You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory-b2c/partner-xid.md
+69-25Lines changed: 69 additions & 25 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,14 +8,14 @@ manager: martinco
8
8
ms.service: active-directory
9
9
ms.workload: identity
10
10
ms.topic: how-to
11
-
ms.date: 03/18/2022
11
+
ms.date: 04/27/2022
12
12
ms.author: gasinh
13
13
ms.subservice: B2C
14
14
---
15
15
16
16
# Configure xID with Azure Active Directory B2C for passwordless authentication
17
17
18
-
In this sample tutorial, learn how to integrate Azure Active Directory B2C (Azure AD B2C) authentication with the xID digital ID solution. The xID app provides users with passwordless, secure, multifactor authentication. xID-authenticated users obtain their identities verified by a My Number Card, the digital ID card issued by the Japanese government. Organizations can get users verified Personal Identification Information (customer content) through the xID API. Furthermore, the xID app generates a private key in a secure area within user’s mobile device, which can be used as a digital signing device.
18
+
In this sample tutorial, learn how to integrate Azure Active Directory B2C (Azure AD B2C) authentication with the xID digital ID solution. The xID app provides users with passwordless, secure, multifactor authentication. xID-authenticated users obtain their identities verified by a My Number Card, the digital ID card issued by the Japanese government. Organizations can get users verified Personal Identification Information (customer content) through the xID API. Furthermore, the xID app generates a private key in a secure area within user's mobile device, which can be used as a digital signing device.
19
19
20
20
21
21
## Prerequisites
@@ -43,23 +43,23 @@ The following architecture diagram shows the implementation.
43
43
44
44
| Step | Description |
45
45
|:--------|:--------|
46
-
| 1. |User opens Azure AD B2C's signin page, and then signs in or signs up by entering their username. |
47
-
| 2. |Azure AD B2C redirects the user to xID authorize API endpoint using an OpenID Connect (OIDC) request. An OIDC endpoint is available containing information about the endpoints. xID Identity provider (IdP) redirects the user to the xID authorization signin page, allows the user to fill in or select their email address. |
48
-
| 3. |xID IdP sends the push notification to the user’s mobile device. |
49
-
| 4. |The user opens the xID app and checks the request, then enters the PIN or authenticates with their biometrics. If PIN or biometrics is successfully verified, xID app activates the private key and creates an electronic signature. |
46
+
| 1. |User opens Azure AD B2C's sign-in page and then signs in or signs up by entering their username. |
47
+
| 2. |Azure AD B2C redirects the user to xID authorize API endpoint using an OpenID Connect (OIDC) request. An OIDC endpoint is available containing information about the endpoints. xID Identity provider (IdP) redirects the user to the xID authorization sign-in page allowing the user to fill in or select their email address. |
48
+
| 3. |xID IdP sends the push notification to the user's mobile device. |
49
+
| 4. |The user opens the xID app, checks the request, then enters the PIN or authenticates with their biometrics. If PIN or biometrics is successfully verified, xID app activates the private key and creates an electronic signature. |
50
50
| 5. |xID app sends the signature to xID IdP for verification. |
51
-
| 6. |xID IdP shows consent screen to the user, requesting authorization to give their personal information to the service they're signing in. |
51
+
| 6. |xID IdP shows a consent screen to the user, requesting authorization to give their personal information to the service they're signing in. |
52
52
| 7. |xID IdP returns the OAuth authorization code to Azure AD B2C. |
53
-
| 8. |Using the authorization code, Azure AD B2C sends a token request. |
54
-
| 9. |xID IdP checks the token request, and if still valid, returns the OAuth access token and the ID token containing the requested user’s identifier and email address. |
53
+
| 8. |Azure AD B2C sends a token request using the authorization code. |
54
+
| 9. |xID IdP checks the token request and, if still valid, returns the OAuth access token and the ID token containing the requested user's identifier and email address. |
55
55
| 10. |In addition, if the user's customer content is needed, Azure AD B2C calls the xID userdata API. |
56
-
| 11. |The xID userdata API returns the user’s encrypted customer content. User can decrypt it with their private key, which they create when they request the xID client information. |
56
+
| 11. |The xID userdata API returns the user's encrypted customer content. Users can decrypt it with their private key, which they create when requesting the xID client information. |
57
57
| 12. | User is either granted or denied access to the customer application based on the verification results. |
58
58
59
59
60
60
## Onboard with xID
61
61
62
-
Request for API documents by filling out [the form](https://xid.inc/contact-us). In the message field, indicate that you would like to onboard with Azure AD B2C. The xID sales representatives will contact you. Follow the instructions provided in the xID API document and request a xID API client. xID tech team will send client information to you in 3-4 working days.
