%3CLINGO-SUB%20id%3D%22lingo-sub-1224754%22%20slang%3D%22en-US%22%3EHow%20To%20Use%20Okta%20for%20Azure%20API%20Management%20Developer%20Portal%20Authentication%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1224754%22%20slang%3D%22en-US%22%3E%3CP%3EToday%20there%20are%20many%20organizations%20around%20the%20world%20that%20leverage%20the%20rich%20capabilities%20of%20the%20Microsoft%20Identity%20Platform.%20Often%20these%20organizations%20also%20need%20to%20integrate%20with%20third-party%20identity%20platforms.%26nbsp%3BIn%20this%20post%2C%20I%20will%20demonstrate%20the%20flexibility%20of%20the%20Microsoft%20Identity%20Platform%20and%20how%20it%20can%20be%20used%20to%20integrate%20a%20third-party%20identity%20provider%20(Okta)%20with%20our%20Azure%20API%20Management%20(APIM)%20service.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EMore%20specifically%2C%20this%20post%20demonstrates%20how%20to%20configure%20APIM%20to%20use%20Okta%20identities%20for%20the%20APIM%20developer%20portal.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EBy%20default%2C%20the%20APIM%20developer%20portal%20authenticates%20users%20using%20a%20username%20and%20password%2C%20acting%20as%20its%20own%20identity%20provider%20(IdP).%20If%20you%20need%20to%20use%20external%20IdPs%2C%20APIM%20provides%20out-of-the-box%20support%20for%20the%20following%3A%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CUL%3E%0A%3CLI%3EAzure%20Active%20Directory%3C%2FLI%3E%0A%3CLI%3EAzure%20Active%20Directory%20B2C%3C%2FLI%3E%0A%3CLI%3EFacebook%3C%2FLI%3E%0A%3CLI%3EGoogle%3C%2FLI%3E%0A%3CLI%3EMicrosoft%3C%2FLI%3E%0A%3CLI%3ETwitter%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3CP%3EYou%20may%20be%20thinking%2C%20%E2%80%9C%3CEM%3EI%20don%E2%80%99t%20see%20Okta%20listed%20here.%20Does%20that%20mean%20that%20APIM%20does%20not%20support%20Okta%3F%3C%2FEM%3E%E2%80%9D%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EThe%20short%20answer%20is%20APIM%20supports%20Okta%20indirectly%20because%20Okta%20supports%20certain%20security%20protocols%20that%20APIM%20and%20AAD%20B2C%20also%20support.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3ETo%20integrate%20the%20APIM%20Developer%20Portal%20with%20Okta%2C%20we%20will%20need%20to%20add%20an%20AAD%20B2C%20identity%20provider%20to%20our%20APIM%20configuration.%20The%20product%20team%20has%20done%20a%20pretty%20decent%20job%20of%20outlining%20the%20essential%20steps%20of%20configuring%20AAD%20B2C%20as%20an%20identity%20provider%20for%20APIM%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fazure%2Fapi-management%2Fapi-management-howto-aad-b2c%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%22%3Ehere%3C%2FA%3E.%20I%20will%20be%20extending%20this%20to%20include%20Okta.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EIt%20is%20important%20to%20note%20that%20having%20a%20good%20foundational%20understanding%20of%20security%20protocols%20such%20as%20%3CA%20href%3D%22https%3A%2F%2Fopenid.net%2Fconnect%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noopener%20noreferrer%20noopener%20noreferrer%22%3EOpenID%20Connect%3C%2FA%3E%20and%20%3CA%20href%3D%22https%3A%2F%2Foauth.net%2F2%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noopener%20noreferrer%20noopener%20noreferrer%22%3EOAuth2%3C%2FA%3E%20is%20extremely%20helpful%20in%20navigating%20the%20complexities%20of%20security%20integration.%20There%20are%20a%20number%20of%20ways%20you%20can%20configure%20Okta%20and%20AAD%20B2C%20to%20leverage%20the%20various%20security%20flows%20and%20token%20types.%20For%20this%20article%2C%20I%20am%20going%20to%20demonstrate%20a%20basic%20configuration%20that%20you%20can%20extend.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CFONT%20size%3D%225%22%3E1)%20Get%20Access%20to%20an%20Okta%20Tenant%3C%2FFONT%3E%3C%2FP%3E%0A%3CP%3EYou%20will%20need%20to%20have%20an%20Okta%20tenant%20and%20administrative%20access%20to%20configure%20it.%20If%20you%20don%E2%80%99t%20already%20have%20access%20to%20Okta%2C%20you%20can%20sign%20up%20for%20a%20free%20account%20at%3A%26nbsp%3B%20%3CA%20href%3D%22https%3A%2F%2Fdeveloper.okta.com%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noopener%20noreferrer%20noopener%20noreferrer%22%3Ehttps%3A%2F%2Fdeveloper.okta.com%2F%3C%2FA%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EOkta%20will%20assign%20a%20unique%20host%20name%20for%20your%20tenant%2C%20such%20as%20%E2%80%9Cdev-831740.okta.com%E2%80%9D%20and%20the%20administration%20portal%20will%20have%20%E2%80%9C-admin%E2%80%9D%20tacked%20onto%20it.%20For%20example%2C%20the%20admin%20portal%20for%20the%20previous%20host%20will%20be%20%E2%80%9C%3CA%20href%3D%22https%3A%2F%2Fdev-831740-admin.okta.com%E2%80%9D%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noopener%20noreferrer%20noopener%20noreferrer%22%3Ehttps%3A%2F%2Fdev-831740-admin.okta.com%E2%80%9D%3C%2FA%3E.