Have my public-facing application deployed to Azure. Intended to delegate Authentication to Microsoft, Google, Facebook, Apple etc. So once a user is authenticated as who he claims to be and authentication/ID token returned by that provider, app takes over in authorization/permission etc. Found Microsoft does provide Federation Authentication. So I used sign-in only (assume users all have an account with the 3rd-party providers), set up, Run user flow, tested with my own already existing personal Microsoft outlook.com account not tired to any organizations, and I'm of course not a MS employee, authenticated but receiving
AADB2C99002: User does not exist. Please sign up before you can sign in.
This is how it is set up:
- Registered
Microsoft.ActiveDirectory - Add/create a
Azure AD B2C Tenantand linked it with the subscription - Search for
Azure Active Directory, register my app and configure Redirect URI according to MS' format - Switch to the directory created by step 2,
Azure AD B2C, configIdentity providersusing Client ID and Secret from 3 User flowcreate and run
I've read other threads 1, 2, 3, and Azure AD getting more confused. All I need is third-party authentication, no fancy things like application, custom policy, devices, signals etc.
If I need to invite people first, no way I'd know who will use the app. If invite is not needed, do they have to sign-up before sign-in? My guess is not, because when creating a User flow it has Sign up and sign in and Sign in
