You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory-b2c/azure-ad-b2c-global-identity-funnel-based-design.md
+39-39Lines changed: 39 additions & 39 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -16,7 +16,7 @@ ms.subservice: B2C
16
16
17
17
# Build a global identity solution with funnel-based approach
18
18
19
-
In this article, we describe the scenarios for funnel-based design approach. Before starting to design, it's recommended that you review the [capabilities](azure-ad-b2c-global-identity-solutions.md#capabilities-and-considerations), and [performance](azure-ad-b2c-global-identity-solutions.md#performance) of both funnel and region-based design approach.
19
+
In this article, we describe the scenarios for funnel-based design approach. Before starting to design, it's recommended that you review the [capabilities](azure-ad-b2c-global-identity-solutions.md#capabilities-and-considerations), and [performance](azure-ad-b2c-global-identity-solutions.md#performance) of both funnel and region-based design approach. This article will further help determine which design may fit best for your organization.
20
20
21
21
The designs account for:
22
22
@@ -37,9 +37,9 @@ This use case demonstrates how a user from their home country/region performs a
37
37
38
38

39
39
40
-
1.User from Europe, Middle East, and Africa (EMEA) attempts to sign up at **myapp.fr**. If the user isn't being sent to their local hostname, the traffic manager will enforce a redirect.
40
+
1.A user from Europe, Middle East, and Africa (EMEA) attempts to sign up at **myapp.fr**. If the user isn't being sent to their local appication instance, the traffic manager will enforce a redirect.
41
41
42
-
1.User reaches the Global Funnel Azure AD B2C tenant. This tenant is configured to redirect to a regional Azure AD B2C tenant based on defined criteria using OpenId federation. This can be a lookup based on Application clientId.
42
+
1.The user reaches the Global Funnel Azure AD B2C tenant. This tenant is configured to redirect to a regional Azure AD B2C tenant based on defined criteria using OpenId federation. This can be a lookup based on Application clientId.
43
43
44
44
1. The user attempts to sign up. The sign-up process checks the global lookup table to determine if the user exists in any of the regional Azure AD B2C tenants.
45
45
@@ -55,9 +55,9 @@ This use case demonstrates how a user re-registering the same email from their o
55
55
56
56

57
57
58
-
1.User from EMEA attempts to sign up at **myapp.fr**. If the user isn't being sent to their local hostname, the traffic manager will enforce a redirect.
58
+
1.A user from EMEA attempts to sign up at **myapp.fr**. If the user isn't being sent to their local appication instance, the traffic manager will enforce a redirect.
59
59
60
-
1.User reaches the Global Funnel Azure AD B2C tenant. This tenant is configured to redirect to a regional Azure AD B2C tenant based on some criteria using OpenId federation. This can be a lookup based on Application clientId.
60
+
1.The user reaches the Global Funnel Azure AD B2C tenant. This tenant is configured to redirect to a regional Azure AD B2C tenant based on some criteria using OpenId federation. This can be a lookup based on Application clientId.
61
61
62
62
1. The user attempts to sign up. The sign-up process checks the global lookup table to determine if the user exists in any of the regional Azure AD B2C tenants.
63
63
@@ -71,11 +71,11 @@ This use case demonstrates how a user from their home country/region performs a
71
71
72
72

73
73
74
-
1.User from EMEA attempts to sign in at **myapp.fr**. If the user isn't being sent to their local hostname, the traffic manager will enforce a redirect.
74
+
1.A user from EMEA attempts to sign in at **myapp.fr**. If the user isn't being sent to their local appication instance, the traffic manager will enforce a redirect.
75
75
76
-
1.User reaches the global funnel Azure AD B2C tenant. This tenant is configured to redirect to a regional Azure AD B2C tenant based on some criteria using OpenId federation. This can be a lookup based on application clientId.
76
+
1.The user reaches the global funnel Azure AD B2C tenant. This tenant is configured to redirect to a regional Azure AD B2C tenant based on some criteria using OpenId federation. This can be a lookup based on application clientId.
77
77
78
-
1.User enters their credentials at the regional tenant.
78
+
1.The user enters their credentials at the regional tenant.
79
79
80
80
1. The regional tenant issues a token back to the funnel tenant.
81
81
@@ -87,11 +87,11 @@ This use case demonstrates how a user can travel across regions and maintain the
87
87
88
88