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EOnce%20you%20have%20access%2C%20sign%20into%20the%20admin%20interface%20following%20the%20instructions%20sent%20via%20email.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CFONT%20size%3D%225%22%3E2)%20Create%20an%20Azure%20AD%20B2C%20Tenant%3C%2FFONT%3E%3C%2FP%3E%0A%3CP%3ENext%2C%20we%20will%20create%20an%20Azure%20AD%20B2C%20tenant.%20Simply%20follow%20the%20steps%20documented%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fazure%2Factive-directory-b2c%2Ftutorial-create-tenant%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%22%3Ehere%3C%2FA%3E.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CFONT%20size%3D%225%22%3E3)%20Register%20the%20APIM%20Developer%20Portal%20as%20an%20Application%20in%20AAD%20B2C%3C%2FFONT%3E%3C%2FP%3E%0A%3CP%3EOnce%20we%20have%20our%20AAD%20B2C%20tenant%2C%20we%20will%20need%20to%20register%20the%20APIM%20Developer%20Portal%20as%20an%20application%20in%20B2C.%20The%20new%20application%20registration%20dialog%20should%20look%20like%20the%20following%3A%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22image001.png%22%20style%3D%22width%3A%20957px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F176829iEE2F815D7B1E0A2C%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20title%3D%22image001.png%22%20alt%3D%22image001.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3EThe%20%3CSTRONG%3Ereply%20URLs%3C%2FSTRONG%3E%20are%20important%20as%20they%20instruct%20AAD%20B2C%20where%20to%20respond%20with%20the%20requested%20response%20type%20when%20authenticating%20users%20and%20exchanging%20security%20tokens.%20There%20are%20two%20specific%20reply%20URLs%20for%20APIM%2C%20with%20each%20one%20representing%20the%20legacy%20developer%20portal%20and%20the%20new%20developer%20portal%3A%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%20class%3D%22lia-indent-padding-left-30px%22%3E%3CSTRONG%3Ehttps%3A%2F%2F%3CYOUR%20apim%3D%22%22%20instance%3D%22%22%3E.portal.azure-api.net%2Fsignin-aad%3C%2FYOUR%3E%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%20class%3D%22lia-indent-padding-left-30px%22%3E%3CSTRONG%3Ehttps%3A%2F%2F%20%3CYOUR%20apim%3D%22%22%20instance%3D%22%22%3E.developer.azure-api.net%2Fsignin%3C%2FYOUR%3E%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EI%20have%20added%20an%20additional%20reply%20URL%20(%3CA%20href%3D%22https%3A%2F%2Fjwt.ms%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noopener%20noreferrer%20noopener%20noreferrer%22%3E%3CSTRONG%3Ehttps%3A%2F%2Fjwt.ms%3C%2FSTRONG%3E%3C%2FA%3E)%20for%20debugging%20purposes%2C%20which%20I%20will%20talk%20more%20about%20later.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EOnce%20registered%2C%20AAD%20B2C%20will%20create%20an%20%3CSTRONG%3EApplication%20ID%3C%2FSTRONG%3E%20for%20the%20application%2C%20otherwise%20known%20as%20the%20%3CSTRONG%3EClient%20ID%3C%2FSTRONG%3E%20of%20the%20APIM%20Developer%20Portal%20application%20registered%20in%20B2C.%20Make%20a%20note%20of%20the%20value%20from%20your%20registration%3A%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22image003.png%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F176830i4EF0DF6046052E14%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20title%3D%22image003.png%22%20alt%3D%22image003.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CFONT%20size%3D%225%22%3E4)%20Generate%20App%20Key%20(Client%20Secret)%3C%2FFONT%3E%3C%2FP%3E%0A%3CP%3ENext%2C%20you%20will%20need%20to%20generate%20a%20%3CSTRONG%3EClient%20Secret%3C%2FSTRONG%3E%20for%20your%20registered%20application.%3C%2FP%3E%0A%3CP%3ESelect%20%3CSTRONG%3EKeys%3C%2FSTRONG%3E%20on%20the%20left%2C%20then%20%3CSTRONG%3EGenerate%20key%3C%2FSTRONG%3E%20and%20then%20%3CSTRONG%3ESave%3C%2FSTRONG%3E%20to%20view%20the%20key%20value.%26nbsp%3BCopy%20this%20value%20to%20use%20later%3A%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22image005.png%22%20style%3D%22width%3A%20982px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F176831i9EFBA5B3C4A57214%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20title%3D%22image005.png%22%20alt%3D%22image005.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%3CFONT%20size%3D%225%22%3E5)%20Register%20AAD%20B2C%20as%20an%20Application%20in%20Okta%3C%2FFONT%3E%3C%2FP%3E%0A%3CP%3EAt%20this%20point%2C%20we%20should%20have%20our%20APIM%20instance%2C%20our%20AAD%20B2C%20instance%2C%20and%20have%20registered%20our%20APIM%20developer%20portal%20as%20an%20application%20in%20AAD%20B2C.%20Now%20we%20need%20to%20register%20AAD%20B2C%20as%20an%20application%20in%20Okta.%3C%2FP%3E%0A%3CP%3ENavigate%20to%20the%20Okta%20Developer%20Console%20and%20select%20the%20%3CSTRONG%3EApplications%3C%2FSTRONG%3E%20tab.