Skip to main content

LoginRadius as IDP in Azure AD B2C using OIDC

This guide walks you through integrating LoginRadius as an OpenID Connect (OIDC) Identity Provider within your Azure AD B2C tenant. By completing this configuration, Azure AD B2C can delegate authentication to LoginRadius, allowing your users to log in using credentials and identity profiles managed by the LoginRadius Identity Platform. This is especially useful if LoginRadius is your centralized identity hub and you want to leverage its advanced authentication features—such as social login, multi-factor authentication, or custom workflows—within applications protected by Azure AD B2C.

This integration supports OIDC-compliant authentication and enables seamless Single Sign-On (SSO) across multiple apps registered with Azure AD B2C while using LoginRadius as the identity source.

Prerequisites

Before proceeding, ensure you have the following components ready:

  • In LoginRadius:

    • LoginRadius Console Access: You need access to the LoginRadius Console with permissions to create and configure applications.

    • OIDC App Configuration in LoginRadius: An OpenID Connect (OIDC) app should be configured within LoginRadius. This app will provide the metadata endpoint, client ID, and client secret required by Azure AD B2C.

    • Whitelisted Redirect URLs: Ensure that Azure AD B2C callback URLs (such as https://jwt.ms) are added to the allowed redirect URLs in your LoginRadius OIDC app configuration.

  • In Azure AD B2C:

    • Azure AD B2C Tenant: An active Azure AD B2C tenant with administrative access. You can create one from the Azure portal.

    • Registered Application in Azure AD B2C: You need a web application registered under your B2C directory to test user flows and capture tokens post-login.

    • User Flows or Custom Policies:

      • Have at least one User Flow (e.g., Sign up and sign in, Profile editing, Password reset) configured. Alternatively, you may use Custom Policies if your use case is more advanced.

If these elements are not yet in place, refer to Microsoft’s documentation:

Configuration

This section guides you through setting up LoginRadius as an OpenID Connect (OIDC) Identity Provider within Azure AD B2C. You'll first create an OIDC app in LoginRadius, then use the generated metadata URL to configure Azure AD B2C for federated login.

  1. Log in to the LoginRadius Console.
  2. Navigate to Applications > Apps and click Add App.
  3. Choose OIDC as the app type.
  4. Fill out the required fields:
    • App Name: Name the app as desired.
    • Secret Key: Choose a secret key; this will be used in Azure AD B2C configuration.
  5. Under the Federated SSO > OIDC Connect section, note the metadata URL format: https://cloud-api.loginradius.com/sso/oidc/v2/<site-name>/<oidc-app-name>/.well-known/openid-configuration

Replace <site-name> with your LoginRadius app name and <oidc-app-name> with the name assigned to the OIDC configuration.

  1. Complete any required field mappings and click Save.
  1. In the Azure AD B2C portal, go to User Flows.
  2. Select the user flow where you want to enable the LoginRadius IDP.
  3. Under Identity Providers, select the provider you just created (e.g., LoginRadius).
  4. Click Save.

Test the Integration

To test the flow:

  1. Navigate to User Flows in Azure AD B2C and select your configured flow.
  2. Click Run user flow.
  3. Choose the application you registered earlier in Azure.
  4. Confirm the reply URL (https://jwt.ms) is whitelisted in your LoginRadius Console.
  5. On the login screen, select the LoginRadius identity provider.
  6. Complete the authentication process. You will be redirected to https://jwt.ms with the received token.

Next Steps

  • Customize the mapping of attributes within Azure and LoginRadius as needed.
  • Use the issued token to access authorized applications or APIs.