Microsoft Security | Microsoft Entra | Microsoft Entra External ID
Managing external identities to enable secure access for partners, customers, and other non-employees
This browser is no longer supported.
Upgrade to Microsoft Edge to take advantage of the latest features, security updates, and technical support.
I’m integrating Entra External ID (CIAM) with an external OIDC identity provider (Azure AD B2C). I’m creating users in the EEID tenant using Microsoft Graph, and giving them both local and federated identities with Password profile
Here’s the identity fetched after creating:
"identities": [
{
"signInType": "federated",
"issuer": "https://demodigitalb2c.b2clogin.com/*******-7659-4181-8671-7e4c934bfdcf/v2.0/</*******--a3ec-4fa7-a471-d4eb8006dedb>",
"issuerAssignedId": "8180e51e-aa7b-403d-9bbc-a27b8f728562"
},
{
"signInType": "emailAddress",
"issuer": "demodigitalciamuat.onmicrosoft.com",
"issuerAssignedId": "******@email.ghostinspector.com"
},
{
"signInType": "userPrincipalName",
"issuer": "demodigitalciamuat.onmicrosoft.com",
"issuerAssignedId": "******@demodigitalciamuat.onmicrosoft.com"
}
],
The Issues faced are
Can you please help on this.