You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
title: Tutorial for configuring Saviynt with Azure Active Directory B2C
2
+
title: Tutorial to configure Saviynt with Azure Active Directory B2C
3
3
titleSuffix: Azure AD B2C
4
-
description: Tutorial to configure Azure Active Directory B2C with Saviynt for crossapplication integration to streamline IT modernization and promote better security, governance, and compliance.
4
+
description: Learn to configure Azure AD B2C with Saviynt for cross-application integration for better security, governance, and compliance.
5
5
services: active-directory-b2c
6
6
author: gargi-sinha
7
-
manager: CelesteDG
7
+
manager: martinco
8
8
ms.reviewer: kengaderdus
9
-
10
9
ms.service: active-directory
11
10
ms.workload: identity
12
11
ms.topic: how-to
13
-
ms.date: 09/20/2021
12
+
ms.date: 03/07/2023
14
13
ms.author: gasinh
15
14
ms.subservice: B2C
16
15
---
17
16
18
-
# Tutorial for configuring Saviynt with Azure Active Directory B2C
19
-
20
-
In this sample tutorial, we provide guidance on how to integrate Azure Active Directory (AD) B2C with [Saviynt](https://saviynt.com/integrations/azure-ad/for-b2c/). Saviynt’s Security Manager platform provides the visibility, security, and governance today’s businesses need, in a single unified platform. Saviynt incorporates application risk and governance, infrastructure management, privileged account management, and customer risk analysis.
17
+
# Tutorial to configure Saviynt with Azure Active Directory B2C
21
18
22
-
In this sample tutorial, you'll set up Saviynt to provide fine grained access control based delegated administration for Azure AD B2C users. Saviynt does the following checks to determine if a user is authorized to manage Azure AD B2C users.
19
+
Learn to integrate Azure Active Directory B2C (Azure AD B2C) with the Saviynt Security Manager platform, which has visibility, security, and governance. Saviynt incorporates application risk and governance, infrastructure management, privileged account management, and customer risk analysis.
23
20
24
-
- Feature level security to determine if a user can perform a specific operation. For example, Create user, Update user, Reset user password, and so on.
21
+
Learn more: [Saviynt for Azure AD B2C](https://saviynt.com/integrations/azure-ad/for-b2c/)
25
22
26
-
- Field level security to determine if a user can read/write a specific attribute of another user during user management operations. For example, help desk agent can only update phone number and all other attributes are read-only.
23
+
Use the following instructions to set up access control delegated administration for Azure AD B2C users. Saviynt determines if a user is authorized to manage Azure AD B2C users with:
27
24
28
-
- Data level security to determine if a user can perform a certain operation on a specific user. For example, help desk administrator for UK region can manage UK users only.
25
+
* Feature level security to determine if users can perform an operation
26
+
* For example, create user, update user, reset user password, and so on
27
+
* Field level security to determine if users can read/write user attributes during user management operations
28
+
* For example, a Help Desk agent can update a phone number; other attributes are read-only
29
+
* Data level security to determine if users can perform an operation on another user
30
+
* For example, a Help Desk administrator for the United Kingdom region manages UK users
29
31
30
32
## Prerequisites
31
33
32
-
To get started, you'll need:
33
-
34
-
- An Azure AD subscription. If you don't have a subscription, you can get a [free account](https://azure.microsoft.com/free/).
35
-
36
-
- An [Azure AD B2C tenant](./tutorial-create-tenant.md). Tenant is linked to your Azure subscription.
34
+
To get started, you need:
37
35
38
-
- A Saviynt [subscription](https://saviynt.com/contact-us/)
36
+
* An Azure AD subscription
37
+
* If you don't have on, get an [Azure free account](https://azure.microsoft.com/free/)
38
+
* An [Azure AD B2C tenant](./tutorial-create-tenant.md) linked to your Azure subscription
39
+
* Go to saviynt.com [Contact Us](https://saviynt.com/contact-us/) to request a demo
39
40
40
41
## Scenario description
41
42
42
43
The Saviynt integration includes the following components:
43
44
44
-
-[Azure AD B2C](https://azure.microsoft.com/services/active-directory/external-identities/b2c/) – The business-to-customer identity as a service that enables custom control of how your customers sign up, sign in, and manage their profiles.
45
+
***Azure AD B2C** – identity as a service for custom control of customer sign-up, sign-in, and profile management
46
+
* See, [Azure AD B2C, Get started](https://azure.microsoft.com/services/active-directory/external-identities/b2c/)
47
+
***Saviynt for Azure AD B2C** – identity governance for delegated administration of user life-cycle management and access governance
48
+
* See, [Saviynt for Azure AD B2C](https://saviynt.com/integrations/azure-ad/for-b2c/)
49
+
***Microsoft Graph API** – interface for Saviynt to manage Azure AD B2C users and their access
50
+
* See, [Use the Microsoft Graph API](/graph/use-the-api)
51
+
45
52
46
-
-[Saviynt](https://saviynt.com/integrations/azure-ad/for-b2c/) – The identity governance platform that provides fine grained delegated administration for user life-cycle management and access governance of Azure AD B2C users.
53
+
The following architecture diagram illustrates the implementation.
47
54
48
-
-[Microsoft Graph API](/graph/use-the-api) – This API provides the interfaces for Saviynt to manage the Azure AD B2C users and their access in Azure AD B2C.
55
+

49
56
50
-
The following architecture diagram shows the implementation.
