Introduction to Azure AD B2C for IT Pros

Published Aug 10 2021 03:26 AM 4,183 Views
Microsoft

Though Microsoft’s Azure Active Directory is the underlying identity platform for Azure resources and Microsoft 365 applications, there are two other identity capabilities with specific functions – Azure AD B2B and Azure AD B2C.

 

Azure AD B2B lets you allow external users access to your Azure resources and applications by trusting their credentials that have been verified by their own identity provider (including other Azure AD tenants).

 

Azure AD B2C provides developers with an identity platform separate to your Azure Active Directory tenant, which they can customise to suit the sign-up process and user profile requirements of their application. If your developers are building applications or websites which require consumers or customers to sign in, Azure AD B2C gives them a full-featured Customer Identity and Access Management system, including the ability to custom brand the user experience. So, what do IT Pros need to know about the impact of Azure AD B2C on user identity management and security?

 

1. Azure AD B2C is a separate tenant

You’ll need to log into Azure with an account that has Contributor access to an existing Subscription, but then the process of provisioning Azure AD B2C creates a new tenant and associated directory. You’ll be able to switch to this using the Directories + Subscriptions filter in the Azure portal, but this keeps all of the B2C Users isolated from any user accounts you’re already managing for your organization in Azure Active Directory. You will then register you applications to be able to use this directory.

 

Azure AD B2C in the Azure PortalAzure AD B2C in the Azure Portal

For more information, see Technical and feature overview – Azure AD B2C tenant

2. Azure AD B2C supports social identities and other Identity providers

If you have ever signed up to use a website, you might have entered and verified your email address to create an account, or you may have be asked if you’d like to use an existing social identity account to log in with, like Facebook, Google, or a consumer Microsoft Account.

 

Customized sign in experience including Google, Facebook and Microsoft Account optionsCustomized sign in experience including Google, Facebook and Microsoft Account options

 

Azure AD B2C supports both of these scenarios, with detailed documentation on connecting a range of popular social platforms but also allows for any identity provider that supports OAuth 1.0, OAuth 2.0, OpenID Connect or SAML. An advantage of OAuth 2.0 identity providers (including Facebook and Google) is the ability for those identity platforms to authenticate the user credentials and pass them through to your application, as well as supporting single sign on.


Single sign on session typesSingle sign on session types

 

This also means those platforms retain the password management functionality. For more information visit Add an identity provider to your Azure Active Directory B2C tenant and Configure session behaviour in Azure Active Directory B2C

 

The sign up process also allows developers to ask for additional information to be stored in the user’s profile such as city, country, date of birth or other custom attributes like Loyalty Program Number. For more information on user attributes, visit User profile attributes.

 

Developers can also define the user experience for different identity-related tasks, such as editing their profile or challenging for MFA. Details can be found at User flows and custom policies.

 

3. Management has some differences compared to Azure Active Directory

An Azure AD B2C tenant cannot have other Azure resources provisioned in it, like virtual machines or Azure functions. Azure AD features like groups and roles only apply to administrative accounts in the tenant, not to the consumer accounts that are create by the application users. You can use Azure AD security defaults to force all administrative accounts to use Multi Factor Authentication (MFA). For detailed information on supported Azure AD features and more, visit Manage your Azure Active Directory B2C tenant.

You can create or delete consumer accounts via the Azure Portal and reset a user’s password (if they’re not using a social identity sign on). Find the steps at Use the Azure portal to create and delete consumer users in Azure AD B2C.

 

4. Azure AD B2C allows for some advanced identity features

Beyond the basics of Azure Active Directory, you may have explored advanced identity features like Identity Protection and Conditional Access. Some of these features are available to protect Azure AD B2C accounts, with Azure AD B2C P1 and P2 licensing.
Identity Protection lets you view risky users and risk detections, and can be accessed via the Microsoft Graph API. You can then investigate these detections and decide on any appropriate action, such as blocking users. Note that detections are limited to a small set of risks when a social identity is being used, as it is managed by the external identity provider. For an overview of Azure AD B2C Identity Protection including service limitations, licensing and report details, visit Investigate risk with Identity Protection.