%20Click%20on%20%3CSTRONG%3EAdd%20Application%3C%2FSTRONG%3E%3A%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22image007.png%22%20style%3D%22width%3A%20903px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F176832i7D2DA7A97271FDAD%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20title%3D%22image007.png%22%20alt%3D%22image007.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3ESelect%20%3CSTRONG%3EWeb%3C%2FSTRONG%3E%20as%20the%20platform%20option.%3C%2FP%3E%0A%3CP%3ENext%20you%20should%20see%20a%20few%20fields%20for%20application%20settings%3A%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22image009.png%22%20style%3D%22width%3A%20967px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F176833i5158A70BE1755335%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20title%3D%22image009.png%22%20alt%3D%22image009.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3EEnter%20a%20value%20for%20the%20name%20that%20signifies%20this%20is%20for%20your%20AAD%20B2C.%3C%2FP%3E%0A%3CP%3EFor%20Grant%20type%20allowed%2C%20select%20all%20options%20for%20now.%3C%2FP%3E%0A%3CP%3EFinally%2C%20add%20a%20Login%20redirect%20URI%20so%20that%20Okta%20knows%20where%20to%20send%20its%20responses%20to%2C%20which%20in%20this%20case%2C%20will%20be%20AAD%20B2C%3A%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%20class%3D%22lia-indent-padding-left-30px%22%3E%3CSTRONG%3Ehttps%3A%2F%2F%3CYOUR%20b2c%3D%22%22%20tenant%3D%22%22%3E.b2clogin.com%2Fmcpcsab2c.onmicrosoft.com%2Foauth2%2Fauthresp%3C%2FYOUR%3E%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EJust%20like%20before%2C%20you%20can%20also%20add%20%3CSTRONG%3E%3CA%20href%3D%22https%3A%2F%2Fjwt.ms%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noopener%20noreferrer%20noopener%20noreferrer%22%3Ehttps%3A%2F%2Fjwt.ms%3C%2FA%3E%3C%2FSTRONG%3E%20to%20make%20it%20easier%20to%20debug.%3C%2FP%3E%0A%3CP%3EClick%20%3CSTRONG%3EDone%3C%2FSTRONG%3E%20to%20save%20the%20configuration.%3C%2FP%3E%0A%3CP%3EAt%20this%20point%2C%20your%20application%20should%20be%20listed%20under%20the%20Applications%20tab%20in%20the%20Okta%20admin%20interface.%20Select%20the%20B2C%20application%20and%20then%20go%20to%20the%20%3CSTRONG%3EGeneral%3C%2FSTRONG%3E%20tab.%20Scroll%20to%20the%20bottom%20to%20get%20to%20the%20Client%20Credentials%20section%3A%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22image011.png%22%20style%3D%22width%3A%20749px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F176836i207CD352247C968F%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20title%3D%22image011.png%22%20alt%3D%22image011.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3EYou%20will%20need%20the%20%3CSTRONG%3EClient%20ID%3C%2FSTRONG%3E%20and%20%3CSTRONG%3EClient%20secret%3C%2FSTRONG%3E%20values%2C%20so%20copy%20those%20for%20later.%3C%2FP%3E%0A%3CP%3EYou%20will%20also%20need%20the%20metadata%20URL%20from%20your%20Okta%20Authorization%20Server.%20To%20find%20this%2C%20click%20on%20%3CSTRONG%3EAPI%3C%2FSTRONG%3E%20tab%20at%20the%20top%2C%20followed%20by%20%3CSTRONG%3EAuthorization%20Servers%3C%2FSTRONG%3E%3A%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22image013.png%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F176837iEA040CF0DB9A7F53%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20title%3D%22image013.png%22%20alt%3D%22image013.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3EClick%20on%20the%20default%20Authorization%20Server%20to%20bring%20up%20the%20details.%3C%2FP%3E%0A%3CP%3EUnder%20the%20%3CSTRONG%3Esettings%3C%2FSTRONG%3E%20tab%2C%20you%20should%20see%20a%20%3CSTRONG%3EMetadata%20URI%3C%2FSTRONG%3E%3A%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22image015.png%22%20style%3D%22width%3A%20747px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F176838iE85557B830F5AC63%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20title%3D%22image015.png%22%20alt%3D%22image015.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3ETo%20use%20this%20with%20AAD%20B2C%2C%20we%20need%20to%20change%20this%20to%20its%20OpenID%20Connect%20equivalent.%20Replace%20the%20%E2%80%9Coauth-authorization-server%E2%80%9D%20with%20%E2%80%9Copenid-configuration%E2%80%9D%20like%20so%3A%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%20class%3D%22lia-indent-padding-left-30px%22%3E%3CSTRONG%3Ehttps%3A%2F%2F%3CYOUR%20okta%3D%22%22%20tenant%3D%22%22%3E.okta.com%2Foauth2%2Fdefault%2F.well-known%2Fopenid-configuration%3C%2FYOUR%3E%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EYou%20can%20test%20the%20metadata%20URI%20by%20pasting%20it%20in%20a%20browser%3A%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22image017.png%22%20style%3D%22width%3A%20804px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F176840iD23CEA71CEA7E200%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20title%3D%22image017.png%22%20alt%3D%22image017.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3ESave%20the%20%3CSTRONG%3EOkta%3C%2FSTRONG%3E%20%3CSTRONG%3Emetadata%20URL%3C%2FSTRONG%3E%20for%20later.