Skip to content

Commit e9679ea

Browse files
authored
Update partner-azure-web-application-firewall.md
1 parent c5dffaf commit e9679ea

File tree

1 file changed

+18
-16
lines changed

1 file changed

+18
-16
lines changed

articles/active-directory-b2c/partner-azure-web-application-firewall.md

Lines changed: 18 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -16,36 +16,38 @@ ms.subservice: B2C
1616

1717
# Tutorial: Configure Azure Active Directory B2C with Azure Web Application Firewall
1818

19-
In this sample tutorial, learn how to enable [Azure Web Application Firewall (WAF)](https://azure.microsoft.com/services/web-application-firewall/#overview) solution for Azure Active Directory (AD) B2C tenant with custom domain. Azure WAF provides centralized protection of your web applications from common exploits and vulnerabilities.
19+
Learn how to enable the Azure Web Application Firewall (WAF) service for Azure Active Directory B2C (Azure AD B2C) tenant with custom domain. WAF has centralized protection of web applications from common exploits and vulnerabilities.
2020

21-
>[!NOTE]
22-
>This feature is in public preview.
21+
Learn more about [Azure Web Application Firewall](https://azure.microsoft.com/services/web-application-firewall/#overview)
2322

2423
## Prerequisites
2524

26-
To get started, you'll need:
25+
To get started, you need:
2726

28-
- An Azure subscription – If you don't have a subscription, you can get a [free account](https://azure.microsoft.com/free/).
29-
30-
- [An Azure AD B2C tenant](tutorial-create-tenant.md) – The authorization server, responsible for verifying the user’s credentials using the custom policies defined in the tenant. It's also known as the identity provider.
31-
32-
- [Azure Front Door (AFD)](../frontdoor/index.yml) – Responsible for enabling custom domains for Azure AD B2C tenant.
33-
34-
- [Azure WAF](https://azure.microsoft.com/services/web-application-firewall/#overview) – Manages all traffic that is sent to the authorization server.
27+
* An Azure subscription
28+
* If you don't have one, get an [Azure free account](https://azure.microsoft.com/free/)
29+
* An Azure AD B2C tenant – authorization server that verifies user credentials using custom policies defined in the tenant
30+
* Also known as the identity provider (IdP)
31+
* See, [Tutorial: Create an Azure Active Directory B2C tenant](tutorial-create-tenant.md)
32+
* Azure Front Door (AFD) – enables custom domains for the Azure AD B2C tenant
33+
* See, [Azure Front Door and CDN documentation](../frontdoor/index.yml)
34+
* WAF – Manages traffic sent to the authorization server
35+
* [Azure Web Application Firewall](https://azure.microsoft.com/services/web-application-firewall/#overview)
3536

3637
## Azure AD B2C setup
3738

38-
To use custom domains in Azure AD B2C, it's required to use custom domain feature provided by AFD. Learn how to [enable Azure AD B2C custom domains](./custom-domain.md?pivots=b2c-user-flow).
39+
To use custom domains in Azure AD B2C, use the custom domain features in AFD. See, [Enable custom domains for Azure AD B2C](./custom-domain.md?pivots=b2c-user-flow).
3940

40-
After custom domain for Azure AD B2C is successfully configured using AFD, [test the custom domain](./custom-domain.md?pivots=b2c-custom-policy#test-your-custom-domain) before proceeding further.
41+
> [!IMPORTANT]
42+
> After you configure the custom domain, see [Test your custom domain](./custom-domain.md?pivots=b2c-custom-policy#test-your-custom-domain).
4143
42-
## Onboard with Azure WAF
44+
## Onboard with WAF
4345

44-
To enable Azure WAF, configure a WAF policy and associate that policy to the AFD for protection.
46+
To enable WAF, configure a WAF policy and associate it with the AFD for protection.
4547

4648
### Create a WAF policy
4749

48-
Create a basic WAF policy with managed Default Rule Set (DRS) in the [Azure portal](https://portal.azure.com).
50+
Create a basic WAF policy with managed Default Rule Set (DRS):
4951

5052
1. Go to the [Azure portal](https://portal.azure.com). Select **Create a resource** and then search for Azure WAF. Select **Azure Web Application Firewall (WAF)** > **Create**.
5153

0 commit comments

Comments
 (0)