向 Azure Active Directory B2C 租户添加标识提供者Add an identity provider to your Azure Active Directory B2C tenant

可以配置 Azure AD B2C,以允许用户使用外部社交或企业标识提供者 (IdP) 提供的凭据登录到你的应用程序。You can configure Azure AD B2C to allow users to sign in to your application with credentials from external social or enterprise identity providers (IdP). Azure AD B2C 支持外部标识提供者(如 qq、wechat、weibo)和任何支持 OAuth 1.0、OAuth 2.0、OpenID Connect 和 SAML 协议的标识提供者。Azure AD B2C supports external identity providers like qq, wechat, weibo, and any identity provider that supports OAuth 1.0, OAuth 2.0, OpenID Connect, and SAML protocols.

使用外部标识提供者联合,可让使用者通过其现有的社交帐户或企业帐户登录,而不必仅仅出于访问你的应用程序的目的创建一个新帐户。With external identity provider federation, you can offer your consumers the ability to sign in with their existing social or enterprise accounts, without having to create a new account just for your application.

在注册或登录页上,Azure AD B2C 会提供外部标识提供者的列表,供用户选择用来登录。On the sign-up or sign-in page, Azure AD B2C presents a list of external identity providers the user can choose for sign-in. 用户选择一个外部标识提供者后,将会转到(重定向到)所选提供者的网站,以完成登录过程。Once they select one of the external identity providers, they're taken (redirected) to the selected provider's website to complete the sign in process. 用户成功登录后,将返回到 Azure AD B2C,以便对应用程序中的帐户进行身份验证。After the user successfully signs in, they're returned to Azure AD B2C for authentication of the account in your application.

可使用 Azure 门户向用户流添加 Azure Active Directory B2C (Azure AD B2C) 支持的标识提供程序。You can add identity providers that are supported by Azure Active Directory B2C (Azure AD B2C) to your user flows using the Azure portal. 还可以将标识提供者添加到自定义策略You can also add identity providers to your custom policies.

添加标识提供程序Select an identity provider

通常在应用程序中只使用一个标识提供程序,但可以视需要添加更多标识提供程序。You typically use only one identity provider in your applications, but you have the option to add more. 以下操作指南文章介绍了如何创建标识提供者应用程序、如何将标识提供者添加到租户,以及如何将标识提供者添加到用户流或自定义策略中。The how-to articles below show you how to create the identity provider application, add the identity provider to your tenant, and add the identity provider to your user flow or custom policy.