoft.com/services/web-application-firewall/#overview)
35
36
36
37
## Azure AD B2C setup
37
38
38
-
To use custom domains in Azure AD B2C, it's required to use custom domain feature provided by AFD. Learn how to [enable Azure AD B2C custom domains](./custom-domain.md?pivots=b2c-user-flow).
39
+
To use custom domains in Azure AD B2C, use the custom domain features in AFD. See, [Enable custom domains for Azure AD B2C](./custom-domain.md?pivots=b2c-user-flow).
39
40
40
-
After custom domain for Azure AD B2C is successfully configured using AFD, [test the custom domain](./custom-domain.md?pivots=b2c-custom-policy#test-your-custom-domain) before proceeding further.
41
+
> [!IMPORTANT]
42
+
> After you configure the custom domain, see [Test your custom domain](./custom-domain.md?pivots=b2c-custom-policy#test-your-custom-domain).
41
43
42
-
## Onboard with Azure WAF
44
+
## Onboard with WAF
43
45
44
-
To enable Azure WAF, configure a WAF policy and associate that policy to the AFD for protection.
46
+
To enable WAF, configure a WAF policy and associate it with the AFD for protection.
45
47
46
48
### Create a WAF policy
47
49
48
-
Create a basic WAF policy with managed Default Rule Set (DRS) in the [Azure portal](https://portal.azure.com).
50
+
Create a basic WAF policy with managed Default Rule Set (DRS):
49
51
50
52
1. Go to the [Azure portal](https://portal.azure.com). Select **Create a resource** and then search for Azure WAF. Select **Azure Web Application Firewall (WAF)** > **Create**.
0 commit comments