89
89
90
-
1.User from North America (NOAM) attempts to sign in at **myapp.fr**since there's a holiday in France. If the user isn't being sent to their local hostname, the traffic manager will enforce a redirect.
90
+
1.A user from North America (NOAM) attempts to sign in at **myapp.fr**while they are on holiday in France. If the user isn't being sent to their local appication instance, the traffic manager will enforce a redirect.
91
91
92
-
1.User reaches the global funnel Azure AD B2C tenant. This tenant is configured to redirect to a regional Azure AD B2C tenant based on some criteria using OpenId federation. This can be a lookup based on Application clientId.
92
+
1.The user reaches the global funnel Azure AD B2C tenant. This tenant is configured to redirect to a regional Azure AD B2C tenant based on some criteria using OpenId federation. This can be a lookup based on Application clientId.
93
93
94
-
1.User enters their credentials at the regional tenant.
94
+
1.The user enters their credentials at the regional tenant.
95
95
96
96
1. The regional tenant performs a lookup into the global lookup table, since the user’s email wasn't found in the EMEA Azure AD B2C directory.
97
97
@@ -111,9 +111,9 @@ This use case demonstrates how a user can reset their password when they are wit
111
111
112
112

113
113
114
-
1.User from EMEA attempts to sign in at **myapp.fr**. If the user isn't being sent to their local hostname, the traffic manager will enforce a redirect.
114
+
1.A user from EMEA attempts to sign in at **myapp.fr**. If the user isn't being sent to their local appication instance, the traffic manager will enforce a redirect.
115
115
116
-
1.User reaches the global funnel Azure AD B2C tenant. This tenant is configured to redirect to a regional Azure AD B2C tenant based on some criteria using OpenId federation. This can be a lookup based on application clientId.
116
+
1.The user reaches the global funnel Azure AD B2C tenant. This tenant is configured to redirect to a regional Azure AD B2C tenant based on some criteria using OpenId federation. This can be a lookup based on application clientId.
117
117
118
118
1. The user arrives at the EMEA Azure AD B2C tenant and selects **forgot password**. The user enters and verifies their email.
119
119
@@ -133,9 +133,9 @@ This use case demonstrates how a user can reset their password when they're trav
133
133
134
134

135
135
136
-
1.User from NOAM attempts to sign in at **myapp.fr** since they are on holiday in France. If the user isn't being sent to their local hostname, the traffic manager will enforce a redirect.
136
+
1.A user from NOAM attempts to sign in at **myapp.fr** since they are on holiday in France. If the user isn't being sent to their local appication instance, the traffic manager will enforce a redirect.
137
137
138
-
1.User reaches the global funnel Azure AD B2C tenant. This tenant is configured to redirect to a regional Azure AD B2C tenant based on some criteria using OpenId federation. This can be a lookup based on application clientId.
138
+
1.The user reaches the global funnel Azure AD B2C tenant. This tenant is configured to redirect to a regional Azure AD B2C tenant based on some criteria using OpenId federation. This can be a lookup based on application clientId.
139
139
140
140
1. The user arrives at the EMEA Azure AD B2C tenant and selects **forgot password**. The user enters and verifies their email.
141
141
@@ -155,9 +155,9 @@ This use case demonstrates how a user can change their password after they've lo
155
155
156
156

157
157
158
-
1.User from EMEA attempts selects **change password** after logging into **myapp.fr**.
158
+
1.A user from EMEA attempts selects **change password** after logging into **myapp.fr**.
159
159
160
-
1.User reaches the global funnel Azure AD B2C tenant. This tenant is configured to redirect to a regional Azure AD B2C tenant based on some criteria using OpenId federation. This can be a lookup based on application clientId.
160
+
1.The user reaches the global funnel Azure AD B2C tenant. This tenant is configured to redirect to a regional Azure AD B2C tenant based on some criteria using OpenId federation. This can be a lookup based on application clientId.
161
161
162
162
1. The user arrives at the EMEA Azure AD B2C tenant, and the Single-Sign On (SSO) cookie set allows the user to change their password immediately.
163
163
@@ -173,9 +173,9 @@ This use case demonstrates how a user can change their password after they've lo
173
173
174
174

