In Azure AD associate IDP Identity to existing users - azure

I've connected an Azure AD to a OpenId IDP (based on KeyCloak) using Azure AD B2C. The connections works well and user can use external IDP to create an user on Azure AD an login in an basic application that I use for test.
I would like to connect existing user in Azure AD to the relative IDP identity.
Using Graph API, in users detail I've notice that users created from IDP has in identities array an identity with "signInType": "federated".
In Update user graph API documentation seams that identities isn't an updatable value.
Is it possible to connect the user on Azure to my external IDP?

• You want to connect the user ID in Azure to the external IDP, i.e., you want the user in Azure AD to login with Azure AD credentials in external/other IDP. Thus, you will want to federate your Azure AD tenant with the external IDP for Azure AD to be provisioned in external IDP and use SAML SSO for authentication purposes.
For the sake of convenience, let’s assume here that external IDP is Google cloud. So, you want to connect your Azure AD users to the Google cloud IDP, for this purpose, you would want to configure a federation between Google cloud Identity and Azure AD such that Azure AD users are provisioned in Google cloud workspace and these users use SAML SSO for authentication in Google cloud using their Azure AD provisioned identities. To configure the same, please refer the below documentation link for that purpose: -
https://cloud.google.com/architecture/identity/federating-gcp-with-azure-active-directory

Related

Using both Azure AD and Azure AD B2C to authenticate with SSO

My Azure web application will have both internal and external users. The requirements regarding authentication are:
Internal users authenticate with their domain accounts (with SSO)
External users authenticate through Azure AD B2C (we need to create accounts for them)
How can I set up such scenario?
Regards
George
If your internal users are using Azure AD - simple - you add your corporate AAD as Identity provider to your B2C.
There are various ways to do this. So start here.
If your internal users do not have Microsoft 365 (Azure AD), and you only have on-premises AD DS infrastructure - ... move to Cloud, things will be so much easier. If not, you need at least ADFS, then you can hook up ADFS as Identity Provider in your B2C.
There is no way to make Windows Integrated Authentication and Claims Based authentication at the same time for the app.

Is it possible to create the Azure AD user account using federated domain via graph api?

Is it possible to create the Azure AD user account using federated domain via graph api? I am encountered this error message 'SourceAnchor is a required property for creation of a federated user.' We are using adfs to sync user account between on-premised AD and Azure AD cloud.
No it’s not possible. Federated accounts can only be created in the system of origin - in this case AD

How to add a SAML external identity provider to azure active directory?

I have an Single Page Application that needs to authenticate against Azure Active Directory with OAuth.
I want the authentication to be done using AD accounts, or different external data providers like Google, Facebook, and... one that is based on SAML.
How can I integrate a SAML external identity provider into Azure AD?
NB: The question is not "how to use Azure AD as a SAML identity provider?"
You can use Azure Active Directory B2C to set the Identity providers.
Sign in with Azure AD account.
Sign in with Facebook.
Sign in with Google.
Sign in with SAML provider.

Azure AD and Azure B2C for users

Our organization has a on premise Active directory.For few of our applications we want to implement authentication mechanism using Azure AD. Following is the requirement:
1) Organization users will be authenticated by Azure AD
2) External users will be authenticated by Azure AD B2C
3) Whenever an external user is trying to access the application, application will redirect the user to B2C login page.
Can anyone help me with steps for the solution?
Also, is there any issues to implement the security mechanism using Azure AD and B2C if the application resides in AWS?
For a specific sample of how to implement these custom policies, see Woodgrove Groceries demo, which enables users to sign in with either:
An "individual customer" account (i.e. a local account that is managed by Azure AD B2C or a Google or Microsoft account that is federated with it); or
A "business customer" account (i.e. an Azure AD account that is federated with Azure AD B2C); or
A "partner" account that is a direct federation between the end-user application and Azure AD (where Azure AD B2C doesn't act as an intermediate federation).
For your use case B2C custom policies are perfect fit. you can get start on custom policies from https://learn.microsoft.com/en-us/azure/active-directory-b2c/active-directory-b2c-get-started-custom
1) Organization users will be authenticated by Azure AD
You can integrate this in custom policies. Example: https://learn.microsoft.com/en-us/azure/active-directory-b2c/active-directory-b2c-setup-aad-custom
2) External users will be authenticated by Azure AD B2C
Once you add custom policies those will allow you to login users from external network/ social IDPs
3) Whenever an external user is trying to access the application,
application will redirect the user to B2C login page.
It's all about configuration. If you configure properly it will take you to B2C login page. If you stuck while integrating drop comment here.
Also, is there any issues to implement the security mechanism using
Azure AD and B2C if the application resides in AWS?
I don't think you will face challenges. Cloud redirects will happen and works fine with B2C too.

Azure AD B2C and on-premise Active Directory

We have the following scenario:
an Angular app accessing a Web Api backend
our own user database
We are planning to use a third-party identity solution such as Azure AD B2C, AWS IAM or Auth0. To my surprise, I found that Auth0 has an integration with on-premise Active Directory, but Azure AD B2C seems not to support this (at least not that I could find out)
We want to get to the following scenario:
an Angular app accessing a Web Api backend
third-party identity solution that manages the users of the angular app (preferably Azure AD B2C)
users need to authenticate via the identity solution (e.g. using a social account)
some users are in an existing on-premise AD and also need to be able to access the angular app
So my problem basically is : if we would use Azure AD B2C, how can we let users that are defined in an on-premise AD, authenticate in our Angular app? Or with other words: can an on-premise AD be an identity provider for Azure B2C?
This scenario can be solved with AD B2C custom policies.
I found that Auth0 has an integration with on-premise Active
Directory, but Azure AD B2C seems not to support this (at least not
that I could find out)
One way I know to make this work through ADFS. Where you can Integrate ADFS in B2C. I will update this answer if I know any other way of doing this.
Update Start
You can use Shibboleth and Okta servers apart ADFS server.
Update End
users need to authenticate via the identity solution (e.g. using a
social account) some users are in an existing on-premise AD and also
need to be able to access the angular app
If you use custom policies, you can achieve all of these scenarios. You can integrate both social accounts and AD via ADFS (On Premise ADFS server which give access to On Premise AD users)
if we would use Azure AD B2C, how can we let users that are defined in
an on-premise AD, authenticate in our Angular app? Or with other
words: can an on-premise AD be an identity provider for Azure B2C?
As I said this is possible through ADFS server. All you need to do is enable ADFS service on your server and add Relying Parties and make B2C consume and allow your AD users to login with B2C.
Warning: If at all your server not have ADFS enabled first try it on other test server.
ADFS in custom policies can found at: https://learn.microsoft.com/en-us/azure/active-directory-b2c/active-directory-b2c-custom-setup-adfs2016-idp

Resources