|
1 | 1 | ---
|
2 |
| -title: Configure Haventec Authenticate with Azure Active Directory B2C for single-step multi-factor passwordless authentication |
| 2 | +title: Configure Haventec Authenticate with Azure Active Directory B2C for single-step, multi-factor passwordless authentication |
3 | 3 | titleSuffix: Azure AD B2C
|
4 |
| -description: Learn to integrate Azure AD B2C with Haventec Authenticate for multifactor passwordless authentication |
| 4 | +description: Learn to integrate Azure AD B2C with Haventec Authenticate for multi-factor passwordless authentication |
5 | 5 | author: gargi-sinha
|
6 | 6 | manager: martinco
|
7 | 7 | ms.reviewer: kengaderdus
|
@@ -78,87 +78,56 @@ For the following instructions, use the directory with the Azure AD B2C tenant.
|
78 | 78 |
|
79 | 79 | ### Configure an identity provider
|
80 | 80 |
|
81 |
| -To configure an identity provider, follow these steps: |
82 |
| - |
83 |
| -1. Select **Identity provider type** > **OpenID Connect** |
84 |
| - |
85 |
| -2. Fill out the form to set up the Identity provider: |
86 |
| - |
87 |
| - | Property | Value| |
88 |
| - |:--------------|:---------------| |
89 |
| - |Name |Enter Haventec or a name of your choice| |
90 |
| - |Metadata URL| `https://iam.demo.haventec.com/auth/realms/*your\_realm\_name*/.well-known/openid-configuration`| |
91 |
| - |Client ID | The application ID from the Haventec admin UI captured in Part - 1 | |
92 |
| - |Client Secret | The application Secret from the Haventec admin UI captured in Part - 1 | |
93 |
| - |Scope | OpenID email profile| |
94 |
| - |Response type | Code | |
95 |
| - |Response mode | forms_post | |
96 |
| - |Domain hint | Blank | |
97 |
| - |
98 |
| -3. Select **OK**. |
99 |
| - |
100 |
| -4. Select **Map this identity provider's claims**. |
101 |
| - |
102 |
| -5. Fill out the form to map the Identity provider: |
103 |
| - |
104 |
| - | Property | Value| |
105 |
| - |:--------------|:---------------| |
106 |
| - | User ID | From subscription | |
107 |
| - | Display name | From subscription | |
108 |
| - | Given name | given_name | |
109 |
| - | Surname | family_name | |
110 |
| - | Email | Email | |
111 |
| - |
112 |
| -6. Select **Save** to complete the setup for your new OIDC Identity provider. |
| 81 | +To configure an identity provider: |
| 82 | + |
| 83 | +1. Select **Identity provider type** > **OpenID Connect**. |
| 84 | +2. For **Name**, enter **Haventec**, or another name. |
| 85 | +3. For **Metadata URL**, use `https://iam.demo.haventec.com/auth/realms/*your\_realm\_name*/.well-known/openid-configuration`. |
| 86 | +4. For **Client ID**, enter the application ID recorded from the Haventec admin UI. |
| 87 | +5. For **Client Secret**, enter the application Secret recorded from the Haventec admin UI. |
| 88 | +6. For **Scope**, select **OpenID email profile**. |
| 89 | +7. For **Response type**, select **Code**. |
| 90 | +8. For **Response mode**, select **forms_post**. |
| 91 | +9. For **Domain hint**, leave blank. |
| 92 | +10. Select **OK**. |
| 93 | +11. Select **Map this identity provider's claims**. |
| 94 | +12. For **User ID**, select **From subscription**. |
| 95 | +13. For **Display** name, select **From subscription**. |
| 96 | +14. For **Given name**, use **given_name**. |
| 97 | +15. For **Surname**, use **family_name**. |
| 98 | +16. For **Email**, use **Email**. |
| 99 | +17. Select **Save**. |
113 | 100 |
|
114 | 101 | ## Create a user flow policy
|
115 | 102 |
|
116 |
| -You should now see Haventec as a new OIDC Identity provider listed within your B2C identity providers. |
117 |
| - |
118 |
| -1. In your Azure AD B2C tenant, under **Policies**, select **User flows**. |
| 103 | +For the following instructions, Haventec is a new OIDC identity provider in the B2C identity providers list. |
119 | 104 |
|
| 105 | +1. In the Azure AD B2C tenant, under **Policies**, select **User flows**. |
120 | 106 | 2. Select **New user flow**.
