Managing external identities to enable secure access for partners, customers, and other non-employees
Hello viswanadham paila,
Your understanding is correct.
Smart Lockout in Azure AD B2C applies only to username and password sign-ins. It protects against repeated incorrect password attempts and doesn’t apply to MFA. This is confirmed in Microsoft’s documentation: https://learn.microsoft.com/en-us/azure/active-directory-b2c/threat-management
For MFA (email OTP, SMS, authenticator), there isn’t a built-in lockout for repeated failures. The platform doesn’t block users after multiple incorrect OTP attempts, and any limits you may see are usually session-based, not persistent.
Since you’re using custom policies with a custom email OTP via REST API, the lockout logic needs to be handled on your side. Typically, this means tracking failed attempts, setting a limit, and temporarily blocking further attempts once that limit is reached.
In short, password lockout is handled by the platform, but MFA lockout needs to be implemented in your custom solution.