Connect Apps to Azure AD B2C
Prerequisite
Sign in Microsoft Azure.
Create a B2C tenant by following this tutorial.
Enable self-service sign-up for the tenant by following this doc
Go back the main page of Microsoft Azure and search for "Azure AD B2C"
Create a app registration for Authgear by following this guide.
Configure "Redirect URI" with
https://<YOUR_AUTHGEAR_ENDPOINT>/sso/oauth2/callback/azureadb2c
.Follow this guide to create a sign-up and sign-in user flow.
After creating the user flow, configure it
Open "Application Claims".
Make sure "Email Addresses" is checked.
Configure Sign in with Azure AD B2c through the portal
If you have finished the above prerequisite, you should have the following information:
The Tenant Name, obtained in Step 2
The Application (Client) ID, obtained in Step 5
The Policy (User flow) Name, obtained in Step 7
Then in Authgear portal, do the following:
In the portal, go to Authentication > Social / Enterprise Login.
Enable Sign in with Microsoft Azure AD B2C.
Fill in Client ID with the Application (Client) ID above.
Fill in Client secret with the client secret you get when you create the app registration.
Fill in Tenant with the Azure AD B2C Tenant Name.
Fill in Policy with the Policy (User Flow) Name. Normally it starts with
b2c_
.Save the changes
🎉 Done! You have just added Azure AD B2C Login to your apps!
Force Login page
Azure AD B2C automatically logs in to the same account without requiring a username and password. To prevent this behaviour, you can use the prompt=login
parameter to force Azure AD B2C to show the login page. See our guide on using the prompt=login parameter in Authgear SDKs to learn more.
Last updated