175
175
176
-
1.User from NOAM attempts **change password** after logging into **myapp.fr**.
176
+
1.A user from NOAM attempts **change password** after logging into **myapp.fr**.
177
177
178
-
1.User reaches the global funnel Azure AD B2C tenant. This tenant is configured to redirect to a regional Azure AD B2C tenant based on some criteria using OpenId federation. This can be a lookup based on application clientId.
178
+
1.The user reaches the global funnel Azure AD B2C tenant. This tenant is configured to redirect to a regional Azure AD B2C tenant based on some criteria using OpenId federation. This can be a lookup based on application clientId.
179
179
180
180
1. The user arrives at the EMEA Azure AD B2C tenant, and the SSO cookie set allows the user to change their password immediately.
181
181
@@ -193,15 +193,15 @@ The following use cases show examples of using federated identities to sign up o
193
193
194
194
### Local federated ID sign-up
195
195
196
-
This use case demonstrates how a user from their local region signs up to the service using a federated ID.
196
+
This use case demonstrates how a user can sign up to the service from their local region using a federated ID.
197
197
198
198

199
199
200
-
1.User from EMEA attempts to sign up at **myapp.fr**. If the user isn't being sent to their local hostname, the traffic manager will enforce a redirect.
200
+
1.A user from EMEA attempts to sign up at **myapp.fr**. If the user isn't being sent to their local appication instance, the traffic manager will enforce a redirect.
201
201
202
-
1.User reaches the global funnel Azure AD B2C tenant. This tenant is configured to redirect to a regional Azure AD B2C tenant based on some criteria using OpenId federation. This can be a lookup based on application clientId.
202
+
1.The user reaches the global funnel Azure AD B2C tenant. This tenant is configured to redirect to a regional Azure AD B2C tenant based on some criteria using OpenId federation. This can be a lookup based on application clientId.
203
203
204
-
1.User selects to sign in with a federated Identity Provider (IdP).
204
+
1.The user selects to sign in with a federated Identity Provider (IdP).
205
205
206
206
1. Perform a lookup into the global lookup table.
207
207
***If account linking is in scope**: Proceed if the federated IdP identifier nor the email that came back from the federated IdP doesn't exist in the lookup table.
@@ -220,11 +220,11 @@ This use case demonstrates how a user from their local region signs into the ser
220
220
221
221

222
222
223
-
1.User from EMEA attempts to sign in at **myapp.fr**. If the user isn't being sent to their local hostname, the traffic manager will enforce a redirect.
223
+
1.A user from EMEA attempts to sign in at **myapp.fr**. If the user isn't being sent to their local appication instance, the traffic manager will enforce a redirect.
224
224
225
-
2.User reaches the global funnel Azure AD B2C tenant. This tenant is configured to redirect to a regional Azure AD B2C tenant based on some criteria using OpenId federation. This can be a lookup based on Application clientId.
225
+
2.The user reaches the global funnel Azure AD B2C tenant. This tenant is configured to redirect to a regional Azure AD B2C tenant based on some criteria using OpenId federation. This can be a lookup based on Application clientId.
226
226
227
-
3.User selects to sign in with a federated identity provider.
227
+
3.The user selects to sign in with a federated identity provider.
228
228
229
229
4. Perform a lookup into the global lookup table and confirm the user’s federated ID is registered in EMEA.
230
230
@@ -234,15 +234,15 @@ This use case demonstrates how a user from their local region signs into the ser
234
234
235
235
### Traveling federated user sign-in
236
236
237
-
This use case demonstrates how a user located away from the region in which they signed up signs into the service using a federated IdP.
237
+
This use case demonstrates how a user can sign into their account with a federated IdP, whilst located away from the region in which they signed up in.
238
238
239
239

