You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory-b2c/identity-verification-proofing.md
+30-21Lines changed: 30 additions & 21 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,43 +4,52 @@ titleSuffix: Azure AD B2C
4
4
description: Learn about our partners who integrate with Azure AD B2C to provide identity proofing and verification solutions
5
5
services: active-directory-b2c
6
6
author: gargi-sinha
7
-
manager: CelesteDG
7
+
manager: martinco
8
8
ms.reviewer: kengaderdus
9
-
10
9
ms.service: active-directory
11
10
ms.workload: identity
12
11
ms.topic: how-to
13
-
ms.date: 09/13/2022
12
+
ms.date: 01/18/2023
14
13
ms.author: gasinh
15
-
ms.subservice: B2C
16
14
---
17
15
18
16
# Identity verification and proofing partners
19
17
20
-
With Azure AD B2C partners, customers can enable identity verification and proofing of their end users before allowing account registration or access. Identity verification and proofing can check document, knowledge-based information and liveness.
18
+
With Azure Active Directory B2C (Azure AD B2C) and solutions from software-vendor partners, customers can enable end-user identity verification and proofing for account registration. Identity verification and proofing can check documents, knowledge-based information, and liveness.
19
+
20
+
## Architecture diagram
21
+
22
+
The following architecture diagram illustrates the verification and proofing flow.
21
23
22
-
A high-level architecture diagram explains the flow.
24
+

23
25
24
-

26
+
1. User begins registration with a device.
27
+
2. User enters information.
28
+
3. Digital-risk score is assessed, then third-party identity proofing and identity validation occurs.
29
+
4. Identity is validated or rejected.
30
+
5. User attributes are passed to Azure Active Directory B2C.
31
+
6. If user verification is successful, a user account is created in Azure AD B2C during sign-in.
32
+
7. Based on the verification result, the user receives an access-approved or -denied message.
25
33
26
-
Microsoft partners with the following ISV partners.
34
+
## Software vendors and integration documentation
27
35
28
-
| ISV partner | Description and integration walkthroughs |
29
-
|:-------------------------|:--------------|
30
-
||[Deduce](./partner-deduce.md) is an identity verification and proofing provider focused on stopping account takeover and registration fraud. It helps combat identity fraud and creates a trusted user experience. |
31
-
||[eID-Me](./partner-eid-me.md) is an identity verification and decentralized digital identity solution for Canadian citizens. It enables organizations to meet Identity Assurance Level (IAL) 2 and Know Your Customer (KYC) requirements. |
32
-
||[Experian](./partner-experian.md) is an Identity verification and proofing provider that performs risk assessments based on user attributes to prevent fraud. |
33
-
||[IDology](./partner-idology.md) is an Identity verification and proofing provider with ID verification solutions, fraud prevention solutions, compliance solutions, and others.|
34
-
||[Jumio](./partner-jumio.md) is an ID verification service, which enables real-time automated ID verification, safeguarding customer data. |
35
-
||[LexisNexis](./partner-lexisnexis.md) is a profiling and identity validation provider that verifies user identification and provides comprehensive risk assessment based on user’s device. |
36
-
||[Onfido](./partner-onfido.md) is a document ID and facial biometrics verification solution that allows companies to meet *Know Your Customer* and identity requirements in real time. |
36
+
Microsoft partners with independent software vendors (ISVs). Use the following table to locate an ISV and related integration documentation.
37
37
38
-
## Additional information
38
+
| ISV logo | ISV link and description| Integration documentation|
39
+
|---|---|---|
40
+
||[Deduce](https://www.deduce.com/): Identity verification and proofing provider that helps stop account takeover and registration fraud. Use it to combat identity fraud and create a trusted user experience. |[Configure Azure AD B2C with Deduce to combat identity fraud and create a trusted user experience](partner-deduce.md)|
41
+
||[Bluink, Ltd.](https://bluink.ca/): eID-Me is an identity verification and decentralized digital identity solution for Canadian citizens. Use it to meet Identity Assurance Level (IAL) 2 and Know Your Customer (KYC) requirements. |[Configure eID-Me with Azure AD B2C for identity verification](partner-eid-me.md)|
42
+
||[Experian Information Solutions, Inc.](https://www.experian.com/business/products/crosscore): Identity verification and proofing provider with solutions that perform risk assessments based on user attributes. |[Tutorial: Configure Experian with Azure AD B2C](partner-experian.md)|
43
+
||[IDology, a GBG company](https://www.idology.com/solutions/): Identity verification and proofing provider with ID verification, fraud prevention, and compliance solutions.|[Tutorial for configuring IDology with Azure AD B2C](partner-idology.md)|
44
+
||[Jumio](https://www.jumio.com/): Identify verification service with products for real-time, automated ID verification. |[Tutorial for configuring Jumio with Azure AD B2C](partner-jumio.md)|
45
+
||[LexisNexis Risk Solutions Group](https://risk.lexisnexis.com/products/threatmetrix): Profiling and identity validation provider that verifies user identification and provides risk assessment based on user devices. See, ThreatMetrix. |[Tutorial for configuring LexisNexis with Azure AD B2C](partner-lexisnexis.md)|
46
+
||[Onfido](https://onfido.com/): Document ID and facial biometrics verification solutions to meet Know Your Customer (KYC) and identity requirements. |[Tutorial for configuring Onfido with Azure AD B2C](partner-onfido.md)|
39
47
40
-
-[Custom policies in Azure AD B2C](./custom-policy-overview.md)
48
+
## Resources
41
49
42
-
-[Get started with custom policies in Azure AD B2C](./tutorial-create-user-flows.md?pivots=b2c-custom-policy&tabs=applications)
50
+
-[Azure AD B2C custom policy overview](custom-policy-overview.md)
51
+
-[Tutorial: Create user flows and custom policies in Azure Active Directory B2C](tutorial-create-user-flows.md?pivots=b2c-custom-policy&tabs=applications)
43
52
44
53
## Next steps
45
54
46
-
Select a partner in the tables mentioned to learn how to integrate their solution with Azure AD B2C.
