Hello there!

Need Help? We are right here!

Support Icon
miniOrange Email Support
success

Thanks for your Enquiry. Our team will soon reach out to you.

If you don't hear from us within 24 hours, please feel free to send a follow-up email to info@xecurify.com

Search Results:

×

Configure Azure B2C SSO for Multiple Apps


Configure Azure B2C to Single Sign-On (SSO) into multiple applications using Azure B2C as OAuth Identity Provider. Here, users can login to all applications (SPs) using their Azure B2C login credentials by configuring Azure AD as an Identity Provider (IdP). miniOrange will act as an Identity Broker which forms a trusted connection between identity providers and multiple service providers by enabling cross-protocol authentication.

Implementing Azure B2C SSO allows users to log into your websites and applications with a single set of credentials using the Azure B2C OAuth IDP. This solution ensures that you are ready to roll out secure access to your application using Azure B2C within minutes.


Get Free Installation Help


miniOrange offers free help through a consultation call with our System Engineers to configure Single Sign-On (SSO) for different apps using Azure B2C as an Identity Provider in your environment with 30-day free trial.

For this, you need to just send us an email at idpsupport@xecurify.com to book a slot and we'll help you in no time.



Prerequisites

Please make sure your organisation branding is already set under Customization >> Login and Registration Branding in the left menu of the dashboard.


Follow the Step-by-Step Guide to configure Azure B2C SSO

1. Configure miniOrange as Service Provider (SP) in Azure B2C

  • Go to miniOrange Admin Console.
  • From the left navigation bar select Identity Providers >> click Add Identity Provider.
  • Azure B2C SSO : Go to Identity Providers

  • Select OAuth 2.0 and copy the OAuth Callback URL which we will use to configure Azure B2C as OAuth Server/Provider.
  • Azure B2C Single Sign On : Select OAuth 2.0

  • Now, sign in to Azure Portal.
  • Go to home and in the Azure Services, select Azure AD B2C.
  • Azure B2C SSO: Select Azure B2C App

  • Please make sure you are in Azure AD B2C directory with an active subscription and if not, you can switch to the correct directory.
  • Azure B2C SAML: Active Directory B2C Instructions

  • In the Essential tab, you will find the Azure B2C domain name, Save it for futher configuration.
  • Azure B2C SSO Login: Add Domain Name

  • Now, click on App registerations and then click on the New registeration option to create a new Azure B2C Application.
  • Azure B2C SSO: Add new registration

  • When the Register an application page appears, enter your application's registration details:
    • Name: Name of the application.
    • Supported account types: Select 3rd option ‘Accounts in any organizational directory (for authenticating users with user flows)’. You can also refer to Help me choose... an option if needed.
    • Select a Platform: select Web as a platform and paste the copied OAuth Callback URL (which we copied in the above step) in the Redirect URI text field.
    • Azure B2C SSO Login: Azure B2C App Create

  • Click on Register.
  • After successful application creation, you will be redirected to the newly created application’s overview page. If not, you can go to the app registrations and search the name of your application and you will find your application in the list.
  • Azure B2C as IDP : Select App

  • Copy your Application ID and keep it handy, you will need it later for configuring the Client ID under miniOrange Service Provider.
  • Azure B2C as IDP : Copy Application ID and Keep it

  • Now, click on Certificates and secrets and then click on New client secret to generate a client secret. Enter a description and click on the Add button.
  • Azure B2C as IDP : Generate New Client Secret

  • Copy the secret key Value and save it, as you'll need it later in Step 2 to configure the Client Secret in the miniOrange as Service Provider.
  • Azure B2C as IDP : Copy client secret value

      Step 1.1: Add Users in your B2C Application

      • On the homepage, go to Users tab in the left menu.
      • Azure B2C as IDP : Go to users

      • Click on New user >> Create new user.
      • Azure B2C as IDP : Click New user to create new user

      • Open a new user window and enter the required information.
        • Select Create Azure AD B2C user from the Select template section.
        • Select Email in the Sign-in method section and set a password.
        • Azure B2C as IDP : Add new user

        • Click Create to save the user details for test configuration.