%3C%2FP%3E%0A%3CP%3EBefore%20continuing%2C%20you%20should%20have%20the%20following%20information%20from%20earlier%20in%20this%20step%3A%3C%2FP%3E%0A%3CUL%3E%0A%3CLI%3E%3CSTRONG%3EMetadata%20URL%3C%2FSTRONG%3E%3C%2FLI%3E%0A%3CLI%3E%3CSTRONG%3EClient%20ID%3C%2FSTRONG%3E%3C%2FLI%3E%0A%3CLI%3E%3CSTRONG%3EClient%20secret%3C%2FSTRONG%3E%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CFONT%20size%3D%225%22%3E6)%20Add%20a%20New%20OpenID%20Connect%20provider%20in%20AAD%20B2C%3C%2FFONT%3E%3C%2FP%3E%0A%3CP%3ESince%20we%20are%20going%20to%20be%20authenticating%20users%20to%20the%20APIM%20Developer%20Portal%20using%20AAD%20B2C%2C%20we%20need%20to%20tell%20AAD%20B2C%20that%20we%20want%20those%20identities%20to%20come%20from%20an%20external%20identity%20provider.%3C%2FP%3E%0A%3CP%3ETo%20do%20this%2C%20we%20need%20to%20go%20back%20to%20our%20AAD%20B2C%20Azure%20blade%20and%20select%20the%20%3CSTRONG%3EIdentity%20providers%3C%2FSTRONG%3E%20tab.%20Next%2C%20click%20on%20the%20%3CSTRONG%3ENew%20OpenID%20Connect%20provider%3C%2FSTRONG%3E%20button%20at%20the%20top%3A%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22image019.png%22%20style%3D%22width%3A%20575px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F176841i49F9D8972F88D93A%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20title%3D%22image019.png%22%20alt%3D%22image019.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3EFor%20the%20%3CSTRONG%3EMetadata%20URL%3C%2FSTRONG%3E%2C%20%3CSTRONG%3EClient%20ID%3C%2FSTRONG%3E%2C%20and%20%3CSTRONG%3EClient%20secret%3C%2FSTRONG%3E%2C%20enter%20the%20values%20obtained%20from%20step%205%20earlier.%3C%2FP%3E%0A%3CP%3EFor%20Scope%2C%20enter%20%3CSTRONG%3Eopenid%20profile%20email%3C%2FSTRONG%3E.%3C%2FP%3E%0A%3CP%3EFor%20Response%20type%2C%20change%20the%20value%20to%20%3CSTRONG%3Eid_token%3C%2FSTRONG%3E.%3C%2FP%3E%0A%3CP%3EFor%20User%20ID%2C%20enter%20%3CSTRONG%3Esub%3C%2FSTRONG%3E.%3C%2FP%3E%0A%3CP%3EFor%20Display%20name%2C%20enter%20%3CSTRONG%3Ename%3C%2FSTRONG%3E.%3C%2FP%3E%0A%3CP%3EFor%20Given%20name%2C%20enter%20%3CSTRONG%3Egiven_name%3C%2FSTRONG%3E.%3C%2FP%3E%0A%3CP%3EFor%20Surname%2C%20enter%20%3CSTRONG%3Efamily_name%3C%2FSTRONG%3E.%3C%2FP%3E%0A%3CP%3EFor%20Email%2C%20enter%20%3CSTRONG%3Eemail%3C%2FSTRONG%3E.%3C%2FP%3E%0A%3CP%3EClick%20on%20%3CSTRONG%3ESave%3C%2FSTRONG%3E.%3C%2FP%3E%0A%3CP%3EYou%20should%20see%20a%20new%20OpenID%20Connect%20identity%20provider%20listed%20now%20in%20the%20%3CSTRONG%3Eidentity%20providers%3C%2FSTRONG%3E%20tab%20of%20your%20AAD%20B2C%20tenant.%20Your%20configuration%20will%20look%20like%20this%3A%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22image021.png%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F176842i5195607540D99CB7%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20title%3D%22image021.png%22%20alt%3D%22image021.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CFONT%20size%3D%225%22%3E7)%20Add%20a%20Sign-In%20and%20Sign-Up%20AAD%20B2C%20Policy%3C%2FFONT%3E%3C%2FP%3E%0A%3CP%3EWhile%20still%20on%20the%20AAD%20B2C%20blade%2C%20select%20the%20%3CSTRONG%3EUser%20flows%3C%2FSTRONG%3E%20tab%20under%20Policies%20and%20then%20select%20%3CSTRONG%3ENew%20user%20flow%3C%2FSTRONG%3E%3A%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22image023.png%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F176843i0103145773CBD172%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20title%3D%22image023.png%22%20alt%3D%22image023.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3ESelect%20the%20%3CSTRONG%3ESign%20up%20and%20sign%20in%3C%2FSTRONG%3E%20policy%3A%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22image025.png%22%20style%3D%22width%3A%20944px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F176845iFA10F242CFB7D113%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20title%3D%22image025.png%22%20alt%3D%22image025.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3EFor%20the%20%3CSTRONG%3Ename%3C%2FSTRONG%3E%20of%20the%20user%20flow%2C%20enter%20%3CSTRONG%3EUF_SignUpOrSignIn%3C%2FSTRONG%3E.%3C%2FP%3E%0A%3CP%3EFor%20the%20%3CSTRONG%3Eidentity%20provider%3C%2FSTRONG%3E%2C%20select%20the%20identity%20provider%20added%20to%20B2C%20from%20step%206.%3C%2FP%3E%0A%3CP%3EFor%20the%20%3CSTRONG%3Ereturn%20claims%3C%2FSTRONG%3E%2C%20specify%3A%3C%2FP%3E%0A%3CUL%3E%0A%3CLI%3EGiven%20Name%3C%2FLI%3E%0A%3CLI%3ESurname%3C%2FLI%3E%0A%3CLI%3EUser%E2%80%99s%20Object%20ID%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22image027.png%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F176846iB528A6CDE8CE94C8%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20title%3D%22image027.png%22%20alt%3D%22image027.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EClick%20on%20%3CSTRONG%3ECreate%3C%2FSTRONG%3E%20to%20create%20the%20user%20flow.%3C%2FP%3E%0A%3CP%3EOnce%20the%20user%20flow%20is%20created%2C%20you%20can%20select%20it%20to%20see%20its%20details.