Configure WhoIAM Rampart with Azure Active Directory B2C

In this tutorial, learn to integrate Azure Active Directory B2C (Azure AD B2C) authentication with WhoIAM Rampart. Rampart features enable an integrated helpdesk and invitation-gated user registration experience. Support specialists can reset passwords and multifactor authentication without using Azure. There are apps and role-based access control (RBAC) for Azure AD B2C users.


Scenario description

WhoIAM Rampart is built in Azure and runs in the Azure environment. The following components comprise the Rampart solution with Azure AD B2C:

  • a Microsoft Entra tenant - the Azure AD B2C tenant stores users and manages access (and scope) in Rampart

  • Custom B2C policies - to integrate with Rampart

  • A resource group - hosts Rampart functionality

    Diagram of the WhoIAM Rampart integration for Azure AD B2C.

Install Rampart

Go to Contact us to get started.

Automated templates deploy Azure resources. Templates configure the DevOps instance with code and configuration.

Configure and integrate Rampart with Azure AD B2C

The solution integration with Azure AD B2C requires custom policies. WhoIAM provides the policies and helps integrate them with applications or policies, or both.

For details about WhoIAM custom policies, go to for Set-up Guide, Authorization Policy Execution.

Test the solution

The following image is an example a list of app registrations in your Azure AD B2C tenant. WhoIAM validates the implementation by testing features and health check status endpoints.

Screenshot of the user-created application list in the Azure AD B2C tenant.

A list of user-created applications in your Azure AD B2C tenant appears. Likewise, the user sees a list of users in your Azure AD B2C directory and user management functions such as invitations, approvals, and RBAC management.

Screenshot of the WhoIAM Rampart user list in the Azure AD B2C tenant.

Next steps