You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory-b2c/partner-nok-nok.md
+62-87Lines changed: 62 additions & 87 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -44,115 +44,90 @@ The following diagram illustrates the Nok Nok solution as IdP for Azure AD B2C u
44
44

45
45
46
46
1. At the sign-in page, user selects sign-in or sign-up and enters the username.
47
-
2. Azure AD B2C redirects user to the Nok Nok OIDC authentication provider. |
48
-
| 3a. | For mobile based authentications, Nok Nok either displays a QR code or sends a push notification request to the end user’s mobile device. |
49
-
| 3b. | For Desktop/PC based login, Nok Nok redirects the end user to the web application login page to initiate a passwordless authentication prompt. |
50
-
|4a. | The user scan’s the displayed QR code in their smartphone using Nok Nok app SDK or Nok Nok Passport app.|
51
-
| 4b. | User provides username as an input on the login page of the web application and selects next. |
52
-
| 5a. | User is prompted for authentication on smartphone. <BR> User does passwordless authentication by using the user’s preferred method, such as biometrics, device PIN, or any roaming authenticator.|
53
-
| 5b. | User is prompted for authentication on web application. <BR> User does passwordless authentication by using the user’s preferred method, such as biometrics, device PIN, or any roaming authenticator. |
54
-
| 6. | Nok Nok server validates FIDO assertion and upon validation, sends OIDC authentication response to Azure AD B2C.|
55
-
| 7. | Based on the response user is granted or denied access. |
47
+
2. Azure AD B2C redirects user to the Nok Nok OIDC authentication provider.
48
+
3. For mobile authentications, a QR code appears or push notification goes to the user device. For desktop sign-in, the user is redirected to the web app sign-in page for passwordless authentication.
49
+
4. User scans the QR code with Nok Nok app SDK or Passport app. Or, username is sign-in page input.
50
+
5. User is prompted for authentication. User does passwordless authentication: biometrics, device PIN, or any roaming authenticator. Authentication prompt appears on web application. User does passwordless authentication: biometrics, device PIN, or any roaming authenticator.
51
+
6. Nok Nok server validates FIDO assertion and sends OIDC authentication response to Azure AD B2C.
52
+
7. User is granted or denied access.
56
53
57
54
## Onboard with Nok Nok
58
55
59
56
Fill out the [Nok Nok cloud form](https://noknok.com/contact/) to create your own Nok Nok tenant. Once you submit the form, you'll receive an email explaining how to access your tenant. The email will also include access to Nok Nok guides. Follow the instructions provided in the Nok Nok integration guide to complete the OIDC configuration of your Nok Nok cloud tenant.
60
57
61
58
## Integrate with Azure AD B2C
62
59
60
+
Use the following instructions to add and configure an IdP then configure a user flow.
61
+
63
62
### Add a new Identity provider
64
63
65
-
To add a new Identity provider, follow these steps:
64
+
For the following instructions, use the directory with the Azure AD B2C tenant. To add a new IdP:
66
65
67
-
1. Sign in to the **[Azure portal](https://portal.azure.com/#home)** as the global administrator of your Azure AD B2C tenant.
68
-
1. Make sure you're using the directory that contains your Azure AD B2C tenant. Select the **Directories + subscriptions** icon in the portal toolbar.
69
-
1. On the **Portal settings | Directories + subscriptions** page, find your Azure AD B2C directory in the **Directory name** list, and then select **Switch**.
70
-
1. Choose **All services** in the top-left corner of the Azure portal, search for and select **Azure AD B2C**.
71
-
1. Navigate to **Dashboard** > **Azure Active Directory B2C** > **Identity providers**
72
-
1. Select **Identity providers**.
73
-
1. Select **Add**.
66
+
1. Sign in to the **[Azure portal](https://portal.azure.com/#home)** as Global Administrator of the Azure AD B2C tenant.
67
+
2. In the portal toolbar, select the **Directories + subscriptions**.
68
+
3. On **Portal settings, Directories + subscriptions**, in the **Directory name** list, locate the Azure AD B2C directory.