%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22image029.png%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F176847i617B9F78D9CD67AC%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20title%3D%22image029.png%22%20alt%3D%22image029.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3EIf%20you%20have%20registered%20%3CA%20href%3D%22https%3A%2F%2Fjwt.ms%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noopener%20noreferrer%20noopener%20noreferrer%22%3Ehttps%3A%2F%2Fjwt.ms%2F%3C%2FA%3E%20as%20a%20reply%20URL%20from%20step%203%2C%20you%20can%20click%20on%20the%20%3CSTRONG%3ERun%20user%20flow%3C%2FSTRONG%3E%20to%20test%20the%20flow%20right%20from%20the%20Azure%20portal.%3C%2FP%3E%0A%3CP%3EFor%20the%20%3CSTRONG%3Eapplication%3C%2FSTRONG%3E%2C%20select%20the%20name%20you%20used%20to%20register%20the%20APIM%20developer%20portal%20from%20step%203%3A%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22image031.png%22%20style%3D%22width%3A%20815px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F176848i59A2A6A6BCBD2BAD%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20title%3D%22image031.png%22%20alt%3D%22image031.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3EAt%20this%20point%2C%20when%20you%20click%20on%20Run%20user%20flow%2C%20you%20should%20be%20prompted%20by%20Okta%20to%20authenticate%20and%20if%20successful%2C%20you%E2%80%99ll%20be%20redirected%20to%20jwt.ms%20where%20you%20will%20see%20the%20information%20about%20the%20token%20issued%20by%20B2C.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CFONT%20size%3D%225%22%3E8)%3C%2Fimg%3E%20Add%20Azure%20Active%20Directory%20B2C%20as%20an%20Identity%20Provider%20in%20APIM%3C%2FFONT%3E%3C%2FP%3E%0A%3CP%3EBack%20in%20your%20APIM%20instance%2C%20select%20the%20%3CSTRONG%3EIdentities%3C%2FSTRONG%3E%20tab%20and%20then%20select%20%3CSTRONG%3EAdd%3C%2FSTRONG%3E%20to%20add%20a%20provider%3A%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22image033.png%22%20style%3D%22width%3A%20720px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F176850iBA934B4DC5C28C11%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20title%3D%22image033.png%22%20alt%3D%22image033.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3ESelect%20%3CSTRONG%3EAzure%20Active%20Directory%20B2C%3C%2FSTRONG%3E%20from%20the%20drop%20down.%3C%2FP%3E%0A%3CP%3EFor%20the%20%3CSTRONG%3EClient%20id%3C%2FSTRONG%3E%20and%20%3CSTRONG%3EClient%20secret%3C%2FSTRONG%3E%2C%20enter%20the%20values%20obtained%20from%20steps%203%20and%204%20respectively.%3C%2FP%3E%0A%3CP%3EFor%20%3CSTRONG%3ESign-in%20tenant%3C%2FSTRONG%3E%2C%20enter%20your%20AAD%20B2C%20%3CSTRONG%3Edomain%20name%3C%2FSTRONG%3E%2C%20which%20you%20can%20find%20on%20the%20AAD%20B2C%20overview%20tab%3A%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22image035.png%22%20style%3D%22width%3A%20613px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F176857iF8091244B4856449%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20title%3D%22image035.png%22%20alt%3D%22image035.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EFor%20%3CSTRONG%3EAuthority%3C%2FSTRONG%3E%2C%20set%20the%20value%20to%20%3CSTRONG%3E%3CYOUR%20b2c%3D%22%22%20tenant%3D%22%22%20name%3D%22%22%3E.b2clogin.com%3C%2FYOUR%3E%3C%2FSTRONG%3E.%3C%2FP%3E%0A%3CP%3EFor%20the%20Sign-up%20policy%2C%20Sign-in%20policy%2C%20Profile%20editing%20policy%2C%20and%20Password%20reset%20policy%2C%20enter%20the%20names%20of%20the%20B2C%20policies%20from%20B2C%20(step%207).%3C%2FP%3E%0A%3CP%3EYour%20configuration%20will%20look%20like%20this%3A%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22image037.png%22%20style%3D%22width%3A%20310px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F176858i74C8152DB6E6D9C8%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20title%3D%22image037.png%22%20alt%3D%22image037.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EClick%20%3CSTRONG%3EAdd%3C%2FSTRONG%3E%20to%20complete%20the%20configuration%20of%20the%20B2C%20identity%20provider%20in%20API%20Management.%3C%2FP%3E%0A%3CP%3EYou%20can%20also%20choose%20to%20optionally%20remove%20the%20default%20%3CSTRONG%3EUsername%20and%20password%3C%2FSTRONG%3E%20provider%20type%20which%20is%20configured%20by%20default%20with%20a%20new%20API%20Management%20instance.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CFONT%20size%3D%225%22%3E9)%20Add%20Test%20User%20to%20Okta%3C%2FFONT%3E%3C%2FP%3E%0A%3CP%3EWe%20will%20need%20a%20user%20that%20is%20not%20registered%20as%20the%20administrator%20of%20your%20APIM%20instance%20in%20order%20to%20test%20the%20sign-in%2Fsign-up%20process.%20Since%20we%E2%80%99ve%20configured%20the%20APIM%20Developer%20Portal%20to%20accept%20user%20identities%20from%20Okta%20(through%20AAD%20B2C)%2C%20we%20need%20to%20go%20back%20to%20the%20Okta%20administrative%20portal%20and%20create%20a%20user%20in%20our%20Okta%20tenant.