You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory-b2c/partner-eid-me.md
+34-39Lines changed: 34 additions & 39 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -34,52 +34,48 @@ To get started, you need:
34
34
* Go to bluink.ca to [learn more](https://bluink.ca/eid-me/solutions/id-verification#contact-form) and request a demo
35
35
* An Azure subscription
36
36
* If you don't have one, get an [Azure free account](https://azure.microsoft.com/free)
37
-
* An Azure AD B2C tenant linked to thke Azure subscription
38
-
* See, [Tutorial: Create an Azure Active Directory B2C tenant](tutorial-create-tenant.md)
37
+
* An Azure AD B2C tenant linked to the Azure subscription
38
+
* See, [Tutorial: Create an Azure AD B2C tenant](tutorial-create-tenant.md)
39
39
* A trial or production version of the eID-Me Digital ID App
40
40
* Go to bluink.ca to [Download the eID-Me Digital ID App](https://bluink.ca/eid-me/download)
41
41
42
42
See also, [Tutorial: Create user flows and custom policies in Azure AD B2C](./tutorial-create-user-flows.md?pivots=b2c-custom-policy).
43
43
44
-
45
44
## Scenario description
46
45
47
46
eID-Me integrates with Azure AD B2C as an OpenID Connect (OIDC) identity provider. The following components comprise the eID-Me solution with Azure AD B2C:
48
47
49
-
***An Azure AD B2C tenant**: Your Azure AD B2C tenant need be configured as a Relying Party in eID-Me. This allows the eID-Me identity provider to trust your Azure AD B2C tenant for sign up and sign in.
50
-
***An Azure AD B2C tenant application**: Although not strictly required, it's assumed that tenants need to have an Azure AD B2C tenant application. The application can receive identity claims received by Azure AD B2C during an eID-Me transaction.
51
-
***eID-Me smartphone apps**: Users of your Azure AD B2C tenant need to have the eID-Me smartphone app for iOS or Android.
52
-
***Issued eID-Me digital identities**: Before using eID-Me, users need to successfully go through the eID-Me identity proofing process. They need to have been issued a digital identity to the digital wallet within the app. This process is done from home and usually takes minutes provided the users have valid identity documents.
53
-
54
-
The eID-Me apps also provide strong authentication of the user during any transaction. X509 public key authentication using a private signing key contained within the eID-Me digital identity provides passwordless MFA.
48
+
***Azure AD B2C tenant** - configured as a relying party in eID-Me enables eID-Me to trust an Azure AD B2C tenant for sign up and sign in.
49
+
***Azure AD B2C tenant application** - because it's assumed tenants need an Azure AD B2C tenant application.
50
+
* The application receives identity claims received by Azure AD B2C during transaction
51
+
***eID-Me smartphone apps** - Azure AD B2C tenant users need the app for iOS or Android
52
+
***Issued eID-Me digital identities** - from eID-Me identity proofing
53
+
* Users are issued a digital identity to the digital wallet in the app. Valid identity documents required.
55
54
56
-
The following diagram shows the identity proofing process, which occurs outside of Azure AD B2C flows.
55
+
The eID-Me apps authenticate users during transactions. The X509 public key authentication provides passwordless MFA, using a private signing key in the eID-Me digital identity.
57
56
58
-

57
+
The following diagram illustrates eID-Me identity proofing, which occurs outside Azure AD B2C flows.
| 1. | User opens Azure AD B2C's sign in page, and then signs in or signs up by entering their username. |
74
-
| 2. | User is forwarded to Azure AD B2C’s combined sign-in and sign-up policy. |
75
-
| 3. | Azure AD B2C redirects the user to the eID-Me identity router using the OIDC authorization code flow. |
76
-
| 4. | The eID-Me router sends a push notification to the user’s mobile app including all context details of the authentication and authorization request. |
77
-
| 5. | The user reviews the authentication challenge; if accepted the user is prompted for identity claims, proving the user’s identity. |
78
-
| 6. | The challenge response is returned to the eID-Me router. |
79
-
| 7. | The eID-Me router then replies to Azure AD B2C with the authentication result. |
80
-
| 8. | Response from Azure AD B2C is sent as an ID token to the application. |
81
-
| 9. | Based on the authentication result, the user is granted or denied access. |
68
+

82
69
70
+
1. User opens Azure AD B2C's sign in page, and then signs in or signs up by entering their username.
71
+
2. User is forwarded to Azure AD B2C’s combined sign-in and sign-up policy.
72
+
3. Azure AD B2C redirects the user to the eID-Me identity router using the OIDC authorization code flow.
73
+
4. The eID-Me router sends a push notification to the user’s mobile app including all context details of the authentication and authorization request.
74
+
5. The user reviews the authentication challenge; if accepted the user is prompted for identity claims, proving the user’s identity.
75
+
6. The challenge response is returned to the eID-Me router.
76
+
7. The eID-Me router then replies to Azure AD B2C with the authentication result.
77
+
8. Response from Azure AD B2C is sent as an ID token to the application.
78
+
9. Based on the authentication result, the user is granted or denied access.
83
79
84
80
## Onboard with eID-Me
85
81
@@ -89,14 +85,14 @@ The following architecture diagram shows the implementation.
89
85
90
86
To configure your tenant application as a Relying Party in eID-Me the following information should be supplied to eID-Me:
| Name | Azure AD B2C/your desired application name|
95
-
| Domain| name.onmicrosoft.com|
96
-
| Redirect URIs|https://jwt.ms|
97
-
| Redirect URLs|`https://your-B2C-tenant-name.b2clogin.com/your-B2C-tenant-name.onmicrosoft.com/oauth2/authresp`<br>For Example: `https://fabrikam.b2clogin.com/fabrikam.onmicrosoft.com/oauth2/authresp`<br>If you use a custom domain, enter https://your-domain-name/your-tenant-name.onmicrosoft.com/oauth2/authresp.<br> Replace your-domain-name with your custom domain, and your-tenant-name with the name of your tenant. |
98
-
| URL for application home page| Will be displayed to the end user|
99
-
| URL for application privacy policy | Will be displayed to the end user|
88
+
| Property | Description|
89
+
| ---- | --- |
90
+
| Name | Azure AD B2C/your desired application name |
91
+
| Domain| name.onmicrosoft.com|
92
+
| Redirect URIs|https://jwt.ms|
93
+
| Redirect URLs|`https://your-B2C-tenant-name.b2clogin.com/your-B2C-tenant-name.onmicrosoft.com/oauth2/authresp`<br>For Example: `https://fabrikam.b2clogin.com/fabrikam.onmicrosoft.com/oauth2/authresp`<br>If you use a custom domain, enter https://your-domain-name/your-tenant-name.onmicrosoft.com/oauth2/authresp.<br> Replace your-domain-name with your custom domain, and your-tenant-name with the name of your tenant. |
94
+
| URL for application home page| Will be displayed to the end user|
95
+
| URL for application privacy policy | Will be displayed to the end user|
100
96
101
97
eID-Me will provide a Client ID and a Client Secret once the Relying Party has been configured with eID-Me.
102
98
@@ -594,4 +590,3 @@ For additional information, review the following articles:
594
590
595
591
-[eID-Me and Azure AD B2C integration guide](https://bluink.ca/eid-me/azure-b2c-integration-guide)
0 commit comments