Azure Active Directory B2C
Identity and access management for your customer-facing apps
Customise every pixel of your customer journey
Manage customer, consumer and citizen access to your business-to-consumer (B2C) applications. Connect with millions of users with the scalability and availability you need.
High availability to scale to hundreds of millions of customers
Customisation for every pixel of the registration and sign-in experience
Strong authentication for your customers using their preferred identity provider
Integration with apps and databases to capture sign-in and conversion data
Protect your customers’ identities
Build your solution your way
Customise your brand, your HTML and your CSS to maintain consistency for your customers at every step, from sign-up to in-app experiences.
Unmatched security and compliance
Microsoft invests more than USD 1 billion annually on cybersecurity research and development.
We employ more than 3,500 security experts dedicated to data security and privacy.
Azure has more certifications than any other cloud provider. View the comprehensive list.
Use your free tier of 50,000 monthly active users (MAUs)
Manage customer identities and access in the cloud, and provide multi-factor authentication for greater security.
Get started with Azure AD B2C
Documentation, training and resources
Documentation and tutorials
Azure Active Directory external IdentitiesLearn more about Azure Active Directory external identities
Trusted by companies of all sizes
Ralf Cichy, Project Manager, Zeiss
"Azure AD B2C is a huge innovation enabler…our development teams don't need to worry about authentication when creating applications. It's also less work for our staff to not have to manage multiple authentication systems."
Build a seamless end-user experience with our ISV Partner integration network
Tailor your end user experience specifically for your needs. Our ISV Partner integration network extends our solution capabilities by enabling different methods of MFA, enabling Secure Customer Authentication, performing Role Based Access Control, combatting against fraud and Identity Verification – Proofing.