I have my Azure AD B2C tenant, where I have an application that is connected with my AD using OpenIdConnect.
I've been reading the MS documentation on how to add one IDP that can communicate with my Azure AD B2C tenant trough SAML, for that I've been using Okta for testing so
- A user can login into its okta account
- Using okta's dashboard user can click on my application (the one setup in my Azure tenant)
but internally what I need to happen is:
- Okta sends a SAML package to my Azure AD B2C tenant (SAML Idp inititated)
- My Azure AD B2C can read the content and gets the user identifier (email)
- Email gotten from the SAML package is read by my Azure AD B2C and checks if that exists already in my users already registered, if so, then user is authorized to login
- After Azure AD B2C confirms users is good to continue, then it redirects the user to my application using OpenIdConnect (this integration I'd say is already in place)
But there is where I'm having some difficulties trying to add okta as an IdentityProvider within my Azure AD B2C, as source of truth, I did tried using the direct federation, it didn't work, so continued trying to accomplish it using custom policies but I can't still get my mind around how it works. Found this repo with samples, while in my research found this link where basically mentions like I cannot do that:
I'm very very new with this, so trying to get any kind of assistance. Any ideas if that's possible or how can I integrate it using SAML? The samples found are mainly using OpenIdConnect and most of them if the user does not exists then it signs them up, and that's not what I want either. Any help?