You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
# Use API connectors to customize and extend self-service sign-up
@@ -25,7 +25,7 @@ As a developer or IT administrator, you can use [API connectors](self-service-si
25
25
-**Overwrite user attributes**. Reformat or assign a value to an attribute collected from the user. For example, if a user enters the first name in all lowercase or all uppercase letters, you can format the name with only the first letter capitalized.
26
26
-**Run custom business logic**. You can trigger downstream events in your cloud systems to send push notifications, update corporate databases, manage permissions, audit databases, and perform other custom actions.
27
27
28
-
An API connector provides Azure Active Directory with the information needed to call API endpoint by defining the HTTP endpoint URL and authentication for the API call. Once you configure an API connector, you can enable it for a specific step in a user flow. When a user reaches that step in the signup flow, the API connector is invoked and materializes as an HTTP POST request to your API, sending user information ("claims") as key-value pairs in a JSON body. The API response can affect the execution of the user flow. For example, the API response can block a user from signing up, ask the user to re-enter information, or overwrite and append user attributes.
28
+
An API connector provides Azure Active Directory with the information needed to call API endpoint by defining the HTTP endpoint URL and authentication for the API call. Once you configure an API connector, you can enable it for a specific step in a user flow. When a user reaches that step in the sign-up flow, the API connector is invoked and materializes as an HTTP POST request to your API, sending user information ("claims") as key-value pairs in a JSON body. The API response can affect the execution of the user flow. For example, the API response can block a user from signing up, ask the user to reenter information, or overwrite and append user attributes.
29
29
30
30
## Where you can enable an API connector in a user flow
31
31
@@ -39,7 +39,7 @@ There are two places in a user flow where you can enable an API connector:
39
39
40
40
### After federating with an identity provider during sign-up
41
41
42
-
An API connector at this step in the sign-up process is invoked immediately after the user authenticates with an identity provider (like Google, Facebook, & Azure AD). This step precedes the ***attribute collection page***, which is the form presented to the user to collect user attributes. This step is not invoked if a user is registering with a local account. The following are examples of API connector scenarios you might enable at this step:
42
+
An API connector at this step in the sign-up process is invoked immediately after the user authenticates with an identity provider (like Google, Facebook, & Azure AD). This step precedes the [***attribute collection page***](self-service-sign-up-user-flow.md#select-the-layout-of-the-attribute-collection-form), which is the form presented to the user to collect user attributes. This step isn't invoked if a user is registering with a local account. The following are examples of API connector scenarios you might enable at this step:
43
43
44
44
- Use the email or federated identity that the user provided to look up claims in an existing system. Return these claims from the existing system, pre-fill the attribute collection page, and make them available to return in the token.
45
45
- Implement an allow or blocklist based on social identity.
@@ -55,4 +55,5 @@ An API connector at this step in the sign-up process is invoked after the attrib
55
55
56
56
## Next steps
57
57
- Learn how to [add an API connector to a user flow](self-service-sign-up-add-api-connector.md)
58
+
- Learn about [Azure AD entitlement management](self-service-portal.md)
58
59
- Learn how to [add a custom approval system to self-service sign-up](self-service-sign-up-add-approvals.md)
# Self-service for Azure AD B2B collaboration sign-up
@@ -20,14 +20,14 @@ Customers can do a lot with the built-in features that are exposed through the [
20
20
21
21
## Azure AD entitlement management for B2B guest user sign-up
22
22
23
-
As an inviting organization, you might not know ahead of time who the individual external collaborators are who need access to your resources. You need a way for users from partner companies to sign themselves up with policies that you control. If you want to enable users from other organizations to request access, and upon approval be provisioned with guest accounts and assigned to groups, apps and SharePoint Online sites, you can use [Azure AD entitlement management](../governance/entitlement-management-overview.md) to configure policies that[manage access for external users](../governance/entitlement-management-external-users.md#how-access-works-for-external-users).
