You are viewing an earlier version of the admin guide. For the latest version, please visit EmpowerID Admin Guide v7.211.0.0.

Skip to end of banner
Go to start of banner

Azure AD B2C SCIM Connector

Skip to end of metadata
Go to start of metadata

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 3 Next »

With the help of EmpowerID's Azure AD B2C Scim Connector, organizations can easily manage and synchronize group owners and members in their AD B2C domains with data in other connected back-end user directories. The connector is based on the SCIM open standard protocol, thus making the B2C connector secure and simplified.

The connector is designed as a microservice that has the capabilities of,

  • Creating and managing records of B2C group owners and members in AD B2C

  • Full inventory of group owners and members in AD B2C

  • Incremental inventory that captures only changes in group owners and members after the last inventory

Before setting up the connector, please ensure you have the necessary configuration values. These settings are mandatory for the setup process.

CertificateName: The name of the certificate stored in the Key Vault. This certificate is used by the application registered in Azure AD B2C for authentication or other security purposes.

ClientID: The Client ID (or Application ID) uniquely identifies the application registered in Azure AD B2C. It is used to authenticate and authorize the application to access resources within the B2C tenant.

GraphBaseUrl: The base URL of the Microsoft Graph API, which provides a unified endpoint to access various Microsoft services and data, including Azure AD B2C.

TenantID: The Tenant ID refers to the unique identifier of the Azure AD B2C tenant. It represents the organization or directory to which the B2C tenant belongs.

VaultURL: The Vault URL is the address that points to the specific Key Vault instance used to store the certificate. Key Vault provides secure storage and management of cryptographic keys, secrets, and certificates. The Vault URL identifies the location where the certificate is stored.

  • No labels