You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
1. Sign in to the [Azure portal](https://portal.azure.com).
42
-
1. Search for and Select **Azure Active Directory**.
43
-
1. Select **App registrations**, then select **New registration**.
41
+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Cloud Application Administrator](../roles/permissions-reference.md#cloud-application-administrator).
42
+
1. Browse to **Identity** > **Applications** > **App registrations** then select **New registration**.
44
43
1. Name the application, for example "example-app".
45
44
1. Select a supported account type, which determines who can use the application.
46
45
1. Under **Redirect URI**, select **Web** for the type of application you want to create. Enter the URI where the access token is sent to.
@@ -76,8 +75,7 @@ The next section shows how to get values that are needed when signing in program
76
75
77
76
When programmatically signing in, pass the tenant ID and the application ID in your authentication request. You also need a certificate or an authentication key. To obtain the directory (tenant) ID and application ID:
78
77
79
-
1. Search for select **Azure Active Directory**.
80
-
1. From **App registrations** in Azure AD, select your application.
78
+
1. Browse to **Identity** > **Applications** > **App registrations**, then select your application.
81
79
1. On the app's overview page, copy the Directory (tenant) ID value and store it in your application code.
82
80
1. Copy the Application (client) ID value and store it in your application code.
83
81
@@ -89,8 +87,7 @@ There are two types of authentication available for service principals: password
89
87
90
88
To upload the certificate file:
91
89
92
-
1. Search for and select **Azure Active Directory**.
93
-
1. From **App registrations** in Azure AD, select your application.
90
+
1. Browse to **Identity** > **Applications** > **App registrations**, then select your application.
94
91
1. Select **Certificates & secrets**.
95
92
1. Select **Certificates**, then select **Upload certificate** and then select the certificate file to upload.
96
93
1. Select **Add**. Once the certificate is uploaded, the thumbprint, start date, and expiration values are displayed.
@@ -114,8 +111,7 @@ Export this certificate to a file using the [Manage User Certificate](/dotnet/fr
114
111
115
112
To upload the certificate:
116
113
117
-
1. Search for and select **Azure Active Directory**.
118
-
1. From **App registrations** in Azure AD, select your application.
114
+
1. Browse to **Identity** > **Applications** > **App registrations**, then select your application.
119
115
1. Select **Certificates & secrets**.
120
116
1. Select **Certificates**, then select **Upload certificate** and then select the certificate (an existing certificate or the self-signed certificate you exported).
121
117
1. Select **Add**.
@@ -126,8 +122,7 @@ After registering the certificate with your application in the application regis
126
122
127
123
If you choose not to use a certificate, you can create a new application secret.
128
124
129
-
1. Search for and select **Azure Active Directory**.
130
-
1. Select **App registrations** and select your application from the list.
125
+
1. Browse to **Identity** > **Applications** > **App registrations**, then select your application.
131
126
1. Select **Certificates & secrets**.
132
127
1. Select **Client secrets**, and then Select **New client secret**.
133
128
1. Provide a description of the secret, and a duration.
1. Sign in to the [Azure portal](https://portal.azure.com) using a Global administrator or User administrator account for the directory.
44
-
1.Search for and select **Azure Active Directory**.
45
-
1.Select **Users**.
43
+
44
+
1.Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [User Administrator](../roles/permissions-reference.md#user-administrator).
45
+
1.Browse to **Identity** > **Users** > **All users**.
46
46
1. In the list, select the user's name to open their user profile.
47
47
1. (Optional) If the user wants to sign in using a different email:
1. Sign in to the [Azure portal](https://portal.azure.com).
31
-
2. Under **Azure services**, select **Azure Active Directory**.
32
-
3. In the left menu, select **External Identities**.
33
-
4. Select **All API connectors**, and then select **New API connector**.
30
+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [User Administrator](../roles/permissions-reference.md#user-administrator).
31
+
1. Browse to **Identity** > **External Identities** > **Overview**.
32
+
1. Select **All API connectors**, and then select **New API connector**.
34
33
35
34
:::image type="content" source="media/self-service-sign-up-add-api-connector/api-connector-new.png" alt-text="Screenshot of adding a new API connector to External Identities.":::
36
35
37
-
5. Provide a display name for the call. For example, **Check approval status**.
38
-
6. Provide the **Endpoint URL** for the API call.
39
-
7. Choose the **Authentication type** and configure the authentication information for calling your API. Learn how to [Secure your API Connector](self-service-sign-up-secure-api-connector.md).
