Skip to content

Commit f934374

Browse files
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into aca/jason/353435
2 parents 33e49d5 + fb69d58 commit f934374

File tree

1,142 files changed

+8762
-8851
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

1,142 files changed

+8762
-8851
lines changed

.openpublishing.redirection.json

Lines changed: 16 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,6 +5,11 @@
55
"redirect_url": "/previous-versions/azure/partner-solutions/split-experimentation/create",
66
"redirect_document_id": false
77
},
8+
{
9+
"source_path": "articles/migrate/context/vmware-context.yml",
10+
"redirect_url": "articles/migrate/context/migrate-context",
11+
"redirect_document_id": false
12+
},
813
{
914
"source_path": "articles/partner-solutions/split-experimentation/how-to-set-up-data-access.md",
1015
"redirect_url": "/previous-versions/azure/partner-solutions/split-experimentation/how-to-set-up-data-access",
@@ -4020,6 +4025,11 @@
40204025
"redirect_url": "/azure/managed-grafana/overview",
40214026
"redirect_document_id": false
40224027
},
4028+
{
4029+
"source_path_from_root": "/articles/managed-grafana/concept-whats-new.md",
4030+
"redirect_url": "/azure/managed-grafana/overview",
4031+
"redirect_document_id": false
4032+
},
40234033
{
40244034
"source_path_from_root": "/articles/managed-grafana/how-to-transition-domain.md",
40254035
"redirect_url": "/azure/managed-grafana/overview",
@@ -4039,11 +4049,16 @@
40394049
"source_path_from_root": "/articles/load-balancer/move-across-regions-internal-load-balancer-portal.md",
40404050
"redirect_url": "/azure/load-balancer/move-across-regions-azure-load-balancer",
40414051
"redirect_document_id": false
4042-
},
4052+
},
40434053
{
40444054
"source_path_from_root": "/articles/load-balancer/move-across-regions-internal-load-balancer-powershell.md",
40454055
"redirect_url": "/azure/load-balancer/move-across-regions-azure-load-balancer",
40464056
"redirect_document_id": false
4057+
},
4058+
{
4059+
"source_path_from_root": "/articles/fasttrack/index.yml",
4060+
"redirect_url": "/azure",
4061+
"redirect_document_id": false
40474062
}
40484063
]
40494064
}

articles/active-directory-b2c/partner-nok-nok.md

Lines changed: 29 additions & 32 deletions
Original file line numberDiff line numberDiff line change
@@ -1,65 +1,62 @@
11
---
22
title: Tutorial to configure Nok Nok S3 Authentication Suite with Azure Active Directory B2C for FIDO passkey authentication
33
titleSuffix: Azure AD B2C
4-
description: Configure Nok Nok S3 Authentication Suite with Azure AD B2C to enable FIDO passkey authentication
4+
description: Configure Nok Nok S3 Authentication Suite with Azure AD B2C to enable FIDO passkey authentication.
55
author: gargi-sinha
66
manager: martinco
77
ms.reviewer: kengaderdus
88
ms.service: azure-active-directory
99
ms.topic: how-to
10-
ms.date: 06/21/2024
11-
10+
ms.date: 12/09/2024
1211
ms.author: gasinh
1312
ms.subservice: b2c
1413

15-
# Customer intent: I'm a developer integrating Azure AD B2C with a third-party authentication provider. I want to learn how to configure Nok Nok S3 Authentication Suite as an identity provider (IdP) in Azure AD B2C. My goal is to implement FIDO Passkey authentication for my users.
14+
# Customer intent: I'm a developer integrating Azure AD B2C with a third-party authentication provider. I want to learn how to configure Nok Nok S3 Authentication Suite as an identity provider (IdP) in Azure AD B2C. My goal is to implement FIDO passkey authentication for my users.
1615
---
17-
# Tutorial: Configure Nok Nok S3 Authentication Suite with Azure AD B2C for FIDO Passkey Authentication
16+
# Tutorial: Configure Nok Nok S3 Authentication Suite with Azure AD B2C for FIDO passkey authentication
1817

19-
Learn to integrate the Nok Nok S3 Authentication Suite into your Azure Active Directory (AD) B2C tenant. The Nok Nok solution enables FIDO-certified multifactor authentication such as FIDO UAF, FIDO U2F, WebAuthn, and FIDO2 for mobile and web applications. The Nok Nok solution strengthens your security while maintaining an optimal user experience.
18+
In this article, you learn to integrate the Nok Nok S3 Authentication Suite into your Azure Active Directory (AD) B2C tenant. The Nok Nok solution enables FIDO-certified multifactor authentication, such as FIDO Universal Authentication Framework (UAF), FIDO Universal Second Factor (U2F), WebAuthn, and FIDO2, for mobile and web applications. The Nok Nok solution strengthens your security while maintaining an optimal user experience.
2019

