The repository contains code which demonstrates an integration between Azure AD B2C and IPification.
This integration is powered by the Identity Experience Framework in Azure AD B2C. For more information on TrustFramework Policies and the Identity Experience Framework, see the Azure AD B2C documentation.
In the src/
folder is the source code for a simple website which uses OpenID Connect to authenticate using two Azure AD B2C policies which demonstrate different types of integration options with IPification.
You can find the demo site at: https://b2c-ipification-demo.azurewebsites.net
In the policies/
folder you'll find custom policy definitions for two integration patterns with IPification:
The policies starting with Phone
demonstrate how to leverage IPification as a silent phone-based passwordless authentication provider with fall back to SMS when IPification is not able to verify the user.
This scenario is based on the phone-number-passwordless
starter pack.
The policies starting with Mfa
demonstrate how to leverage IPification as a multi-factor authentication option to verify a user's mobile number silently. This will fall back to SMS when IPification is not able to verify the user.
This scenario is based on the SocialAndLocalAccountsWithMfa
starter pack.
This repository uses GitHub Actions to deploy both the Azure AD B2C policies and the website. You can find the deployment workflows in .github/workflows/
.
Use Stack Overflow to get support from the community. Ask your questions on Stack Overflow first and browse existing issues to see if someone has asked your question before. Make sure that your questions or comments are tagged with [azure-ad-b2c].
If you find a bug in the sample, please raise the issue on GitHub Issues.
To provide product feedback, visit the Azure AD B2C feedback page.