Hello @Drew Williams,
I understand that you are working on configuring identity options for a B2B SaaS application, where each tenant can bring their own OIDC identity provider. This allows each tenant to set up a custom OpenID Connect (OIDC) provider. However, you're encountering some challenges.
Regarding the visibility of the custom OIDC provider on the login page, ensure that the app registration in the different Azure tenants is correctly configured and that the OIDC information is properly populated. If the custom OIDC provider still doesn't appear, I recommend double-checking the user flow or custom policies settings and confirming that the provider is correctly assigned.
To configure the OIDC Identity Provider (IdP) through user flows or custom policies, I recommend you refer to these documents: https://learn.microsoft.com/en-us/azure/active-directory-b2c/identity-provider-generic-openid-connect?pivots=b2c-user-flow
https://learn.microsoft.com/en-us/azure/active-directory-b2c/direct-signin?pivots=b2c-custom-policy#set-up-direct-sign-in-using-azure-active-directory-b2c
Regarding to reduce the visibility of SSO options and directly redirect users to a specific Identity Provider (IdP) in your Azure AD B2C implementation, you need to configure the IdP using user flows or custom policies within Azure. However, Azure does not allow you to hide IdPs for a particular tenant, nor does it support direct redirection to a specific IdP. B2C mechanism works based on the IDP chosen by the user for authentication but not directly with the domain used for authentication. Since Microsoft Azure AD B2C can provide all the IDP's that regards to the application and do not have an option to detect the user before providing the UPN to redirect to the specific IDP's, I would suggest in checking on the application side. If your application supports a mechanism where it can redirect the user based on the domain which can help you in providing specific IDP's to the user for authentication.
Do let us know if you any further queries.