36
+
1. Provide a display name for the call. For example, **Check approval status**.
37
+
1. Provide the **Endpoint URL** for the API call.
38
+
1. Choose the **Authentication type** and configure the authentication information for calling your API. Learn how to [Secure your API Connector](self-service-sign-up-secure-api-connector.md).
40
39
41
40
:::image type="content" source="media/self-service-sign-up-add-api-connector/api-connector-config.png" alt-text="Screenshot of configuring an API connector.":::
42
41
43
-
8. Select **Save**.
42
+
1. Select **Save**.
44
43
45
44
## The request sent to your API
46
45
An API connector materializes as an **HTTP POST** request, sending user attributes ('claims') as key-value pairs in a JSON body. Attributes are serialized similarly to [Microsoft Graph](/graph/api/resources/user#properties) user properties.
@@ -93,9 +92,8 @@ Additionally, the claims are typically sent in all request:
93
92
94
93
Follow these steps to add an API connector to a self-service sign-up user flow.
95
94
96
-
1. Sign in to the [Azure portal](https://portal.azure.com) as an Azure AD administrator.
97
-
2. Under **Azure services**, select **Azure Active Directory**.
98
-
3. In the left menu, select **External Identities**.
95
+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [User Administrator](../roles/permissions-reference.md#user-administrator).
96
+
1. Browse to **Identity** > **External Identities** > **Overview**.
99
97
4. Select **User flows**, and then select the user flow you want to add the API connector to.
100
98
5. Select **API connectors**, and then select the API endpoints you want to invoke at the following steps in the user flow:
Copy file name to clipboardExpand all lines: articles/active-directory/external-identities/self-service-sign-up-add-approvals.md
+11-14Lines changed: 11 additions & 14 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -36,17 +36,16 @@ This article gives an example of how to integrate with an approval system. In th
36
36
37
37
You need to register your approval system as an application in your Azure AD tenant so it can authenticate with Azure AD and have permission to create users. Learn more about [authentication and authorization basics for Microsoft Graph](/graph/auth/auth-concepts).
38
38
39
-
1. Sign in to the [Azure portal](https://portal.azure.com) as an Azure AD administrator.
40
-
2. Under **Azure services**, select **Azure Active Directory**.
41
-
3. In the left menu, select **App registrations**, and then select **New registration**.
42
-
4. Enter a **Name** for the application, for example, _Sign-up Approvals_.
43
-
5. Select **Register**. You can leave other fields at their defaults.
39
+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [User Administrator](../roles/permissions-reference.md#user-administrator).
40
+
1. Browse to **Identity** > **Applications** > **App registrations**, and then select **New registration**.
41
+
1. Enter a **Name** for the application, for example, _Sign-up Approvals_.
42
+
1. Select **Register**. You can leave other fields at their defaults.
44
43
45
44
:::image type="content" source="media/self-service-sign-up-add-approvals/register-approvals-app.png" alt-text="Screenshot that highlights the Register button.":::
46
45
47
-
6. Under **Manage** in the left menu, select **API permissions**, and then select **Add a permission**.
48
-
7. On the **Request API permissions** page, select **Microsoft Graph**, and then select **Application permissions**.
49
-
8. Under **Select permissions**, expand **User**, and then select the **User.ReadWrite.All** check box. This permission allows the approval system to create the user upon approval. Then select **Add permissions**.
46
+
1. Under **Manage** in the left menu, select **API permissions**, and then select **Add a permission**.
47
+
1. On the **Request API permissions** page, select **Microsoft Graph**, and then select **Application permissions**.
48
+
1. Under **Select permissions**, expand **User**, and then select the **User.ReadWrite.All** check box. This permission allows the approval system to create the user upon approval. Then select **Add permissions**.
50
49
51
50
:::image type="content" source="media/self-service-sign-up-add-approvals/request-api-permissions.png" alt-text="Screenshot of requesting API permissions.":::
52
51
@@ -77,19 +76,17 @@ To create these connectors, follow the steps in [create an API connector](self-s
77
76
78
77
Now you'll add the API connectors to a self-service sign-up user flow with these steps:
79
78
80
-
1. Sign in to the [Azure portal](https://portal.azure.com) as an Azure AD administrator.
81
-
2. Under **Azure services**, select **Azure Active Directory**.
82
-
3. In the left menu, select **External Identities**.
83
-
4. Select **User flows**, and then select the user flow you want to enable the API connector for.
84
-
5. Select **API connectors**, and then select the API endpoints you want to invoke at the following steps in the user flow:
79
+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [User Administrator](../roles/permissions-reference.md#user-administrator).
