Skip to main content
TrustRadius
Microsoft Entra External ID

Microsoft Entra External ID
Formerly Azure Active Directory External Identities

Overview

What is Microsoft Entra External ID?

Microsoft Entra External ID (formerly Azure Active Directory B2C, or alternately, Azure Active Directory External Identities) provides business-to-customer identity as a service. Customers can use their preferred social, enterprise, or local account identities to get single sign-on access to applications…

Read more

Learn from top reviewers

Awards

Products that are considered exceptional by their customers based on a variety of criteria win TrustRadius awards. Learn more about the types of TrustRadius awards to make the best purchase decision. More about TrustRadius Awards

Return to navigation

Pricing

View all pricing

Premium P1 (for More than 50,000 MAU)

$0.00325

Cloud
per month per active users

Premium P2 (for More than 50,000 MAU)

$0.01625

Cloud
per month per active users

Entry-level set up fee?

  • No setup fee
For the latest information on pricing, visithttps://azure.microsoft.com/en…

Offerings

  • Free Trial
  • Free/Freemium Version
  • Premium Consulting/Integration Services
Return to navigation

Product Demos

DEMO Azure Active Directory Business-to-Business | Azure Active Directory B2C

YouTube

Modern Identity Platform powered by Azure cloud (Azure AD B2C/CIAM)

YouTube

Configure authentication in Angular and WEB API by using Azure Active Directory B2C | Demo | LSC

YouTube
Return to navigation

Product Details

What is Microsoft Entra External ID?

Microsoft Entra External ID is a customer identity access management (CIAM) solution
The solution is capable of supporting millions of users and billions of authentications per day. It takes care of the scaling and safety of the authentication platform, monitoring, and automatically handling threats like denial-of-service, password spray, or brute force attacks.

Who uses Microsoft Entra External ID?
Any business or individual who wishes to authenticate end users to their web/mobile applications using a white-label authentication solution. Apart from authentication, the service is used for authorization such as access to API resources by authenticated users. It is meant to be used by IT administrators and developers.

Custom-branded identity solution
Microsoft Entra External ID is a white-label authentication solution. The user experience can be customized with a brand so that it blends with web and mobile applications. Pages displayed when users sign up, sign in, and modify their profile information can also be customized. Customize the HTML, CSS, and JavaScript in user journeys so that the Microsoft Entra External ID experience looks and feels like it's a native part of the application.

Single sign-on access with a user-provided identity
Microsoft Entra External ID uses standards-based authentication protocols including OpenID Connect, OAuth 2.0, and Security Assertion Markup Language (SAML). It integrates with most modern applications and commercial off-the-shelf software.

Integrate with external user stores
Microsoft Entra External ID provides a directory that can hold 100 custom attributes per user. However, the solution can be integrated with external systems. For example, it can be used for authentication, but delegate to an external customer relationship management (CRM) or customer loyalty database as the source of truth for customer data.

Another external user store scenario is to have Microsoft Entra External ID handle the authentication for an application, but integrate with an external system that stores user profile or personal data. For example, to satisfy data residency requirements like regional or on-premises data storage policies. However, the Microsoft Entra External ID service itself is worldwide via the Azure public cloud.

Progressive profiling
Another user journey option includes progressive profiling. Progressive profiling allows customers to coomplete their first transaction by collecting a minimal amount of information. Then, gradually collect more profile data from the customer on future sign-ins.

Third-party identity verification and proofing
Microsoft Entra External ID can be used to facilitate identity verification and proofing by collecting user data, then passing it to a third-party system to perform validation, trust scoring, and approval for user account creation.

Microsoft Entra External ID Technical Details

Deployment TypesSoftware as a Service (SaaS), Cloud, or Web-Based
Operating SystemsUnspecified
Mobile ApplicationNo
Return to navigation

Comparisons

View all alternatives
Return to navigation

Reviews From Top Reviewers

(1-5 of 6)

Azure Active Directory B2C Review

Rating: 9 out of 10
September 14, 2023
Vetted Review
Verified User
Microsoft Entra External ID
1 year of experience
Azure Active Directory B2C helps provide seamless access to all the services and apps to the people either working on-site or working remotely and helps them stay productive. With the graphical overview of monthly activity, the Azure Active Directory B2C also makes it simple to manage all sign-ins. It is very reliable and secure.
  • Simple to use
  • Secure
  • Manage sign-ins
Cons
  • Customization
Good for managing all your sign-ins and helps provide secure access from anywhere.

