Skip to content

Commit 088d259

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into toc-update
2 parents 88735b5 + ef663e2 commit 088d259

File tree

222 files changed

+3954
-2106
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

222 files changed

+3954
-2106
lines changed

articles/active-directory-b2c/partner-strata.md

Lines changed: 113 additions & 135 deletions
Large diffs are not rendered by default.

articles/active-directory-b2c/partner-whoiam.md

Lines changed: 44 additions & 60 deletions
Original file line numberDiff line numberDiff line change
@@ -4,100 +4,84 @@ titleSuffix: Azure AD B2C
44
description: In this tutorial, learn how to integrate Azure AD B2C authentication with WhoIAM for user verification.
55
services: active-directory-b2c
66
author: gargi-sinha
7-
manager: CelesteDG
7+
manager: martinco
88
ms.reviewer: kengaderdus
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: how-to
12-
ms.date: 09/13/2022
12+
ms.date: 12/19/2022
1313
ms.author: gasinh
1414
ms.subservice: B2C
1515
---
1616

17-
# Tutorial for configuring WhoIAM with Azure Active Directory B2C
17+
# Tutorial to configure Azure Active Directory B2C with WhoIAM
1818

19-
In this sample tutorial, we provide guidance on how to configure [WhoIAM](https://www.whoiam.ai/brims/) Branded Identity Management System (BRIMS) in your environment and integrate it with Active Directory B2C (Azure AD B2C).
19+
In this tutorial, learn how to configure WhoIAM Branded Identity Management System (BRIMS) in your environment and integrate it with Azure Active Directory B2C (Azure AD B2C). The BRIMS apps and services are deployed in your environment. They provide user verification with voice, SMS, and email. BRIMS works with your identity and access management solution and is platform-agnostic.
20+
21+
Learn more: [WhoIAM, Products and Services, Branded Identity Management System](https://www.whoiam.ai/brims/)
2022

21-
BRIMS is a set of apps and services that's deployed in your environment. It provides voice, SMS, and email verification of your user base. BRIMS works in conjunction with your existing identity and access management solution and is platform agnostic.
2223

2324
## Prerequisites
2425

2526
To get started, you'll need:
2627

27-
- An Azure AD subscription. If you don't have a subscription, you can get a [free account](https://azure.microsoft.com/free/).
28-
29-
- [An Azure AD B2C tenant](./tutorial-create-tenant.md) that's linked to your Azure subscription.
30-
31-
- A WhoIAM [trial account](https://www.whoiam.ai/contact-us/).
28+
- An Azure AD subscription
29+
- If you don't have one, you can get an [Azure free account](https://azure.microsoft.com/free/)
30+
- [An Azure AD B2C tenant](./tutorial-create-tenant.md) linked to your Azure subscription
31+
- A WhoIAM trial account
32+
- Go to [WhoIAM, Contact us](https://www.whoiam.ai/contact-us/) to get started
3233

3334
## Scenario description
3435

3536
The WhoIAM integration includes the following components:
3637

37-
- An Azure AD B2C tenant. It's the authorization server that verifies the user's credentials based on custom policies defined in it. It's also known as the identity provider.
38-
39-
- An administration portal for managing clients and their configurations.
40-
41-
- An API service that exposes various features through endpoints.
42-
43-
- Azure Cosmos DB, which acts as the back end for both the BRIMS administration portal and the API service.
38+
- **Azure AD B2C tenant** - The authorization server that verifies user credentials, based on custom policies, know as the identity provider (IdP)
39+
- **Administration portal** - To manage clients and their configurations
40+
- **API service** - To expose various features through endpoints
41+
- **Azure Cosmos DB** - The back end for the BRIMS administration portal and API service
4442

45-
The following architecture diagram shows the implementation.
43+
The following diagram shows the implementation architecture.
4644

47-
![Diagram of the architecture of Azure AD B2C integration with WhoIAM.](media/partner-whoiam/whoiam-architecture-diagram.png)
45+
![Diagram of Azure AD B2C integration with WhoIAM.](media/partner-whoiam/whoiam-architecture-diagram.png)
4846

49-
|Step | Description |
50-
|:-----| :-----------|
51-
| 1. | The user arrives at a page to start the sign-up or sign-in request to an app that uses Azure AD B2C as its identity provider.
52-
| 2. | As part of authentication, the user requests to either verify ownership of their email or phone or use their voice as a biometric verification factor.
53-
| 3. | Azure AD B2C makes a call to the BRIMS API service and passes on the user's email address, phone number, and voice recording.
54-
| 4. | BRIMS uses predefined configurations such as fully customizable email and SMS templates to interact with the user in their respective language in a way that's consistent with the app's style.
55-
| 5. | After a user's identity verification is complete, BRIMS returns a token to Azure AD B2C to indicate the outcome of the verification. Azure AD B2C then either grants the user access to the app or fails their authentication attempt.
47+
1. The user signs up or signs in to request an app that uses Azure AD B2C as IdP
48+
2. The user requests ownership verification of their email, phone, or they use voice as biometric verification
49+
3. Azure AD B2C calls to the BRIMS API service and passes the user attributes
50+
4. BRIMS interacts with the user in their own language
51+
5. After verification, BRIMS returns a token to Azure AD B2C, which grants access, or doesn't.
5652

