Azure Active Directory B2C (Azure AD B2C) is an identity and access management solution that can ease integration with your infrastructure. Use the following guidance to help understand requirements and compliance throughout an Azure AD B2C deployment.
Communicate proactively and regularly with your users about pending and current changes. Inform them about how the experience changes, when it changes, and provide a contact for support.
Timelines
Help set realistic expectations and make contingency plans to meet key milestones:
Pilot date
Launch date
Dates that affect delivery
Dependencies
Implement an Azure AD B2C deployment
Deploy applications and user identities - Deploy client application and migrate user identities
Client application onboarding and deliverables - Onboard the client application and test the solution
Security - Enhance the identity solution security
Compliance - Address regulatory requirements
User experience - Enable a user-friendly service
Deploy authentication and authorization
Before your applications interact with Azure AD B2C, register them in a tenant you manage
Use the following checklist for onboarding an application
Area
Description
Application target user group
Select among end customers, business customers, or a digital service. Determine a need for employee sign-in.
Application business value
Understand the business need or goal to determine the best Azure AD B2C solution and integration with other client applications.
Your identity groups
Cluster identities into groups with requirements, such as business-to-consumer (B2C), business-to-business (B2B) business-to-employee (B2E), and business-to-machine (B2M) for IoT device sign-in and service accounts.
Identity provider (IdP)
See, Select an identity provider. For example, for a customer-to-customer (C2C) mobile app use an easy sign-in process. B2C with digital services has compliance requirements. Consider email sign-in.
Regulatory constraints
Determine a need for remote profiles or privacy policies.
Implement client applications such as Web application, single-page application (SPA), or native. Authentication protocols for client application and Azure AD B2C: OAuth, OIDC, and SAML. See the video Protecting Web APIs with Microsoft Entra ID.
Gather the base path, policies, and metadata URL of both variants. Specify attributes such as sample sign-in, client application ID, secrets, and redirects.
Learn about Azure AD B2C service limits and restrictions. Calculate the expected authentications and user sign-ins per month. Assess high load traffic durations and business reasons: holiday, migration, and event. Determine expected peak rates for sign-up, traffic, and geographic distribution, for example per second.
Security
Use the following checklist to enhance application security.
Authentication method, such as multifactor authentication:
Multifactor authentication is recommended for users that trigger high-value transactions or other risk events. For example, banking, finance, and check-out processes.
To help comply with regulatory requirements and enhance back-end system security you can use virtual networks (VNets), IP restrictions, Web Application Firewall, and so on. Consider the following requirements:
Your regulatory compliance requirements
For example, Payment Card Industry Data Security Standard (PCI DSS)
पहचान समाधानों को आधुनिक बनाने, हाइब्रिड समाधानों को कार्यान्वित करने और पहचान संचालन कार्यान्वित करने के लिए Microsoft Entra ID की सुविधाओं का प्रदर्शन करें.
Learn how you can use Azure Active Directory B2C to support external identities in your applications, including social sign-up with Facebook, Google, and other identity providers.
Learn about Azure AD B2C's monthly active users (MAU) billing model, how to link an Azure AD B2C tenant to an Azure subscription, and how to select the appropriate premium tier pricing.