Conditional Access can be used to activate steps (like prompting for an MFA challenge or blocking a sign in), based on the conditions that are evaluated during the sign-in attempt taking place. This can be based on things like user or sign-in risk, or specific locations. Only a subset of Azure AD Conditional Access policies are available. Find all the details at Add Conditional Access to user flows in Azure Active Directory B2C.

 

Conditional Access flowConditional Access flow

Azure AD B2C uses a sophisticated strategy to lock accounts, to help mitigate credential attacks. You can customize the lockout threshold and lockout duration. Learn more at Mitigate credential attacks in Azure AD B2C.

 

When they register their web application, developers can also set multi factor authentication options, including MFA methods and whether it's enforced on every logon or only challenged for when conditions are met: 

 

Multi factor authentication options on user sign upMulti factor authentication options on user sign up

 

5. Azure AD B2C integrates with Azure Monitor and Azure Sentinel

It’s important to note that Azure AD B2C audit log events are only retained for 7 days. If you require a longer retention period, you’ll need to configure a solution to send the audit log events to another retention source, for example downloading it using the Azure Active Directory reporting API or sending the data to an Azure storage account or to Log Analytics.

 

One benefit of using Log Analytics is that you can then query the data with Azure Monitor. But remember how I said you can’t create an Azure resource, including a Log Analytics Workspace, in an Azure AD B2C tenant? Instead, architect a solution where the Log Analytics Workspace resides in a different tenant, and Azure Lighthouse allows delegated access from the B2C tenant to the LAW resource:

 

Architecture of Azure AD B2C integration with Azure MonitorArchitecture of Azure AD B2C integration with Azure Monitor

 

Then you can query the logs with Kusto Query Language, create workbooks, alerts and action groups, and change the data retention period. Visit Monitor Azure AD B2C for detailed steps.

You can also configure Azure Sentinel to use the log data! Take advantage of Microsoft’s analytics and threat intelligence, investigate threats and hunt for suspicious activities and quickly response to incidents, adding Azure AD B2C activities to your bigger security picture. Check out the steps at Tutorial: How to perform security analytics for Azure AD B2C data with Azure Sentinel.

NOTE: Registering web applications for use with Azure AD B2C also involves creating an application secret. If performing secret rollovers is part of your IT Pro role, these application secrets should also be included. Learn more at Create a client secret.

 

Learn more:

I hope this article has provided you with a good overview of the benefits and capabilities of Azure AD B2C, so you can support a request from your developers to provide websites and applications with log-in capabilities for your own external customers!

 

About Azure AD B2C

Recommendations and best practices for Azure Active Directory B2C

MS Learn - Enable secure access to apps for external users with Azure AD B2C

 

1 Comment
Occasional Contributor

Wow thanks Sonia, I;ve been wondering about something like this for a long time. 
Only thing I can't see available here is Biometrics / Hello / Authenticator app for MFA or is that abstracted from the B2C layer and still sits with the federated provider?
Would be good for the conditional access to be aware that the federated provided user accounts is MFA compliant so there is not a double up on MFA. 

