Skip to content

Commit 22d9e27

Browse files
authored
Merge branch 'MicrosoftDocs:main' into docs-editor/delete-application-portal-1674143820
2 parents 61b2de6 + ab281ab commit 22d9e27

29 files changed

+1680
-165
lines changed

.openpublishing.redirection.active-directory.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -11035,6 +11035,11 @@
1103511035
"source_path_from_root": "/articles/active-directory/cloud-infrastructure-entitlement-management/permissions-management-trial-playbook.md",
1103611036
"redirect_url": "/azure/active-directory/cloud-infrastructure-entitlement-management/permissions-management-trial-user-guide",
1103711037
"redirect_document_id": false
11038+
},
11039+
{
11040+
"source_path_from_root": "/articles/active-directory/develop/microsoft-graph-intro.md",
11041+
"redirect_url": "/graph/overview?toc=/azure/active-directory/develop/toc.json&bc=/azure/active-directory/develop/breadcrumb/toc.json",
11042+
"redirect_document_id": false
1103811043
}
1103911044
]
1104011045
}

articles/active-directory-b2c/identity-verification-proofing.md

Lines changed: 30 additions & 21 deletions
Original file line numberDiff line numberDiff line change
@@ -4,43 +4,52 @@ titleSuffix: Azure AD B2C
44
description: Learn about our partners who integrate with Azure AD B2C to provide identity proofing and verification solutions
55
services: active-directory-b2c
66
author: gargi-sinha
7-
manager: CelesteDG
7+
manager: martinco
88
ms.reviewer: kengaderdus
9-
109
ms.service: active-directory
1110
ms.workload: identity
1211
ms.topic: how-to
13-
ms.date: 09/13/2022
12+
ms.date: 01/18/2023
1413
ms.author: gasinh
15-
ms.subservice: B2C
1614
---
1715

1816
# Identity verification and proofing partners
1917

20-
With Azure AD B2C partners, customers can enable identity verification and proofing of their end users before allowing account registration or access. Identity verification and proofing can check document, knowledge-based information and liveness.
18+
With Azure Active Directory B2C (Azure AD B2C) and solutions from software-vendor partners, customers can enable end-user identity verification and proofing for account registration. Identity verification and proofing can check documents, knowledge-based information, and liveness.
19+
20+
## Architecture diagram
21+
22+
The following architecture diagram illustrates the verification and proofing flow.
2123

22-
A high-level architecture diagram explains the flow.
24+
![Diagram of of the identity proofing flow, from registration to access approval.](./media/partner-gallery/third-party-identity-proofing.png)
2325

24-
![Diagram shows the identity proofing flow](./media/partner-gallery/third-party-identity-proofing.png)
26+
1. User begins registration with a device.
27+
2. User enters information.
28+
3. Digital-risk score is assessed, then third-party identity proofing and identity validation occurs.
29+
4. Identity is validated or rejected.
30+
5. User attributes are passed to Azure Active Directory B2C.
31+
6. If user verification is successful, a user account is created in Azure AD B2C during sign-in.
32+
7. Based on the verification result, the user receives an access-approved or -denied message.
2533

26-
Microsoft partners with the following ISV partners.
34+
## Software vendors and integration documentation
2735

