Skip to content

Commit d2ae4a1

Browse files
authored
Update partner-idemia.md
1 parent e79733a commit d2ae4a1

File tree

1 file changed

+30
-26
lines changed

1 file changed

+30
-26
lines changed

articles/active-directory-b2c/partner-idemia.md

Lines changed: 30 additions & 26 deletions
Original file line numberDiff line numberDiff line change
@@ -96,21 +96,25 @@ During Mobile ID integration, the following information is provided.
9696
Store the noted IDEMIA Client Secret in your Azure AD B2C tenant. For the following instructions, use the directory with your Azure AD B2C tenant.
9797

9898
1. Sign in to the [Azure portal](https://portal.azure.com/).
99-
2. In the portal toolbar, select the **Directories + subscriptions**.
100-
3. On the **Portal settings | Directories + subscriptions** page, find your Azure AD B2C directory in the **Directory name** list, and then select **Switch**.
101-
4. Choose **All services** in the top-left corner of the Azure portal, and then search for and select **Azure AD B2C**.
102-
5. On the **Overview** page, select **Identity Experience Framework**.
103-
6. Select **Policy Keys** and then select **Add**.
104-
7. For **Options**, choose **Manual**.
105-
8. Enter a **Name** for the policy key. For example, IdemiaAppSecret. The prefix B2C_1A_ is added automatically to the name of your key.
106-
9. In **Secret**, enter your client secret that you previously recorded.
107-
10. For **Key** usage, select **Signature**.
108-
11. Select **Create**.
109-
110-
### Configure IDEMIA as an External IdP
111-
112-
To enable users to sign in using IDEMIA mobile ID passwordless identity, you need to define IDEMIA as a claims provider that Azure AD B2C can communicate with through an endpoint. The endpoint provides a set of claims that are used by Azure AD B2C to verify a specific user has authenticated using biometry such as fingerprint or facial scan as available on their device, proving the user’s identity.
113-
You can define IDEMIA as a claims provider by adding it to the **ClaimsProvider** element in the extension file of your policy.
99+
2. In the portal toolbar, select **Directories + subscriptions**.
100+
3. On the **Portal settings, Directories + subscriptions** page, in the **Directory name** list find your Azure AD B2C directory
101+
4. Select **Switch**.
102+
5. In the top-left corner of Azure portal, select **All services**.
103+
6. Search for and select **Azure AD B2C**.
104+
7. On the **Overview** page, select **Identity Experience Framework**.
105+
8. Select **Policy Keys**.
106+
9. Select **Add**.
107+
10. For **Options**, choose **Manual**.
108+
11. Enter a **Name** for the policy key. For example, `IdemiaAppSecret`. The prefix `B2C_1A_` is added to the key name.
109+
12. In **Secret**, enter the Client Secret you noted.
110+
13. For **Key** usage, select **Signature**.
111+
14. Select **Create**.
112+
113+
### Configure Mobile ID as an External IdP
114+
115+
To enable users to sign in with Mobile ID, define IDEMIA as a claims provider. This action ensures Azure AD B2C communicates through an endpoint, which provides claims Azure AD B2C uses to verify user authentication with biometry.
116+
117+
To define IDEMIA as a claims provider, add it to the **ClaimsProvider** element in the policy extension file.
114118

115119
```PowerShell
116120
<TechnicalProfile Id="Idemia-Oauth2">
@@ -160,23 +164,23 @@ You can define IDEMIA as a claims provider by adding it to the **ClaimsProvider*
160164
Set client_id to the application ID from the application registration.
161165

162166
|Property | Description|
163-
|:------|:-------|
164-
|Scope| For OpenID Connect (OIDC) the minimum requirement is that the scope parameter be set to **openid**. Additional scopes may be appended as a space-delimited list.|
165-
|redirect_uri | This defines where the user agent sends the authorization code back to Azure AD B2C.|
167+
|---|---|
168+
|Scope| For OpenID Connect (OIDC) the minimum requirement is scope parameter is set to **openid**. Append more scopes as a space-delimited list.|
169+
|redirect_uri | This location is where the user agent sends the authorization code to Azure AD B2C.|
166170
|response_type| For the authorization code flow, this is set to **code**|
167-
|acr_values| This parameter controls the authentication methods that the user is required to perform during the authentication process. |
171+
|acr_values| This parameter controls the authentication methods the user must perform during authentication. |
168172

169-
One of the following values must be selected:
173+
Select one of the following values:
170174

171175
|Parameter value| Effect on user authentication process |
172-
|:------|:-------|
176+
|---|---|
173177
|`loa-2`| Crypto-based Azure AD Multi-Factor Authentication only|
174178
|`loa-3`| Crypto-based Azure AD Multi-Factor Authentication plus one additional factor|
175-
|`loa-4`| Crypto-based Azure AD Multi-Factor Authentication with the requirement that the user must also perform pin-based and biometric authentication |
179+
|`loa-4`| Crypto-based Azure AD Multi-Factor Authentication with the requirement the user must perform PIN-based and biometric authentication |
176180

177-
The **/userinfo** endpoint provides the claims for the scope(s) requested in the authorization request. For the **<mt_scope>** this includes such claims as First Name, Last Name, and Driver's License Number, among other items.
178-
The claims set for any given scope are published in the **scope_to_claims_mapping** section of the discovery API.
179-
Azure AD B2C requests claims from the claims endpoint and returns those claims in the OutputClaims element. You may need to map the name of the claim defined in your policy to the name defined in the IdP making sure to define the claim type in the [ClaimSchema element](claimsschema.md):
181+
The **/userinfo** endpoint provides the claims for the scope(s) requested in the authorization request. For the **<mt_scope>** this includes claims like First Name, Last Name, and Driver's License Number, among other items.
182+
The claims set for a scope are published in the **scope_to_claims_mapping** section of the discovery API.
183+
Azure AD B2C requests claims from the claims endpoint and returns them in the OutputClaims element. You might need to map the claim name in your policy to the name in the IdP. Define the claim type in the [ClaimSchema element](claimsschema.md):
180184

181185
```PowerShell
182186
<ClaimType Id="documentId">
@@ -189,7 +193,7 @@ Azure AD B2C requests claims from the claims endpoint and returns those claims i
189193
</ClaimType>
190194
```
191195

192-
### Part 4 - Add a user journey
196+
### Add a user journey
193197

194198
At this point, the IdP has been set up, but it's not yet available in any of the sign-in pages. If you don't have your own custom user journey, create a duplicate of an existing template user journey, otherwise continue to the next step.
195199

0 commit comments

Comments
 (0)