62
+
Request API documents by filling out [the request form](https://xid.inc/contact-us). In the message field, indicate that you'd like to onboard with Azure AD B2C. Then, an xID sales representative will contact you. Follow the instructions provided in the xID API document and request an xID API client. xID tech team will send client information to you in 3-4 working days.
63
63
64
64
## Step 1: Create a xID policy key
65
65
@@ -94,7 +94,7 @@ Store the client secret that you received from xID in your Azure AD B2C tenant.
94
94
95
95
## Step 2: Configure xID as an Identity provider
96
96
97
-
To enable users to sign in using xID, you need to define xID as a claims provider that Azure AD B2C can communicate with through an endpoint. The endpoint provides a set of claims that are used by Azure AD B2C to verify that a specific user has authenticated using digital identity available on their device, proving the user’s identity.
97
+
To enable users to sign in using xID, you need to define xID as a claims provider that Azure AD B2C can communicate with through an endpoint. The endpoint provides a set of claims Azure AD B2C uses to verify that a specific user has authenticated using digital identity available on their device. Proving the user's identity.
98
98
99
99
Use the following steps to add xID as a claims provider:
100
100
@@ -167,7 +167,7 @@ Use the following steps to add xID as a claims provider:
<ItemKey="DefaultUserMessageIfRequestFailed">Cannot process your request right now, please try again later.</Item>
170
+
<ItemKey="DefaultUserMessageIfRequestFailed">Can't process your request right now, please try again later.</Item>
171
171
</Metadata>
172
172
<InputClaims>
173
173
<!-- Claims sent to your REST API -->
@@ -203,7 +203,7 @@ Use the following steps to add xID as a claims provider:
203
203
204
204
## Step 3: Add a user journey
205
205
206
-
At this point, you've set up the identity provider, but it's not yet available in any of the signin pages. If you've your own custom user journey continue to [step 4](#step-4-add-the-identity-provider-to-a-user-journey), otherwise, create a duplicate of an existing template user journey as follows:
206
+
At this point, you've set up the identity provider, but it's not yet available on any of the sign-in pages. If you have a custom user journey, continue to [step 4](#step-4-add-the-identity-provider-to-a-user-journey). Otherwise, create a duplicate of an existing template user journey as follows:
207
207
208
208
1. Open the `TrustFrameworkBase.xml` file from the starter pack.
209
209
@@ -217,15 +217,15 @@ At this point, you've set up the identity provider, but it's not yet available i
217
217
218
218
## Step 4: Add the identity provider to a user journey
219
219
220
-
Now that you have a user journey, add the new identity provider to the user journey.
220
+
Now that you have a user journey add the new identity provider to the user journey.
221
221
222
-
1. Find the orchestration step element that includes Type=`CombinedSignInAndSignUp`, or Type=`ClaimsProviderSelection` in the user journey. It's usually the first orchestration step. The **ClaimsProviderSelections** element contains a list of identity providers that a user can sign in with. The order of the elements controls the order of the sign-in buttons presented to the user. Add a **ClaimsProviderSelection** XML element. Set the value of **TargetClaimsExchangeId** to a friendly name, such as `X-IDExchange`.
