You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory-b2c/partner-hypr.md
+37-48Lines changed: 37 additions & 48 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,89 +4,78 @@ titleSuffix: Azure AD B2C
4
4
description: Tutorial to configure Azure Active Directory B2C with Hypr for true passwordless strong customer authentication
5
5
services: active-directory-b2c
6
6
author: gargi-sinha
7
-
manager: CelesteDG
7
+
manager: martinco
8
8
ms.reviewer: kengaderdus
9
9
ms.service: active-directory
10
10
ms.workload: identity
11
11
ms.topic: how-to
12
-
ms.date: 09/13/2022
12
+
ms.date: 12/7/2022
13
13
ms.author: gasinh
14
14
ms.subservice: B2C
15
15
---
16
16
17
17
# Tutorial for configuring HYPR with Azure Active Directory B2C
18
18
19
-
In this sample tutorial, we provide guidance on how to configure Azure AD B2C with [HYPR](https://get.hypr.com). With Azure AD B2C as an identity provider, you can integrate HYPR with any of your customer applications to provide true passwordless authentication to your users. HYPR replaces passwords with Public key encryptions eliminating fraud, phishing, and credential reuse.
19
+
In this tutorial, learn to configure Azure Active Directory B2C (Azure AD B2C) with [HYPR](https://get.hypr.com). When Azure AD B2C is the identity provider (IdP), you can integrate HYPR with customer applications for passwordless authentication. HYPR replaces passwords with public key encryptions that help prevent fraud, phishing, and credential reuse.
20
20
21
21
## Prerequisites
22
22
23
23
To get started, you'll need:
24
24
25
-
- An Azure AD subscription. If you don't have a subscription, you can get a [free account](https://azure.microsoft.com/free/).
26
-
27
-
- An [Azure AD B2C tenant](./tutorial-create-tenant.md). Tenant is linked to your Azure subscription.
28
-
29
-
- A HYPR cloud tenant, get a free [trial account](https://get.hypr.com/free-trial).
30
-
31
-
- A user's mobile device registered using the HYPR REST APIs or the HYPR Device Manager in your HYPR tenant. For example, you can use the [HYPR Java SDK](https://docs.hypr.com/integratinghypr/docs/hypr-java-web-sdk)to accomplish this task.
25
+
- An Azure AD subscription
26
+
- If you don't have one, you can get an [Azure free account](https://azure.microsoft.com/free/)
27
+
- An [Azure AD B2C tenant](./tutorial-create-tenant.md)linked to your Azure subscription
28
+
- A HYPR cloud tenant
29
+
- Request a HYPR [custom demo](https://get.hypr.com/free-trial)
30
+
- A user mobile device registered using the HYPR REST APIs, or the HYPR Device Manager in your HYPR tenant
31
+
-For example, see [HYPR SDK for Java Web](https://docs.hypr.com/integratinghypr/docs/hypr-java-web-sdk)
32
32
33
33
## Scenario description
34
34
35
-
The HYRP integration includes the following components:
36
-
37
-
- Azure AD B2C – The authorization server, responsible for verifying the user’s credentials, also known as the identity provider
35
+
The HYPR integration has the following components:
38
36
39
-
- Web and mobile applications - Your mobile or web applications that you choose to protect with HYPR and Azure AD B2C. HYPR provides a robust mobile SDK also a mobile app that you can use on iOS and Android platforms to do true passwordless authentication.
40
-
41
-
- The HYPR mobile app - The HYPR mobile app can be used to execute this sample if prefer not to use the mobile SDKs in your own mobile applications.
42
-
43
-
- HYPR REST APIs - You can use the HYPR APIs to do both user device registration and authentication. These APIs can be found [here](https://apidocs.hypr.com).
37
+
-**Azure AD B2C** – The authorization server to verify user credentials, or the identity provider (IdP)
38
+
-**Web and mobile applications** - For mobile or web applications protected by HYPR and Azure AD B2C
39
+
- HYPR has mobile SDK and a mobile app for iOS and Android
40
+
-**HYPR mobile app** - Use it for this tutorial, if you're not using the mobile SDKs in your mobile applications
41
+
-**HYPR REST APIs** - User device registration and authentication
42
+
- Go to apidocs.hypr.com for [HYPR Passwordless APIs](https://apidocs.hypr.com)
44
43
45
44
The following architecture diagram shows the implementation.
