Last Updated on October 26, 2020 by Dishan M. Francis

Facebook federation with Azure AD allows external users to use their Facebook accounts to access corporate applications. In this demo, I am going to demonstrate how we can initiate federation with Facebook.

Before start configuration, make sure you have a valid Azure AD Subscription, an Application published through Azure AD, and a Facebook account.

Enable Self-service sign-up for guest users (preview)

Before we initiate federation with Facebook, we need to enable Self-service sign-up. To do this,

1. Log on to Azure Portal as Global Administrator
2. Click on Azure Active Directory

Azure Active Directory Service

3. On the Azure AD properties page, click on User settings

Azure AD user settings

4. Then under External Users, select Manage external collaboration settings

Manage external collaboration settings for External users

5. In the External collaboration settings page, Set the Enable guest self-service sign up via user flows (Preview) option to Yes. Then to apply settings click on Save.

Enable guest self-service sign up via user flows

Add Facebook as an identity provider

Before we create user flow, we need to add Facebook as an identity provider. To do that,

1. Log in to the Facebook developers console ( with your Facebook credentials.

2. If you didn’t use this before, click on Get Started and complete the sign-up process.
3. Then click on My Apps

Facebook developers console

4. To create a new app click on Create app

Create Facebook app

5. Create an App ID popup, select Build Connected Experience and click on Continue

Create Facebook app ID options

6. In the new form, provide a display name for app ID. Then click on Create App ID to proceed.

7. After security checks, the system will create new App ID. On the Application page, click on Settings | Basic

Facebook app basic settings

8. On the new page, Change the app category to Business and pages

Facebook app category

9. Then in the bottom of the page click on + Add Platform

Add platform to app

10. In the new popup window, select Website as a platform

Website as app platform

11. Then type app Url and Privacy policy URL. At the end click on Save Changes to apply settings.

Facebook app url and privacy url settings

12. Once settings are saved, copy App ID and App Secret value as we need it in a later step.

13. Then click on Products + in the left-hand panel.

Facebook app products settings

14. On the products page, click on Setup under Facebook Login

Facebook login setup

15. Next, click on Facebook Login | Settings

Facebook login settings

16. For Valid OAuth Redirect URIs use<tenant-id>/oauth2/authresp. In here, replace <tenant-id> with your current tenant id value. Then to apply changes, click on Save Changes.

Facebook Valid OAuth Redirect URIs settings

17. Next, we need to make the application live. To do that, click on the button at top of the page and change mode from Development to Live.

Make Facebook app live


Add Facebook federation option to Azure AD portal

Now we have the Facebook app configured, the next step is to add Facebook federation option to the Azure AD portal. To do that,

1. Go to Azure AD home page
2. Then click on External Identities

Azure AD External Identities

3. Next, click on All Identity providers | + Facebook

Add Facebook as identity provider

4. In the new window, For the Client ID, enter the Facebook App ID, and for the Client secret enter the Facebook App Secret. Then click on Save to complete the registration process.

Facebook federation settings

Create new User flow

The next step of the configuration is to create new user flow and select Facebook as an identity provider. To do that,

1. Go back to the Azure AD properties page.
2. Click on External Identities

Azure AD External Identity Settings

3. Then click on User flows (Preview)

User flow settings

4. To create a new flow, click on + New user flow

Create new user flow

5. This will open up a new form. First, provide a name for user flow. Then select Facebook under Social identity providers. Under User attributes select required attributes to collect. At the end click on Create

User flow settings

6. We also need applications added to the user flow. To do that, click on User flow just created.

New user flow

7. Then click on Applications | + Add application

Add application to user flow

8. Then select the application you like to add and click on Select

Select Azure AD enterprise app

Now we have the user flow in place. The next step is to do the testing,


1. I went ahead and launch my application URL. After, I click on the Create account option.

Create new Azure AD account

2. Now in there, I can see the option to Sign in with Facebook.

Sign in with Facebook option

3. Next, I click on it, I can see the Facebook login page.

Facebook login page

4. After successful authentication, the Application asks for additional info to proceed with the sign-up process.

Additional info for facebook sign up

5. Once the sign-up process is completed, user can access the application successfully.

Note: Your custom application should have required permissions for users and self-service option enabled.

I hope now you have a better understanding of how Facebook federation works with Azure AD. If you have any further questions about this feel free to contact me at also follow me on Twitter @rebeladm to get updates about new blog posts.