%3C%2FP%3E%0A%3CP%3ESelect%20the%20%3CSTRONG%3EUsers%3C%2FSTRONG%3E%20tab%20and%20then%20click%20on%20%3CSTRONG%3EAdd%20Person%3C%2FSTRONG%3E.%20Fill%20out%20the%20form%20with%20an%20email%20address%20from%20an%20account%20that%20you%20have%20access%20to%20and%20be%20sure%20to%20check%20%3CSTRONG%3ESend%20user%20activation%20email%20now%3C%2FSTRONG%3E%3A%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22image039.png%22%20style%3D%22width%3A%20921px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F176859iDEF9055BF437B7F1%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20title%3D%22image039.png%22%20alt%3D%22image039.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3ECheck%20your%20email%20and%20follow%20the%20links%20to%20activate%20the%20new%20account%20and%20set%20a%20user%20password.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CFONT%20size%3D%225%22%3E10)%20Test%20Sign-In%20with%20APIM%20Developer%20Portal%3C%2FFONT%3E%3C%2FP%3E%0A%3CP%3EAt%20this%20point%2C%20we%20should%20be%20able%20to%20test%20out%20the%20sign-in%2Fsign-up%20experience%20using%20the%20APIM%20Developer%20Portal.%3C%2FP%3E%0A%3CP%3EOpen%20a%20new%20InPrivate%20or%20Incognito%20browser%20window%20and%20navigate%20to%20the%20legacy%20APIM%20Developer%20Portal%20for%20your%20APIM%20instance%20and%20select%20the%20SIGN%20IN%20link%20at%20the%20top%20right%3A%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22image041.png%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F176860iDF37C6B4E50BB1E7%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20title%3D%22image041.png%22%20alt%3D%22image041.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3EYou%20should%20be%20redirected%20to%20your%20Okta%E2%80%99s%20tenant%20sign-in%20page.%3C%2FP%3E%0A%3CP%3EEnter%20your%20Okta%20test%20user%20account%20information%20from%20step%209.%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22image043.png%22%20style%3D%22width%3A%20971px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F176861iFE536C6257430782%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20title%3D%22image043.png%22%20alt%3D%22image043.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3EOnce%20authenticated%2C%20Okta%20will%20redirect%20the%20user%20back%20to%20the%20APIM%20Developer%20Portal%20to%20complete%20the%20sign-up%20experience.%20Provide%20any%20missing%20information%20and%20click%20on%20Sign%20up%3A%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22image045.png%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F176862i75CB15C3E59A206C%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20title%3D%22image045.png%22%20alt%3D%22image045.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3EIf%20all%20goes%20well%2C%20you%20should%20be%20directed%20back%20to%20your%20profile%20page%20on%20the%20portal%3A%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22image047.png%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F176863iEB2D6E042D92AAA6%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20title%3D%22image047.png%22%20alt%3D%22image047.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3EOnce%20you%20complete%20the%20sign-up%20process%2C%20APIM%20will%20have%20a%20record%20of%20that%20user%20in%20its%20user%20database%20which%20can%20then%20be%20used%20to%20map%20to%20subscriptions%20and%20APIs.%20You%20can%20verify%20this%20by%20going%20to%20the%20%3CSTRONG%3EUsers%3C%2FSTRONG%3E%20tab%20of%20your%20APIM%20instance%3A%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22image049.png%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F176864iD4D4CF7B491A7948%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20title%3D%22image049.png%22%20alt%3D%22image049.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EAnd%20that%20is%20it!%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-TEASER%20id%3D%22lingo-teaser-1224754%22%20slang%3D%22en-US%22%3E%3CP%3EToday%20there%20are%20many%20organizations%20around%20the%20world%20that%20leverage%20the%20rich%20capabilities%20of%20the%20Microsoft%20Identity%20Platform.%20Often%20these%20organizations%20also%20need%20to%20integrate%20with%20third-party%20identity%20platforms.%26nbsp%3BIn%20this%20post%2C%20I%20will%20demonstrate%20the%20flexibility%20of%20the%20Microsoft%20Identity%20Platform%20and%20how%20it%20can%20be%20used%20to%20integrate%20a%20third-party%20identity%20provider%20(Okta)%20with%20our%20Azure%20API%20Management%20service.%3C%2FP%3E%3C%2FLINGO-TEASER%3E%3CLINGO-LABS%20id%3D%22lingo-labs-1224754%22%20slang%3D%22en-US%22%3E%3CLINGO-LABEL%3EAmericas%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3EApplication%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3EAzure%20API%20Management%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3ESecurity%3C%2FLINGO-LABEL%3E%3C%2FLINGO-LABS%3E