%3CLINGO-SUB%20id%3D%22lingo-sub-2631332%22%20slang%3D%22en-US%22%3EIntroduction%20to%20Azure%20AD%20B2C%20for%20IT%20Pros%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2631332%22%20slang%3D%22en-US%22%3E%3CP%3EThough%20Microsoft%E2%80%99s%20Azure%20Active%20Directory%20is%20the%20underlying%20identity%20platform%20for%20Azure%20resources%20and%20Microsoft%20365%20applications%2C%20there%20are%20two%20other%20identity%20capabilities%20with%20specific%20functions%20%E2%80%93%20Azure%20AD%20B2B%20and%20Azure%20AD%20B2C.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EAzure%20AD%20B2B%20lets%20you%20allow%20external%20users%20access%20to%20your%20Azure%20resources%20and%20applications%20by%20trusting%20their%20credentials%20that%20have%20been%20verified%20by%20their%20own%20identity%20provider%20(including%20other%20Azure%20AD%20tenants).%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EAzure%20AD%20B2C%20provides%20developers%20with%20an%20identity%20platform%20separate%20to%20your%20Azure%20Active%20Directory%20tenant%2C%20which%20they%20can%20customise%20to%20suit%20the%20sign-up%20process%20and%20user%20profile%20requirements%20of%20their%20application.%20If%20your%20developers%20are%20building%20applications%20or%20websites%20which%20require%20consumers%20or%20customers%20to%20sign%20in%2C%20Azure%20AD%20B2C%20gives%20them%20a%20full-featured%20Customer%20Identity%20and%20Access%20Management%20system%2C%20including%20the%20ability%20to%20custom%20brand%20the%20user%20experience.%20So%2C%20what%20do%20IT%20Pros%20need%20to%20know%20about%20the%20impact%20of%20Azure%20AD%20B2C%20on%20user%20identity%20management%20and%20security%3F%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CH2%20id%3D%22toc-hId--383013616%22%20id%3D%22toc-hId--383013425%22%20id%3D%22toc-hId--383013425%22%20id%3D%22toc-hId--383013425%22%3E1.%20Azure%20AD%20B2C%20is%20a%20separate%20tenant%3C%2FH2%3E%0A%3CP%3EYou%E2%80%99ll%20need%20to%20log%20into%20Azure%20with%20an%20account%20that%20has%20Contributor%20access%20to%20an%20existing%20Subscription%2C%20but%20then%20the%20process%20of%20provisioning%20Azure%20AD%20B2C%20creates%20a%20new%20tenant%20and%20associated%20directory.%20You%E2%80%99ll%20be%20able%20to%20switch%20to%20this%20using%20the%20Directories%20%2B%20Subscriptions%20filter%20in%20the%20Azure%20portal%2C%20but%20this%20keeps%20all%20of%20the%20B2C%20Users%20isolated%20from%20any%20user%20accounts%20you%E2%80%99re%20already%20managing%20for%20your%20organization%20in%20Azure%20Active%20Directory.%20You%20will%20then%20register%20you%20applications%20to%20be%20able%20to%20use%20this%20directory.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22InkedAzure%20AD%20B2C%20portal%20blade_LI.jpg%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F302145iF5579FC33C9A9722%2Fimage-size%2Flarge%3Fv%3Dv2%26amp%3Bpx%3D999%22%20role%3D%22button%22%20title%3D%22InkedAzure%20AD%20B2C%20portal%20blade_LI.jpg%22%20alt%3D%22Azure%20AD%20B2C%20in%20the%20Azure%20Portal%22%20%2F%3E%3CSPAN%20class%3D%22lia-inline-image-caption%22%20onclick%3D%22event.preventDefault()%3B%22%3EAzure%20AD%20B2C%20in%20the%20Azure%20Portal%3C%2FSPAN%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3EFor%20more%20information%2C%20see%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fazure%2Factive-directory-b2c%2Ftechnical-overview%3FWT.mc_id%3Dmodinfra-23481-socuff%23azure-ad-b2c-tenant%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3ETechnical%20and%20feature%20overview%20%E2%80%93%20Azure%20AD%20B2C%20tenant%3C%2FA%3E%3CBR%20%2F%3E%3CBR%20%2F%3E%3C%2FP%3E%0A%3CH2%20id%3D%22toc-hId-2104499217%22%20id%3D%22toc-hId-2104499408%22%20id%3D%22toc-hId-2104499408%22%20id%3D%22toc-hId-2104499408%22%3E2.