Skip to content

Commit 9def409

Browse files
authored
Update azure-ad-b2c-global-identity-funnel-based-design.md
update phrasing
1 parent e294e22 commit 9def409

File tree

1 file changed

+39
-39
lines changed

1 file changed

+39
-39
lines changed

articles/active-directory-b2c/azure-ad-b2c-global-identity-funnel-based-design.md

Lines changed: 39 additions & 39 deletions
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ ms.subservice: B2C
1616

1717
# Build a global identity solution with funnel-based approach
1818

19-
In this article, we describe the scenarios for funnel-based design approach. Before starting to design, it's recommended that you review the [capabilities](azure-ad-b2c-global-identity-solutions.md#capabilities-and-considerations), and [performance](azure-ad-b2c-global-identity-solutions.md#performance) of both funnel and region-based design approach.
19+
In this article, we describe the scenarios for funnel-based design approach. Before starting to design, it's recommended that you review the [capabilities](azure-ad-b2c-global-identity-solutions.md#capabilities-and-considerations), and [performance](azure-ad-b2c-global-identity-solutions.md#performance) of both funnel and region-based design approach. This article will further help determine which design may fit best for your organization.
2020

2121
The designs account for:
2222

@@ -37,9 +37,9 @@ This use case demonstrates how a user from their home country/region performs a
3737

3838
![Screenshot shows the Local user sign-up flow.](media/azure-ad-b2c-global-identity-design-considerations/local-user-account-signup.png)
3939

40-
1. User from Europe, Middle East, and Africa (EMEA) attempts to sign up at **myapp.fr**. If the user isn't being sent to their local hostname, the traffic manager will enforce a redirect.
40+
1. A user from Europe, Middle East, and Africa (EMEA) attempts to sign up at **myapp.fr**. If the user isn't being sent to their local appication instance, the traffic manager will enforce a redirect.
4141

42-
1. User reaches the Global Funnel Azure AD B2C tenant. This tenant is configured to redirect to a regional Azure AD B2C tenant based on defined criteria using OpenId federation. This can be a lookup based on Application clientId.
42+
1. The user reaches the Global Funnel Azure AD B2C tenant. This tenant is configured to redirect to a regional Azure AD B2C tenant based on defined criteria using OpenId federation. This can be a lookup based on Application clientId.
4343

4444
1. The user attempts to sign up. The sign-up process checks the global lookup table to determine if the user exists in any of the regional Azure AD B2C tenants.
4545

@@ -55,9 +55,9 @@ This use case demonstrates how a user re-registering the same email from their o
5555

5656
![Screenshot shows the existing account sign-up flow.](media/azure-ad-b2c-global-identity-design-considerations/local-existing-account-signup.png)
5757

58-
1. User from EMEA attempts to sign up at **myapp.fr**. If the user isn't being sent to their local hostname, the traffic manager will enforce a redirect.
58+
1. A user from EMEA attempts to sign up at **myapp.fr**. If the user isn't being sent to their local appication instance, the traffic manager will enforce a redirect.
5959

60-
1. User reaches the Global Funnel Azure AD B2C tenant. This tenant is configured to redirect to a regional Azure AD B2C tenant based on some criteria using OpenId federation. This can be a lookup based on Application clientId.
60+
1. The user reaches the Global Funnel Azure AD B2C tenant. This tenant is configured to redirect to a regional Azure AD B2C tenant based on some criteria using OpenId federation. This can be a lookup based on Application clientId.
6161

6262
1. The user attempts to sign up. The sign-up process checks the global lookup table to determine if the user exists in any of the regional Azure AD B2C tenants.
6363

@@ -71,11 +71,11 @@ This use case demonstrates how a user from their home country/region performs a
7171

7272
![Screenshot shows the local user sign-in flow.](media/azure-ad-b2c-global-identity-design-considerations/local-user-account-signin.png)
7373

74-
1. User from EMEA attempts to sign in at **myapp.fr**. If the user isn't being sent to their local hostname, the traffic manager will enforce a redirect.
74+
1. A user from EMEA attempts to sign in at **myapp.fr**. If the user isn't being sent to their local appication instance, the traffic manager will enforce a redirect.
7575

76-
1. User reaches the global funnel Azure AD B2C tenant. This tenant is configured to redirect to a regional Azure AD B2C tenant based on some criteria using OpenId federation. This can be a lookup based on application clientId.
76+
1. The user reaches the global funnel Azure AD B2C tenant. This tenant is configured to redirect to a regional Azure AD B2C tenant based on some criteria using OpenId federation. This can be a lookup based on application clientId.
7777

78-
1. User enters their credentials at the regional tenant.
78+
1. The user enters their credentials at the regional tenant.
7979

