You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
In this sample tutorial, learn how to integrate Azure Active Directory (AD) B2C authentication with [Transmit Security](https://www.transmitsecurity.com/bindid) passwordless authentication solution **BindID**. BindID is a passwordless authentication service that uses strong Fast Identity Online (FIDO2) biometric authentication for a reliable omni-channel authentication experience. The solution ensures a smooth login experience for all customers across every device and channel eliminating fraud, phishing, and credential reuse.
23
+
In this sample tutorial, learn how to integrate Azure Active Directory B2C (Azure AD B2C) authentication with [Transmit Security](https://www.transmitsecurity.com/bindid) passwordless authentication solution **BindID**. BindID is a passwordless authentication service that uses strong Fast Identity Online (FIDO2) biometric authentication for a reliable omni-channel authentication experience. The solution ensures a smooth login experience for all customers across every device and channel eliminating fraud, phishing, and credential reuse.
24
24
25
25
## Scenario description
26
26
@@ -30,8 +30,8 @@ The following architecture diagram shows the implementation.
30
30
31
31
|Step | Description |
32
32
|:-----| :-----------|
33
-
| 1. | User arrives at a login page. Users select sign-in/sign-up and enter username into the page.
34
-
| 2. | Azure AD B2C redirects the user to BindID using an OpenID Connect (OIDC) request.
33
+
| 1. | User attempts to log in to an Azure AD B2C application and is forwarded to Azure AD B2C’s combined sign-in and sign-up policy.
34
+
| 2. | Azure AD B2C redirects the user to BindID using the OpenID Connect (OIDC) authorization code flow.
35
35
| 3. | BindID authenticates the user using appless FIDO2 biometrics, such as fingerprint.
36
36
| 4. | A decentralized authentication response is returned to BindID.
37
37
| 5. | The OIDC response is passed on to Azure AD B2C.
@@ -62,7 +62,7 @@ To get started, you'll need:
62
62
63
63
### Step 1 - Create an application registration in BindID
64
64
65
-
From[Applications](https://admin.bindid-sandbox.io/console/#/applications) to configure your tenant application in BindID, the following information is needed
65
+
For[Applications](https://admin.bindid-sandbox.io/console/#/applications) to configure your tenant application in BindID, the following information is needed
66
66
67
67
| Property | Description |
68
68
|:---------|:---------------------|
@@ -318,7 +318,7 @@ The relying party policy, for example [SignUpSignIn.xml](https://github.com/Azur
318
318
319
319
1. Open the Azure AD B2C tenant and under Policies select **Identity Experience Framework**.
320
320
321
-
2.Click on your previously created **CustomSignUpSignIn** and select the settings:
321
+
2.Select your previously created **CustomSignUpSignIn** and select the settings:
322
322
323
323
a. **Application**: select the registered app (sample is JWT)
0 commit comments