This repository contains examples of how to integrate Okta as an external idenity provider with Azure B2C using custom policies
SignUpSignInOkta Policy
Allows the user to sign in using any of the following:
- Local Account
- Okta
- Microsoft Live Account
After first sign-in, the user may enter their name information
SignUpSignInOktaDefault Policy
Only allows sign in using Okta. If someone is already authenticated, B2C will not prompt again
SignInLinkLocalToOkta Policy
Allows a user to sign in or create a local account and then link that to an Okta account
SignInLinkOktaToLocal Policy
Allows a user to sign in with Okta and then create a new local account to link to or link to an existing local account
Follow the external identity provider steps for a Microsoft Account found here
Instead of adding an application in Azure AD, add the application in Okta and set the following
Login redirect URI: https://{yourb2ctenantname}.b2clogin.com/{yourb2ctenantname}.onmicrosoft.com/oauth2/authresp
Okta OpenId Connect Settings in B2C Policy:
ProviderName: https://{yourOktaTenant}/oauth2/default
METADATA: https://{yourOktaTenant}/oauth2/default/.well-known/openid-configuration
Coming soon