240
240
241
-
1.User from NOAM attempts to sign in at **myapp.fr**. If the user isn't being sent to their local hostname, the traffic manager will enforce a redirect.
241
+
1.A user from NOAM attempts to sign in at **myapp.fr**. If the user isn't being sent to their local appication instance, the traffic manager will enforce a redirect.
242
242
243
-
1.User reaches the global funnel Azure AD B2C tenant. This tenant is configured to redirect to a regional Azure AD B2C tenant based on some criteria using OpenId federation. This can be a lookup based on Application clientId.
243
+
1.The user reaches the global funnel Azure AD B2C tenant. This tenant is configured to redirect to a regional Azure AD B2C tenant based on some criteria using OpenId federation. This can be a lookup based on Application clientId.
244
244
245
-
1.User selects to sign in with a federated identity provider.
245
+
1.The user selects to sign in with a federated identity provider.
246
246
247
247
>[!NOTE]
248
248
>Use the same App Id from the App Registration at the Social IdP across all Azure AD B2C regional tenants. This ensures that the ID coming back from the Social IdP is always the same.
@@ -257,15 +257,15 @@ This use case demonstrates how a user located away from the region in which they
257
257
258
258
### Account linking with matching criteria
259
259
260
-
This use case demonstrates how users are able to perform account linking when matching criteria is satisfied. The matching criteria is typically the users email address.
260
+
This use case demonstrates how users are able to perform account linking when matching criteria is satisfied. The matching criteria is typically the users email address. When the matching criteria of a sign in from a new identity provider has the same value for an existing account in Azure AD B2C, the account linking process can begin.
261
261
262
262

263
263
264
-
1.User from EMEA attempts to sign in at **myapp.fr**. If the user isn't being sent to their local hostname, the traffic manager will enforce a redirect.
264
+
1.A user from EMEA attempts to sign in at **myapp.fr**. If the user isn't being sent to their local appication instance, the traffic manager will enforce a redirect.
265
265
266
-
1.User reaches the global funnel Azure AD B2C tenant. This tenant is configured to redirect to a regional Azure AD B2C tenant based on some criteria using OpenId federation. This can be a lookup based on Application clientId.
266
+
1.The user reaches the global funnel Azure AD B2C tenant. This tenant is configured to redirect to a regional Azure AD B2C tenant based on some criteria using OpenId federation. This can be a lookup based on Application clientId.
267
267
268
-
1.User selects to sign in with a federated identity provider/social IdP.
268
+
1.The user selects to sign in with a federated identity provider/social IdP.
269
269
270
270
1. A lookup is performed into the global lookup table for the ID returned from the federated IdP.
271
271
@@ -281,19 +281,19 @@ This use case demonstrates how users are able to perform account linking when ma
281
281
282
282
### Traveling user account linking with matching criteria
283
283
284
-
This use case demonstrates how non-local users are able to perform account linking when matching criteria is satisfied. The matching criteria is typically the users email address.
284
+
This use case demonstrates how non-local users are able to perform account linking when matching criteria is satisfied. The matching criteria is typically the users email address. When the matching criteria of a sign in from a new identity provider has the same value for an existing account in Azure AD B2C, the account linking process can begin.
285
285
286
286

287
287
288
-
1.User from NOAM attempts to sign in at **myapp.fr**. If the user isn't being sent to their local hostname, the traffic manager will enforce a redirect.
288
+
1.A user from NOAM attempts to sign in at **myapp.fr**. If the user isn't being sent to their local appication instance, the traffic manager will enforce a redirect.
289
289
290
-
1.User reaches the Global Funnel Azure AD B2C tenant. This tenant is configured to redirect to a regional Azure AD B2C tenant based on some criteria using OpenId federation. This can be a lookup based on Application clientId.
290
+
1.The user reaches the Global Funnel Azure AD B2C tenant. This tenant is configured to redirect to a regional Azure AD B2C tenant based on some criteria using OpenId federation. This can be a lookup based on Application clientId.
291
291
292
-
1.User selects to sign in with a federated identity provider/social IdP.
292
+
1.The user selects to sign in with a federated identity provider/social IdP.
293
293
294
294
1. A lookup is performed into the global lookup table for the ID returned from the federated IdP.
295
295
296
-
1. Where the ID doesn't exist, and the email from the federated IdP exists in another region -this is a traveling user account linking use case.
296
+
1. Where the ID doesn't exist, and the email from the federated IdP exists in another region -this is a traveling user account linking use case.
297
297
298
298
1. Create an id_token_hint link asserting the users currently collected claims. Bootstrap a journey into the NOAM Azure AD B2C tenant using federation. The user will prove that they own the account via the NOAM Azure AD B2C tenant.
0 commit comments