80
+
1. Browse to **Identity** > **External identities** > **User flows**, and then select the user flow you want to enable the API connector for.
81
+
1. Select **API connectors**, and then select the API endpoints you want to invoke at the following steps in the user flow:
85
82
86
83
-**After federating with an identity provider during sign-up**: Select your approval status API connector, for example _Check approval status_.
87
84
-**Before creating the user**: Select your approval request API connector, for example _Request approval_.
88
85
89
86
:::image type="content" source="media/self-service-sign-up-add-approvals/api-connectors-user-flow-api.png" alt-text="Screenshot of API connector in a user flow.":::
Copy file name to clipboardExpand all lines: articles/active-directory/external-identities/self-service-sign-up-secure-api-connector.md
+4-6Lines changed: 4 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -33,9 +33,8 @@ HTTP basic authentication is defined in [RFC 2617](https://tools.ietf.org/html/r
33
33
34
34
To configure an API Connector with HTTP basic authentication, follow these steps:
35
35
36
-
1. Sign in to the [Azure portal](https://portal.azure.com).
37
-
2. Under **Azure services**, select **Azure AD**.
38
-
1. In the left menu, select **External Identities**.
36
+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [User Administrator](../roles/permissions-reference.md#user-administrator).
37
+
1. Browse to **Identity** > **External Identities** > **Overview**.
39
38
1. Select **All API connectors**, and then select the **API Connector** you want to configure.
40
39
1. For the **Authentication type**, select **Basic**.
41
40
1. Provide the **Username**, and **Password** of your REST API endpoint.
@@ -71,9 +70,8 @@ You can then [export the certificate](../../key-vault/certificates/how-to-export
71
70
72
71
To configure an API Connector with client certificate authentication, follow these steps:
73
72
74
-
1. Sign in to the [Azure portal](https://portal.azure.com).
75
-
2. Under **Azure services**, select **Azure AD**.
76
-
1. In the left menu, select **External Identities**.
73
+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [User Administrator](../roles/permissions-reference.md#user-administrator).
74
+
1. Browse to **Identity** > **External Identities** > **Overview**.
77
75
1. Select **All API connectors**, and then select the **API Connector** you want to configure.
78
76
1. For the **Authentication type**, select **Certificate**.
79
77
1. In the **Upload certificate** box, select your certificate's .pfx file with a private key.
Copy file name to clipboardExpand all lines: articles/active-directory/external-identities/self-service-sign-up-user-flow.md
+20-25Lines changed: 20 additions & 25 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -51,10 +51,8 @@ Before you can add a self-service sign-up user flow to your applications, you ne
51
51
> [!NOTE]
52
52
> This setting can also be configured with the [authenticationFlowsPolicy](/graph/api/resources/authenticationflowspolicy?view=graph-rest-1.0&preserve-view=true) resource type in the Microsoft Graph API.
53
53
54
-
1. Sign in to the [Azure portal](https://portal.azure.com) as an Azure AD administrator.
55
-
2. Under **Azure services**, select **Azure Active Directory**.
56
-
1. Under **Manage** in the left menu, select **Users**.
57
-
1. Select **User settings**, and then under **External users**, select **Manage external collaboration settings**.
54
+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [User Administrator](../roles/permissions-reference.md#user-administrator).
55
+
1. Browse to **Identity** > **Users** > **User settings**, and then under **External users**, select **Manage external collaboration settings**.
58
56
1. Set the **Enable guest self-service sign up via user flows** toggle to **Yes**.
59
57
60
58
:::image type="content" source="media/self-service-sign-up-user-flow/enable-self-service-sign-up.png" alt-text="Screenshot of the enable guest self-service sign up toggle.":::
@@ -64,32 +62,30 @@ Before you can add a self-service sign-up user flow to your applications, you ne
64
62
65
63
Next, you'll create the user flow for self-service sign-up and add it to an application.
66
64
67
-
1. Sign in to the [Azure portal](https://portal.azure.com) as an Azure AD administrator.
68
-
2. Under **Azure services**, select **Azure Active Directory**.
69
-
3. In the left menu, select **External Identities**.
70
-
4. Select **User flows**, and then select **New user flow**.
65
+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [User Administrator](../roles/permissions-reference.md#user-administrator).