5753
## Sign up with WhoIAM
5854

5955
1. Contact [WhoIAM](https://www.whoiam.ai/contact-us/) and create a BRIMS account.
56+
2. Configure the following Azure services:
6057

61-
2. Use the sign-up guidelines made available to you and configure the following Azure services:
62-
63-
- [Azure Key Vault](https://azure.microsoft.com/services/key-vault/): Used for secure storage of passwords, such as mail service passwords.
64-
65-
- [Azure App Service](https://azure.microsoft.com/services/app-service/): Used to host the BRIMS API and admin portal services.
66-
67-
- [Azure Active Directory](https://azure.microsoft.com/services/active-directory/): Used to authenticate administrative users for the admin portal.
68-
69-
- [Azure Cosmos DB](https://azure.microsoft.com/services/cosmos-db/): Used to store and retrieve settings.
70-
71-
- [Application Insights](../azure-monitor/app/app-insights-overview.md) (optional): Used to log in to both the API and the admin portal.
58+
* [Key Vault](https://azure.microsoft.com/services/key-vault/): Store passwords
59+
* [App Service](https://azure.microsoft.com/services/app-service/): Host the BRIMS API and admin portal services
60+
* [Azure Active Directory](https://azure.microsoft.com/services/active-directory/): Authenticate administrative users for the portal
61+
* [Azure Cosmos DB](https://azure.microsoft.com/services/cosmos-db/): Store and retrieve settings
62+
* [Application Insights overview](../azure-monitor/app/app-insights-overview.md) (optional): Sign in to the API and the portal
7263

7364
3. Deploy the BRIMS API and the BRIMS administration portal in your Azure environment.
74-
75-
4. Azure AD B2C custom policy samples are available in your BRIMS sign-up documentation. Follow the documentation to configure your app and use the BRIMS platform for user identity verification.
76-
77-
For more information about WhoIAM's BRIMS, see the [product documentation](https://www.whoiam.ai/brims/).
65+
4. Follow the documentation to configure your app. Use BRIMS for user identity verification. Azure AD B2C custom policy samples are in the BRIMS sign-up documentation.
66+
For more information about WhoIAM BRIMS, request documentation on [WhoIAM, Contact Us](https://www.whoiam.ai/brims/).
7867

7968
## Test the user flow
8069

81-
1. Open the Azure AD B2C tenant. Under **Policies**, select **Identity Experience Framework**.
82-
83-
2. Select your previously created **SignUpSignIn**.
84-
85-
3. Select **Run user flow** and then:
86-
87-
a. For **Application**, select the registered app (the sample is JWT).
70+
1. Open the Azure AD B2C tenant.
71+
2. Under **Policies**, select **Identity Experience Framework**.
72+
3. Select the created **SignUpSignIn**.
73+
4. Select **Run user flow**.
74+
5. For **Application**, select the registered app (example is JWT).
75+
6. For **Reply URL**, select the **redirect URL**.
76+
7. Select **Run user flow**.
77+
8. Complete the sign-up flow
78+
9. Create an account.
79+
10. After the user attribute is created, the BRIMS service is called.
8880

89-
b. For **Reply URL**, select the **redirect URL**.
90-
91-
c. Select **Run user flow**.
92-
93-
4. Go through the sign-up flow and create an account.
94-
95-
5. The BRIMS service will be called during the flow, after the user attribute is created. If the flow is incomplete, check that the user isn't saved in the directory.
81+
> [!TIP]
82+
> If the flow is incomplete, confirm the user is saved in the directory.
9683
9784
## Next steps
9885

99-
For additional information, review the following articles:
100-
101-
- [Custom policies in Azure AD B2C](./custom-policy-overview.md)
102-
103-
- [Get started with custom policies in Azure AD B2C](tutorial-create-user-flows.md?pivots=b2c-custom-policy)
86+
- [Azure AD B2C custom policy overview](./custom-policy-overview.md)
87+
- [Tutorial: Create user flows and custom policies in Azure Active Directory B2C](tutorial-create-user-flows.md?pivots=b2c-custom-policy)

0 commit comments

Comments
 (0)