%20Azure%20AD%20B2C%20supports%20social%20identities%20and%20other%20Identity%20providers%3C%2FH2%3E%0A%3CP%3EIf%20you%20have%20ever%20signed%20up%20to%20use%20a%20website%2C%20you%20might%20have%20entered%20and%20verified%20your%20email%20address%20to%20create%20an%20account%2C%20or%20you%20may%20have%20be%20asked%20if%20you%E2%80%99d%20like%20to%20use%20an%20existing%20social%20identity%20account%20to%20log%20in%20with%2C%20like%20Facebook%2C%20Google%2C%20or%20a%20consumer%20Microsoft%20Account.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22sign-in-small.png%22%20style%3D%22width%3A%20480px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F302147iE6EBED315052375D%2Fimage-size%2Flarge%3Fv%3Dv2%26amp%3Bpx%3D999%22%20role%3D%22button%22%20title%3D%22sign-in-small.png%22%20alt%3D%22Customized%20sign%20in%20experience%20including%20Google%2C%20Facebook%20and%20Microsoft%20Account%20options%22%20%2F%3E%3CSPAN%20class%3D%22lia-inline-image-caption%22%20onclick%3D%22event.preventDefault()%3B%22%3ECustomized%20sign%20in%20experience%20including%20Google%2C%20Facebook%20and%20Microsoft%20Account%20options%3C%2FSPAN%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EAzure%20AD%20B2C%20supports%20both%20of%20these%20scenarios%2C%20with%20detailed%20documentation%20on%20connecting%20a%20range%20of%20popular%20social%20platforms%20but%20also%20allows%20for%20any%20identity%20provider%20that%20supports%20OAuth%201.0%2C%20OAuth%202.0%2C%20OpenID%20Connect%20or%20SAML.%20An%20advantage%20of%20OAuth%202.0%20identity%20providers%20(including%20Facebook%20and%20Google)%20is%20the%20ability%20for%20those%20identity%20platforms%20to%20authenticate%20the%20user%20credentials%20and%20pass%20them%20through%20to%20your%20application%2C%20as%20well%20as%20supporting%20single%20sign%20on.%3C%2FP%3E%0A%3CP%3E%3CBR%20%2F%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22sso-session-types.png%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F302146i04290C16F47CBB0D%2Fimage-size%2Flarge%3Fv%3Dv2%26amp%3Bpx%3D999%22%20role%3D%22button%22%20title%3D%22sso-session-types.png%22%20alt%3D%22Single%20sign%20on%20session%20types%22%20%2F%3E%3CSPAN%20class%3D%22lia-inline-image-caption%22%20onclick%3D%22event.preventDefault()%3B%22%3ESingle%20sign%20on%20session%20types%3C%2FSPAN%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EThis%20also%20means%20those%20platforms%20retain%20the%20password%20management%20functionality.%20For%20more%20information%20visit%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fazure%2Factive-directory-b2c%2Fadd-identity-provider%3FWT.mc_id%3Dmodinfra-23481-socuff%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EAdd%20an%20identity%20provider%20to%20your%20Azure%20Active%20Directory%20B2C%20tenant%3C%2FA%3E%20and%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fazure%2Factive-directory-b2c%2Fsession-behavior%3FWT.mc_id%3Dmodinfra-23481-socuff%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EConfigure%20session%20behaviour%20in%20Azure%20Active%20Directory%20B2C%3C%2FA%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EThe%20sign%20up%20process%20also%20allows%20developers%20to%20ask%20for%20additional%20information%20to%20be%20stored%20in%20the%20user%E2%80%99s%20profile%20such%20as%20city%2C%20country%2C%20date%20of%20birth%20or%20other%20custom%20attributes%20like%20Loyalty%20Program%20Number.