21-
Learn more at [Nok Nok](https://noknok.com/)
20+
Learn more at [Nok Nok](https://noknok.com/).
2221

2322
## Prerequisites
2423

2524
To get started, you need:
2625

2726
* An Azure subscription. If you don't have one, get an [Azure free account](https://azure.microsoft.com/free/).
28-
* An Azure AD B2C tenant linked to the Azure subscription [Tutorial: Create an Azure AD B2C tenant](tutorial-create-tenant.md).
27+
* An Azure AD B2C tenant linked to the Azure subscription. Learn how to [Create an Azure AD B2C tenant](tutorial-create-tenant.md).
2928
* A Nok Nok Cloud evaluation tenant for FIDO registration and authentication.
3029

3130
## Scenario description
3231

33-
To enable Passkey authentication for your users, enable Nok Nok as an identity provider (IdP) in your Azure AD B2C tenant. The Nok Nok integration includes the following components:
32+
To enable passkey authentication for your users, enable Nok Nok as an identity provider (IdP) in your Azure AD B2C tenant. The Nok Nok integration includes the following components:
3433

3534
* **Azure AD B2C** – authorization server that verifies user credentials.
3635
* **Web and mobile applications** – mobile or web apps to protect with Nok Nok solutions and Azure AD B2C.
37-
* **Nok Nok Tutorial Web App** – application to register the passkey on your device.
38-
* **Nok Nok Sign in App** – application for authenticating Azure AD B2C applications using passkey.
39-
36+
* **Nok Nok tutorial web app** – application to register the passkey on your device.
37+
* **Nok Nok sign-in app** – application for authenticating Azure AD B2C applications with passkey.
4038

41-
The following diagram illustrates the Nok Nok solution as an IdP for Azure AD B2C by using OpenID Connect (OIDC) for Passkey authentication.
39+
The following diagram illustrates the Nok Nok solution as an IdP for Azure AD B2C by using OpenID Connect (OIDC) for passkey authentication.
4240

43-
![Diagram of Nok Nok as IdP for Azure AD B2C using OpenID Connect (OIDC) for Passkey authentication.](./media/partner-nok-nok/nok-nok-architecture-diagram.png)
41+
![Diagram of Nok Nok as IdP for Azure AD B2C using OpenID Connect (OIDC) for passkey authentication.](./media/partner-nok-nok/nok-nok-architecture-diagram.png)
4442

45-
### Scenario 1: Passkey Registration
46-
1. The user navigates to the Nok Nok Tutorial Web App using the link provided by Nok Nok.
43+
### Scenario 1: Passkey registration
44+
1. The user navigates to the Nok Nok tutorial web app using the link provided by Nok Nok.
4745
2. The user enters their Azure AD B2C username and default tutorial app password.
4846
3. The user receives a prompt to register the passkey.
4947
4. The Nok Nok server validates the passkey credential and confirms successful passkey registration to the user.
5048
5. The passkey on the user's device is ready for authentication.
5149

52-
### Scenario 2: Passkey Authentication
53-
1. The user selects the Sign in with Nok Nok Cloud button on the Azure AD B2C Sign in page.
54-
2. Azure AD B2C redirects the user to the Nok Nok Signin App.
55-
3. User authenticates with their passkey.
50+
### Scenario 2: Passkey authentication
51+
1. The user selects the sign-in with Nok Nok Cloud button on the Azure AD B2C sign-in page.
52+
2. Azure AD B2C redirects the user to the Nok Nok sign-in app.
53+
3. The user authenticates with their passkey.
5654
4. The Nok Nok server validates the passkey assertion and sends an OIDC authentication response to Azure AD B2C.
5755
5. Based on the authentication result, Azure AD B2C either grants or denies access to the target application.
5856

59-
6057
## Get started with Nok Nok
6158

62-
1. [Contact](https://noknok.com/contact/) Nok Nok.
59+
1. [Contact Nok Nok](https://noknok.com/contact/).
6360
2. Fill out the form for a Nok Nok tenant.
6461
3. An email arrives with tenant access information and links to documentation.
6562
4. Use the Nok Nok integration documentation to complete the tenant OIDC configuration.
@@ -68,11 +65,11 @@ The following diagram illustrates the Nok Nok solution as an IdP for Azure AD B2
6865

