Azure Active Directory Integration Guide (B2C)
Step 1: Email email@example.com with the following information:
Azure Directory ID (located Azure Active Directory > Properties > Directory ID)
Email “Initial domain name” in step 2.
Step: 2 Create an Azure Active Directory B2C tenant
On the left side select “Dashboard”
In the search bar type “Azure Active Directory B2C”
Select “Azure Active Directory B2C” from the dropdown
Select “Get Started”
Select “Create a new Azure AD B2C Tenant”
Create Organization name and Initial Domain Name
Select the “Create” button
Note: It may take a few minutes for the tenant to be created.
Step: 3 – Add New Identity Provider
Dashboard > Azure AD B2 – Identity providers
Select “Identity providers”
Step: 4 Configure Identity Provider
Select “Identity provider type”
OpenID Connect (Preview)
Step 5 – Set up this Identity Provider
|Client ID||Will be emailed to you from Trusona|
|Scope||openid profile email|
Step: 6 Set up claims mapping
Select “Map this identity provider’s claims”
Click Ok to complete the setup for your new OIDC Identity Provider.
Step 7: Create user flow policy
You should now see your new OpenID Connect Identity Provider listed within your B2C Identity Providers.
Select “User flows (policies)”
Select “New user flow”
Select “Sign up and sign in”
Step 8 – Configure Policy
Name your policy
Select your new created Trusona Identity Provider.
Note: As Trusona is inherently multifactor, it’s best to leave multifactor authentication disabled.
Select at least one attributes that you specified during the setup in step 5.
9: Test Policy
Select your newly created policy
Run user flow
Enter Relying URL
Run user flow
When clicking the Run user flow button, you will be redirected to the Trusona OIDC Gateway. On the Trusona Gateway you can scan the displayed Secure QR code with the Trusona App or with an custom app using the Trusona mobile SDK.
After scanning the Secure QR code, you should be redirected to the Reply URL you defined in the previous step.