57
+
1. A delegated administrator starts the Azure AD B2C user operation with Saviynt.
58
+
2. Saviynt verifies the delegated administrator can perform the operation.
59
+
3. Saviynt sends an authorization success or failure response.
60
+
4. Saviynt allows the delegated administrator to perform the operation.
61
+
5. Saviynt invokes Microsoft Graph API, with user attributes, to manage the user in Azure AD B2C.
62
+
6. Microsoft Graph API creates, updates, or deletes the user in Azure AD B2C.
63
+
7. Azure AD B2C sends a success or failure response.
64
+
8. Microsoft Graph API returns the response to Saviynt.
| 4. | Saviynt allows the delegated administrator to do the required operation.
60
-
| 5. | Saviynt invokes Microsoft Graph API along with user attributes to manage the user in Azure AD B2C
61
-
| 6. | Microsoft Graph API will in turn create/update/delete the user in Azure AD B2C.
62
-
| 7. | Azure AD B2C will send a success/failure response.
63
-
| 8. | Microsoft Graph API will then return the response to Saviynt.
64
-
65
-
## Onboard with Saviynt
66
-
67
-
1. To create a Saviynt account, contact [Saviynt](https://saviynt.com/contact-us/)
68
-
69
-
2. Create delegated administration policies and assign users as delegated administrators with various roles.
68
+
1. Create a Saviynt account. To get started, go to saviynt.com [Contact Us](https://saviynt.com/contact-us/).
69
+
2. Create delegated administration policies.
70
+
3. Assign users the delegated administrator role.
70
71
71
72
## Configure Azure AD B2C with Saviynt
72
73
73
-
### Create an Azure AD Application for Saviynt
74
-
75
-
1. Sign in to the [Azure portal](https://portal.azure.com/#home).
76
-
1. Make sure you're using the directory that contains your Azure AD B2C tenant. Select the **Directories + subscriptions** icon in the portal toolbar.
77
-
1. On the **Portal settings | Directories + subscriptions** page, find your Azure AD B2C directory in the **Directory name** list, and then select **Switch**.
78
-
1. In the Azure portal, search and select **Azure AD B2C**.
1. Enter a Name for the application. For example, Saviynt and select **Create**.
81
-
1. Go to **API Permissions** and select **+ Add a permission.**
82
-
1. The Request API permissions page appears. Select **Microsoft APIs** tab and select **Microsoft Graph** as commonly used Microsoft APIs.
83
-
1. Go to the next page, and select **Application permissions**.
84
-
1. Select **Directory**, and select **Directory.Read.All** and **Directory.ReadWrite.All** checkboxes.
85
-
1. Select **Add Permissions**. Review the permissions added.
86
-
1. Select **Grant admin consent for Default Directory** > **Save**.
87
-
1. Go to **Certificates and Secrets** and select **+ Add Client Secret**. Enter the client secret description, select the expiry option, and select **Add**.
88
-
1. The Secret key is generated and displayed in the Client secret section. You'll need to use it later.
89
-
90
-
1. Go to **Overview** and get the **Client ID** and **Tenant ID**.
91
-
1. Tenant ID, client ID, and client secret will be needed to complete the setup in Saviynt.
92
-
93
-
### Enable Saviynt to Delete users
94
-
95
-
The below steps explain how to enable Saviynt to perform user delete operations in Azure AD B2C.
74
+
Use the following instructions to create an application, delete users, and more.
96
75
97
-
>[!NOTE]
98
-
>[Evaluate the risk before granting admin roles access to a service principal.](../active-directory/develop/app-objects-and-service-principals.md)
76
+
### Create an Azure AD application for Saviynt
99
77
100
-
1. Install the latest version of MSOnline PowerShell Module on a Windows workstation/server.
78
+
For the following instructions, use the directory with the Azure AD B2C tenant.
101
79
102
-
2. Connect to AzureAD PowerShell module and execute the following commands:
80
+
1. Sign in to the [Azure portal](https://portal.azure.com/#home).
81
+
2. In the portal toolbar, select **Directories + subscriptions**.
82
+
3. On the **Portal settings, Directories + subscriptions** page, in the **Directory name** list, find your Azure AD B2C directory.
83
+
4. Select **Switch**.
84
+
5. In the Azure portal, search and select **Azure AD B2C**.
Copy file name to clipboardExpand all lines: articles/active-directory-domain-services/concepts-custom-attributes.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,15 +2,15 @@
2
2
title: Create and manage custom attributes for Azure AD Domain Services | Microsoft Docs
3
3
description: Learn how to create and manage custom attributes in an Azure AD DS managed domain.
4
4
services: active-directory-ds
5
-
author: justinha
5
+
author: AlexCesarini
6
6
manager: amycolannino
7
7
8
8
ms.assetid: 1a14637e-b3d0-4fd9-ba7a-576b8df62ff2
9
9
ms.service: active-directory
10
10
ms.subservice: domain-services
11
11
ms.workload: identity
12
12
ms.topic: how-to
13
-
ms.date: 03/06/2023
13
+
ms.date: 03/07/2023
14
14
ms.author: justinha
15
15
16
16
---
@@ -44,7 +44,7 @@ After you create a managed domain, click **Custom Attributes (Preview)** under *
44
44
45
45
## Enable predefined attribute synchronization
46
46
47
-
Click **OnPremisesExtensionAttributes** to synchronize the attributes extensionAttribute1-15, also known as [Exchange custom attributes](/graph/api/resources/onpremisesextensionattributes?view=graph-rest-1.0).
47
+
Click **OnPremisesExtensionAttributes** to synchronize the attributes extensionAttribute1-15, also known as [Exchange custom attributes](/graph/api/resources/onpremisesextensionattributes).
48
48
49
49
## Synchronize Azure AD directory extension attributes
0 commit comments