6966
Use the following instructions to add and configure an IdP, and then configure a user flow.
7067

71-
### Add a new Identity provider
68+
### Add a new identity provider
7269

7370
For the following instructions, use the directory with the Azure AD B2C tenant. To add a new IdP:
7471

75-
1. Sign in to the [Azure portal](https://portal.azure.com/#home) as at least as the B2C IEF Policy Administrator of the Azure AD B2C tenant.
72+
1. Sign in to the [Azure portal](https://portal.azure.com/#home) as at least as the B2C Identity Experience Framework (IEF) Policy Administrator of the Azure AD B2C tenant.
7673
2. In the portal toolbar, select **Directories + subscriptions**.
7774
3. On **Portal settings, Directories + subscriptions**, in the **Directory name** list, locate the Azure AD B2C directory.
7875
4. Select **Switch**.
@@ -82,13 +79,13 @@ For the following instructions, use the directory with the Azure AD B2C tenant.
8279
8. Select **Identity providers**.
8380
9. Select **Add**.
8481

85-
### Configure an Identity provider
82+
### Configure an identity provider
8683

8784
To configure an IdP:
8885

8986
1. Select **Identity provider type** > **OpenID Connect (Preview)**.
90-
2. For **Name**, enter the Nok Nok Authentication Provider, or another name.
91-
3. For **Metadata URL**, enter the following URL after replacing the placeholder with the tenant ID provided by Nok Nok: `https://cloud.noknok.com/<tenant_id>/webapps/nnlfed/realms/<tenant_id>/.well-known/openid-configuration`.
87+
2. For **Name**, enter the Nok Nok Authentication Provider or another name.
88+
3. For **Metadata URL**, enter the following URL after replacing the placeholder with the tenant ID that Nok Nok provides: `https://cloud.noknok.com/<tenant_id>/webapps/nnlfed/realms/<tenant_id>/.well-known/openid-configuration`.
9289
4. For **Client Secret**, use the Client Secret from Nok Nok.
9390
5. For **Client ID**, use the Client ID provided by Nok Nok.
9491
6. For **Scope**, use **openid**.
@@ -109,19 +106,19 @@ For the following instructions, Nok Nok is a new OIDC IdP in the B2C identity pr
109106
5. Select **Create**.
110107
6. Enter a policy **Name**.
111108
7. In **Identity providers**, select the created Nok Nok IdP.
112-
8. Check **Email signup** under **Local accounts** to display an intermediate Azure AD B2C signin/signup page with a button that redirects the user to the Nok Nok Signin App.
109+
8. Check **Email signup** under **Local accounts** to display an intermediate Azure AD B2C signin/signup page with a button that redirects the user to the Nok Nok sign-in app.
113110
9. Leave the **Multi-factor Authentication** field.
114-
10. Click **Create** to save.
111+
10. Select **Create** to save.
115112

116113
## Test the user flow
117114

118115
1. Open the Azure AD B2C tenant. Under **Policies**, select **Identity Experience Framework**.
119116
2. Select the created **SignUpSignIn**.
120117
3. Select **Run user flow**.
121-
4. For **Application**, select the registered app. The example is JWT.
122-
5. For **Reply URL**, select the redirect URL of the application that you previously selected at the previous step.
118+
4. For **Application**, select the registered app. The example is JSON Web Token (JWT).
119+
5. For **Reply URL**, select the redirect URL of the application that you selected at the previous step.
123120
6. Select **Run user flow**.
124-
7. Perform signin using the Azure AD B2C username and the passkey that you previously registered for the same user.
121+
7. Perform sign-in using the Azure AD B2C username and the passkey that you previously registered for the same user.
125122
8. Verify that you received the token after authentication.
126123

127124
If the flow is incomplete, confirm the user is or isn't saved in the directory.

articles/api-center/synchronize-api-management-apis.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -28,7 +28,7 @@ API Management APIs automatically synchronize to the API center whenever existin
2828

