You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory-b2c/partner-whoiam.md
+44-60Lines changed: 44 additions & 60 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,100 +4,84 @@ titleSuffix: Azure AD B2C
4
4
description: In this tutorial, learn how to integrate Azure AD B2C authentication with WhoIAM for user verification.
5
5
services: active-directory-b2c
6
6
author: gargi-sinha
7
-
manager: CelesteDG
7
+
manager: martinco
8
8
ms.reviewer: kengaderdus
9
9
ms.service: active-directory
10
10
ms.workload: identity
11
11
ms.topic: how-to
12
-
ms.date: 09/13/2022
12
+
ms.date: 12/19/2022
13
13
ms.author: gasinh
14
14
ms.subservice: B2C
15
15
---
16
16
17
-
# Tutorial for configuring WhoIAM with Azure Active Directory B2C
17
+
# Tutorial to configure Azure Active Directory B2C with WhoIAM
18
18
19
-
In this sample tutorial, we provide guidance on how to configure [WhoIAM](https://www.whoiam.ai/brims/) Branded Identity Management System (BRIMS) in your environment and integrate it with Active Directory B2C (Azure AD B2C).
19
+
In this tutorial, learn how to configure WhoIAM Branded Identity Management System (BRIMS) in your environment and integrate it with Azure Active Directory B2C (Azure AD B2C). The BRIMS apps and services are deployed in your environment. They provide user verification with voice, SMS, and email. BRIMS works with your identity and access management solution and is platform-agnostic.
20
+
21
+
Learn more: [WhoIAM, Products and Services, Branded Identity Management System](https://www.whoiam.ai/brims/)
20
22
21
-
BRIMS is a set of apps and services that's deployed in your environment. It provides voice, SMS, and email verification of your user base. BRIMS works in conjunction with your existing identity and access management solution and is platform agnostic.
22
23
23
24
## Prerequisites
24
25
25
26
To get started, you'll need:
26
27
27
-
- An Azure AD subscription. If you don't have a subscription, you can get a [free account](https://azure.microsoft.com/free/).
28
-
29
-
-[An Azure AD B2C tenant](./tutorial-create-tenant.md)that's linked to your Azure subscription.
30
-
31
-
- A WhoIAM [trial account](https://www.whoiam.ai/contact-us/).
28
+
- An Azure AD subscription
29
+
- If you don't have one, you can get an [Azure free account](https://azure.microsoft.com/free/)
30
+
-[An Azure AD B2C tenant](./tutorial-create-tenant.md) linked to your Azure subscription
31
+
- A WhoIAM trial account
32
+
- Go to [WhoIAM, Contact us](https://www.whoiam.ai/contact-us/) to get started
32
33
33
34
## Scenario description
34
35
35
36
The WhoIAM integration includes the following components:
36
37
37
-
- An Azure AD B2C tenant. It's the authorization server that verifies the user's credentials based on custom policies defined in it. It's also known as the identity provider.
38
-
39
-
- An administration portal for managing clients and their configurations.
40
-
41
-
- An API service that exposes various features through endpoints.
42
-
43
-
- Azure Cosmos DB, which acts as the back end for both the BRIMS administration portal and the API service.
38
+
-**Azure AD B2C tenant** - The authorization server that verifies user credentials, based on custom policies, know as the identity provider (IdP)
39
+
-**Administration portal** - To manage clients and their configurations
40
+
-**API service** - To expose various features through endpoints
41
+
-**Azure Cosmos DB** - The back end for the BRIMS administration portal and API service
44
42
45
-
The following architecture diagram shows the implementation.
43
+
The following diagram shows the implementation architecture.
46
44
47
-

45
+

48
46
49
-
|Step | Description |
50
-
|:-----| :-----------|
51
-
| 1. | The user arrives at a page to start the sign-up or sign-in request to an app that uses Azure AD B2C as its identity provider.
52
-
| 2. | As part of authentication, the user requests to either verify ownership of their email or phone or use their voice as a biometric verification factor.
53
-
| 3. | Azure AD B2C makes a call to the BRIMS API service and passes on the user's email address, phone number, and voice recording.
54
-
| 4. | BRIMS uses predefined configurations such as fully customizable email and SMS templates to interact with the user in their respective language in a way that's consistent with the app's style.
55
-
| 5. | After a user's identity verification is complete, BRIMS returns a token to Azure AD B2C to indicate the outcome of the verification. Azure AD B2C then either grants the user access to the app or fails their authentication attempt.