46
45
47
-

46
+

48
47
49
-
|Step | Description |
50
-
|:-----| :-----------|
51
-
| 1. | User arrives at a login page. Users select sign-in/sign-up and enter username into the page.
52
-
| 2. | The application sends the user attributes to Azure AD B2C for identify verification.
53
-
| 3. | Azure AD B2C collects the user attributes and sends the attributes to HYPR to authenticate the user through the HYPR mobile app.
54
-
| 4. | HYPR sends a push notification to the registered user mobile device for a Fast Identity Online (FIDO) certified authentication. It can be a user finger print, biometric or decentralized pin.
55
-
| 5. | After user acknowledges the push notification, user is either granted or denied access to the customer application based on the verification results.
48
+
1. User arrives at a sign-in page and selects sign-in or sign-up. User enters username.
49
+
2. The application sends the user attributes to Azure AD B2C for identify verification.
50
+
3. Azure AD B2C sends user attributes to HYPR to authenticate the user through the HYPR mobile app.
51
+
4. HYPR sends a push notification to the registered user mobile device for a Fast Identity Online (FIDO) certified authentication. It can be a user fingerprint, biometric, or decentralized PIN.
52
+
5. After user acknowledges the push notification, user is granted or denied access to the customer application.
56
53
57
54
## Configure the Azure AD B2C policy
58
55
59
-
1. Go to the [Azure AD B2C HYPR policy](https://github.com/HYPR-Corp-Public/Azure-AD-B2C-HYPR-Sample/tree/master/policy) in the Policy folder.
60
-
61
-
2. Follow this [document](tutorial-create-user-flows.md?pivots=b2c-custom-policy#custom-policy-starter-pack) to download [LocalAccounts starter pack](https://github.com/Azure-Samples/active-directory-b2c-custom-policy-starterpack/tree/master/LocalAccounts)
62
-
56
+
1. Go to [Azure-AD-B2C-HYPR-Sample/policy/](https://github.com/HYPR-Corp-Public/Azure-AD-B2C-HYPR-Sample/tree/master/policy).
57
+
2. Follow the instructions in [Custom policy starter pack](tutorial-create-user-flows.md?pivots=b2c-custom-policy#custom-policy-starter-pack) to download [Active-directory-b2c-custom-policy-starterpack/LocalAccounts/](https://github.com/Azure-Samples/active-directory-b2c-custom-policy-starterpack/tree/master/LocalAccounts)
63
58
3. Configure the policy for the Azure AD B2C tenant.
64
59
65
60
>[!NOTE]
66
-
>Update the provided policies to relate to your specific tenant.
61
+
>Update policies to relate to your tenant.
67
62
68
63
## Test the user flow
69
64
70
-
1. Open the Azure AD B2C tenant and under Policies select **Identity Experience Framework**.
65
+
1. Open the Azure AD B2C tenant.
66
+
2. Under **Policies**, select **Identity Experience Framework**.
67
+
3. Select the **SignUpSignIn** you created.
68
+
4. Select **Run user flow**.
69
+
5. For **Application**, select the registered app (sample is JWT).
70
+
6. For **Reply URL**, select the **redirect URL**.
71
+
7. Select **Run user flow**.
72
+
8. Complete the sign-up flow to create an account.
73
+
9. After the user attribute is created, HYPR is called.
71
74
72
-
2. Select your previously created **SignUpSignIn**.
73
-
74
-
3. Select **Run user flow** and select the settings:
75
-
76
-
a. **Application**: select the registered app (sample is JWT)
77
-
78
-
b. **Reply URL**: select the **redirect URL**
79
-
80
-
c. Select **Run user flow**.
81
-
82
-
4. Go through sign-up flow and create an account
83
-
84
-
5. HYPR will be called during the flow, after user attribute is created. If the flow is incomplete, check that user isn't saved in the directory.
75
+
>[!TIP]
76
+
>If the flow is incomplete, confirm the user is saved in the directory.
85
77
86
78
## Next steps
87
79
88
-
For additional information, review the following articles:
89
-
90
80
-[Custom policies in Azure AD B2C](./custom-policy-overview.md)
91
-
92
81
-[Get started with custom policies in Azure AD B2C](tutorial-create-user-flows.md?pivots=b2c-custom-policy)
0 commit comments