8080
1. The regional tenant issues a token back to the funnel tenant.
8181

@@ -87,11 +87,11 @@ This use case demonstrates how a user can travel across regions and maintain the
8787

8888
![Screenshot shows the traveling user sign-in flow.](media/azure-ad-b2c-global-identity-design-considerations/traveling-user-account-signin.png)
8989

90-
1. User from North America (NOAM) attempts to sign in at **myapp.fr** since there's a holiday in France. If the user isn't being sent to their local hostname, the traffic manager will enforce a redirect.
90+
1. A user from North America (NOAM) attempts to sign in at **myapp.fr** while they are on holiday in France. If the user isn't being sent to their local appication instance, the traffic manager will enforce a redirect.
9191

92-
1. User reaches the global funnel Azure AD B2C tenant. This tenant is configured to redirect to a regional Azure AD B2C tenant based on some criteria using OpenId federation. This can be a lookup based on Application clientId.
92+
1. The user reaches the global funnel Azure AD B2C tenant. This tenant is configured to redirect to a regional Azure AD B2C tenant based on some criteria using OpenId federation. This can be a lookup based on Application clientId.
9393

94-
1. User enters their credentials at the regional tenant.
94+
1. The user enters their credentials at the regional tenant.
9595

9696
1. The regional tenant performs a lookup into the global lookup table, since the user’s email wasn't found in the EMEA Azure AD B2C directory.
9797

@@ -111,9 +111,9 @@ This use case demonstrates how a user can reset their password when they are wit
111111

112112
![Screenshot shows the local user forgot password flow.](media/azure-ad-b2c-global-identity-design-considerations/local-user-forgot-password.png)
113113

114-
1. User from EMEA attempts to sign in at **myapp.fr**. If the user isn't being sent to their local hostname, the traffic manager will enforce a redirect.
114+
1. A user from EMEA attempts to sign in at **myapp.fr**. If the user isn't being sent to their local appication instance, the traffic manager will enforce a redirect.
115115

116-
1. User reaches the global funnel Azure AD B2C tenant. This tenant is configured to redirect to a regional Azure AD B2C tenant based on some criteria using OpenId federation. This can be a lookup based on application clientId.
116+
1. The user reaches the global funnel Azure AD B2C tenant. This tenant is configured to redirect to a regional Azure AD B2C tenant based on some criteria using OpenId federation. This can be a lookup based on application clientId.
117117

118118
1. The user arrives at the EMEA Azure AD B2C tenant and selects **forgot password**. The user enters and verifies their email.
119119

@@ -133,9 +133,9 @@ This use case demonstrates how a user can reset their password when they're trav
133133

134134
![Screenshot shows the traveling user forgot password flow.](media/azure-ad-b2c-global-identity-design-considerations/traveling-user-forgot-password.png)
135135

136-
1. User from NOAM attempts to sign in at **myapp.fr** since they are on holiday in France. If the user isn't being sent to their local hostname, the traffic manager will enforce a redirect.
136+
1. A user from NOAM attempts to sign in at **myapp.fr** since they are on holiday in France. If the user isn't being sent to their local appication instance, the traffic manager will enforce a redirect.
137137

138-
1. User reaches the global funnel Azure AD B2C tenant. This tenant is configured to redirect to a regional Azure AD B2C tenant based on some criteria using OpenId federation. This can be a lookup based on application clientId.
138+
1. The user reaches the global funnel Azure AD B2C tenant. This tenant is configured to redirect to a regional Azure AD B2C tenant based on some criteria using OpenId federation. This can be a lookup based on application clientId.
139139

140140
1. The user arrives at the EMEA Azure AD B2C tenant and selects **forgot password**. The user enters and verifies their email.
141141

@@ -155,9 +155,9 @@ This use case demonstrates how a user can change their password after they've lo
155155

156156
![Screenshot shows the local user password change flow.](media/azure-ad-b2c-global-identity-design-considerations/local-user-password-change.png)
157157

158-
1. User from EMEA attempts selects **change password** after logging into **myapp.fr**.
158+
1. A user from EMEA attempts selects **change password** after logging into **myapp.fr**.
159159

160-
1. User reaches the global funnel Azure AD B2C tenant. This tenant is configured to redirect to a regional Azure AD B2C tenant based on some criteria using OpenId federation. This can be a lookup based on application clientId.
160+
1. The user reaches the global funnel Azure AD B2C tenant. This tenant is configured to redirect to a regional Azure AD B2C tenant based on some criteria using OpenId federation. This can be a lookup based on application clientId.
161161