28-
| ISV partner | Description and integration walkthroughs |
29-
|:-------------------------|:--------------|
30-
| ![Screenshot of a deduce logo.](./media/partner-gallery/deduce-logo.png) | [Deduce](./partner-deduce.md) is an identity verification and proofing provider focused on stopping account takeover and registration fraud. It helps combat identity fraud and creates a trusted user experience. |
31-
| ![Screenshot of a eid-me logo](./media/partner-gallery/eid-me-logo.png) | [eID-Me](./partner-eid-me.md) is an identity verification and decentralized digital identity solution for Canadian citizens. It enables organizations to meet Identity Assurance Level (IAL) 2 and Know Your Customer (KYC) requirements. |
32-
|![Screenshot of an Experian logo.](./media/partner-gallery/experian-logo.png) | [Experian](./partner-experian.md) is an Identity verification and proofing provider that performs risk assessments based on user attributes to prevent fraud. |
33-
|![Screenshot of an IDology logo.](./media/partner-gallery/idology-logo.png) | [IDology](./partner-idology.md) is an Identity verification and proofing provider with ID verification solutions, fraud prevention solutions, compliance solutions, and others.|
34-
|![Screenshot of a Jumio logo.](./media/partner-gallery/jumio-logo.png) | [Jumio](./partner-jumio.md) is an ID verification service, which enables real-time automated ID verification, safeguarding customer data. |
35-
| ![Screenshot of a LexisNexis logo.](./media/partner-gallery/lexisnexis-logo.png) | [LexisNexis](./partner-lexisnexis.md) is a profiling and identity validation provider that verifies user identification and provides comprehensive risk assessment based on user’s device. |
36-
| ![Screenshot of a Onfido logo](./media/partner-gallery/onfido-logo.png) | [Onfido](./partner-onfido.md) is a document ID and facial biometrics verification solution that allows companies to meet *Know Your Customer* and identity requirements in real time. |
36+
Microsoft partners with independent software vendors (ISVs). Use the following table to locate an ISV and related integration documentation.
3737

38-
## Additional information
38+
| ISV logo | ISV link and description| Integration documentation|
39+
|---|---|---|
40+
| ![Screenshot of the Deduce logo.](./media/partner-gallery/deduce-logo.png) | [Deduce](https://www.deduce.com/): Identity verification and proofing provider that helps stop account takeover and registration fraud. Use it to combat identity fraud and create a trusted user experience. |[Configure Azure AD B2C with Deduce to combat identity fraud and create a trusted user experience](partner-deduce.md)|
41+
| ![Screenshot of the eID-Me logo.](./media/partner-gallery/eid-me-logo.png) | [Bluink, Ltd.](https://bluink.ca/): eID-Me is an identity verification and decentralized digital identity solution for Canadian citizens. Use it to meet Identity Assurance Level (IAL) 2 and Know Your Customer (KYC) requirements. |[Configure eID-Me with Azure AD B2C for identity verification](partner-eid-me.md)|
42+
|![Screenshot of the Experian logo.](./media/partner-gallery/experian-logo.png) | [Experian Information Solutions, Inc.](https://www.experian.com/business/products/crosscore): Identity verification and proofing provider with solutions that perform risk assessments based on user attributes. |[Tutorial: Configure Experian with Azure AD B2C](partner-experian.md)|
43+
|![Screenshot of the IDology logo.](./media/partner-gallery/idology-logo.png) | [IDology, a GBG company](https://www.idology.com/solutions/): Identity verification and proofing provider with ID verification, fraud prevention, and compliance solutions.|[Tutorial for configuring IDology with Azure AD B2C](partner-idology.md)|
44+
|![Screenshot of the Jumio logo.](./media/partner-gallery/jumio-logo.png) | [Jumio](https://www.jumio.com/): Identify verification service with products for real-time, automated ID verification. |[Tutorial for configuring Jumio with Azure AD B2C](partner-jumio.md)|
45+
| ![Screenshot of the LexisNexis logo.](./media/partner-gallery/lexisnexis-logo.png) | [LexisNexis Risk Solutions Group](https://risk.lexisnexis.com/products/threatmetrix): Profiling and identity validation provider that verifies user identification and provides risk assessment based on user devices. See, ThreatMetrix. |[Tutorial for configuring LexisNexis with Azure AD B2C](partner-lexisnexis.md)|
46+
| ![Screenshot of the Onfido logo.](./media/partner-gallery/onfido-logo.png) | [Onfido](https://onfido.com/): Document ID and facial biometrics verification solutions to meet Know Your Customer (KYC) and identity requirements. |[Tutorial for configuring Onfido with Azure AD B2C](partner-onfido.md)|
3947

40-
- [Custom policies in Azure AD B2C](./custom-policy-overview.md)
48+
## Resources
4149

42-
- [Get started with custom policies in Azure AD B2C](./tutorial-create-user-flows.md?pivots=b2c-custom-policy&tabs=applications)
50+
- [Azure AD B2C custom policy overview](custom-policy-overview.md)
51+
- [Tutorial: Create user flows and custom policies in Azure Active Directory B2C](tutorial-create-user-flows.md?pivots=b2c-custom-policy&tabs=applications)
4352