Great cloud solution for companies already using other MS Azure services.

Rating: 8 out of 10
January 25, 2023
Vetted Review
Verified User
Microsoft Entra External ID
1 year of experience
We use Azure AD B2C solution for one of our clients who need to authenticate end users to their mobile application and support their backbone as IT admins. It helped us to address and facilitate identity verification by gathering user data. Moreover, the progressive profiling feature helped their customers to complete their first transaction quickly and efficiently.
  • Single sign-on access with a user-provided identity.
  • Progressive profiling.
  • Authenticate individual customers.
Cons
  • Confusing pricing.
  • Complexity.
  • Interface
The cloud-based aspect is well suited for our client as they also switched to MS365 and Azure platforms from the On-site infrastructure of their IT. For companies that are still using on-premise IT infrastructure, it may not be the best solution due to the complexity of the user interface, and the learning curve can be challenging for this type of client.

Cloud based - Business to Consumer

Rating: 8 out of 10
September 14, 2022
CR
Vetted Review
Verified User
Microsoft Entra External ID
5 years of experience
Azure Active Directory B2C allows users to sign into parts of our systems using multifactor authentication while still accessing the parts that do not need the added protection. The predefined user flows help create user experiences and access quickly, while the custom policies are for a more robust scenario. Both are unique and tailored to our needs.
  • User flows
  • MFA
  • User interface
Cons
  • Custom policies options
  • integrating
Azure Active Directory B2C is well suited for businesses that require different levels of protection. You can use Azure Active Directory B2C for both signings into an application and added security once signed in. You can edit profiles, set up workflows, customize group policies, as well as provides several different verification methods such as email, phone call, SMS, or authenticator app.

Awesome product, lousy marketing -- it's Azure's best-kept secret!

Rating: 10 out of 10
February 25, 2022
Azure Active Directory B2C is our go-to platform for customer identity and access management (CIAM) needs, both for our internally-developed applications and products as well as for our clients' customer-facing applications. Despite the name, Azure Active Directory B2C excels at both business-to-consumer and business-to-business ("B2B") functionality; I often explain to people that "B2C" should be read as "business-to-customer." We have used Azure Active Directory B2C for everything from prototype apps and small business scenarios to very large enterprises with millions of user accounts.
  • Customer identity
  • User experience customization
  • Integration and configuration
  • Security
  • Availability/reliability
Cons
  • Troubleshooting diagnostic logs effectively requires VS Code
  • Group and role management requires additional effort
  • The programming model (XML) could use some developer experience love
Azure Active Directory B2C is sufficiently flexible and configurable that it can work in just about any customer identity and access management (CIAM) scenario. Its pricing model also scales well for both small businesses (for whom it's almost always free) and very large enterprises (who can optimize the cost of multifactor authentication at scale by using the Premium P2 SKU). Azure Active Directory B2C is particularly useful in scenarios where you want to integrate multitenant (corporate) Azure AD apps, for single sign-on from your AAD customers, with other accounts for your non-AAD customers.

The only technical limitation we've encountered over the years is that, natively, Azure Active Directory B2C does not support device "fingerprinting"; however, this functionality can be added (if needed) through Microsoft's Fraud Prevention service or other third-party solutions.

Scalable and easy to implement solution with great visibility

Rating: 7 out of 10
October 04, 2022
Vetted Review
Verified User
Microsoft Entra External ID
2 years of experience
We use the Azure Active Directory B2C service to authorize access to our own custom web applications via API access. It is mainly used for authentication, control and monitoring of external users such as developers, and also for security reasons to defend against, for example, Denial of service, password hashing or brute force attacks.
  • authentication
  • authorization
  • monitoring access
Cons
  • Azure AD Application Proxy
  • inability to nest groups
  • no customized emails
It is not easy to calculate the actual ROI due to the difficult quantification of all factors, but it certainly contributed a lot in protecting, monitoring and controlling access to our system. It also made it much easier to detect vulnerable external users with simple and "easy to hack" passwords they use on multiple apps.
Return to navigation