55
+
Select and contact a partner from the previous table to get started on solution integration with Azure AD B2C. The partners have similar processes to contact them for a product demo.
Copy file name to clipboardExpand all lines: articles/active-directory/fundamentals/five-steps-to-full-application-integration-with-azure-ad.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -98,7 +98,7 @@ In addition, you can integrate application delivery controllers like F5 BIG-IP A
98
98
99
99
For apps that are built within your company, your developers can use the [Microsoft identity platform](../develop/index.yml) to implement authentication and authorization. Applications integrated with the platform with be [registered with Azure AD](../develop/quickstart-register-app.md) and managed just like any other app in your portfolio.
100
100
101
-
Developers can use the platform for both internal-use apps and customer facing apps, and there are other benefits that come with using the platform. [Microsoft Authentication Libraries (MSAL)](../develop/msal-overview.md), which is part of the platform, allows developers to enable modern experiences like multi-factor authentication and the use of security keys to access their apps without needing to implement it themselves. Additionally, apps integrated with the Microsoft identity platform can access [Microsoft Graph](../develop/microsoft-graph-intro.md) - a unified API endpoint providing the Microsoft 365 data that describes the patterns of productivity, identity, and security in an organization. Developers can use this information to implement features that increase productivity for your users. For example, by identifying the people the user has been interacting with recently and surfacing them in the app's UI.
101
+
Developers can use the platform for both internal-use apps and customer facing apps, and there are other benefits that come with using the platform. [Microsoft Authentication Libraries (MSAL)](../develop/msal-overview.md), which is part of the platform, allows developers to enable modern experiences like multi-factor authentication and the use of security keys to access their apps without needing to implement it themselves. Additionally, apps integrated with the Microsoft identity platform can access [Microsoft Graph](/graph/overview) - a unified API endpoint providing the Azure AD data that describes the patterns of productivity, identity, and security in an organization. Developers can use this information to implement features that increase productivity for your users. For example, by identifying the people the user has been interacting with recently and surfacing them in the app's UI.
102
102
103
103
We have a [video series](https://www.youtube.com/watch?v=zjezqZPPOfc&list=PLLasX02E8BPBxGouWlJV-u-XZWOc2RkiX) that provides a comprehensive introduction to the platform as well as [many code samples](../develop/sample-v2-code.md) in supported languages and platforms.
Copy file name to clipboardExpand all lines: articles/active-directory/manage-apps/create-service-principal-cross-tenant.md
+13-11Lines changed: 13 additions & 11 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -24,15 +24,15 @@ In this article, you'll learn how to create an enterprise application in your te
24
24
25
25
Before you proceed to add the application using any of these options, check whether the enterprise application is already in your tenant by attempting to sign in to the application. If the sign-in is successful, the enterprise application already exists in your tenant.
26
26
27
-
If you have verified that the application isn't in your tenant, proceed with any of the following ways to add the enterprise application to your tenant using the appId
27
+
If you have verified that the application isn't in your tenant, proceed with any of the following ways to add the enterprise application to your tenant.
28
28
29
29
## Prerequisites
30
30
31
31
To add an enterprise application to your Azure AD tenant, you need:
32
32
33
33
- An Azure AD user account. If you don't already have one, you can [Create an account for free](https://azure.microsoft.com/free/?WT.mc_id=A261C142F).
34
34
- One of the following roles: Global Administrator, Cloud Application Administrator, or Application Administrator.
35
-
- The client ID of the multi-tenant application.
35
+
- The client ID (also called appId in Microsoft Graph) of the multi-tenant application.
36
36
37
37
38
38
## Create an enterprise application
@@ -67,24 +67,26 @@ where:
67
67
:::zone-end
68
68
:::zone pivot="ms-graph"
69
69
70
-
From the Microsoft Graph explorer window:
70
+
You can use an API client such as [Graph Explorer](https://aka.ms/ge) to work with Microsoft Graph.
71
71
72
-
1. To create the enterprise application, insert the following query:
72
+
1. Grant the client app the *Application.ReadWrite.All* permission.
73
+
74
+
1. To create the enterprise application, run the following query. The appId is the client ID of the application.
73
75
74
76
```http
75
-
POST /servicePrincipals.
76
-
```
77
-
1. Supply the following request in the **Request body**.
78
-
77
+
POST https://graph.microsoft.com/v1.0/servicePrincipals
78
+
Content-type: application/json
79
+
79
80
{
80
81
"appId": "fc876dd1-6bcb-4304-b9b6-18ddf1526b62"
81
82
}
82
-
1. Grant the Application.ReadWrite.All permission under the **Modify permissions** tab and select **Run query**.
83
+
84
+
```
83
85
84
-
1. To delete the enterprise application you created, run the query:
86
+
1. To delete the enterprise application you created, run the query.
0 commit comments