2929
> [!NOTE]
3030
> * There are [limits](../azure-resource-manager/management/azure-subscription-service-limits.md?toc=/azure/api-center/toc.json&bc=/azure/api-center/breadcrumb/toc.json#api-center-limits) for the number of linked API Management instances (API sources).
31-
> * API updates in API Management can take a few minutes to up to 24 hours to synchronize to your API center.
31+
> * API updates in API Management typically synchronize to your API center within minutes but synchronization can take up to 24 hours.
3232
3333
### Entities synchronized from API Management
3434

articles/api-management/api-management-gateways-overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -126,7 +126,7 @@ Managed and self-hosted gateways support all available [policies](api-management
126126
| [GraphQL resolvers](api-management-policies.md#graphql-resolvers) and [GraphQL validation](api-management-policies.md#content-validation)| ✔️ | ✔️ |✔️ |||
127127
| [Get authorization context](get-authorization-context-policy.md) | ✔️ | ✔️ |✔️ |||
128128
| [Authenticate with managed identity](authentication-managed-identity-policy.md) | ✔️ | ✔️ |✔️ | ✔️ ||
129-
| [Azure OpenAI and LLM semantic caching](api-management-policies.md#caching) | | ✔️ | |||
129+
| [Azure OpenAI and LLM semantic caching](api-management-policies.md#caching) | ✔️ | ✔️ |✔️ |||
130130
| [Quota and rate limit](api-management-policies.md#rate-limiting-and-quotas) | ✔️ | ✔️<sup>2</sup> | ✔️<sup>3</sup> | ✔️<sup>4</sup> | ✔️ |
131131

132132
<sup>1</sup> Configured policies that aren't supported by the self-hosted gateway are skipped during policy execution.<br/>

articles/api-management/authentication-managed-identity-policy.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -31,7 +31,7 @@ Both system-assigned identity and any of the multiple user-assigned identities c
3131
| Attribute | Description | Required | Default |
3232
| ----------------- | ------------------------------------------------------ | -------- | ------- |
3333
|resource|String. The application ID of the target web API (secured resource) in Microsoft Entra ID. Policy expressions are allowed. |Yes|N/A|
34-
|client-id|String. The client ID of the user-assigned identity in Microsoft Entra ID. Policy expressions aren't allowed. |No|system-assigned identity|
34+
|client-id|String. The client ID of the user-assigned identity in Microsoft Entra ID. Policy expressions aren't allowed. |No|N/A. System-assigned identity is used if attribute is not present.|
3535
|output-token-variable-name|String. Name of the context variable that will receive token value as an object of type `string`. Policy expressions aren't allowed. |No|N/A|
3636
|ignore-error|Boolean. If set to `true`, the policy pipeline continues to execute even if an access token isn't obtained.|No|`false`|
3737

articles/api-management/azure-openai-enable-semantic-caching.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -61,6 +61,10 @@ Configure a [backend](backends.md) resource for the embeddings API deployment wi
6161
```
6262
https://my-aoai.openai.azure.com/openai/deployments/embeddings-deployment/embeddings
6363
```
64+
* **Authorization credentials** - Go to **Managed Identity** tab.
65+
* **Client indentity** - Select *System assigned identity* or type in a User assigned managed identity client ID.
66+
* **Resource ID** - Enter `https://cognitiveservices.azure.com/` for Azure OpenAI Service.
67+
6468
### Test backend
6569

6670
To test the backend, create an API operation for your Azure OpenAI Service API:
@@ -123,7 +127,6 @@ Configure the following policies to enable semantic caching for Azure OpenAI API
123127
<azure-openai-semantic-cache-lookup
124128
score-threshold="0.8"
125129
embeddings-backend-id="embeddings-deployment"
126-
embeddings-backend-auth="system-assigned"
127130
ignore-system-messages="true"
128131
max-message-count="10">
129132
<vary-by>@(context.Subscription.Id)</vary-by>

articles/api-management/azure-openai-semantic-cache-lookup-policy.md

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -34,7 +34,6 @@ Use the `azure-openai-semantic-cache-lookup` policy to perform cache lookup of r
3434
<azure-openai-semantic-cache-lookup
3535
score-threshold="similarity score threshold"
3636
embeddings-backend-id ="backend entity ID for embeddings API"
37-
embeddings-backend-auth ="system-assigned"
3837
ignore-system-messages="true | false"
3938
max-message-count="count" >
4039
<vary-by>"expression to partition caching"</vary-by>
@@ -47,7 +46,6 @@ Use the `azure-openai-semantic-cache-lookup` policy to perform cache lookup of r
4746
| ----------------- | ------------------------------------------------------ | -------- | ------- |
4847
| score-threshold | Similarity score threshold used to determine whether to return a cached response to a prompt. Value is a decimal between 0.0 and 1.0. [Learn more](../azure-cache-for-redis/cache-tutorial-semantic-cache.md#change-the-similarity-threshold). | Yes | N/A |
4948
| embeddings-backend-id | [Backend](backends.md) ID for OpenAI embeddings API call. | Yes | N/A |
50-
| embeddings-backend-auth | Authentication used for Azure OpenAI embeddings API backend. | Yes. Must be set to `system-assigned`. | N/A |
5149
| ignore-system-messages | Boolean. If set to `true`, removes system messages from a GPT chat completion prompt before assessing cache similarity. | No | false |
5250
| max-message-count | If specified, number of remaining dialog messages after which caching is skipped. | No | N/A |
5351
@@ -62,7 +60,7 @@ Use the `azure-openai-semantic-cache-lookup` policy to perform cache lookup of r
6260

