Tutorial: Configure Nok Nok Passport with Azure Active Directory B2C for passwordless FIDO2 authentication
Learn to integrate the Nok Nok S3 Authentication Suite into your Azure Active Directory B2C (Azure AD B2C) tenant. The Nok Nok solutions enable FIDO certified multi-factor authentication such as FIDO UAF, FIDO U2F, WebAuthn, and FIDO2 for mobile and web applications. Nok Nok solutions improve security posture while balancing user the experience.
Go to noknok.com to learn more: Nok Nok Labs, Inc.
Prerequisites
To get started, you need:
- An Azure subscription
- If you don't have one, get a Azure free account
- An Azure AD B2C tenant linked to the Azure subscription
- Go to noknok.com.
- On the top menu, select Demo.
Scenario description
To enable passwordless FIDO authentication for your users, enable Nok Nok as an identity provider (IdP) in your Azure AD B2C tenant. The Nok Nok solution integration includes the following components:
- Azure AD B2C – authorization server that verifies user credentials
- Web and mobile applications – mobile or web apps to protect with Nok Nok solutions and Azure AD B2C
- Nok Nok app SDK or Passport app – authenticate Azure AD B2C enabled applications.
- Go to the Apple App Store for Nok Nok Passport
- Or, Google Play Nok Nok Passport
The following diagram illustrates the Nok Nok solution as an IdP for Azure AD B2C by using OpenID Connect (OIDC) for passwordless authentication.
- At the sign-in page, select sign-in or sign-up and enters the username.
- Azure AD B2C redirects to the Nok Nok OIDC authentication provider.
- For mobile authentications, a QR code appears or push notification goes to the user device. For desktop sign-in, the user is redirected to the web app sign-in page for passwordless authentication.
- Scan the QR code with the Nok Nok app SDK or Passport app. Or, username is the sign-in page input.
- A prompt appears for authentication. Perform passwordless authentication: biometrics, device PIN, or any roaming authenticator.
- The authentication prompt appears on the web application.
- Perform passwordless authentication: biometrics, device PIN, or any roaming authenticator.
- The Nok Nok server validates FIDO assertion and sends OIDC authentication response to Azure AD B2C.
- The user is granted or denied access.
Get started with Nok Nok
- Go to noknok.com Contact.
- Fill out the form for a Nok Nok tenant.
- An email arrives with tenant access information and links to documentation.
- Use the Nok Nok integration documentation to complete the tenant OIDC configuration.
Integrate with Azure AD B2C
Use the following instructions to add and configure an IdP, and then configure a user flow.
Add a new Identity provider
For the following instructions, use the directory with the Azure AD B2C tenant. To add a new IdP:
- Sign in to the Azure portal as at least B2C IEF Policy Administrator of the Azure AD B2C tenant.
- In the portal toolbar, select the Directories + subscriptions.
- On Portal settings, Directories + subscriptions, in the Directory name list, locate the Azure AD B2C directory.
- Select Switch.
- In the top-left corner of the Azure portal, select All services.
- Search for and select Azure AD B2C.
- Navigate to Dashboard > Azure Active Directory B2C > Identity providers.
- Select Identity providers.
- Select Add.
Configure an Identity provider
To configure an IdP:
- Select Identity provider type > OpenID Connect (Preview).
- For Name, enter the Nok Nok Authentication Provider, or another name.
- For Metadata URL, enter the hosted Nok Nok Authentication app URI, followed by the path such as
https://demo.noknok.com/mytenant/oidc/.well-known/openid-configuration
. - For Client Secret, use the Client Secret from Nok Nok.
- For Client ID, use the Client ID provided by Nok Nok.
- For Scope, use OpenID profile email.
- For Response type, use code.
- For Response mode, use form_post.
- Select OK.
- Select Map this identity provider’s claims.
- For UserID, select From subscription.
- For Display name, select From subscription.
- For Response mode, select From subscription.
- Select Save.
Create a user flow policy
For the following instructions, Nok Nok is a new OIDC IdP in the B2C identity providers list.
- In your Azure AD B2C tenant, under Policies, select User flows.
- Select New.
- Select Sign up and sign in.
- Select a version.
- Select Create.
- Enter a policy Name.
- In Identity providers, select the created Nok Nok IdP.
- You can add an email address. Azure won't redirect sign-in to Nok Nok; a screen appears with user options.
- Leave the Multi-factor Authentication field.
- Select Enforce conditional access policies.
- Under User attributes and token claims, in the Collect attribute option, select Email Address.
- Add user attributes for Microsoft Entra ID to collect, with claims that Azure AD B2C returns to the client application.
- Select Create.
- Select the new User flow.
- On the left panel, select Application Claims.
- Under options, select the email checkbox
- Select Save.
Test the user flow
- Open the Azure AD B2C tenant. Under Policies select Identity Experience Framework.
- Select the created SignUpSignIn.
- Select Run user flow.
- For Application, select the registered app. The example is JWT.
- For Reply URL, select the redirect URL.
- Select Run user flow.
- Perform a sign-up flow and create an account.
- After the user attribute is created, Nok Nok is called.
If the flow is incomplete, confirm the user is or isn't saved in the directory.