4453
## Next steps
4554

46-
Select a partner in the tables mentioned to learn how to integrate their solution with Azure AD B2C.
55+
Select and contact a partner from the previous table to get started on solution integration with Azure AD B2C. The partners have similar processes to contact them for a product demo.

articles/active-directory/azuread-dev/TOC.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -143,7 +143,7 @@
143143
- name: Reactivate disabled Access Control Service namespaces
144144
href: howto-reactivate-disabled-acs-namespaces.md
145145
- name: Use the Microsoft Graph API
146-
href: ../develop/microsoft-graph-intro.md?toc=/azure/active-directory/azuread-dev/toc.json&bc=/azure/active-directory/azuread-dev/breadcrumb/toc.json
146+
href: /graph/overview?toc=/azure/active-directory/azuread-dev/toc.json&bc=/azure/active-directory/azuread-dev/breadcrumb/toc.json
147147
- name: AD FS for developers
148148
href: /windows-server/identity/ad-fs/ad-fs-overview
149149
- name: References
@@ -152,7 +152,7 @@
152152
displayName: ADAL
153153
href: active-directory-authentication-libraries.md
154154
- name: Microsoft Graph API
155-
href: ../develop/microsoft-graph-intro.md?toc=/azure/active-directory/azuread-dev/toc.json&bc=/azure/active-directory/azuread-dev/breadcrumb/toc.json
155+
href: /graph/overview?toc=/azure/active-directory/azuread-dev/toc.json&bc=/azure/active-directory/azuread-dev/breadcrumb/toc.json
156156
- name: Application manifest
157157
href: ../develop/reference-app-manifest.md?toc=/azure/active-directory/azuread-dev/toc.json&bc=/azure/active-directory/azuread-dev/breadcrumb/toc.json
158158
- name: Authentication and authorization error codes

articles/active-directory/develop/TOC.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -26,7 +26,7 @@
2626
- name: Microsoft Authentication Library (MSAL)
2727
href: msal-overview.md
2828
- name: Microsoft Graph
29-
href: microsoft-graph-intro.md
29+
href: /graph/overview?toc=/azure/active-directory/develop/toc.json&bc=/azure/active-directory/develop/breadcrumb/toc.json
3030
- name: Glossary of terms
3131
displayName: dictionary, terminology
3232
href: developer-glossary.md

articles/active-directory/develop/index.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -208,10 +208,10 @@ additionalContent:
208208
## CARD 2 ######################
209209
- title: Connect to Microsoft Graph
210210
summary: >
211-
Programmatic access to organizational, user, and application data stored in Microsoft Graph. Call the Microsoft Graph API from your application to
211+
Programmatic access to organizational, user, and application data stored in Azure Active Directory. Call Microsoft Graph from your application to
212212
create and manage Azure AD users and groups, get and modify your users' data like their profiles, calendars, email, and more.
213213
links:
214-
- url: microsoft-graph-intro.md
214+
- url: /graph/overview?toc=/azure/active-directory/develop/toc.json&bc=/azure/active-directory/develop/breadcrumb/toc.json
215215
text: Microsoft Graph API documentation
216216
## CARD 3 ######################
217217
- title: Manage and market your apps

articles/active-directory/develop/microsoft-graph-intro.md

Lines changed: 0 additions & 67 deletions
This file was deleted.

articles/active-directory/fundamentals/five-steps-to-full-application-integration-with-azure-ad.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -98,7 +98,7 @@ In addition, you can integrate application delivery controllers like F5 BIG-IP A
9898

9999
For apps that are built within your company, your developers can use the [Microsoft identity platform](../develop/index.yml) to implement authentication and authorization. Applications integrated with the platform with be [registered with Azure AD](../develop/quickstart-register-app.md) and managed just like any other app in your portfolio.
100100