6361
- [**Policy sections:**](./api-management-howto-policies.md#sections) inbound
6462
- [**Policy scopes:**](./api-management-howto-policies.md#scopes) global, product, API, operation
65-
- [**Gateways:**](api-management-gateways-overview.md) v2
63+
- [**Gateways:**](api-management-gateways-overview.md) classic, v2, consumption
6664

6765
### Usage notes
6866

articles/api-management/azure-openai-semantic-cache-store-policy.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -46,7 +46,7 @@ The `azure-openai-semantic-cache-store` policy caches responses to Azure OpenAI
4646

4747
- [**Policy sections:**](./api-management-howto-policies.md#sections) outbound
4848
- [**Policy scopes:**](./api-management-howto-policies.md#scopes) global, product, API, operation
49-
- [**Gateways:**](api-management-gateways-overview.md) v2
49+
- [**Gateways:**](api-management-gateways-overview.md) classic, v2, consumption
5050

5151
### Usage notes
5252

articles/api-management/inject-vnet-v2.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -88,7 +88,7 @@ When you [create](get-started-create-service-instance.md) a Premium v2 instance
8888

8989
1. In the **Create API Management service** wizard, select the **Networking** tab.
9090
1. In **Connectivity type**, select **Virtual network**.
91-
1. In **Type**, select **Injection**.
91+
1. In **Type**, select **Virtual Network injection**.
9292
1. In **Configure virtual networks**, select the virtual network and the delegated subnet that you want to inject.
9393
1. Complete the wizard to create the API Management instance.
9494

articles/api-management/llm-semantic-cache-lookup-policy.md

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -34,7 +34,6 @@ Use the `llm-semantic-cache-lookup` policy to perform cache lookup of responses
3434
<llm-semantic-cache-lookup
3535
score-threshold="similarity score threshold"
3636
embeddings-backend-id ="backend entity ID for embeddings API"
37-
embeddings-backend-auth ="system-assigned"
3837
ignore-system-messages="true | false"
3938
max-message-count="count" >
4039
<vary-by>"expression to partition caching"</vary-by>
@@ -47,7 +46,6 @@ Use the `llm-semantic-cache-lookup` policy to perform cache lookup of responses
4746
| ----------------- | ------------------------------------------------------ | -------- | ------- |
4847
| score-threshold | Similarity score threshold used to determine whether to return a cached response to a prompt. Value is a decimal between 0.0 and 1.0. [Learn more](../azure-cache-for-redis/cache-tutorial-semantic-cache.md#change-the-similarity-threshold). | Yes | N/A |
4948
| embeddings-backend-id | [Backend](backends.md) ID for OpenAI embeddings API call. | Yes | N/A |
50-
| embeddings-backend-auth | Authentication used for Azure OpenAI embeddings API backend. | Yes. Must be set to `system-assigned`. | N/A |
5149
| ignore-system-messages | Boolean. If set to `true`, removes system messages from a GPT chat completion prompt before assessing cache similarity. | No | false |
5250
| max-message-count | If specified, number of remaining dialog messages after which caching is skipped. | No | N/A |
5351
@@ -62,7 +60,7 @@ Use the `llm-semantic-cache-lookup` policy to perform cache lookup of responses
6260

6361
- [**Policy sections:**](./api-management-howto-policies.md#sections) inbound
6462
- [**Policy scopes:**](./api-management-howto-policies.md#scopes) global, product, API, operation
65-
- [**Gateways:**](api-management-gateways-overview.md) v2
63+
- [**Gateways:**](api-management-gateways-overview.md) classic, v2, consumption
6664

6765
### Usage notes
6866

0 commit comments

Comments
 (0)