23
+
As an inviting organization, you might not know ahead of time who the individual external collaborators are who need access to your resources. You need a way for users from partner companies to sign themselves up with policies that you control. You can use [Azure AD entitlement management](../governance/entitlement-management-overview.md) to configure policies, which[manage access for external users](../governance/entitlement-management-external-users.md#how-access-works-for-external-users). This will enable users from other organizations to request access, and upon approval be provisioned with guest accounts and assigned to groups, apps and SharePoint Online sites.
24
24
25
25
## Azure Active Directory B2B invitation API
26
26
27
27
Organizations can use the [Microsoft Graph invitation manager API](/graph/api/resources/invitation) to build their own onboarding experiences for B2B guest users. When you want to offer self-service B2B guest user sign-up, we recommend that you use [Azure AD entitlement management](../governance/entitlement-management-overview.md). But if you want to build your own experience, you can use the [create invitation API](/graph/api/invitation-post?tabs=http) to automatically send your customized invitation email directly to the B2B user, for example. Or your app can use the inviteRedeemUrl returned in the creation response to craft your own invitation (through your communication mechanism of choice) to the invited user.
28
28
29
29
## Next steps
30
30
31
-
*[What is Azure AD B2B collaboration?](what-is-b2b.md)
Copy file name to clipboardExpand all lines: articles/active-directory/fundamentals/resilience-b2b-authentication.md
+12-23Lines changed: 12 additions & 23 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,21 +3,18 @@ title: Build resilience in external user authentication with Azure Active Direct
3
3
description: A guide for IT admins and architects to building resilient authentication for external users
4
4
services: active-directory
5
5
author: janicericketts
6
-
manager: amycolannino
7
6
ms.service: active-directory
8
7
ms.workload: identity
9
8
ms.subservice: fundamentals
10
9
ms.topic: conceptual
11
-
ms.date: 09/13/2022
10
+
ms.date: 11/16/2022
12
11
ms.author: jricketts
13
-
ms.reviewer: ajburnle
14
12
ms.custom: "it-pro, seodec18"
15
13
ms.collection: M365-identity-device-management
16
14
---
17
-
18
15
# Build resilience in external user authentication
19
16
20
-
[Azure Active Directory B2B collaboration](../external-identities/what-is-b2b.md) (Azure AD B2B) is a feature of [External Identities](../external-identities/external-collaboration-settings-configure.md) that enables collaboration with other organizations and individuals. It enables the secure onboarding of guest users into your Azure AD tenant without having to manage their credentials. External users bring their identity and credentials with them from an external identity provider (IdP), so they don’t have to remember a new credential.
17
+
[Azure Active Directory B2B collaboration](../external-identities/what-is-b2b.md) (Azure AD B2B) is a feature of [External Identities](../external-identities/external-collaboration-settings-configure.md) that enables collaboration with other organizations and individuals. It enables the secure onboarding of guest users into your Azure AD tenant without having to manage their credentials. External users bring their identity and credentials with them from an external identity provider (IdP) so they don't have to remember a new credential.
21
18
22
19
## Ways to authenticate external users
23
20
@@ -26,46 +23,38 @@ You can choose the methods of external user authentication to your directory. Yo
26
23
With every external IdP, you take a dependency on the availability of that IdP. With some methods of connecting to IdPs, there are things you can do to increase your resilience.
27
24
28
25
> [!NOTE]
29
-
> Azure AD B2B has the built-in ability to authenticate any user from any [Azure Active Directory](../index.yml) tenant, or with a personal [Microsoft Account](https://account.microsoft.com/account). You do not have to do any configuration with these built-in options.
26
+
> Azure AD B2B has the built-in ability to authenticate any user from any [Azure Active Directory](../index.yml) tenant or with a personal [Microsoft Account](https://account.microsoft.com/account). You do not have to do any configuration with these built-in options.
30
27
31
28
### Considerations for resilience with other IdPs
32
29
33
-
When using external IdPs for guest user authentication, there are certain configurations that you must ensure you maintain to prevent disruptions.
