App Service Auth and Azure AD B2C

An exciting new preview feature which was recently added to Azure Active Directory is Azure Active Directory B2C. “B2C” stands for “Business to Consumer” and allows a developer to add user and login management to their application with very little (if any) coding. This also includes login integration with social identity providers like Facebook, Amazon, LinkedIn, etc. Check out their documentation and blog posts for more details. My colleague Swaroop from the Azure AD team also has a nice //build video where you can see it in action.

From my perspective, App Service Authentication / Authorization (Easy Auth) shares a similar goal of B2C, which is to make it really easy to build identity into your application. We saw a great opportunity to make these features work well together, giving you both an identity management system as well as login and OAuth token management without requiring a single line of code.

In this post, I’ll describe how you can use Easy Auth to add Azure AD B2C capabilities to your App Service Web App.

Creating an App Service Web App

Hopefully you know how to do this by now. Go ahead and create a web app (or an API/mobile/function app – they all work the same way) and make a note of the URL. For example, when drafting this blog post and walking through the steps, I created Use your own web app URL in place of mine wherever you see it in these instructions. However, don’t configure Authentication / Authorization yet. We’ll do that in a later step.

Creating the Azure AD B2C Tenant and Application

We don’t currently support an “Express” setup of B2C like we do for classic Azure AD, so these steps will need to be done manually. You can find detailed instructions for this below:

  1. Create an Azure AD B2C tenant
  2. Register your application

Note that in step 2, you’ll need to use the https address of the web app you previously created as the Reply URL and you must suffix it with “/.auth/login/aad/callback” (again, in my case this is Once this is done, you should have an application in the B2C portal which looks something like the following:

B2C Application Blade

Make a note of the Application Client ID that you see in the Application blade. You’ll need this in a later step.

Adding a Sign-Up/Sign-In Policy

For simplicity, we’ll create a single B2C “policy” which allows the user to sign in or sign up if they don’t already have an account. In the portal, this is the Sign-up or sign-in policies selection. Add a new policy (assuming you don’t have one already). The details of the policy don’t matter too much, so I won’t provide any specific guidance here. There are a lot of options, including whether to configure social identity providers. In my case, I set up email login as well as Google and Facebook. To get started quickly, I suggest you use the email sign-up policy. When you’re done, make a note of the Metadata Endpoint for this policy URL which gets generated, like in the screenshot below:

B2C Policy Blade

Azure AD B2C supports other policy types as well, but the combination sign-up/sign-in is currently the one best suited for Easy Auth login integration.

Configure Easy Auth

Now let’s go back to the web app we previously created. We’ll configure Easy Auth with Azure AD using the Advanced configuration option. The steps are:

  1. In the portal in the context of your web app, click the Settings icon.
  2. Set App Service Authentication to On
  3. Configure Azure Active Directory
  4. Select the Advanced management mode
  5. Set the Client ID to be the Application Client ID from before.
  6. Set the Issuer URL to be the Metadata Endpoint for this policy URL value that was generated from your sign-in/sign-on B2C policy.
  7. Click OK and then the Save icon to save your changes.

Your Authentication / Authorization settings blade should look something like the following:

Authentication / Authorization Blade

Now if you navigate to your site, you should see the B2C login page that you configured previously. Depending on how it was configured, you can sign up using social identity credentials or you can sign up using username (or email) and password. You will also be prompted for additional registration information, such as your name, etc (again, all dictated by the policies you configured).

Here is an example of what your initial sign-in page might look like. Notice the link on the bottom of the image which allows users to register:

B2C Login Page

Below is an example of what your “sign-up” registration page will look like. If you selected the email option, Azure AD B2C will even implement the email verification workflow for you.

B2C Sign-Up Page

That’s it! You’ve now created a skeleton B2C web application that allows users to sign-up and sign-in without writing any code or deploying any databases! I’ve used all the defaults in terms of styling, but Azure AD B2C does allow you to customize the look and feel of these pages to match your own application branding, if you choose. See the B2C UI customization documentation for more information.

Once signed in, you can write code which inspects the inbound HTTP headers and/or the /.auth/me endpoint (both described in my earlier Token Store post) to get more information about the user. If you’re running an ASP.NET application, you can also enumerate the claims on the current ClaimsPrincipal. Specifically, you should be able to see all the claims that you configured in your B2C policy. This is great because you don’t need to provision your own database which contains this information – it’s built into the B2C directory and can be accessed using the features of Easy Auth.

Azure AD B2C Social Providers vs. Easy Auth Social Providers

One thing you may have noticed is that there are now two ways to incorporate social logins into your web app: using B2C policies or configuring them directly in the Authentication / Authorization settings. Ideally, there would be just one which is common between the two technologies. Unfortunately we’re not there yet. Until then, here are some important differences between social providers in Azure AD B2C and Easy Auth:

  • Different identity providers: B2C and Easy Auth support different providers. At the time of writing, B2C supports MSA, Facebook, Google, LinkedIn, and Amazon identities. Easy Auth, however, supports MSA, Facebook, Google, and Twitter.
  • Client-Directed Login: Both B2C and Easy Auth support server-directed social logins where the login flow is controlled by the browser. However, only Easy Auth supports client-directed logins where the login flow is controlled by the client operating system (typically a mobile OS or a JavaScript client).
  • User Claims: B2C provides a somewhat normalized set of user claims for each login. These claims are similar to what you’d see in an ordinary AAD login. The claims are also configurable. With Easy Auth, however, the claims are static and in many cases are different for each identity provider.
  • OAuth Tokens: With Easy Auth, the application code has direct access to the provider-specific OAuth tokens. This is useful if you want to make graph API calls on behalf of the logged-in user (for example, calling the Facebook Graph to post a photo to the user’s timeline). B2C, however, does not expose the provider OAuth tokens to your application code.