%20For%20more%20information%20on%20user%20attributes%2C%20visit%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fazure%2Factive-directory-b2c%2Fuser-profile-attributes%3FWT.mc_id%3Dmodinfra-23481-socuff%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EUser%20profile%20attributes.%3C%2FA%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EDevelopers%20can%20also%20define%20the%20user%20experience%20for%20different%20identity-related%20tasks%2C%20such%20as%20editing%20their%20profile%20or%20challenging%20for%20MFA.%20Details%20can%20be%20found%20at%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fazure%2Factive-directory-b2c%2Fuser-flow-overview%3FWT.mc_id-modinfra-23481-socuff%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EUser%20flows%20and%20custom%20policies.%3C%2FA%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CH2%20id%3D%22toc-hId-297044754%22%20id%3D%22toc-hId-297044945%22%20id%3D%22toc-hId-297044945%22%20id%3D%22toc-hId-297044945%22%3E3.%20Management%20has%20some%20differences%20compared%20to%20Azure%20Active%20Directory%3C%2FH2%3E%0A%3CP%3EAn%20Azure%20AD%20B2C%20tenant%20cannot%20have%20other%20Azure%20resources%20provisioned%20in%20it%2C%20like%20virtual%20machines%20or%20Azure%20functions.%20Azure%20AD%20features%20like%20groups%20and%20roles%20only%20apply%20to%20administrative%20accounts%20in%20the%20tenant%2C%20not%20to%20the%20consumer%20accounts%20that%20are%20create%20by%20the%20application%20users.%20You%20can%20use%20Azure%20AD%20security%20defaults%20to%20force%20all%20administrative%20accounts%20to%20use%20Multi%20Factor%20Authentication%20(MFA).%20For%20detailed%20information%20on%20supported%20Azure%20AD%20features%20and%20more%2C%20visit%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fazure%2Factive-directory-b2c%2Ftenant-management%3FWt.mc_id%3Dmodinfra-23481-socuff%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EManage%20your%20Azure%20Active%20Directory%20B2C%20tenant.%3C%2FA%3E%3CBR%20%2F%3E%3CBR%20%2F%3EYou%20can%20create%20or%20delete%20consumer%20accounts%20via%20the%20Azure%20Portal%20and%20reset%20a%20user%E2%80%99s%20password%20(if%20they%E2%80%99re%20not%20using%20a%20social%20identity%20sign%20on).%20Find%20the%20steps%20at%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fazure%2Factive-directory-b2c%2Fmanage-users-portal%3FWt.mc_id%3Dmodinfra-23481-socuff%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EUse%20the%20Azure%20portal%20to%20create%20and%20delete%20consumer%20users%20in%20Azure%20AD%20B2C.%3C%2FA%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CH2%20id%3D%22toc-hId--1510409709%22%20id%3D%22toc-hId--1510409518%22%20id%3D%22toc-hId--1510409518%22%20id%3D%22toc-hId--1510409518%22%3E4.%20Azure%20AD%20B2C%20allows%20for%20some%20advanced%20identity%20features%3C%2FH2%3E%0A%3CP%3EBeyond%20the%20basics%20of%20Azure%20Active%20Directory%2C%20you%20may%20have%20explored%20advanced%20identity%20features%20like%20Identity%20Protection%20and%20Conditional%20Access.%20Some%20of%20these%20features%20are%20available%20to%20protect%20Azure%20AD%20B2C%20accounts%2C%20with%20Azure%20AD%20B2C%20P1%20and%20P2%20licensing.%3CBR%20%2F%3EIdentity%20Protection%20lets%20you%20view%20risky%20users%20and%20risk%20detections%2C%20and%20can%20be%20accessed%20via%20the%20Microsoft%20Graph%20API.%20You%20can%20then%20investigate%20these%20detections%20and%20decide%20on%20any%20appropriate%20action%2C%20such%20as%20blocking%20users.%20Note%20that%20detections%20are%20limited%20to%20a%20small%20set%20of%20risks%20when%20a%20social%20identity%20is%20being%20used%2C%20as%20it%20is%20managed%20by%20the%20external%20identity%20provider.