- Sign in Microsoft Azure.
- Create a B2C tenant by following this tutorial.
- Enable self-service sign-up for the tenant by following this doc
- Go back the main page of Microsoft Azure and search for "Azure AD B2C"
- Create a app registration for Authgear by following this guide.
- Configure "Redirect URI" with
https://<YOUR_AUTHGEAR_ENDPOINT>/sso/oauth2/callback/azureadb2c. - Follow this guide to create a sign-up and sign-in user flow.
- After creating the user flow, configure it
- Open "Application Claims".
- Make sure "Email Addresses" is checked.
If you have finished the above prerequisite, you should have the following information:
- The Tenant Name, obtained in Step 2
- The Application (Client) ID, obtained in Step 5
- The Policy (User flow) Name, obtained in Step 7
Then in Authgear portal, do the following:
- In the portal, go to Authentication > Social / Enterprise Login.
- Enable Sign in with Microsoft Azure AD B2C.
- Fill in Client ID with the Application (Client) ID above.
- Fill in Client secret with the client secret you get when you create the app registration.
- Fill in Tenant with the Azure AD B2C Tenant Name.
- Fill in Policy with the Policy (User Flow) Name. Normally it starts with
b2c_. - Save the changes
🎉 Done! You have just added Azure AD B2C Login to your apps!
Azure AD B2C automatically logs in to the same account without requiring a username and password. To prevent this behaviour, you can use the prompt=login parameter to force Azure AD B2C to show the login page. See our guide on using the prompt=login parameter in Authgear SDKs to learn more.