162162
1. The user arrives at the EMEA Azure AD B2C tenant, and the Single-Sign On (SSO) cookie set allows the user to change their password immediately.
163163

@@ -173,9 +173,9 @@ This use case demonstrates how a user can change their password after they've lo
173173

174174
![Screenshot shows the flow for traveling user password change.](media/azure-ad-b2c-global-identity-design-considerations/traveling-user-password-change.png)
175175

176-
1. User from NOAM attempts **change password** after logging into **myapp.fr**.
176+
1. A user from NOAM attempts **change password** after logging into **myapp.fr**.
177177

178-
1. User reaches the global funnel Azure AD B2C tenant. This tenant is configured to redirect to a regional Azure AD B2C tenant based on some criteria using OpenId federation. This can be a lookup based on application clientId.
178+
1. The user reaches the global funnel Azure AD B2C tenant. This tenant is configured to redirect to a regional Azure AD B2C tenant based on some criteria using OpenId federation. This can be a lookup based on application clientId.
179179

180180
1. The user arrives at the EMEA Azure AD B2C tenant, and the SSO cookie set allows the user to change their password immediately.
181181

@@ -193,15 +193,15 @@ The following use cases show examples of using federated identities to sign up o
193193

194194
### Local federated ID sign-up
195195

196-
This use case demonstrates how a user from their local region signs up to the service using a federated ID.
196+
This use case demonstrates how a user can sign up to the service from their local region using a federated ID.
197197

198198
![Screenshot shows the flow for federated ID sign-up.](media/azure-ad-b2c-global-identity-design-considerations/local-federated-id-signup.png)
199199

200-
1. User from EMEA attempts to sign up at **myapp.fr**. If the user isn't being sent to their local hostname, the traffic manager will enforce a redirect.
200+
1. A user from EMEA attempts to sign up at **myapp.fr**. If the user isn't being sent to their local appication instance, the traffic manager will enforce a redirect.
201201

202-
1. User reaches the global funnel Azure AD B2C tenant. This tenant is configured to redirect to a regional Azure AD B2C tenant based on some criteria using OpenId federation. This can be a lookup based on application clientId.
202+
1. The user reaches the global funnel Azure AD B2C tenant. This tenant is configured to redirect to a regional Azure AD B2C tenant based on some criteria using OpenId federation. This can be a lookup based on application clientId.
203203

204-
1. User selects to sign in with a federated Identity Provider (IdP).
204+
1. The user selects to sign in with a federated Identity Provider (IdP).
205205

206206
1. Perform a lookup into the global lookup table.
207207
* **If account linking is in scope**: Proceed if the federated IdP identifier nor the email that came back from the federated IdP doesn't exist in the lookup table.
@@ -220,11 +220,11 @@ This use case demonstrates how a user from their local region signs into the ser
220220

221221
![Screenshot shows the flow for local federated user sign-in.](media/azure-ad-b2c-global-identity-design-considerations/local-federated-signin.png)
222222

223-
1. User from EMEA attempts to sign in at **myapp.fr**. If the user isn't being sent to their local hostname, the traffic manager will enforce a redirect.
223+
1. A user from EMEA attempts to sign in at **myapp.fr**. If the user isn't being sent to their local appication instance, the traffic manager will enforce a redirect.
224224

225-
2. User reaches the global funnel Azure AD B2C tenant. This tenant is configured to redirect to a regional Azure AD B2C tenant based on some criteria using OpenId federation. This can be a lookup based on Application clientId.
225+
2. The user reaches the global funnel Azure AD B2C tenant. This tenant is configured to redirect to a regional Azure AD B2C tenant based on some criteria using OpenId federation. This can be a lookup based on Application clientId.
226226

227-
3. User selects to sign in with a federated identity provider.
227+
3. The user selects to sign in with a federated identity provider.
228228

229229
4. Perform a lookup into the global lookup table and confirm the user’s federated ID is registered in EMEA.
230230

@@ -234,15 +234,15 @@ This use case demonstrates how a user from their local region signs into the ser
234234

235235
### Traveling federated user sign-in
236236

237-
This use case demonstrates how a user located away from the region in which they signed up signs into the service using a federated IdP.
237+
This use case demonstrates how a user can sign into their account with a federated IdP, whilst located away from the region in which they signed up in.
238238

239239
![Screenshot shows the flow for traveling federated user sign-in.](media/azure-ad-b2c-global-identity-design-considerations/traveling-federated-user-signin.png)
240240

241-
1. User from NOAM attempts to sign in at **myapp.fr**. If the user isn't being sent to their local hostname, the traffic manager will enforce a redirect.
241+
1. A user from NOAM attempts to sign in at **myapp.fr**. If the user isn't being sent to their local appication instance, the traffic manager will enforce a redirect.
242242