|
121 |
| - |
122 | 107 | 3. Select **Sign up and sign in** > **version** > **Create**.
|
123 |
| - |
124 |
| -4. Enter a **Name** for your policy. |
125 |
| - |
126 |
| -5. In the Identity providers section, select your newly created Haventec Identity provider. |
127 |
| - |
128 |
| -6. Select **None** for Local Accounts to disable email and password-based authentication. |
129 |
| - |
| 108 | +4. Enter a **Name** for the policy. |
| 109 | +5. In **Identity providers**, select the created Haventec identity provider. |
| 110 | +6. For **Local Accounts**, select **None**. This selection disables email and password authentication. |
130 | 111 | 7. Select **Run user flow**
|
131 |
| - |
132 |
| -8. In the form, enter the Replying URL, for example, `https://jwt.ms` |
133 |
| - |
134 |
| -9. The browser will be redirected to the Haventec login page |
135 |
| - |
136 |
| -10. User will be asked to register if new or enter a PIN for an existing user. |
137 |
| - |
138 |
| -11. Once the authentication challenge is accepted, the browser will redirect the user to the replying URL. |
| 112 | +8. In the form, enter the replying URL, for example, `https://jwt.ms`. |
| 113 | +9. The browser redirects to the Haventec sign-in page. |
| 114 | +10. User is prompted to register, or enter a PIN. |
| 115 | +11. The authentication challenge is performed. |
| 116 | +12. The browser redirects to the replying URL. |
139 | 117 |
|
140 | 118 | ## Test the user flow
|
141 | 119 |
|
142 |
| -Open the Azure AD B2C tenant and under Policies select **User flows**. |
143 |
| - |
144 |
| -1. Select your previously created **User Flow**. |
145 |
| - |
146 |
| -2. Select **Run user flow** and select the settings: |
147 |
| - |
148 |
| - a. **Application**: select the registered app (sample is JWT) |
149 |
| - |
150 |
| - b. **Reply URL**: select the redirect URL |
151 |
| - |
152 |
| - c. Select **Run user flow**. |
153 |
| - |
154 |
| -3. Go through sign-up flow and create an account |
155 |
| - |
156 |
| -4. Haventec Authenticate will be called during the flow. |
| 120 | +1. In the Azure AD B2C tenant, under **Policies**, select **User flows**. |
| 121 | +2. Select the created **User Flow**. |
| 122 | +3. Select **Run user flow**. |
| 123 | +4. For **Application**, select the registered app. The example is JWT. |
| 124 | +5. For **Reply URL**, select the redirect URL. |
| 125 | +6. Select **Run user flow**. |
| 126 | +7. Perform a sign-up flow and create an account. |
| 127 | +8. Haventec Authenticate is called. |
157 | 128 |
|
158 | 129 | ## Next steps
|
159 | 130 |
|
160 |
| -- [Haventec](https://docs.haventec.com/) documentation |
161 |
| - |
162 |
| -- [Custom policies in Azure AD B2C](custom-policy-overview.md) |
| 131 | +* Go to docs.haventec.com for [Haventec Documentation](https://docs.haventec.com/) |
| 132 | +* [Azure AD B2C custom policy overview](custom-policy-overview.md) |
163 | 133 |
|
164 |
| -- [Get started with custom policies in Azure AD B2C](custom-policy-get-started.md?tabs=applications) |
0 commit comments