Azure AD B2B (Business-to-Business)
Purpose:
Allows secure sharing of company applications and services with external partner organizations while maintaining control over corporate data.
Key Features:
-
Works with external partners even if they don’t have Azure AD or IT infrastructure.
-
Partners use their own credentials; no need for your organization to manage external accounts or passwords.
-
No synchronization of accounts or lifecycle management is required.
-
Developers can customize the invitation process or create self-service sign-up portals using Azure AD B2B APIs.
Benefits:
-
Minimal external administrative overhead.
-
Secure collaboration with partners.
-
Easy invitation and redemption process.
Azure AD B2C (Business-to-Customer)
Purpose:
Provides customer identity management as a service (CIAM), allowing customers to use social, enterprise, or local accounts for single sign-on (SSO) access.
Key Features:
-
Scales to millions of users and billions of authentications.
-
Protects against threats such as denial-of-service, password spray, or brute force attacks.
-
Standards-based authentication protocols: OpenID Connect, OAuth 2.0, SAML.
-
Directory supports 100 custom attributes per user and can integrate with external systems (e.g., CRM, loyalty databases).
-
Supports identity verification by collecting user data and passing it to third-party systems for validation and trust scoring.
Benefits:
-
Flexible user provisioning (invited party controls provisioning).
-
Integration with modern apps and commercial off-the-shelf software.
-
Facilitates secure and scalable authentication for customers.
Demonstration: Users and Groups in Azure AD
1. Determine Domain Information
-
Navigate to Azure Active Directory in the Azure portal.
-
Note your domain name (e.g.,
usergmail.onmicrosoft.com).
2. Explore User Accounts
-
Go to the Users blade → New user → Option to create New guest user.
-
Review user details:
-
User name
-
Groups
-
Directory Role
-
Job Info
-
-
After creation, check additional information about the user.
3. Explore Group Accounts
-
Go to the Groups blade → New group.
-
Example configuration:
-
Group type: Security
-
Group name: Managers
-
Membership type: Assigned
-
Add your newly created user as a member
-
-
After creation, review group details.
4. PowerShell for Group Management
-
Create a group:
New-AzADGroup -DisplayName Developers -MailNickname Developers
-
Retrieve group ObjectId:
Get-AzADGroup
-
Retrieve user ObjectId:
Get-AzADUser
-
Add user to group:
Add-AzADGroupMember -MemberUserPrincipalName "myemail@domain.com" -TargetGroupDisplayName "MyGroupDisplayName"
-
Verify members of the group:
Get-AzADGroupMember -GroupDisplayName "MyGroupDisplayName"
✅ Summary:
-
B2B: Secure collaboration with external organizations, minimal admin effort.
-
B2C: Scalable customer identity management with integration flexibility.
-
Users & Groups: Can be managed via Azure Portal or PowerShell, giving control over access and membership.