Home > Get Started > Enable Backup for Azure AD B2C

Export to PDF

Enable Backup for Azure AD B2C

To back up Azure AD B2C data, you can choose to create a service app, or use a custom Azure app with required permissions. For details on creating a custom Azure app in your tenant, refer to .

Complete the steps below:

  1. Before you enable the backup service for Azure AD B2C, go to AvePoint Online Services to configure a service app profile for that Microsoft 365 tenant. For detailed instructions on creating a service app profile, refer to .

    *Note: The user creating the service app profile and granting consent must be a member of your tenant's domain, instead of an external user.

  2. After the service app is ready, go to the Backup page of the Cloud Backup for IaaS + PaaS to configure the backup scope for the Azure AD B2C. Note that if you have multiple tenants to protect, you must create a service app for each of them.

  3. For details on configuring the backup scope, refer to Create a New Backup Scope for Azure AD B2C .

  4. For details on the support list, refer to Azure AD B2C .

To use Azure AD B2C backup and restore services, create a service app to connect to your tenant and grant the requested permissions for this app.

*Note: The user creating the service app profile and granting consent must be a member of your tenant's domain, instead of an external user.

Follow the steps below to create the service app:

  1. On the Management > App management page, click Create on the action bar.

  2. In the Select services step, select Cloud Backup for IaaS + PaaS.

  3. In the Choose setup method step, select Modern mode and click Next.

  4. In the Consent to apps step, click Consent next to the Cloud Backup for Azure AD B2C.

  5. On the Microsoft 365 sign-in page, sign in with a Microsoft 365 Global Administrator account.

  6. On the Permissions required page, review the permissions required and click Accept to continue. For the API permissions that this app requests, refer to Default Permissions Granted to the Service App.

  7. The app profile you created will be displayed on the App management page, and the Cloud Backup for Azure AD B2C app will be added to your Microsoft Entra admin center > enterprise applications.

Default Permissions Granted to the Service App

If you want to protect Azure AD B2C data, you can choose to create a Cloud Backup for Azure AD B2C service app profile or create a custom Azure app profile with delegated permissions through AvePoint Online Services > Management > App management page.

  1. The following API permissions will be automatically added to the service app with consent from your Global administrator account. You can also choose the specific permissions to grant your custom Azure app for the services or data types that you want to protect upon the usage purpose.
APIPermissionsTypeWhy You NeedPermission CategoryAlternative Permission for backup only
Microsoft GraphAppRoleAssignment.ReadWrite.All(Manage app permission grants and app role assignments)ApplicationAllows the app to manage permission grants for application permissions to any API (including Microsoft Graph) and application assignments for any app, without a signed-in user.Azure AD B2C > backup and restore user > app role assignmentDirectory.Read.All
Microsoft GraphApplication.ReadWrite.All(Read and write all applications)ApplicationAllows the app to create, read, update and delete applications and service principals without a signed-in user. Does not allow management of consent grants.Azure AD B2C > backup and restore app registrationApplication.Read.All
Microsoft GraphAuditLog.Read.All(Read all audit log data)ApplicationAllows the app to read and query your audit log activities, without a signed-in user.Azure AD B2C > backup and restore userflow and userattributeAzure AD B2C > backup and restore identity providerAzure AD B2C > backup and restore app registration
Microsoft GraphDirectory.Read.All(Read directory data)ApplicationAllows the app to read data in your organization's directory, such as users, groups and apps, without a signed-in user.Azure AD B2C > create planAzure AD B2C > backup and restore userflow and userattributeAzure AD B2C > backup and restore identity providerAzure AD B2C > backup and restore app registration
Microsoft GraphGroupMember.ReadWrite.All(Read and write all group memberships)ApplicationAllows the app to list groups, read basic properties, read and update the membership of the groups this app has access to without a signed-in user. Group properties and owners cannot be updated and groups cannot be deleted.Azure AD B2C > backup and restore user > member of groupUser.Read.All
Microsoft GraphIdentityProvider.ReadWrite.All(Read and write identity providers)ApplicationAllows the app to read and write your organization's identity (authentication) providers' properties without a signed in user.Azure AD B2C > backup and restore identity providerIdentityProvider.Read.All
Microsoft GraphIdentityUserFlow.ReadWrite.All(Read and write all identity user flows)ApplicationAllows the app to read or write your organization's user flows, without a signed-in user.Azure AD B2C > backup and restore userflow and userattributeIdentityUserFlow.Read.All
Microsoft GraphRoleManagement.ReadWrite.Directory(Read and write all directory RBAC settings)ApplicationAllows the app to read and manage the role-based access control (RBAC) settings for your company's directory, without a signed-in user. This includes instantiating directory roles and managing directory role membership, and reading directory role templates, directory roles and memberships.Azure AD B2C > backup and restore user > unified role assignmentRoleManagement.Read.Directory
Microsoft GraphUserAuthenticationMethod.ReadWrite.All(Read and write all users' authentication methods)ApplicationAllows the application to read and write authentication methods of all users in your organization, without a signed-in user. Authentication methods include things like a user's phone numbers and Authenticator app settings. This does not allow the app to see secret information like passwords, or to sign-in or otherwise use the authentication methods.Azure AD B2C > backup and restore user > authentication userUser.Read.All
Microsoft GraphUser.EnableDisableAccount.All(Enable and disable user accounts)ApplicationAllows the app to enable and disable users' accounts, without a signed-in user.Azure AD B2C > backup and restore user > accountEnabledUser.Read.All
Microsoft GraphUser.ManageIdentities.All(Manage all users' identities)ApplicationAllows the app to read, update and delete identities that are associated with a user's account, without a signed in user. This controls the identities users can sign-in with.Azure AD B2C > backup and restore user > identitiesUser.Read.All
Microsoft GraphUser.ReadWrite.All(Read and write all users' full profiles)ApplicationAllows the app to read and update user profiles without a signed in user.Azure AD B2C > backup and restore userUser.Read.All
Microsoft GraphUser-Mail.ReadWrite.All(Read and write all secondary mail addresses for users)ApplicationAllows the app to read and write secondary mail addresses for all users, without a signed-in user.Azure AD B2C > backup and restore user > otherMailsUser.Read.All
Microsoft GraphUser-Phone.ReadWrite.All(Read and write all user mobile phone and business phones)ApplicationAllows the app to read and write the mobile phone and business phones for all users, without a signed-in user.Azure AD B2C > backup and restore user > businessPhones/mobilePhoneUser.Read.All