Thank you for posting your query on Microsoft Q&A.
From above description I could understand that you are looking for a way a way to revoke access token when users hits Sign-out/Logout URI.
Please do correct me if there is any discrepancy by responding in the comments section.
The access token could not be revoked or invalidated. The only way is to set minimum life time of an access token. The minimum (inclusive) is 5 minutes.
This would enforce the session to renew the access token after every 5 min via refresh token.
Also please be informed that user may not be able to use access token for any other B2C API.
However Web API chains (On-Behalf-Of) is not supported by Azure AD B2C - Many architectures include a web API that needs to call another downstream web API, both secured by Azure AD B2C. This scenario is common in clients that have a web API back end, which in turn calls a another service. This chained web API scenario can be supported by using the OAuth 2.0 JWT Bearer Credential grant, otherwise known as the On-Behalf-Of flow. However, the On-Behalf-Of flow is not currently implemented in Azure AD B2C. Although On-Behalf-Of works for applications registered in Azure AD, it does not work for applications registered in Azure AD B2C, regardless of the tenant (Azure AD or Azure AD B2C) that is issuing the tokens.
Apart from this you must configure the session behavior to most restrictive so that
Please do let me know if you have any queries by responding in the comments section.
Thanks,
Akshay Kaushik
Please "Accept the answer" (Yes), and share your feedback if the suggestion answers you’re your query. This will help us and others in the community as well.