%20For%20an%20overview%20of%20Azure%20AD%20B2C%20Identity%20Protection%20including%20service%20limitations%2C%20licensing%20and%20report%20details%2C%20visit%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fazure%2Factive-directory-b2c%2Fidentity-protection-investigate-risk%3FWT.mc_id%3Dmodinfra-23481-socuff%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EInvestigate%20risk%20with%20Identity%20Protection.%3C%2FA%3E%3CBR%20%2F%3E%3CBR%20%2F%3EConditional%20Access%20can%20be%20used%20to%20activate%20steps%20(like%20prompting%20for%20an%20MFA%20challenge%20or%20blocking%20a%20sign%20in)%2C%20based%20on%20the%20conditions%20that%20are%20evaluated%20during%20the%20sign-in%20attempt%20taking%20place.%20This%20can%20be%20based%20on%20things%20like%20user%20or%20sign-in%20risk%2C%20or%20specific%20locations.%20Only%20a%20subset%20of%20Azure%20AD%20Conditional%20Access%20policies%20are%20available.%20Find%20all%20the%20details%20at%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fazure%2Factive-directory-b2c%2Fconditional-access-user-flow%3FWT.mc_id%3Dmodinfra-23481-socuff%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EAdd%20Conditional%20Access%20to%20user%20flows%20in%20Azure%20Active%20Directory%20B2C.%3C%2FA%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22conditional-access-flow.png%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F302148i0BDAEA6568D90F42%2Fimage-size%2Flarge%3Fv%3Dv2%26amp%3Bpx%3D999%22%20role%3D%22button%22%20title%3D%22conditional-access-flow.png%22%20alt%3D%22Conditional%20Access%20flow%22%20%2F%3E%3CSPAN%20class%3D%22lia-inline-image-caption%22%20onclick%3D%22event.preventDefault()%3B%22%3EConditional%20Access%20flow%3C%2FSPAN%3E%3C%2FSPAN%3E%3CBR%20%2F%3E%3CBR%20%2F%3EAzure%20AD%20B2C%20uses%20a%20sophisticated%20strategy%20to%20lock%20accounts%2C%20to%20help%20mitigate%20credential%20attacks.%20You%20can%20customize%20the%20lockout%20threshold%20and%20lockout%20duration.%20Learn%20more%20at%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fazure%2Factive-directory-b2c%2Fthreat-management%3FWT.mc_id%3Dmodinfra-23481-socuff%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EMitigate%20credential%20attacks%20in%20Azure%20AD%20B2C.%3C%2FA%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EWhen%20they%20register%20their%20web%20application%2C%20developers%20can%20also%20set%20multi%20factor%20authentication%20options%2C%20including%20MFA%20methods%20and%20whether%20it's%20enforced%20on%20every%20logon%20or%20only%20challenged%20for%20when%20conditions%20are%20met%3A%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22SignUpSignInFlow.jpg%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F302149i42CD761ADC9DBD6F%2Fimage-size%2Flarge%3Fv%3Dv2%26amp%3Bpx%3D999%22%20role%3D%22button%22%20title%3D%22SignUpSignInFlow.jpg%22%20alt%3D%22Multi%20factor%20authentication%20options%20on%20user%20sign%20up%22%20%2F%3E%3CSPAN%20class%3D%22lia-inline-image-caption%22%20onclick%3D%22event.preventDefault()%3B%22%3EMulti%20factor%20authentication%20options%20on%20user%20sign%20up%3C%2FSPAN%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CH2%20id%3D%22toc-hId-977103124%22%20id%3D%22toc-hId-977103315%22%20id%3D%22toc-hId-977103315%22%20id%3D%22toc-hId-977103315%22%3E5.%20Azure%20AD%20B2C%20integrates%20with%20Azure%20Monitor%20and%20Azure%20Sentinel%3C%2FH2%3E%0A%3CP%3EIt%E2%80%99s%20important%20to%20note%20that%20Azure%20AD%20B2C%20audit%20log%20events%20are%20only%20retained%20for%207%20days.