47
+
1. The user signs up or signs in to request an app that uses Azure AD B2C as IdP
48
+
2. The user requests ownership verification of their email, phone, or they use voice as biometric verification
49
+
3. Azure AD B2C calls to the BRIMS API service and passes the user attributes
50
+
4. BRIMS interacts with the user in their own language
51
+
5. After verification, BRIMS returns a token to Azure AD B2C, which grants access, or doesn't.
56
52
57
53
## Sign up with WhoIAM
58
54
59
55
1. Contact [WhoIAM](https://www.whoiam.ai/contact-us/) and create a BRIMS account.
56
+
2. Configure the following Azure services:
60
57
61
-
2. Use the sign-up guidelines made available to you and configure the following Azure services:
62
-
63
-
-[Azure Key Vault](https://azure.microsoft.com/services/key-vault/): Used for secure storage of passwords, such as mail service passwords.
64
-
65
-
-[Azure App Service](https://azure.microsoft.com/services/app-service/): Used to host the BRIMS API and admin portal services.
66
-
67
-
-[Azure Active Directory](https://azure.microsoft.com/services/active-directory/): Used to authenticate administrative users for the admin portal.
68
-
69
-
-[Azure Cosmos DB](https://azure.microsoft.com/services/cosmos-db/): Used to store and retrieve settings.
70
-
71
-
-[Application Insights](../azure-monitor/app/app-insights-overview.md) (optional): Used to log in to both the API and the admin portal.
58
+
*[Key Vault](https://azure.microsoft.com/services/key-vault/): Store passwords
59
+
*[App Service](https://azure.microsoft.com/services/app-service/): Host the BRIMS API and admin portal services
60
+
*[Azure Active Directory](https://azure.microsoft.com/services/active-directory/): Authenticate administrative users for the portal
61
+
*[Azure Cosmos DB](https://azure.microsoft.com/services/cosmos-db/): Store and retrieve settings
62
+
*[Application Insights overview](../azure-monitor/app/app-insights-overview.md) (optional): Sign in to the API and the portal
72
63
73
64
3. Deploy the BRIMS API and the BRIMS administration portal in your Azure environment.
74
-
75
-
4. Azure AD B2C custom policy samples are available in your BRIMS sign-up documentation. Follow the documentation to configure your app and use the BRIMS platform for user identity verification.
76
-
77
-
For more information about WhoIAM's BRIMS, see the [product documentation](https://www.whoiam.ai/brims/).
65
+
4. Follow the documentation to configure your app. Use BRIMS for user identity verification. Azure AD B2C custom policy samples are in the BRIMS sign-up documentation.
66
+
For more information about WhoIAM BRIMS, request documentation on [WhoIAM, Contact Us](https://www.whoiam.ai/brims/).
78
67
79
68
## Test the user flow
80
69
81
-
1. Open the Azure AD B2C tenant. Under **Policies**, select **Identity Experience Framework**.
82
-
83
-
2. Select your previously created **SignUpSignIn**.
84
-
85
-
3. Select **Run user flow** and then:
86
-
87
-
a. For **Application**, select the registered app (the sample is JWT).
70
+
1. Open the Azure AD B2C tenant.
71
+
2. Under **Policies**, select **Identity Experience Framework**.
72
+
3. Select the created **SignUpSignIn**.
73
+
4. Select **Run user flow**.
74
+
5. For **Application**, select the registered app (example is JWT).
75
+
6. For **Reply URL**, select the **redirect URL**.
76
+
7. Select **Run user flow**.
77
+
8. Complete the sign-up flow
78
+
9. Create an account.
79
+
10. After the user attribute is created, the BRIMS service is called.
88
80
89
-
b. For **Reply URL**, select the **redirect URL**.
90
-
91
-
c. Select **Run user flow**.
92
-
93
-
4. Go through the sign-up flow and create an account.
94
-
95
-
5. The BRIMS service will be called during the flow, after the user attribute is created. If the flow is incomplete, check that the user isn't saved in the directory.
81
+
> [!TIP]
82
+
> If the flow is incomplete, confirm the user is saved in the directory.
96
83
97
84
## Next steps
98
85
99
-
For additional information, review the following articles:
100
-
101
-
-[Custom policies in Azure AD B2C](./custom-policy-overview.md)
102
-
103
-
-[Get started with custom policies in Azure AD B2C](tutorial-create-user-flows.md?pivots=b2c-custom-policy)
86
+
-[Azure AD B2C custom policy overview](./custom-policy-overview.md)
87
+
-[Tutorial: Create user flows and custom policies in Azure Active Directory B2C](tutorial-create-user-flows.md?pivots=b2c-custom-policy)
0 commit comments