Connect Apps to Azure AD B2C
Prerequisite
- Sign in Microsoft Azure. 
- Create a B2C tenant by following this tutorial. 
- Enable self-service sign-up for the tenant by following this doc 
- Go back the main page of Microsoft Azure and search for "Azure AD B2C" 
- Create a app registration for Authgear by following this guide. 
- Configure "Redirect URI" with - https://<YOUR_AUTHGEAR_ENDPOINT>/sso/oauth2/callback/azureadb2c.
- Follow this guide to create a sign-up and sign-in user flow. 
- After creating the user flow, configure it 
- Open "Application Claims". 
- Make sure "Email Addresses" is checked. 
Configure Sign in with Azure AD B2c through the portal
If you have finished the above prerequisite, you should have the following information:
- The Tenant Name, obtained in Step 2 
- The Application (Client) ID, obtained in Step 5 
- The Policy (User flow) Name, obtained in Step 7 
Then in Authgear portal, do the following:
- In the portal, go to Authentication > Social / Enterprise Login. 
- Enable Sign in with Microsoft Azure AD B2C. 
- Fill in Client ID with the Application (Client) ID above. 
- Fill in Client secret with the client secret you get when you create the app registration. 
- Fill in Tenant with the Azure AD B2C Tenant Name. 
- Fill in Policy with the Policy (User Flow) Name. Normally it starts with - b2c_.
- Save the changes 
🎉 Done! You have just added Azure AD B2C Login to your apps!
Force Login page
Azure AD B2C automatically logs in to the same account without requiring a username and password. To prevent this behaviour, you can use the prompt=login parameter to force Azure AD B2C to show the login page. See our guide on using the prompt=login parameter in Authgear SDKs to learn more.
Last updated
Was this helpful?