101-
Developers can use the platform for both internal-use apps and customer facing apps, and there are other benefits that come with using the platform. [Microsoft Authentication Libraries (MSAL)](../develop/msal-overview.md), which is part of the platform, allows developers to enable modern experiences like multi-factor authentication and the use of security keys to access their apps without needing to implement it themselves. Additionally, apps integrated with the Microsoft identity platform can access [Microsoft Graph](../develop/microsoft-graph-intro.md) - a unified API endpoint providing the Microsoft 365 data that describes the patterns of productivity, identity, and security in an organization. Developers can use this information to implement features that increase productivity for your users. For example, by identifying the people the user has been interacting with recently and surfacing them in the app's UI.
101+
Developers can use the platform for both internal-use apps and customer facing apps, and there are other benefits that come with using the platform. [Microsoft Authentication Libraries (MSAL)](../develop/msal-overview.md), which is part of the platform, allows developers to enable modern experiences like multi-factor authentication and the use of security keys to access their apps without needing to implement it themselves. Additionally, apps integrated with the Microsoft identity platform can access [Microsoft Graph](/graph/overview) - a unified API endpoint providing the Azure AD data that describes the patterns of productivity, identity, and security in an organization. Developers can use this information to implement features that increase productivity for your users. For example, by identifying the people the user has been interacting with recently and surfacing them in the app's UI.
102102

103103
We have a [video series](https://www.youtube.com/watch?v=zjezqZPPOfc&list=PLLasX02E8BPBxGouWlJV-u-XZWOc2RkiX) that provides a comprehensive introduction to the platform as well as [many code samples](../develop/sample-v2-code.md) in supported languages and platforms.
104104

articles/active-directory/manage-apps/create-service-principal-cross-tenant.md

Lines changed: 13 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -24,15 +24,15 @@ In this article, you'll learn how to create an enterprise application in your te
2424

2525
Before you proceed to add the application using any of these options, check whether the enterprise application is already in your tenant by attempting to sign in to the application. If the sign-in is successful, the enterprise application already exists in your tenant.
2626

27-
If you have verified that the application isn't in your tenant, proceed with any of the following ways to add the enterprise application to your tenant using the appId
27+
If you have verified that the application isn't in your tenant, proceed with any of the following ways to add the enterprise application to your tenant.
2828

2929
## Prerequisites
3030

3131
To add an enterprise application to your Azure AD tenant, you need:
3232

3333
- An Azure AD user account. If you don't already have one, you can [Create an account for free](https://azure.microsoft.com/free/?WT.mc_id=A261C142F).
3434
- One of the following roles: Global Administrator, Cloud Application Administrator, or Application Administrator.
35-
- The client ID of the multi-tenant application.
35+
- The client ID (also called appId in Microsoft Graph) of the multi-tenant application.
3636

3737

3838
## Create an enterprise application
@@ -67,24 +67,26 @@ where:
6767
:::zone-end
6868
:::zone pivot="ms-graph"
6969

70-
From the Microsoft Graph explorer window:
70+
You can use an API client such as [Graph Explorer](https://aka.ms/ge) to work with Microsoft Graph.
7171

72-
1. To create the enterprise application, insert the following query:
72+
1. Grant the client app the *Application.ReadWrite.All* permission.
73+
74+
1. To create the enterprise application, run the following query. The appId is the client ID of the application.
7375

7476
```http
75-
POST /servicePrincipals.
76-
```
77-
1. Supply the following request in the **Request body**.
78-
77+
POST https://graph.microsoft.com/v1.0/servicePrincipals
78+
Content-type: application/json
79+
7980
{
8081
"appId": "fc876dd1-6bcb-4304-b9b6-18ddf1526b62"
8182
}
82-
1. Grant the Application.ReadWrite.All permission under the **Modify permissions** tab and select **Run query**.
83+
84+
```
8385

84-
1. To delete the enterprise application you created, run the query:
86+
1. To delete the enterprise application you created, run the query.
8587

8688
```http
87-
DELETE /servicePrincipals/{objectID}
89+
DELETE https://graph.microsoft.com/v1.0/servicePrincipals(appId='fc876dd1-6bcb-4304-b9b6-18ddf1526b62')
8890
```
8991
:::zone-end
9092
:::zone pivot="azure-cli"

0 commit comments

Comments
 (0)