Need Help? We are right here!
Thanks for your Enquiry. Our team will soon reach out to you.
If you don't hear from us within 24 hours, please feel free to send a follow-up email to info@xecurify.com
Search Results:
×Configure Azure B2C to Single Sign-On (SSO) into multiple applications using Azure B2C as OAuth Identity Provider. Here, users can login to all applications (SPs) using their Azure B2C login credentials by configuring Azure AD as an Identity Provider (IdP). miniOrange will act as an Identity Broker which forms a trusted connection between identity providers and multiple service providers by enabling cross-protocol authentication.
Implementing Azure B2C SSO allows users to log into your websites and applications with a single set of credentials using the Azure B2C OAuth IDP. This solution ensures that you are ready to roll out secure access to your application using Azure B2C within minutes.
miniOrange offers free help through a consultation call with our System Engineers to configure Single Sign-On (SSO) for different apps using Azure B2C as an Identity Provider in your environment with 30-day free trial.
For this, you need to just send us an email at idpsupport@xecurify.com to book a slot and we'll help you in no time.
IdP Display Name | Choose appropriate Name |
OAuth Authorize Endpoint | From step 2 | OAuth Access Token Endpoint | From step 2 |
Client ID | From step 1 |
Client secret | From step 1 |
Scope | openid email profile |
If you have already configured your application in miniOrange you can skip the following steps.
Service Provider Name | Choose appropriate name according to your choice |
SP Entity ID or Issuer | Your Application Entity ID |
ACS URL X.509 Certificate (optional) | Your Application Assertion Consumer Service URL |
NameID format | Select urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress |
Response Signed | Unchecked |
Assertion Signed | Checked |
Encrypted Assertion | Unchecked |
Group policy | Default |
Login Method | Password |
Client Name | Add appropriate Name |
Redirect URL | Get the Redirect-URL from your OAuth Client |
Description | Add if required |
Group Name | Default |
Policy Name | As per your Choice |
Login Method | Password |
Note: Choose the Authorization Endpoint according to the identity source you configure.
https://{mycompany.domainname.com}/moas/idp/openidsso
https://{mycompany.domainname.com}/broker/login/oauth{customerid}
In case you are setting up SSO with Mobile Applications where you can't create an endpoint for Redirect or Callback URL, use below URL.
https://login.xecurify.com/moas/jwt/mobile
Few usecases where customers configure multiple IDPs -
For Cloud IDP - | https://login.xecurify.com/moas/discovery?customerId=<customer_id> |
For On-Premise IDP - | https://yourdomain.com/discovery?customerId=<customer_id> |
You can see the screenshot below of the IDP Selection Page with a list of IDPs.
Note: To view the IDP in drop-down list, go to Identity Providers tab > against your configured IDP > Select >Edit , here Enable the Show IdP to Users option.
Our Other Identity & Access Management Products