Today there are many organizations around the world that leverage the rich capabilities of the Microsoft Identity Platform. Often these organizations also need to integrate with third-party identity platforms. In this post, I will demonstrate the flexibility of the Microsoft Identity Platform and how it can be used to integrate a third-party identity provider (Okta) with our Azure API Management (APIM) service.

 

More specifically, this post demonstrates how to configure APIM to use Okta identities for the APIM developer portal.

 

By default, the APIM developer portal authenticates users using a username and password, acting as its own identity provider (IdP). If you need to use external IdPs, APIM provides out-of-the-box support for the following:

 

  • Azure Active Directory
  • Azure Active Directory B2C
  • Facebook
  • Google
  • Microsoft
  • Twitter

You may be thinking, “I don’t see Okta listed here. Does that mean that APIM does not support Okta?

 

The short answer is APIM supports Okta indirectly because Okta supports certain security protocols that APIM and AAD B2C also support.

 

To integrate the APIM Developer Portal with Okta, we will need to add an AAD B2C identity provider to our APIM configuration. The product team has done a pretty decent job of outlining the essential steps of configuring AAD B2C as an identity provider for APIM here. I will be extending this to include Okta.

 

It is important to note that having a good foundational understanding of security protocols such as OpenID Connect and OAuth2 is extremely helpful in navigating the complexities of security integration. There are a number of ways you can configure Okta and AAD B2C to leverage the various security flows and token types. For this article, I am going to demonstrate a basic configuration that you can extend.

 

1) Get Access to an Okta Tenant

You will need to have an Okta tenant and administrative access to configure it. If you don’t already have access to Okta, you can sign up for a free account at:  https://developer.okta.com/

 

Okta will assign a unique host name for your tenant, such as “dev-831740.okta.com” and the administration portal will have “-admin” tacked onto it. For example, the admin portal for the previous host will be “https://dev-831740-admin.okta.com”.

 

Once you have access, sign into the admin interface following the instructions sent via email.

 

2) Create an Azure AD B2C Tenant

Next, we will create an Azure AD B2C tenant. Simply follow the steps documented here.

 

3) Register the APIM Developer Portal as an Application in AAD B2C

Once we have our AAD B2C tenant, we will need to register the APIM Developer Portal as an application in B2C. The new application registration dialog should look like the following:

image001.png

The reply URLs are important as they instruct AAD B2C where to respond with the requested response type when authenticating users and exchanging security tokens. There are two specific reply URLs for APIM, with each one representing the legacy developer portal and the new developer portal:

 

https://<your APIM instance>.portal.azure-api.net/signin-aad

https:// <your APIM instance>.developer.azure-api.net/signin

 

I have added an additional reply URL (https://jwt.ms) for debugging purposes, which I will talk more about later.

 

Once registered, AAD B2C will create an Application ID for the application, otherwise known as the Client ID of the APIM Developer Portal application registered in B2C. Make a note of the value from your registration:

image003.png

 

4) Generate App Key (Client Secret)

Next, you will need to generate a Client Secret for your registered application.

Select Keys on the left, then Generate key and then Save to view the key value. Copy this value to use later:

image005.png

5) Register AAD B2C as an Application in Okta

At this point, we should have our APIM instance, our AAD B2C instance, and have registered our APIM developer portal as an application in AAD B2C. Now we need to register AAD B2C as an application in Okta.

Navigate to the Okta Developer Console and select the Applications tab. Click on Add Application:

image007.png

Select Web as the platform option.

Next you should see a few fields for application settings:

image009.png

Enter a value for the name that signifies this is for your AAD B2C.

