Tutorial for configuring Saviynt with Azure Active Directory B2C
In this sample tutorial, we provide guidance on how to integrate Azure Active Directory (AD) B2C with Saviynt. Saviynt’s Security Manager platform provides the visibility, security, and governance today’s businesses need, in a single unified platform. Saviynt incorporates application risk and governance, infrastructure management, privileged account management, and customer risk analysis.
In this sample tutorial, you'll set up Saviynt to provide fine grained access control based delegated administration for Azure AD B2C users. Saviynt does the following checks to determine if a user is authorized to manage Azure AD B2C users.
Feature level security to determine if a user can perform a specific operation. For example, Create user, Update user, Reset user password, and so on.
Field level security to determine if a user can read/write a specific attribute of another user during user management operations. For example, help desk agent can only update phone number and all other attributes are read-only.
Data level security to determine if a user can perform a certain operation on a specific user. For example, help desk administrator for UK region can manage UK users only.
To get started, you'll need:
An Azure AD subscription. If you don't have a subscription, you can get a free account.
An Azure AD B2C tenant. Tenant is linked to your Azure subscription.
A Saviynt subscription
The Saviynt integration includes the following components:
Azure AD B2C – The business-to-customer identity as a service that enables custom control of how your customers sign up, sign in, and manage their profiles.
Saviynt – The identity governance platform that provides fine grained delegated administration for user life-cycle management and access governance of Azure AD B2C users.
Microsoft Graph API – This API provides the interfaces for Saviynt to manage the Azure AD B2C users and their access in Azure AD B2C.
The following architecture diagram shows the implementation.
|1.||A delegated administrator starts a manage Azure AD B2C user operation through Saviynt.|
|2.||Saviynt verifies with its authorization engine if the delegated administrator can do the specific operation.|
|3.||Saviynt’s authorization engine sends an authorization success/failure response.|
|4.||Saviynt allows the delegated administrator to do the required operation.|
|5.||Saviynt invokes Microsoft Graph API along with user attributes to manage the user in Azure AD B2C|
|6.||Microsoft Graph API will in turn create/update/delete the user in Azure AD B2C.|
|7.||Azure AD B2C will send a success/failure response.|
|8.||Microsoft Graph API will then return the response to Saviynt.|
Onboard with Saviynt
To create a Saviynt account, contact Saviynt
Create delegated administration policies and assign users as delegated administrators with various roles.
Configure Azure AD B2C with Saviynt
Create an Azure AD Application for Saviynt
Sign in to the Azure portal.
Make sure you're using the directory that contains your Azure AD B2C tenant. Select the Directories + subscriptions icon in the portal toolbar.
On the Portal settings | Directories + subscriptions page, find your Azure AD B2C directory in the Directory name list, and then select Switch.
In the Azure portal, search and select Azure AD B2C.
Select App registrations > New registration.
Enter a Name for the application. For example, Saviynt and select Create.
Go to API Permissions and select + Add a permission.
The Request API permissions page appears. Select Microsoft APIs tab and select Microsoft Graph as commonly used Microsoft APIs.
Go to the next page, and select Application permissions.
Select Directory, and select Directory.Read.All and Directory.ReadWrite.All checkboxes.
Select Add Permissions. Review the permissions added.
Select Grant admin consent for Default Directory > Save.
Go to Certificates and Secrets and select + Add Client Secret. Enter the client secret description, select the expiry option, and select Add.
The Secret key is generated and displayed in the Client secret section. You'll need to use it later.
Go to Overview and get the Client ID and Tenant ID.
Tenant ID, client ID, and client secret will be needed to complete the setup in Saviynt.
Enable Saviynt to Delete users
The below steps explain how to enable Saviynt to perform user delete operations in Azure AD B2C.
Install the latest version of MSOnline PowerShell Module on a Windows workstation/server.
Connect to AzureAD PowerShell module and execute the following commands:
Connect-msolservice #Enter Admin credentials of the Azure portal $webApp = Get-MsolServicePrincipal –AppPrincipalId “<ClientId of Azure AD Application>” Add-MsolRoleMember -RoleName "Company Administrator" -RoleMemberType ServicePrincipal -RoleMemberObjectId $webApp.ObjectId
Test the solution
Browse to your Saviynt application tenant and test user life-cycle management and access governance use case.
For additional information, review the following articles: