แก้ไข

แชร์ผ่าน


Supported Microsoft Entra ID features

An Azure Active Directory B2C (Azure AD B2C) tenant is different than a Microsoft Entra tenant, which you may already have, but it relies on it. The following Microsoft Entra ID features can be used in your Azure AD B2C tenant.

Feature Microsoft Entra ID Azure AD B2C
Groups Groups can be used to manage administrative and user accounts. Groups can be used to manage administrative accounts. You can't perform group-based assignment of enterprise applications.
Inviting External Identities guests You can invite guest users and configure External Identities features such as federation and sign-in with Facebook and Google accounts. You can invite only a Microsoft account or a Microsoft Entra user as a guest to your Microsoft Entra tenant for accessing applications or managing tenants. For consumer accounts, you use Azure AD B2C user flows and custom policies to manage users and sign-up or sign-in with external identity providers, such as Google or Facebook.
Roles and administrators Fully supported for administrative and user accounts. Roles are not supported with consumer accounts. Consumer accounts don't have access to any Azure resources.
Custom domain names You can use Microsoft Entra custom domains for administrative accounts only. Consumer accounts can sign in with a username, phone number, or any email address. You can use custom domains in your redirect URLs.
Conditional Access Fully supported for administrative and user accounts. A subset of Microsoft Entra Conditional Access features is supported with consumer accounts Learn how to configure Azure AD B2C conditional access.
Premium P1 Fully supported for Microsoft Entra ID P1 features. For example, Password Protection, Hybrid Identities, Conditional Access, Dynamic groups, and more. Azure AD B2C uses Azure AD B2C Premium P1 license, which is different from Microsoft Entra ID P1. A subset of Microsoft Entra Conditional Access features is supported with consumer accounts. Learn how to configure Azure AD B2C Conditional Access.
Premium P2 Fully supported for Microsoft Entra ID P2 features. For example, Identity Protection, and Identity Governance. Azure AD B2C uses Azure AD B2C Premium P2 license, which is different from Microsoft Entra ID P2. A subset of Microsoft Entra ID Protection features is supported with consumer accounts. Learn how to Investigate risk with Identity Protection and configure Azure AD B2C Conditional Access.
Data retention policy Data retention period for both audit and sign in logs depend on your subscription. Learn more about How long Microsoft Entra ID store reporting data. Sign in and audit logs are only retained for seven (7) days. If you require a longer retention period, use the Azure monitor.
Go-Local add-on Microsoft Entra Go-Local add-on enables you to store data in the country/region you choose when your Microsoft Entra tenant. Just like Microsoft Entra ID, Azure AD B2C supports Go-Local add-on.

Note

Other Azure resources in your tenant:
In an Azure AD B2C tenant, you can't provision other Azure resources such as virtual machines, Azure web apps, or Azure functions. You must create these resources in your Microsoft Entra tenant.