243-
1. User reaches the global funnel Azure AD B2C tenant. This tenant is configured to redirect to a regional Azure AD B2C tenant based on some criteria using OpenId federation. This can be a lookup based on Application clientId.
243+
1. The user reaches the global funnel Azure AD B2C tenant. This tenant is configured to redirect to a regional Azure AD B2C tenant based on some criteria using OpenId federation. This can be a lookup based on Application clientId.
244244

245-
1. User selects to sign in with a federated identity provider.
245+
1. The user selects to sign in with a federated identity provider.
246246

247247
>[!NOTE]
248248
>Use the same App Id from the App Registration at the Social IdP across all Azure AD B2C regional tenants. This ensures that the ID coming back from the Social IdP is always the same.
@@ -257,15 +257,15 @@ This use case demonstrates how a user located away from the region in which they
257257

258258
### Account linking with matching criteria
259259

260-
This use case demonstrates how users are able to perform account linking when matching criteria is satisfied. The matching criteria is typically the users email address.
260+
This use case demonstrates how users are able to perform account linking when matching criteria is satisfied. The matching criteria is typically the users email address. When the matching criteria of a sign in from a new identity provider has the same value for an existing account in Azure AD B2C, the account linking process can begin.
261261

262262
![Screenshot shows the flow to merge a federated account.](media/azure-ad-b2c-global-identity-design-considerations/local-federated-account-merge.png)
263263

264-
1. User from EMEA attempts to sign in at **myapp.fr**. If the user isn't being sent to their local hostname, the traffic manager will enforce a redirect.
264+
1. A user from EMEA attempts to sign in at **myapp.fr**. If the user isn't being sent to their local appication instance, the traffic manager will enforce a redirect.
265265

266-
1. User reaches the global funnel Azure AD B2C tenant. This tenant is configured to redirect to a regional Azure AD B2C tenant based on some criteria using OpenId federation. This can be a lookup based on Application clientId.
266+
1. The user reaches the global funnel Azure AD B2C tenant. This tenant is configured to redirect to a regional Azure AD B2C tenant based on some criteria using OpenId federation. This can be a lookup based on Application clientId.
267267

268-
1. User selects to sign in with a federated identity provider/social IdP.
268+
1. The user selects to sign in with a federated identity provider/social IdP.
269269

270270
1. A lookup is performed into the global lookup table for the ID returned from the federated IdP.
271271

@@ -281,19 +281,19 @@ This use case demonstrates how users are able to perform account linking when ma
281281

282282
### Traveling user account linking with matching criteria
283283

284-
This use case demonstrates how non-local users are able to perform account linking when matching criteria is satisfied. The matching criteria is typically the users email address.
284+
This use case demonstrates how non-local users are able to perform account linking when matching criteria is satisfied. The matching criteria is typically the users email address. When the matching criteria of a sign in from a new identity provider has the same value for an existing account in Azure AD B2C, the account linking process can begin.
285285

286286
![Screenshot shows the flow to merge traveling federated user.](media/azure-ad-b2c-global-identity-design-considerations/traveling-federated-user-merge-account.png)
287287

288-
1. User from NOAM attempts to sign in at **myapp.fr**. If the user isn't being sent to their local hostname, the traffic manager will enforce a redirect.
288+
1. A user from NOAM attempts to sign in at **myapp.fr**. If the user isn't being sent to their local appication instance, the traffic manager will enforce a redirect.
289289

290-
1. User reaches the Global Funnel Azure AD B2C tenant. This tenant is configured to redirect to a regional Azure AD B2C tenant based on some criteria using OpenId federation. This can be a lookup based on Application clientId.
290+
1. The user reaches the Global Funnel Azure AD B2C tenant. This tenant is configured to redirect to a regional Azure AD B2C tenant based on some criteria using OpenId federation. This can be a lookup based on Application clientId.
291291

292-
1. User selects to sign in with a federated identity provider/social IdP.
292+
1. The user selects to sign in with a federated identity provider/social IdP.
293293

294294
1. A lookup is performed into the global lookup table for the ID returned from the federated IdP.
295295

296-
1. Where the ID doesn't exist, and the email from the federated IdP exists in another region -this is a traveling user account linking use case.
296+
1. Where the ID doesn't exist, and the email from the federated IdP exists in another region - this is a traveling user account linking use case.
297297

298298
1. Create an id_token_hint link asserting the users currently collected claims. Bootstrap a journey into the NOAM Azure AD B2C tenant using federation. The user will prove that they own the account via the NOAM Azure AD B2C tenant.
299299
>[!NOTE]

0 commit comments

Comments
 (0)