222
+
1. Find the orchestration step element that includes Type=`CombinedSignInAndSignUp`, or Type=`ClaimsProviderSelection` in the user journey. It's usually the first orchestration step. The **ClaimsProviderSelections** element contains a list of identity providers used for signing in. The order of the elements controls the order of the sign-in buttons presented to the user. Add a **ClaimsProviderSelection** XML element. Set the value of **TargetClaimsExchangeId** to a friendly name, such as `X-IDExchange`.
223
223
224
-
2. In the next orchestration step, add a **ClaimsExchange** element. Set the **Id** to the value of the target claims exchange ID to link the xID button to `X-ID-SignIn` action. Update the value of **TechnicalProfileReferenceId** to the ID of the technical profile you created earlier.
224
+
2. In the next orchestration step, add a **ClaimsExchange** element. Set the **Id** to the value of the target claims exchange ID to link the xID button to `X-ID-SignIn` action. Next, update the value of **TechnicalProfileReferenceId** to the ID of the technical profile you created earlier.
225
225
226
-
The following XML demonstrates orchestration steps of a user journey with the identity provider:
226
+
The following XML demonstrates the orchestration steps of a user journey with the identity provider:
227
227
228
-
```xml
228
+
```xml
229
229
230
230
<UserJourneyId="X-IDSignUpOrSignIn">
231
231
<OrchestrationSteps>
@@ -299,25 +299,69 @@ Now that you have a user journey, add the new identity provider to the user jour
299
299
300
300
a. Select the **Directories + subscriptions** icon in the portal toolbar.
301
301
302
-
b. On the **Portal settings | Directories + subscriptions** page, find your Azure AD B2C directory in the **Directory name** list, and then select **Switch**.
302
+
b. On the **Portal settings | Directories + subscriptions** page, find your Azure AD B2C directory in the **Directory name** list, and select **Switch**.
303
303
304
304
3. In the [Azure portal](https://portal.azure.com/#home), search for and select **Azure AD B2C**.
305
305
306
306
4. Under Policies, select **Identity Experience Framework**.
307
307
308
-
5. Select **Upload Custom Policy**, and then upload the files in the **LocalAccounts** starter pack in the following order: the extension policy, for example `TrustFrameworkExtensions.xml`, then the relying party policy, such as `SignUpSignIn.xml`.
308
+
5. Select **Upload Custom Policy**, and then upload the files in the **LocalAccounts** starter pack in the following order: the extension policy, for example, `TrustFrameworkExtensions.xml`, then the relying party policy, such as `SignUpSignIn.xml`.
309
+
310
+
## Step 6: Configure the relying party policy
311
+
312
+
The relying party policy, for example [SignUpSignIn.xml](https://github.com/Azure-Samples/active-directory-b2c-custom-policy-starterpack/blob/main/LocalAccounts/SignUpOrSignin.xml), specifies the user journey which Azure AD B2C will execute. First, find the **DefaultUserJourney** element within the relying party. Then, update the **ReferenceId** to match the user journey ID you added to the identity provider.
313
+
314
+
In the following example, for the `X-IDSignUpOrSignIn` user journey, the **ReferenceId** is set to `X-IDSignUpOrSignIn`:
1. In your Azure AD B2C tenant blade, and under **Policies**, select **Identity Experience Framework**.
356
+
1. In your Azure AD B2C tenant, and under **Policies**, select **Identity Experience Framework**.
313
357
314
358
1. Under **Custom policies**, select **CustomSignUpSignIn**.
315
359
316
360
3. For **Application**, select the web application that you previously registered as part of this article's prerequisites. The **Reply URL** should show `https://jwt.ms`.
317
361
318
-
4. Select **Run now**. Your browser should be redirected to the xID sign in page.
362
+
4. Select **Run now**. Your browser should redirect to the xID sign in page.
319
363
320
-
5. If the sign-in process is successful, your browser is redirected to `https://jwt.ms`, which displays the contents of the token returned by Azure AD B2C.
364
+
5. If the sign-in process is successful, your browser redirects to `https://jwt.ms`, which displays the contents of the token returned by Azure AD B2C.
