You are viewing an earlier version of the admin guide. For the latest version, please visit EmpowerID Admin Guide v7.211.0.0.

Skip to end of banner
Go to start of banner

Connect to Azure AD B2C

Skip to end of metadata
Go to start of metadata

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 6 Next »

EmpowerID offers a connector specifically designed for Azure AD B2C integration. Administrators can utilize this connector to establish a seamless connection between EmpowerID and their Azure AD B2C system. This connection creates an account store within the EmpowerID Identity Warehouse, serving as a central hub for configuring how EmpowerID manages identity information within the Azure AD B2C system.

Step 1 – Create an account store for Azure AD B2C

Once you have set up Azure and published the EmpowerID Azure AD B2C SCIM microservice to your Azure tenant, you will need to connect EmpowerID to the tenant. This connection will allow that tenant's user and group information to be brought into EmpowerID, where it can be easily managed and synchronized with data in any connected back-end user directories. Please follow the instructions below to create an account store for your organization’s Azure AD B2C instance,

  1. Log in to the EmpowerID portal.

  2. On the navbar, expand Admin → Applications and Directories and click Account Stores and Systems.

  3. Select the Account Stores tab and click on the Create Account Store link.

  4. To continue, please search and choose the Azure AD B2C SCIM account store from the System Types menu. Once selected, click on the submit button.

  5. Please provide the following information related to the account store and click on submit to create the account store.

    1. Account Store Name: Provide a unique and descriptive name for the account store.

    2. Azure App Service URL: URL for the Microservice EndPoint of EID.( do not prefix v1.0)

    3. Application ID: The client application configured in the microservice tenant to access the microservice.

    4. Azure App Certificate Thumbprint: Upload the certificate to the EID portal and provide its thumbprint.

    5. B2C App Service Tenant ID: The ID of the tenant where the microservice is deployed.

    6. Azure AD B2C Tenant FQDN: The fully qualified domain name (FQDN) of the B2C tenant.

  6. ssdd

  • No labels