      Step 1.2: How to create & add Azure B2C Policy

      • Go to Policies >> User flows and click New user flow.
      • Azure B2C as IDP :Go to Policies and click User flows

      • Choose the Sign up and Sign in user flow type, then click Create.
      • Azure B2C as IDP : Select Sign up Sign in

      • Complete the details, such as Name, Identity providers, etc.
        • Select the User attributes you want to fetch during sign-up.
        • Click on Create.
        • Azure B2C as IDP : Enter user flows details

          Azure B2C as IDP : Add user Attribute

      • Copy the Policy name this value will be required when configuring Azure B2C Policy in the miniOrange Service Provider.

      Step 1.3: Add user claims to your application

      • Go to User flows under policies in the left menu and select the configured policy.
      • Azure B2C as IDP : Go to User flows

      • In the Settings section, select Application claims.
      • Azure B2C as IDP : Application Claim

      • Select the desired attributes to be displayed on the test configuration and save it.
      • Azure B2C as IDP : Click on Save

      Step 1.4: Configure ID-Token Claims in Azure B2C [Premium]

      • Open your application in Azure Active Directory and select Token configuration from the left menu.
      • Click on Add optional claim and select ID from the right section.
      • Now choose all the attributes you want to fetch during SSO (e.g family_name, given_name, etc) and click on Add button.
      • You might see a popup to Turn on the Microsoft Graph profile permission (required for claims to appear in token), enable it, and click on Add button.
      • Azure B2C as IDP : Map Custom Attributes

2. Configure Azure B2C as OAuth 2.0 Provider in miniOrange.

  • Go to Application registrations -> Endpoints.
  • Azure B2C SSO : go to application registrations and click endpoints

  • Copy token and authorization endpoints.
  • Now, go to miniOrange Admin Console.
  • From the left navigation bar select Identity Providers -> click Add Identity Provider.
  • Azure B2C as IDP: Azure B2C sso

  • Select OAuth 2.0 and choose Azure B2C as IDP Name from the dropdown list.
  • Azure B2C SSO: Azure B2C sso

  • Enter the following values.
    IdP Display Name Choose appropriate Name
    OAuth Authorize Endpoint From step 2
    OAuth Access Token Endpoint From step 2
    Client ID From step 1
    Client secret From step 1
    Scope openid email profile

3. Test Connection

  • Visit your Login Page URL.
  • Go to Identity Providers tab.
  • Click on Select >> Test Connection option against the Identity Provider (IDP) you configured.
  • Azure B2C-IDP-TestConnection

  • On entering valid Azure B2C credentials (credentials of user assigned to app created in Azure B2C), you will see a pop-up window which is shown in the below screen.
  • SucessTestConn-Azure B2C-IDP

  • Hence your configuration of Azure B2C as IDP in miniOrange is successfully completed.

Note:

You can follow this guide, if you want to configure SAML/WS-FED, OAuth/OIDC, JWT, Radius etc


Configure Attribute Mapping

  • Go to Identity Providers >> View Identity Providers >> Your configured Azure B2C as IdP.
  • Now click on Select and then Configure Attribute Mapping of your application.
  • Azure B2C Single Sign-On SSO Select and Configure Attribute Mapping

  • Under Attribute Type - EXTERNAL for the external attributes that need to be transformed and sent to applications or service providers.
  • Click on the + Add Attribute button to add the attribute fields.
  • Azure B2C Single Sign-On SSO Map External Attribute

  • Check attributes in test connection window from last step. Enter the attribute names (any name) that you want to send to your application under Attribute Name sent to SP.
  • Enter the value of attributes that are coming from IdP into the Attribute Name from IdP field on the Xecurify side.

Configure Multiple IDPs:

You can follow this guide, if you want to configure multiple IDPs (Identity Providers) and give users the option to select the IDP of their choice to authenticate with.



External References


Want To Schedule A Demo?

Request a Demo
  



Our Other Identity & Access Management Products