You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
# Customer intent: As a tenant administrator, I want to add API connectors for custom approval workflows in self-service sign-up.
15
17
---
16
18
17
19
# Add a custom approval workflow to self-service sign-up
@@ -36,25 +38,22 @@ You need to register your approval system as an application in your Azure AD ten
36
38
2. Under **Azure services**, select **Azure Active Directory**.
37
39
3. In the left menu, select **App registrations**, and then select **New registration**.
38
40
4. Enter a **Name** for the application, for example, _Sign-up Approvals_.
39
-
40
-
<!--  -->
41
-
42
41
5. Select **Register**. You can leave other fields at their defaults.
43
42
44
-

43
+
:::image type="content" source="media/self-service-sign-up-add-approvals/register-approvals-app.png" alt-text="Screenshot that highlights the Register button.":::
45
44
46
45
6. Under **Manage** in the left menu, select **API permissions**, and then select **Add a permission**.
47
46
7. On the **Request API permissions** page, select **Microsoft Graph**, and then select **Application permissions**.
48
47
8. Under **Select permissions**, expand **User**, and then select the **User.ReadWrite.All** check box. This permission allows the approval system to create the user upon approval. Then select **Add permissions**.
49
48
50
-

49
+
:::image type="content" source="media/self-service-sign-up-add-approvals/request-api-permissions.png" alt-text="Screenshot of requesting API permissions.":::
51
50
52
51
9. On the **API permissions** page, select **Grant admin consent for (your tenant name)**, and then select **Yes**.
53
52
10. Under **Manage** in the left menu, select **Certificates & secrets**, and then select **New client secret**.
54
53
11. Enter a **Description** for the secret, for example _Approvals client secret_, and select the duration for when the client secret **Expires**. Then select **Add**.
55
-
12. Copy the value of the client secret.
54
+
12. Copy the value of the client secret. Client secret values can be viewed only immediately after creation. Make sure to save the secret when created, before leaving the page.
56
55
57
-

56
+
:::image type="content" source="media/self-service-sign-up-add-approvals/client-secret-value-copy.png" alt-text="Screenshot of copying the client secret. ":::
58
57
59
58
13. Configure your approval system to use the **Application ID** as the client ID and the **client secret** you generated to authenticate with Azure AD.
60
59
@@ -64,11 +63,11 @@ Next you'll [create the API connectors](self-service-sign-up-add-api-connector.m
64
63
65
64
-**Check approval status**. Send a call to the approval system immediately after a user signs-in with an identity provider to check if the user has an existing approval request or has already been denied. If your approval system only does automatic approval decisions, this API connector may not be needed. Example of a "Check approval status" API connector.
66
65
67
-

66
+
:::image type="content" source="media/self-service-sign-up-add-approvals/check-approval-status-api-connector-config-alt.png" alt-text="Screenshot of check approval status API connector configuration.":::
68
67
69
68
-**Request approval** - Send a call to the approval system after a user completes the attribute collection page, but before the user account is created, to request approval. The approval request can be automatically granted or manually reviewed. Example of a "Request approval" API connector.
70
69
71
-

70
+
:::image type="content" source="media/self-service-sign-up-add-approvals/create-approval-request-api-connector-config-alt.png" alt-text="Screenshot of request approval API connector configuration.":::
72
71
73
72
To create these connectors, follow the steps in [create an API connector](self-service-sign-up-add-api-connector.md#create-an-api-connector).
74
73
@@ -85,13 +84,14 @@ Now you'll add the API connectors to a self-service sign-up user flow with these
85
84
-**After federating with an identity provider during sign-up**: Select your approval status API connector, for example _Check approval status_.
86
85
-**Before creating the user**: Select your approval request API connector, for example _Request approval_.
87
86
88
-

87
+
:::image type="content" source="media/self-service-sign-up-add-approvals/api-connectors-user-flow-api.png" alt-text="Screenshot of API connector in a user flow.":::
88
+
89
89
90
90
6. Select **Save**.
91
91
92
92
## Control the sign-up flow with API responses
93
93
94
-
Your approval system can use its responses when called to control the signup flow.
94
+
Your approval system can use its responses when called to control the sign-up flow.
95
95
96
96
### Request and responses for the "Check approval status" API connector
# Customer intent: As a tenant administrator, I want to set up user flows that allow a user to sign up for an app and create a new guest account.
17
+
15
18
---
16
19
17
20
# Add a self-service sign-up user flow to an app
18
21
19
-
For applications you build, you can create user flows that allow a user to sign up for an app and create a new guest account. A self-service sign-up user flow defines the series of steps the user will follow during sign-up, the identity providers you'll allow them to use, and the user attributes you want to collect. You can associate one or more applications with a single user flow.
22
+
For applications you build, you can create user flows that allow a user to sign up for an app and create a new guest account. A self-service sign-up user flow defines the series of steps the user will follow during sign-up, the [identity providers](identity-providers.md) you'll allow them to use, and the user attributes you want to collect. You can associate one or more applications with a single user flow.
20
23
21
24
> [!NOTE]
22
25
> You can associate user flows with apps built by your organization. User flows can't be used for Microsoft apps, like SharePoint or Teams.
@@ -25,12 +28,12 @@ For applications you build, you can create user flows that allow a user to sign
25
28
26
29
### Add identity providers (optional)
27
30
28
-
Azure AD is the default identity provider for self-service sign-up. This means that users are able to sign up by default with an Azure AD account. In your self-service sign-up user flows, you can also include social identity providers like Google and Facebook, Microsoft Account, and Email One-time Passcode. For more information, see these articles:
31
+
Azure AD is the default identity provider for self-service sign-up. This means that users are able to sign up by default with an Azure AD account. In your self-service sign-up user flows, you can also include social identity providers like Google and Facebook, Microsoft Account, and the email one-time passcode feature. For more information, see these articles:
0 commit comments