Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

EmpowerID offers a connector specifically designed for Azure AD B2C integration. Administrators can utilize this connector to establish a seamless connection between EmpowerID and their Azure AD B2C system. This connection creates an account store within the EmpowerID Identity Warehouse, serving as a central hub for configuring how EmpowerID manages identity information within the Azure AD B2C system.

Step 1 – Create an account store for Azure AD B2C

Once you have set up Azure and published the EmpowerID Azure AD B2C SCIM microservice to your Azure tenant, you will need to connect EmpowerID to the tenant. This connection will allow that tenant's user and group information to be brought into EmpowerID, where it can be easily managed and synchronized with data in any connected back-end user directories. Please follow the instructions below to create an account store for your organization’s Azure AD B2C instance,

  1. Log in to the EmpowerID portal.

  2. On the navbar, expand Admin → Applications and Directories and click Account Stores and Systems.

  3. Select the Account Stores tab and click on the Create Account Store link.

  4. To continue, please Please search and choose the Azure AD B2C SCIM account store from the System Types menu to continue. Once selected, click on the submit button.

  5. Please provide the following information related to the account store and click on submit to create the account store.

    1. Account Store Name: Provide a unique and descriptive name for the account store.

    2. Azure App Service URL: URL for the Microservice EndPoint of EID.( do not prefix v1.0)

    3. Application ID: The client application configured in the microservice tenant to access the microservice.

    4. Azure App Certificate Thumbprint: Upload the certificate to the EID portal and provide its thumbprint.

    5. B2C App Service Tenant ID: The ID of the tenant where the microservice is deployed.

    6. Azure AD B2C Tenant FQDN: The fully qualified domain name (FQDN) of the B2C tenant.

EmpowerID creates the Azure AD B2C account store and the associated resource system. The next step is to verify the resource system parameters match your tenant information.

Step 2 – Verify Resource System Parameters

Tip

Please note that the values for ApplicationID, AuthCertificateThumbprint, and TenantID are encrypted and that you will not see the values in the user interface.

  1. Navigate to the Account Stores and Systems, and Select the Account Stores tab, as mentioned in the previous step.

  2. Kindly search for and select your previously created account store.


  3. This directs you to the Account Store and Resource System page for the Azure AD account store EmpowerID created for the tenant. This page contains several tabs related to the account store that you can access to view and manage the account store and resource system.


  4. Select the Resource System tab, find and expand the Configuration Parameters accordion at the bottom of the page.


  5. Verify the following parameters are correct for your account store.

    Insert excerpt
    IL:Azure AD B2C Scim Components
    IL:Azure AD B2C Scim Components
    nameresourcetable
    nopaneltrue

  6. To edit the value of a parameter, click the Edit button for the parameter you want to edit.


  7. Enter the new value in the Value field and click Save.

After updating the Configuration Parameters, the next step is configuring the Attribute Flow.

Step 3 – Configure Attribute Flow

Insert excerpt
IL:Configure Attribute Flow Rules-V21
IL:Configure Attribute Flow Rules-V21
nopaneltrue

Now that you have set up the attribute flow in EmpowerID, the next steps involve configuring the account store and enabling EmpowerID to inventory it.

Step 4 – Configure Account Store Settings

  1. Navigate to the Account Stores and Systems, and Select the Account Stores tab, as mentioned in the previous topics.

  2. Please search and open the details page of the account store that was previously created.

  3. You will be directed to the edit page by clicking the "Edit" link for the account store. This page provides you with the settings to define the desired approach for EmpowerID's management of user information discovered in your Azure tenant during the inventory process. The table below the image contains detailed descriptions of the settings pertaining to the account store.

    Insert excerpt
    IL:Azure AD Account Store Settings V22
    IL:Azure AD Account Store Settings V22
    nopaneltrue

  4. Configure the account stores setting as needed and click on Save.

Step 5 – Enable the Account Inbox Permanent Workflow

Insert excerpt
IL:Enable Account Inbox PW - V22
IL:Enable Account Inbox PW - V22
nopaneltrue

Step 7 – Recycle your EmpowerID Environment

In order to prevent continuous inventory errors stating that “EnableAzureRbacInventory in system config is missing,” EmpowerID must be restarted after you have enabled inventory for the account store. The process to follow depends on whether you are running a cloud instance of EmpowerID or have an on-premise installation.

For cloud instances

Info

Please note that this process puts the environment out of service for about 15 minutes.

  1. On the navbar, expand IT Shop and select Workflows.

  2. Click Recycle Service Environment.

    Image Added

  3. Click Yes to confirm you want to recycle the environment.

    Image Added

  4. Click OK.

    Image Added

For on-premise installations

  1. Restart IIS.

  2. Restart the EmpowerID services.

Now that the Account Inbox Permanent workflow is turned on and inventory for the account store is enabled, you can monitor the inventory of users and groups from the Users and Groups tabs of the Account Store Details page.

Image Added
Info

It generally takes three iterations of the Inventory job before inventory is successful.

Div
stylefloat:left; position:fixed;
idarticleNav

IN THIS ARTICLE

Table of Contents
maxLevel4
minLevel2
stylenone
printablefalse