66
+
1. Browse to **Identity** > **External Identities** > **User flows**, and then select **New user flow**.
71
67
72
68
:::image type="content" source="media/self-service-sign-up-user-flow/new-user-flow.png" alt-text="Screenshot of the new user flow button.":::
73
69
74
-
5. Select the user flow type (for example, **Sign up and sign in**), and then select the version (**Recommended** or **Preview**).
75
-
6. On the **Create** page, enter a **Name** for the user flow. The name is automatically prefixed with **B2X_1_**.
76
-
7. In the **Identity providers** list, select one or more identity providers that your external users can use to log into your application. **Azure Active Directory Sign up** is selected by default. (See [Before you begin](#before-you-begin) earlier in this article to learn how to add identity providers.)
77
-
8. Under **User attributes**, choose the attributes you want to collect from the user. For more attributes, select **Show more**. For example, select **Show more**, and then choose attributes and claims for **Country/Region**, **Display Name**, and **Postal Code**. Select **OK**.
70
+
1. Select the user flow type (for example, **Sign up and sign in**), and then select the version (**Recommended** or **Preview**).
71
+
1. On the **Create** page, enter a **Name** for the user flow. The name is automatically prefixed with **B2X_1_**.
72
+
1. In the **Identity providers** list, select one or more identity providers that your external users can use to log into your application. **Azure Active Directory Sign up** is selected by default. (See [Before you begin](#before-you-begin) earlier in this article to learn how to add identity providers.)
73
+
1. Under **User attributes**, choose the attributes you want to collect from the user. For more attributes, select **Show more**. For example, select **Show more**, and then choose attributes and claims for **Country/Region**, **Display Name**, and **Postal Code**. Select **OK**.
78
74
79
75
:::image type="content" source="media/self-service-sign-up-user-flow/create-user-flow.png" alt-text="Screenshot of the new user flow creation page. ":::
80
76
81
77
> [!NOTE]
82
78
> You can only collect attributes when a user signs up for the first time. After a user signs up, they will no longer be prompted to collect attribute information, even if you change the user flow.
83
79
84
-
8. Select **Create**.
85
-
9. The new user flow appears in the **User flows** list. If necessary, refresh the page.
80
+
1. Select **Create**.
81
+
1. The new user flow appears in the **User flows** list. If necessary, refresh the page.
86
82
87
83
## Select the layout of the attribute collection form
88
84
89
85
You can choose order in which the attributes are displayed on the sign-up page.
90
86
91
-
1. Sign in to the [Azure portal](https://portal.azure.com), then select **Azure Active Directory**.
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [User Administrator](../roles/permissions-reference.md#user-administrator).
88
+
1. Browse to **Identity** > **External Identities** >**User flows**.
93
89
3. Select the self-service sign-up user flow from the list.
94
90
4. Under **Customize**, select **Page layouts**.
95
91
5. The attributes you chose to collect are listed. To change the order of display, select an attribute, and then select **Move up**, **Move down**, **Move to top**, or **Move to bottom**.
@@ -99,18 +95,17 @@ You can choose order in which the attributes are displayed on the sign-up page.
99
95
100
96
Now you'll associate applications with the user flow to enable sign-up for those applications. New users who access the associated applications will be presented with your new self-service sign-up experience.
101
97
102
-
1. Sign in to the [Azure portal](https://portal.azure.com) as an Azure AD administrator.
103
-
2. Under **Azure services**, select **Azure Active Directory**.
104
-
3. In the left menu, select **External Identities**.
105
-
4. Under **Self-service sign up**, select **User flows**.
106
-
5. Select the self-service sign-up user flow from the list.
107
-
6. In the left menu, under **Use**, select **Applications**.
108
-
7. Select **Add application**.
98
+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [User Administrator](../roles/permissions-reference.md#user-administrator).
99
+
1. Browse to **Identity** > **External Identities** > **User flows**
100
+
1. Under **Self-service sign up**, select **User flows**.
101
+
1. Select the self-service sign-up user flow from the list.
102
+
1. In the left menu, under **Use**, select **Applications**.
103
+
1. Select **Add application**.
109
104
110
105
:::image type="content" source="media/self-service-sign-up-user-flow/assign-app-to-user-flow.png" alt-text="Screenshot of adding an application to the user flow.":::
111
106
112
-
8. Select the application from the list. Or use the search box to find the application, and then select it.
113
-
9. Click **Select**.
107
+
1. Select the application from the list. Or use the search box to find the application, and then select it.
0 commit comments