%20If%20you%20require%20a%20longer%20retention%20period%2C%20you%E2%80%99ll%20need%20to%20configure%20a%20solution%20to%20send%20the%20audit%20log%20events%20to%20another%20retention%20source%2C%20for%20example%20downloading%20it%20using%20the%20Azure%20Active%20Directory%20reporting%20API%20or%20sending%20the%20data%20to%20an%20Azure%20storage%20account%20or%20to%20Log%20Analytics.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EOne%20benefit%20of%20using%20Log%20Analytics%20is%20that%20you%20can%20then%20query%20the%20data%20with%20Azure%20Monitor.%20But%20remember%20how%20I%20said%20you%20can%E2%80%99t%20create%20an%20Azure%20resource%2C%20including%20a%20Log%20Analytics%20Workspace%2C%20in%20an%20Azure%20AD%20B2C%20tenant%3F%20Instead%2C%20architect%20a%20solution%20where%20the%20Log%20Analytics%20Workspace%20resides%20in%20a%20different%20tenant%2C%20and%20Azure%20Lighthouse%20allows%20delegated%20access%20from%20the%20B2C%20tenant%20to%20the%20LAW%20resource%3A%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22Azure-AD-B2C-Monitor.png%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F302150i1A399D2F11A81E2E%2Fimage-size%2Flarge%3Fv%3Dv2%26amp%3Bpx%3D999%22%20role%3D%22button%22%20title%3D%22Azure-AD-B2C-Monitor.png%22%20alt%3D%22Architecture%20of%20Azure%20AD%20B2C%20integration%20with%20Azure%20Monitor%22%20%2F%3E%3CSPAN%20class%3D%22lia-inline-image-caption%22%20onclick%3D%22event.preventDefault()%3B%22%3EArchitecture%20of%20Azure%20AD%20B2C%20integration%20with%20Azure%20Monitor%3C%2FSPAN%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EThen%20you%20can%20query%20the%20logs%20with%20Kusto%20Query%20Language%2C%20create%20workbooks%2C%20alerts%20and%20action%20groups%2C%20and%20change%20the%20data%20retention%20period.%20Visit%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fazure%2Factive-directory-b2c%2Fazure-monitor%3FWT.mc_id%3Dmodinfra-23481-socuff%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EMonitor%20Azure%20AD%20B2C%3C%2FA%3E%20for%20detailed%20steps.%3CBR%20%2F%3E%3CBR%20%2F%3EYou%20can%20also%20configure%20Azure%20Sentinel%20to%20use%20the%20log%20data!%20Take%20advantage%20of%20Microsoft%E2%80%99s%20analytics%20and%20threat%20intelligence%2C%20investigate%20threats%20and%20hunt%20for%20suspicious%20activities%20and%20quickly%20response%20to%20incidents%2C%20adding%20Azure%20AD%20B2C%20activities%20to%20your%20bigger%20security%20picture.%20Check%20out%20the%20steps%20at%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fazure%2Factive-directory-b2c%2Fazure-sentinel%3FWT.mc_id%3Dmodinfra-23481-socuff%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3ETutorial%3A%20How%20to%20perform%20security%20analytics%20for%20Azure%20AD%20B2C%20data%20with%20Azure%20Sentinel.%3C%2FA%3E%3CBR%20%2F%3E%3CBR%20%2F%3E%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3ENOTE%3A%3C%2FSTRONG%3E%20Registering%20web%20applications%20for%20use%20with%20Azure%20AD%20B2C%20also%20involves%20creating%20an%20application%20secret.%20If%20performing%20secret%20rollovers%20is%20part%20of%20your%20IT%20Pro%20role%2C%20these%20application%20secrets%20should%20also%20be%20included.%20Learn%20more%20at%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fazure%2Factive-directory-b2c%2Ftutorial-register-applications%3FWT.mc_id%3Dmodinfra-23481-socuff%23create-a-client-secret%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3ECreate%20a%20client%20secret.