Create a federated user

Overview

When using Entra External ID with European eID solutions, the Entra user account must be configured as a federated identity. Accounts can either be created dynamically during the sign-in (Sign Up) flow or provisioned in advance using the Microsoft Graph API.

To pre-create accounts, use the provided script below together with the Graph API Explorer, authenticated against your tenant or using together with Fortified ID valves.

Link to Graph API explorer: https://developer.microsoft.com/en-us/graph/graph-explorer

Create a federated user

{
  "accountEnabled": true,
  "displayName": "John Doe",
  "givenName": "John",
  "surname": "John Doe",
  "mail": "[email protected]",
  "userPrincipalName": "john.doe@Company_Name_External.onmicrosoft.com",
  "userType": "Member",
  "employeeId": "198103073576",
  "identities": [
    {
      "signInType": "federated",
      "issuer": "https://dev.issuer_name.local/oidc/oidc_op_name<tenant_id_guid>",
      "issuerAssignedId": "[email protected]"
    }
  ]
}

Some notes about the configuration above

  • mail and issuerAssignedId links the external user with the Entra account.

  • issuer is the issuer address for your Fortified ID Access OIDC OP name with the GUID of your tenant in the end. Replace dev.issuer_name.local and oidc/oidc_op_name and tenant_id_guid with values from your environment.

  • userPrincipalName is the unique id the user will have

  • userType can be Member or Guest

Replace the values for client_id and tenant_id with the values previously copied.

Use Entra ID in Fortified ID products

The common configuration is now ready to be used by the components in your use case.

Valves: https://docs.fortifiedid.se/pipes/valves/entraid

Controls: https://docs.fortifiedid.se/forms/the-service/key-components/control/advanced-controls

Last updated