Microsoft Entra ID for customers offers solutions that let you quickly add intuitive, user-friendly sign-up and sign-up experiences for your customer apps. The Woodgrove Groceries demo environment illustrates several of the most common authentication experiences that can be configured for your customer-facing apps. This example illustrates the most common use case, including the following features:
Self-service password reset (SSPR) gives users the ability to change or reset their
password, with no administrator or help desk involvement. If a user's account is locked
or they forget their password, they can follow prompts to unblock themselves and get
back to work.
Before you start, make sure you've run one of the sign-up use cases to create an account
with Woodgrove Groceries.
Users can sign in with their existing social accounts, without having to create a new account.
Email with one-time passcode is an option in your local account identity provider settings. With this option, the customer signs in with a temporary passcode instead of a stored password each time they sign in.
Multifactor authentication (MFA) adds a layer of security to your customer-facing
applications.
With MFA, customers are prompted for a one-time passcode in addition to their username
and password when they sign up or sign in to your app.
This demo shows to enforce MFA for your customers to the sign-up and sign-in using email
and password.
After you successfully authenticated, complete the MFA step.
When users authenticate to your application with Microsoft Entra ID for customers, a security
token is return to your application. The security token contains claims that are
statements about the user, such as name, unique identifier, or application roles.
Beyond the default set of claims that are contained in the security token you can define
your own custom claims from external systems using a REST API you develop.
Custom authentication extensions (OnAttributeCollectionSubmit event) allow you to perform validation on attributes collected from the user during sign-up, along with showing the user a blocked or validation error page if needed.
Role-based access control is a popular mechanism to enforce authorization in
applications. It helps you manage who has access to your application and what they can
do in the application.
When an organization uses role-based access control, an application developer defines
the roles in the application. An administrator can then assign these roles to different
users, which controls
who has access to the application and what they can do with it.
Microsoft Entra ID for customers issues an access token for an authenticated user,
which includes the names of the roles they have assigned to the application. Developers
have the flexibility to decide how role assignments are to be used within the
application. For example, show or hide some of the elements on the screen, or block
access to certain functionalities based on the user’s role or security groups.
Usually, an administrator needs to approve your request. But for this demo, your request
is automatically approved. To start the demo:
User attributes are values collected from the user during self-service sign-up. In the user flow settings, you can select from a set of built-in user attributes you want to collect from customers. The customer enters the information on the sign-up page, and it's stored with their profile in your directory. If you want to collect information beyond the built-in attributes, you can create custom user attributes and add them to your sign-up user flow. This demo shows the use of built-in attribute and custom attribute called special diet. To start the demo:
Input-constrained devices are devices that their screen or monitor is limited to
text-only and they don't have a web browser. For example, smart TV, IoT device, robot,
gaming console, printers. Or applications with limited user interface, such as a command
line application.
These devices are connected to the internet, but due to the input constrains, the
authentication should be done on another device. The input constrained device gets a
device code from Microsoft Entra ID for customers and asks the user to visit a webpage in a browser on a second
(rich device), such as smartphone, tablets, or PCs.
In this use case, from the Kiosk page select sign-in. Use the second device, such as
smartphone and scan the QR code. On the sign-in page enters the device code, and
completes the sign-in. Once you signed in, the Kiosk (input-constrained device) is able
to get security tokens and authenticate you. Your name should be presented on the
top-right corner of the page.
The Woodgrove Bank demo application illustrates the sign-up and sign-in authentication experiences for financial scenarios. It also demonstrates the SAML protocol federation with Microsoft Entra External ID for customers.
Start the use caseProfile editing policy lets you manage you profile attributes, like display name, su r name, given name, city, and others. After you update your profile, sign-out and sign-in again.
Edit your accountIf you would like to delete your account and personal information, visit the delete my account page. You won't be able to reactivate your account. In a couple of minutes you will be able to sign-up again with the same credentials.
Delete your account