A set of technologies in the .NET Framework for building web applications and XML web services.
Hi,
Thanks for raising this question — I can see how the scenario can be a little confusing given the overlap between Entra External ID and Azure AD B2C. Let me break this down:
Understanding the products
- Azure AD B2C was Microsoft’s legacy Customer Identity and Access Management (CIAM) platform. It’s still supported, but Microsoft has announced that Microsoft Entra External ID for customers is the strategic replacement going forward.
- Microsoft Entra External ID (customers + partners) now provides the ability to support both B2B collaboration and consumer (CIAM) scenarios, which means it can handle your customers while also integrating with your organization’s Entra ID tenant for employees.
Your scenario: One application for both employees & customers
You’re correct that cross-tenant synchronization isn’t what you need here. Instead, you can achieve this through a unified authentication experience:
- Employees (workforce users):
- They can continue authenticating via your organization’s home Entra ID tenant.
- You don’t need to bring them into the CIAM tenant — instead, configure your app to accept tokens from your home tenant directly.
- Customers (external users):
- These are best handled in an Entra External ID (CIAM) tenant, where you configure social or local account providers.
- You then federate your application with this CIAM tenant so customers can sign in.
- Single entry point (one login screen):
- This is done by implementing an application gateway pattern using something like App registrations + custom policies or by using a central login page that routes users to the right authority (home tenant vs CIAM tenant).
- For employees → direct them to your Entra tenant.
- For customers → forward them to the CIAM tenant login.
Microsoft has some architectural guidance here:
- Microsoft Entra External ID overview (covers both B2B + CIAM): https://learn.microsoft.com/en-us/entra/external-id/
- External ID for customers (CIAM) overview: https://learn.microsoft.com/en-us/entra/external-id/customers/overview-customers-ciam
- Plan your CIAM solution (how to set up apps, sign-in flows, IDPs): https://learn.microsoft.com/en-us/entra/external-id/customers/concept-planning-your-solution
- FAQ: B2C vs External ID (differences + transition guidance): https://learn.microsoft.com/en-us/entra/external-id/customers/faq-customers
- Azure AD B2C docs (legacy): https://learn.microsoft.com/en-us/azure/active-directory-b2c/
Recommendation
Since you want a single application for both workforce and customers, the best approach today is:
- Use Microsoft Entra External ID (for customers) for external sign-ins.
- Keep workforce users in your existing Entra tenant.
- Design the app login flow so that both identity sources are supported — either via tenant federation or by implementing a custom landing page that routes users accordingly.
This way, you don’t need to sync workforce users into the CIAM tenant, and your customers still get the right onboarding and identity management experience.
Hope this helps