You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory-b2c/partner-n8identity.md
+12-12Lines changed: 12 additions & 12 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -29,7 +29,7 @@ Use this solution for the following scenarios:
29
29
30
30
## Prerequisites
31
31
32
-
To get started, you'll need:
32
+
To get started, you need:
33
33
34
34
* An Azure subscription
35
35
@@ -55,11 +55,11 @@ The TheAccessHub Admin Tool runs in the N8ID Azure subscription or the customer
55
55
6. TheAccessHub Admin Tool syncs user records with Azure AD B2C.
56
56
7. Based on TheAccessHub Admin Tool response, Azure AD B2C sends a customized welcome email to users.
57
57
58
-
## Create a Global Administrator in your Azure AD B2C tenant
58
+
## Create an External Identity Provider Administrator and B2C User Flow Administrator in your Azure AD B2C tenant
59
59
60
-
TheAccessHub Admin Tool permissions act on behalf of a Global Administrator to read user information and conduct changes in your Azure AD B2C tenant. Changes to your regular administrators won't affect TheAccessHub Admin Tool interaction with the tenant.
60
+
TheAccessHub Admin Tool permissions act on behalf of an External Identity Provider Administrator and B2C User Flow Administrator to read user information and conduct changes in your Azure AD B2C tenant. Changes to your regular administrators don't affect TheAccessHub Admin Tool interaction with the tenant.
61
61
62
-
To create a Global Administrator:
62
+
To create an External Identity Provider Administrator and B2C User Flow Administrator:
63
63
64
64
1. In the Azure portal, sign in to your Azure AD B2C tenant as an Administrator.
65
65
2. Go to **Microsoft Entra ID** > **Users**.
@@ -70,20 +70,20 @@ To create a Global Administrator:
70
70
* Enter the **account name**, such as TheAccessHub Service Account.
71
71
7. Select **Show Password**.
72
72
8. Copy and save the initial password.
73
-
9. To assign the Global Administrator role, for **User**, select the user's current role.
74
-
10. Select the **Global Administrator**record.
73
+
9. To assign the External Identity Provider Administrator and B2C User Flow Administrator role, for **User**, select the user's current role.
74
+
10. Select the **External Identity Provider Administrator**and **B2C User Flow Administrator** records.
75
75
11. Select **Create**.
76
76
77
77
## Connect TheAccessHub Admin Tool to your Azure AD B2C tenant
78
78
79
-
TheAccessHub Admin Tool uses the Microsoft Graph API to read and make changes to a directory. It acts as a Global Administrator in your tenant. Use the following instructions to add needed permissions.
79
+
TheAccessHub Admin Tool uses the Microsoft Graph API to read and make changes to a directory. It acts as an External Identity Provider Administrator and B2C User Flow Administrator in your tenant. Use the following instructions to add needed permissions.
80
80
81
81
To authorize TheAccessHub Admin Tool to access your directory:
82
82
83
83
1. Use the credentials N8 Identity provided to sign in to TheAccessHub Admin Tool.
84
84
2. Go to **System Admin** > **Azure AD B2C Config**.
85
85
3. Select **Authorize Connection**.
86
-
4. In the new window, sign in with your Global Administrator account. When you sign in for the first time with the new service account, a prompt to reset your password can appear.
86
+
4. In the new window, sign in with your External Identity Provider Administrator and B2C User Flow Administrator account. When you sign in for the first time with the new service account, a prompt to reset your password can appear.
87
87
5. Follow the prompts and select **Accept**.
88
88
89
89
## Configure a new CSR user with your enterprise identity
@@ -189,7 +189,7 @@ With TheAccessHub Admin Tool, you can import data from various databases, LDAPs,
189
189
190
190
***Type**: **Database**
191
191
***Database type**: select a supported database
192
-
***Connection URL**: enter a JDBC connection string, such as `jdbc:postgresql://myhost.com:5432/databasename`
192
+
***Connection URL**: enter a Java Database Connectivity (JDBC) connection string, such as `jdbc:postgresql://myhost.com:5432/databasename`
193
193
***Username**: username to access the database
194
194
***Password**: password to access the database
195
195
***Query**: the SQL query to extract customer details, such as `SELECT * FROM mytable;`'
@@ -226,7 +226,7 @@ With TheAccessHub Admin Tool, you can import data from various databases, LDAPs,
226
226
8. Select **Next**.
227
227
9. In **Search-Mapping configuration**, identify load-record correlation with customers in TheAccessHub Admin Tool.
228
228
10. Select source identifying attributes. Match attributes TheAccessHub Admin Tool attributes with the same values. If there's a match, the record is overridden. Otherwise, a new customer is created.
229
-
11. Sequence the number of checks. For example, check email first, then first and last name.
229
+
11. Sequence the number of checks. For example, check email first, then first and family name.
230
230
12. On the left-side menu, select **Data Mapping**.
231
231
13. In **Data-Mapping configuration**, assign the TheAccessHub Admin Tool attributes to be populated from your source attributes. Unmapped attributes remain unchanged for customers. If you map the attribute `org_name` with a current organization value, created customers go in the organization.
232
232
15. Select **Next**.
@@ -273,7 +273,7 @@ If you occasionally sync TheAccessHub Admin Tool, it might not be up to date wit
273
273
274
274
For your sign-up custom policies, the following steps enable a secure certificate to notify TheAccessHub Admin Tool of new accounts.
275
275
276
-
1.Use the credentials N8ID provided to sign in to TheAccessHub Admin Tool.
276
+
1.To sign in to TheAccessHub Admin Tool, use the credentials N8ID provided.
277
277
2. Go to **System Admin** > **Admin Tools** > **API Security**.
278
278
3. Select **Generate**.
279
279
4. Copy the **Certificate Password**.
@@ -287,7 +287,7 @@ For your sign-up custom policies, the following steps enable a secure certificat
287
287
3. Supply your Azure AD B2C tenant domain and the two Identity Experience Framework IDs from your Identity Experience Framework configuration.
288
288
4. Select **Save**.
289
289
5. Select **Download** to get a .zip file with basic policies that add customers into TheAccessHub Admin Tool as customers sign up.
290
-
6.Use the instructions in [Create user flows](./tutorial-create-user-flows.md?pivots=b2c-custom-policy) to design custom policies in Azure AD B2C.
290
+
6.To design custom policies in Azure AD B2C, use the instructions in [Create user flows](./tutorial-create-user-flows.md?pivots=b2c-custom-policy).
0 commit comments