Webinar Recap: Customising user journeys on Azure AD B2C

18 November 2020

Earlier this month our second webinar in the Microsoft Azure AD B2C series went live!

Following on from the first webinar, which served as an introduction to Azure AD B2C, our second one went into detail on customising user journeys and integrating different sites with B2C using OpenID Connect and SAML2. The webinar included expert insight, demonstrations of B2C’s capabilities, and a Q&A session to close.

As the series continues, we’ll cover topics like federation and single sign-on, API integration, user migration, and more! In this blog, we’re going to reflect and recap on our second webinar, and if you have any questions for our presenters David Manning, and Dave Downs, don’t hesitate to get in touch.

Webinar content

Initial custom policy

In this session we set up B2C custom policies allowing a user to register for an application and sign in to that application, including verifying the user’s email address using a one-time passcode, validating the details the user entered, and capturing custom information such as where the user heard about the service.

We showed a breakdown of how the relying party application is defined in a custom policy, how user journeys are structured, and what goes into writing the components that the user journey executes to register and authenticate a user.

Custom branding

We demonstrated how the default B2C branding templates are set up, how policy authors can host their own custom branding templates, and how custom policies can be used to override the defaults, styling B2C pages using a company’s own branding.

Integration with an OpenID Connect relying party

We went through the configuration of a B2C tenant, including uploading custom policies, where signing keys are configured, and how an application can be registered with B2C allowing that app to make use of B2C policies for authentication using OpenID Connect.

Integration with a SAML2 relying party

Finally, we demonstrated how to add additional custom policies to enable authentication from a SAML2 relying party, how the configuration of that application compares to an OpenID Connect application, and how to make use of single-sign-on to provide a seamless authentication experience for users of multiple services.

Q&A

Can we use variants of branding for different apps or areas of the same site?

The way B2C does branding through content definitions is very flexible.

Parameters can be passed as part of the to the request for a HTML template and, based on those parameters, the site serving the HTML can return custom templates. B2C supports providing those parameters either for all template requests in a user journey or for individual template requests as needed.

Because the templates are loaded based on content definitions in B2C – content definitions just being a section of the policy that defines the URLs used to load templates – and each page in B2C defines which content definition it uses, individual pages can load different templates depending on their requirements.

As all of this is defined in the B2C custom policies, and because the custom policies are hierarchical, all that configuration can be overridden for different journeys, different steps in a journey, or different relying parties as needed.

Overall, this shows there is quite a lot of flexibility when it comes to branding.

Can deployment be automated using technology like Azure DevOps?

There are some parts which aren’t yet automatable, such as the creation of the B2C tenant. Still, things like the deployment of policies are fully automatable, and we do that ourselves on projects using Azure DevOps.

This typically includes writing custom policies as a set of templates and then replacing variables within those templates as we deploy to different environments, through a standard Azure DevOps pipeline.

Up next

If you missed this webinar on customising user journeys with Azure AD B2C, the recording is now available for viewing on our YouTube channel. In our next Microsoft Azure AD B2C webinar on Wednesday 2nd December, our experts focus on federation and single sign-on for Azure AD B2C.

As the series continues, we’ll continue to give our attendees a comprehensive look into the power of Azure AD B2C and how it can be leveraged to provide a fully customised authentication and access management solution to meet your needs.

Register to attend

Don’t miss our upcoming webinar on federation and single sign-on

Coming up next: 2 December @ 3 PM GMT | Secure your IT real-estate with Microsoft Azure AD B2C: Federation and Single Sign-On. This is your opportunity to ask our experts your questions on all things Microsoft Azure AD B2C, grab your ticket!

Download the webinar slides.

     Yes, I would like to subscribe to Condatis’ newsletter and receive company related news & updates—you can unsubscribe at any time.

      All personal data submitted via this form will be stored and used in line with the General Data Protection Regulation (GDPR). Please read our privacy policy to learn more on how we protect and manage personal data submitted through our website.