69
+
4. Select **Switch**.
70
+
5. In the top-left corner of the Azure portal, select **All services**.
71
+
6. Search for and select **Azure AD B2C**.
72
+
7. Navigate to **Dashboard** > **Azure Active Directory B2C** > **Identity providers**.
73
+
8. Select **Identity providers**.
74
+
9. Select **Add**.
74
75
75
76
### Configure an Identity provider
76
77
77
-
To configure an Identity provider, follow these steps:
1. Fill out the form to set up the Identity provider:
81
-
82
-
|Property | Value |
83
-
|:-----| :-----------|
84
-
| Name | Nok Nok Authentication Provider |
85
-
| Metadata URL | Insert the URI of the hosted Nok Nok Authentication app, followed by the specific path such as 'https://demo.noknok.com/mytenant/oidc/.well-known/openid-configuration'|
86
-
| Client Secret | Use the client Secret provided by the Nok Nok platform.|
87
-
| Client ID | Use the client ID provided by the Nok Nok platform.|
88
-
| Scope | OpenID profile email |
89
-
| Response type | code |
90
-
| Response mode | form_post|
91
-
92
-
1. Select **OK**.
93
-
94
-
1. Select **Map this identity provider’s claims**.
95
-
96
-
1. Fill out the form to map the Identity provider:
97
-
98
-
|Property | Value |
99
-
|:-----| :-----------|
100
-
| UserID | From subscription |
101
-
| Display name | From subscription |
102
-
| Response mode | From subscription |
103
-
104
-
1. Select **Save** to complete the setup for your new OIDC Identity provider.
2. For **Name**, enter Nok Nok Authentication Provider, or another name.
82
+
3. For **Metadata URL**, enter hosted Nok Nok Authentication app URI, followed by the path such as `https://demo.noknok.com/mytenant/oidc/.well-known/openid-configuration`
83
+
4. For **Client Secret**, use the Client Secret from Nok Nok.
84
+
5. For **Client ID**, use the client ID provided by Nok Nok.
85
+
6. For **Scope**, use **OpenID profile email**.
86
+
7. For **Response type**, use **code**.
87
+
8. For **Response mode**, use **form_post**.
88
+
9. Select **OK**.
89
+
10. Select **Map this identity provider’s claims**.
90
+
11. For **UserID**, select **From subscription**.
91
+
12. For **Display name**, select **From subscription**.
92
+
13. For **Response mode**, select **From subscription**.
93
+
14. Select **Save**.
105
94
106
95
### Create a user flow policy
107
96
108
-
You should now see Nok Nok as a new OIDC Identity provider listed within your B2C identity providers.
97
+
For the following instructions, Nok Nok is a new OIDC IdP in the B2C identity providers list.
109
98
110
99
1. In your Azure AD B2C tenant, under **Policies**, select **User flows**.
111
-
112
-
2. Select **New** user flow.
113
-
114
-
3. Select **Sign up and sign in**, select a **version**, and then select **Create**.
115
-
116
-
4. Enter a **Name** for your policy.
117
-
118
-
5. In the Identity providers section, select your newly created Nok Nok Identity provider.
119
-
120
-
6. Set up the parameters of your User flow. Insert a name and select the Identity provider you’ve created. You can also add email address. In this case, Azure won’t redirect the login procedure directly to Nok Nok instead it will show a screen where the user can choose the option they would like to use.
121
-
122
-
7. Leave the **Multi-factor Authentication** field as is.
123
-
124
-
8. Select **Enforce conditional access policies**
125
-
126
-
9. Under **User attributes and token claims**, select **Email Address** in the Collect attribute option. You can add all the attributes that Azure AD can collect about the user alongside the claims that Azure AD B2C can return to the client application.
127
-
128
-
10. Select **Create**.
129
-
130
-
11. After a successful creation, select your new **User flow**.
131
-
132
-
12. On the left panel, select **Application Claims**. Under options, tick the **email** checkbox and select **Save**.
100
+
2. Select **New**.
101
+
3. Select **Sign up and sign in**.
102
+
4. Select a **version**.
103
+
5. Select **Create**.
104
+
6. Enter a policy **Name**.
105
+
7. In **Identity providers**, select the created Nok Nok IdP.
106
+
8. You can add an email address. Azure won't redirect sign-in to Nok Nok; a screen appears with user options.
107
+
9. Leave the **Multi-factor Authentication** field.
0 commit comments