30
+
When you use external IdPs for guest user authentication, there are configurations that you must maintain to prevent disruptions.
| Federation with social IDPs like [Facebook](../external-identities/facebook-federation.md) or [Google](../external-identities/google-federation.md).| You must maintain your account with the IdP and configure your Client ID and Client Secret. |
38
-
|[Direct Federation with SAML and WS-Federation Identity Providers](../external-identities/direct-federation.md)| You must collaborate with the IdP owner for access to their endpoints, upon which you're dependent. <br>You must maintain the metadata that contain the certificates and endpoints. |
39
-
|[Email one-time passcode](../external-identities/one-time-passcode.md)| With this method you're dependent on Microsoft’s email system, the user’s email system, and the user’s email client. |
40
-
41
-
42
-
35
+
|[SAML/WS-Fed identity provider (IdP) federation](../external-identities/direct-federation.md)| You must collaborate with the IdP owner for access to their endpoints upon which you're dependent. You must maintain the metadata that contain the certificates and endpoints. |
36
+
|[Email one-time passcode](../external-identities/one-time-passcode.md)| You're dependent on Microsoft's email system, the user's email system, and the user's email client. |
43
37
44
-
## Self-service sign-up (preview)
38
+
## Self-service sign-up
45
39
46
-
As an alternative to sending invitations or links, you can enable [Self-service sign-up](../external-identities/self-service-sign-up-overview.md). This allows external users to request access to an application. You must create an [API connector](../external-identities/self-service-sign-up-add-api-connector.md) and associate it with a user flow. You associate user flows that define the user experience with one or more applications.
40
+
As an alternative to sending invitations or links, you can enable [Self-service sign-up](../external-identities/self-service-sign-up-overview.md). This method allows external users to request access to an application. You must create an [API connector](../external-identities/self-service-sign-up-add-api-connector.md) and associate it with a user flow. You associate user flows that define the user experience with one or more applications.
47
41
48
-
It’s possible to use [API connectors](../external-identities/api-connectors-overview.md) to integrate your self-service sign-up user flow with external systems’ APIs. This API integration can be used for [custom approval workflows](../external-identities/self-service-sign-up-add-approvals.md), [performing identity verification](../external-identities/code-samples-self-service-sign-up.md), and other tasks such as overwriting user attributes. Using APIs requires that you manage the following dependencies.
42
+
It's possible to use [API connectors](../external-identities/api-connectors-overview.md) to integrate your self-service sign-up user flow with external systems' APIs. This API integration can be used for [custom approval workflows](../external-identities/self-service-sign-up-add-approvals.md), [performing identity verification](../external-identities/code-samples-self-service-sign-up.md), and other tasks such as overwriting user attributes. Using APIs requires that you manage the following dependencies.
49
43
50
44
***API Connector Authentication**: Setting up a connector requires an endpoint URL, a username, and a password. Set up a process by which these credentials are maintained, and work with the API owner to ensure you know any expiration schedule.
51
-
52
45
***API Connector Response**: Design API Connectors in the sign-up flow to fail gracefully if the API isn't available. Examine and provide to your API developers these [example API responses](../external-identities/self-service-sign-up-add-api-connector.md) and the [best practices for troubleshooting](../external-identities/self-service-sign-up-add-api-connector.md). Work with the API development team to test all possible response scenarios, including continuation, validation-error, and blocking responses.
53
46
54
47
## Next steps
55
-
Resilience resources for administrators and architects
48
+
49
+
### Resilience resources for administrators and architects
56
50
57
51
*[Build resilience with credential management](resilience-in-credentials.md)
58
-
59
52
*[Build resilience with device states](resilience-with-device-states.md)
60
-
61
53
*[Build resilience by using Continuous Access Evaluation (CAE)](resilience-with-continuous-access-evaluation.md)
62
-
63
54
*[Build resilience in your hybrid authentication](resilience-in-hybrid.md)
64
-
65
55
*[Build resilience in application access with Application Proxy](resilience-on-premises-access.md)
66
56
67
-
Resilience resources for developers
57
+
### Resilience resources for developers
68
58
69
59
*[Build IAM resilience in your applications](resilience-app-development-overview.md)
70
-
71
60
*[Build resilience in your CIAM systems](resilience-b2c.md)
0 commit comments