If social identity integration is important to your app, then consider these differences very carefully when deciding between the two options. Note that these limitations will certainly change as both Easy Auth and Azure AD B2C evolve over time, hopefully in a way that better aligns them together (this is certainly our goal, internally).

Taking it to the Next Level

This post demonstrated using a single, global B2C policy within a web app in a way that doesn’t require any code or database setup. If you are a mobile, API, or SPA app developer, I have written a followup post which goes into more details about how to use code to dynamically select B2C policies, how to set up token refresh, and even included a sample SPA app which demonstrates these capabilities. Check it out in Part 2 of the App Service + Azure AD B2C series.

Author: cgillum

Principal Software Engineer at Microsoft.

25 thoughts on “App Service Auth and Azure AD B2C”

    1. Sorry to hear about that. I believe there was a B2C outage around this time, though I don’t have the specific details. In general, I recommend taking a look at the Azure Status Dashboard to find out if an issue is going on. Another good source of information would be the Azure AD MSDN forums, which should be actively monitored.

  1. Hi cgillum,

    One of our customers wants to migrate his SharePoint on-premise extranet that currently uses FBA authentication for partners. Azure AD B2C service seems to fit our needs but as it is still in preview we can’t go in production.
    Do you have any information about a roll-out date ?

    Thank you in advance,


  2. Hi Chris,

    For now the Access Token from EasyAuth will be expired after 1 hour. Anyway to extend it?
    We did try .auth/refresh as well but got 403 HTTP status all the time even passing valid AccessToken.

    When checked Metadata of the AD B2C policy (we used Unified SignIn Sign Up), see section “scopes_supported” has only “openid”.
    Could you please guide to have “offline_access” in scopes so able to refresh token?


    1. Hi Tri, unfortunately the /.auth/refresh endpoint is not yet working when using B2C. An App Service update will be going out soon so you should expect this scenario to start working sometime next week.

      UPDATE: Token refresh is working now! See my followup post for more details.

  3. Hi Chris,
    In the example you used,Is your default directory B2C.How would this work if we have a default directory and a second Directory for B2C.

    1. By default directory, are you talking about the default directory when I log into the Azure Portal? If so, yes, I have a default directory and the B2C directory is separate. I believe this is the normal experience as I don’t believe B2C tenants can have Azure Subscriptions. Normally what happens is that you log into the Azure Portal using your default directory credentials, and then you switch over to the B2C directory either by changing the directory in the upper right-hand corner (if starting from the Azure Portal) or by clicking the “manage in Azure portal” button from the AAD portal in the old portal,

  4. Chris,

    Did you had any problem during creating a policy? I’m trying to create a single Sign-Up or Sign-In policy but I get the following error message:
    There was an error while creating the policy ‘An object was not found while retrieving extension properties in tenant “73a55309-…”. Error returned was 404/Request_ResourceNotFound: Resource ‘7c7ab660-…’ does not exist or one of its queried reference-property objects are not present.’

    Despite this error my policy has been created but I think it’s not working correctly because I’m trying to sign up on the default page and after this action I see blank white page with a text ‘Bad Request’.

    1. Hmm…I have not seen this problem. Are you seeing that first error message in the Azure portal when creating your policy? If you haven’t already, I recommend mentioning this on and adding the tag azure-ad-b2c to your question. Folks on the B2C team should be able to find your question and help you figure out what the error means.

      Regarding the ‘Bad Request’ error, that might be a result of the first problem. Just to make sure, can you enable Application Logging and see if any warnings or errors are logged that might give clues about why a ‘Bad Request’ was returned?

    2. I’ve added my question on StackOverflow.

      I’ve enabled Application Logging (Warning level) and have tried sign up again – I assume there are no warnings/errors because I can see only LogFiles/kudu, there is no the LogFiles/Application folder.

      On the MSDN forum they suggest I delete my b2c-extension-app but I don’t know what it is and where I can find it. I’ve checked it in Azure classic portal -> Active Directory -> My AAD B2C -> Applications my company owns: there is only my ‘test’ application. Is there any way to restore/recreate b2c-extension-app?

    3. They are right on the MSDN forum. I’ve created a new AAD B2C and ‘b2c-extensions-app’ has been created automatically. After that I have no problems with creation of policy.

  5. Chris – I’ve got the refresh tokens working but my Profile Edit policy now fails for some reason with a Bad Request message. I saw it working on your demo so simply copied your URL parameters and replaced with my policy name. I’m able to get to my Profile and edit but upon returning back to my app is where the error occurs.

    I’ve got logging on and i see the following messages:


    JWT validation succeeded. Subject: ‘Not supported currently. Use oid claim.’, Issuer: ‘’.

    Call to HTTP endpoint failed: 400 (Bad Request). Partial response: Bad Request

    Sending response: 500.74 Internal Server Error

    1. Hi Mark. Unfortunately the error message from B2C doesn’t provide any hints about what went wrong. Do other profiles work for you, or do they all result in the same error? Interestingly, I created a new B2C tenant today and ran into the same error. I ended up resolving it by updating my B2C app key – I’m not sure if I made a copy/paste error with the original key or if it was some kind of formatting issue. In any case, if you’re having a problem with all your profiles, then checking to make sure you application key is set correctly would be a good next step.

  6. The “Forgot your password” returns an error message “You do not have permission to view this directory or page”. Are you able to describe how this can be fixed?

Leave a Reply