On September 30, 2023, we will retire operator assistance in Azure AD Multi-Factor Authentication and it will no longer be available. To avoid service disruption, follow the steps in this topic to disable operator assistance before September 30, 2023.
21
+
20
22
Operator assistance is a feature within Azure AD that allows an operator to manually transfer phone calls instead of automatic transfer. When this setting is enabled, the office phone number is dialed and when answered, the system asks the operator to transfer the call to a given extension.
21
23
22
24
Operator assistance can be enabled for an entire tenant or for an individual user. If the setting is **On**, the entire tenant is enabled for operator assistance. If you choose **Phone call** as the default method and have an extension specified as part of your office phone number (delineated by **x**), an operator can manually transfer the phone call.
Copy file name to clipboardExpand all lines: articles/active-directory/conditional-access/concept-conditional-access-conditions.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ services: active-directory
6
6
ms.service: active-directory
7
7
ms.subservice: conditional-access
8
8
ms.topic: conceptual
9
-
ms.date: 04/05/2022
9
+
ms.date: 04/27/2022
10
10
11
11
ms.author: joflore
12
12
author: MicrosoftGuyJFlo
@@ -186,17 +186,17 @@ For more information, see the following articles:
186
186
187
187
By selecting **Other clients**, you can specify a condition that affects apps that use basic authentication with mail protocols like IMAP, MAPI, POP, SMTP, and older Office apps that don't use modern authentication.
188
188
189
-
## Device state (preview)
189
+
## Device state (deprecated)
190
190
191
-
**This preview feature is being deprecated.** Customers should use the **Filter for devices** condition in the Conditional Access policy, to satisfy scenarios previously achieved using device state (preview) condition.
191
+
**This preview feature has been deprecated.** Customers should use the **Filter for devices** condition in the Conditional Access policy, to satisfy scenarios previously achieved using device state (preview) condition.
192
192
193
193
194
194
The device state condition was used to exclude devices that are hybrid Azure AD joined and/or devices marked as compliant with a Microsoft Intune compliance policy from an organization's Conditional Access policies.
195
195
196
196
For example, *All users* accessing the *Microsoft Azure Management* cloud app including **All device state** excluding **Device Hybrid Azure AD joined** and **Device marked as compliant** and for *Access controls*, **Block**.
197
197
- This example would create a policy that only allows access to Microsoft Azure Management from devices that are either hybrid Azure AD joined or devices marked as compliant.
198
198
199
-
The above scenario, can be configured using *All users* accessing the *Microsoft Azure Management* cloud app with **Filter for devices** condition in include mode using the following rule **device.trustType -ne "ServerAD" -or device.isCompliant -ne True** and for *Access controls*, **Block**.
199
+
The above scenario, can be configured using *All users* accessing the *Microsoft Azure Management* cloud app with **Filter for devices** condition in **exclude** mode using the following rule **device.trustType -eq "ServerAD" -or device.isCompliant -eq True** and for *Access controls*, **Block**.
200
200
- This example would create a policy that blocks access to Microsoft Azure Management cloud app from unmanaged or non-compliant devices.
Copy file name to clipboardExpand all lines: articles/active-directory/develop/workload-identity-federation.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -51,7 +51,7 @@ The workflow for exchanging an external token for an access token is the same, h
51
51
1. When the checks are satisfied, Microsoft identity platform issues an access token to the external workload.
52
52
1. The external workload accesses Azure AD protected resources using the access token from Microsoft identity platform. A GitHub Actions workflow, for example, uses the access token to publish a web app to Azure App Service.
53
53
54
-
The Microsoft identity platform stores only the first 10 signing keys when they're downloaded from the external IdP's OIDC endpoint. If the external IdP exposes more than 10 signing keys, you may experience errors when using Workload Identity Federation.
54
+
The Microsoft identity platform stores only the first 25 signing keys when they're downloaded from the external IdP's OIDC endpoint. If the external IdP exposes more than 25 signing keys, you may experience errors when using Workload Identity Federation.
55
55
56
56
## Next steps
57
57
Learn more about how workload identity federation works:
0 commit comments