For Grant type allowed, select all options for now.

Finally, add a Login redirect URI so that Okta knows where to send its responses to, which in this case, will be AAD B2C:

 

https://<your B2C tenant>.b2clogin.com/mcpcsab2c.onmicrosoft.com/oauth2/authresp

 

Just like before, you can also add https://jwt.ms to make it easier to debug.

Click Done to save the configuration.

At this point, your application should be listed under the Applications tab in the Okta admin interface. Select the B2C application and then go to the General tab. Scroll to the bottom to get to the Client Credentials section:

image011.png

You will need the Client ID and Client secret values, so copy those for later.

You will also need the metadata URL from your Okta Authorization Server. To find this, click on API tab at the top, followed by Authorization Servers:

image013.png

Click on the default Authorization Server to bring up the details.

Under the settings tab, you should see a Metadata URI:

image015.png

To use this with AAD B2C, we need to change this to its OpenID Connect equivalent. Replace the “oauth-authorization-server” with “openid-configuration” like so:

 

https://<your okta tenant>.okta.com/oauth2/default/.well-known/openid-configuration

 

You can test the metadata URI by pasting it in a browser:

image017.png

Save the Okta metadata URL for later.

Before continuing, you should have the following information from earlier in this step:

  • Metadata URL
  • Client ID
  • Client secret

 

6) Add a New OpenID Connect provider in AAD B2C

Since we are going to be authenticating users to the APIM Developer Portal using AAD B2C, we need to tell AAD B2C that we want those identities to come from an external identity provider.

To do this, we need to go back to our AAD B2C Azure blade and select the Identity providers tab. Next, click on the New OpenID Connect provider button at the top:

image019.png

For the Metadata URL, Client ID, and Client secret, enter the values obtained from step 5 earlier.

For Scope, enter openid profile email.

For Response type, change the value to id_token.

For User ID, enter sub.

For Display name, enter name.

For Given name, enter given_name.

For Surname, enter family_name.

For Email, enter email.

Click on Save.

You should see a new OpenID Connect identity provider listed now in the identity providers tab of your AAD B2C tenant. Your configuration will look like this:

image021.png

 

7) Add a Sign-In and Sign-Up AAD B2C Policy

While still on the AAD B2C blade, select the User flows tab under Policies and then select New user flow:

image023.png

Select the Sign up and sign in policy:

image025.png

For the name of the user flow, enter UF_SignUpOrSignIn.

For the identity provider, select the identity provider added to B2C from step 6.

For the return claims, specify:

  • Given Name
  • Surname
  • User’s Object ID

image027.png

 

Click on Create to create the user flow.

Once the user flow is created, you can select it to see its details.

image029.png

If you have registered https://jwt.ms/ as a reply URL from step 3, you can click on the Run user flow to test the flow right from the Azure portal.

For the application, select the name you used to register the APIM developer portal from step 3:

image031.png

At this point, when you click on Run user flow, you should be prompted by Okta to authenticate and if successful, you’ll be redirected to jwt.ms where you will see the information about the token issued by B2C.

 

8) Add Azure Active Directory B2C as an Identity Provider in APIM

Back in your APIM instance, select the Identities tab and then select Add to add a provider:

image033.png

 

Select Azure Active Directory B2C from the drop down.

For the Client id and Client secret, enter the values obtained from steps 3 and 4 respectively.

For Sign-in tenant, enter your AAD B2C domain name, which you can find on the AAD B2C overview tab:

image035.png

 

For Authority, set the value to <your b2c tenant name>.b2clogin.com.

For the Sign-up policy, Sign-in policy, Profile editing policy, and Password reset policy, enter the names of the B2C policies from B2C (step 7).

Your configuration will look like this:

image037.png

 

Click Add to complete the configuration of the B2C identity provider in API Management.

You can also choose to optionally remove the default Username and password provider type which is configured by default with a new API Management instance.

 

9) Add Test User to Okta

We will need a user that is not registered as the administrator of your APIM instance in order to test the sign-in/sign-up process. Since we’ve configured the APIM Developer Portal to accept user identities from Okta (through AAD B2C), we need to go back to the Okta administrative portal and create a user in our Okta tenant.

Select the Users tab and then click on Add Person. Fill out the form with an email address from an account that you have access to and be sure to check Send user activation email now:

image039.png

Check your email and follow the links to activate the new account and set a user password.

 

10) Test Sign-In with APIM Developer Portal

At this point, we should be able to test out the sign-in/sign-up experience using the APIM Developer Portal.

Open a new InPrivate or Incognito browser window and navigate to the legacy APIM Developer Portal for your APIM instance and select the SIGN IN link at the top right:

image041.png

You should be redirected to your Okta’s tenant sign-in page.

Enter your Okta test user account information from step 9.

image043.png

Once authenticated, Okta will redirect the user back to the APIM Developer Portal to complete the sign-up experience. Provide any missing information and click on Sign up:

image045.png

If all goes well, you should be directed back to your profile page on the portal:

image047.png

Once you complete the sign-up process, APIM will have a record of that user in its user database which can then be used to map to subscriptions and APIs. You can verify this by going to the Users tab of your APIM instance:

image049.png

 

And that is it!