%3C%2FA%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CH2%20id%3D%22toc-hId--830351339%22%20id%3D%22toc-hId--830351148%22%20id%3D%22toc-hId--830351148%22%20id%3D%22toc-hId--830351148%22%3ELearn%20more%3A%3C%2FH2%3E%0A%3CP%3EI%20hope%20this%20article%20has%20provided%20you%20with%20a%20good%20overview%20of%20the%20benefits%20and%20capabilities%20of%20Azure%20AD%20B2C%2C%20so%20you%20can%20support%20a%20request%20from%20your%20developers%20to%20provide%20websites%20and%20applications%20with%20log-in%20capabilities%20for%20your%20own%20external%20customers!%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fazure%2Factive-directory-b2c%2Foverview%3FWT.mc_id%3Dmodinfra-23481-socuff%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EAbout%20Azure%20AD%20B2C%3C%2FA%3E%3CBR%20%2F%3E%3CBR%20%2F%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fazure%2Factive-directory-b2c%2Fbest-practices%3FWT.mc_id%3Dmodinfra-23481-socuff%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3ERecommendations%20and%20best%20practices%20for%20Azure%20Active%20Directory%20B2C%3C%2FA%3E%3CBR%20%2F%3E%3CBR%20%2F%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Flearn%2Fmodules%2Fenable-external-access-with-b2c%2F%3FWT.mc_id%3Dmodinfra-23481-socuff%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EMS%20Learn%20-%20Enable%20secure%20access%20to%20apps%20for%20external%20users%20with%20Azure%20AD%20B2C%3C%2FA%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CIFRAME%20src%3D%22https%3A%2F%2Fchannel9.msdn.com%2FShows%2FOn-NET%2FUsing-AzureAD-B2C-for-authenticating-users%2Fplayer%3FWT.mc_id%3Dmodinfra-23481-socuff%22%20width%3D%22960%22%20height%3D%22540%22%20frameborder%3D%220%22%20allowfullscreen%3D%22allowfullscreen%22%20title%3D%22Using%20AzureAD%20B2C%20for%20authenticating%20users%20-%20Microsoft%20Channel%209%20Video%22%3E%3C%2FIFRAME%3E%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-TEASER%20id%3D%22lingo-teaser-2631332%22%20slang%3D%22en-US%22%3E%3CP%3EAzure%20AD%20B2C%20is%20used%20by%20developers%20for%20customer%20access%20to%20apps%20and%20websites.%20What%20are%20the%20implications%20for%20IT%20Pros%2C%20identity%20management%20and%20security%3F%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22sign-in-small.png%22%20style%3D%22width%3A%20480px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F302137i0597F00D7E3E9C51%2Fimage-size%2Flarge%3Fv%3Dv2%26amp%3Bpx%3D999%22%20role%3D%22button%22%20title%3D%22sign-in-small.png%22%20alt%3D%22sign-in-small.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%3C%2FLINGO-TEASER%3E%3CLINGO-LABS%20id%3D%22lingo-labs-2631332%22%20slang%3D%22en-US%22%3E%3CLINGO-LABEL%3EAzure%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3EAzure%20AD%20B2C%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3ESonia%20Cuff%3C%2FLINGO-LABEL%3E%3C%2FLINGO-LABS%3E%3CLINGO-SUB%20id%3D%22lingo-sub-2635484%22%20slang%3D%22en-US%22%3ERe%3A%20Introduction%20to%20Azure%20AD%20B2C%20for%20IT%20Pros%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2635484%22%20slang%3D%22en-US%22%3E%3CP%3EWow%20thanks%20Sonia%2C%20I%3Bve%20been%20wondering%20about%20something%20like%20this%20for%20a%20long%20time.%26nbsp%3B%3CBR%20%2F%3EOnly%20thing%20I%20can't%20see%20available%20here%20is%20Biometrics%20%2F%20Hello%20%2F%20Authenticator%20app%20for%20MFA%20or%20is%20that%20abstracted%20from%20the%20B2C%20layer%20and%20still%20sits%20with%20the%20federated%20provider%3F%3CBR%20%2F%3EWould%20be%20good%20for%20the%20conditional%20access%20to%20be%20aware%20that%20the%20federated%20provided%20user%20accounts%20is%20MFA%20compliant%20so%20there%20is%20not%20a%20double%20up%20on%20MFA.%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E
Co-Authors
Version history
Last update:
‎Aug 10 2021 03:25 AM
Updated by: