What is our primary use case?
I have been using Microsoft Entra External ID for about seven months, currently evaluating and using it for deployment for our customer. I'm using Microsoft Entra External ID right now.
I have no relation to Microsoft; I am a consultant and customer of Microsoft. My customer purchased Microsoft products and they are trying to purchase and deploy Microsoft Entra External ID, so I'm a consultant, an independent authentication and identity consultant for them. I give them advice and I completed a POC about what I call EID, Microsoft Entra External ID, and Azure AD B2C, which is their X B2C product and they sell both EID and Azure AD B2C, planning to discontinue Azure AD B2C maybe after 2030, with a promise to extend support until that time. I provide technical information and discuss the differences between EID and Azure AD B2C to our customer, which is why I evaluate Microsoft Entra External ID right now.
What is most valuable?
The best features of Microsoft Entra External ID include its unification of B2C functionality and B2E features. Microsoft calls it B2B, but it's better to say B2E since it means business to inside of your company, similar to the old Azure Active Directory. EID has both B2C functionalities and B2E functionality.
EID has a unified external identity provider, external application, and external user, unifying these objects and internal workforce users, as Microsoft calls them. EID unifies workforce users with external business partners, which is a very strong feature. Azure AD B2C cannot unify both, as it only provides B2C consumer identity IAM platform features. Therefore, the most important feature is the unification of B2C and B2E.
I have utilized the adaptive authentication feature of Microsoft Entra External ID; I evaluated and adopted it in a virtual environment that mimics a real customer system, similar to a sandbox. We evaluated and deployed EID to our customer system, including authentication.
What needs improvement?
Microsoft Entra External ID can be improved with additional features, specifically customizable flexibility and a customizable user interface for the login dialog. Currently, the login dialog has very limited customization options, which only include font styles, colors, text messages, or brand icons.
Last month, Entra ID introduced some customizable features in their login dialog, but this does not apply to Microsoft Entra External ID, indicating a significant gap between the two. In theory, Entra External ID can support many external identity providers where custom login dialogs could be integrated, potentially via SSO feature coordination, although I have not yet confirmed this. Hence, enhanced customizable login options and the ability to use attribute password logins are critical features that are required for Microsoft Entra External ID to gain dominance in the authentication market.
What was my experience with deployment of the solution?
The initial setup of Microsoft Entra External ID is not overly complex, although it's essential for an administrator to fully understand the background theory and architecture of both Microsoft Entra External ID and Azure portal, as well as Entra ID itself. This understanding can be challenging for ordinary engineers. Once you grasp the components and architecture—that is, having a tenant for Microsoft Entra External ID, Entra ID, and Azure AD B2C—it's not difficult to create the tenant and add users or external identity providers.
What do I think about the stability of the solution?
Microsoft Entra External ID operates entirely as a SaaS solution; they do not offer on-premises deployment options, making it straightforward in that regard.
What do I think about the scalability of the solution?
For Microsoft Entra External ID, there are several types of users: internal, external, and invited external users. Internal users can use password authentication, while external users can use email OTP for password authentication. For B2B collaboration, internal company employees, referred to as workforce users, can log in using some authentication method linked to their Azure ID or Entra ID, allowing for SSO log-in.
The authentication methods available are very limited, and this presents a weak point. EID does not support other forms of attribute password authentication, such as phone number and password combinations. The only authentication options are UPN or email, with UPN being a format derived from the person's email and EID tenant domain. This is one of EID's weak points compared to Azure AD B2C, which offers customizable authentication options, including attribute and password combinations.
How are customer service and support?
I do not have support from Microsoft; the only assistance I've received was regarding the discontinuation date of Azure AD B2C. From May onward, customers who purchased Azure AD B2C can still create tenants and utilize the service until 2030. However, companies without a Microsoft license for Entra ID or Azure portal cannot add Azure AD B2C, creating logistical issues for some of my clients who are unable to evaluate the platform. This has introduced some challenges for consultants.
How would you rate customer service and support?
How was the initial setup?
The initial setup of Microsoft Entra External ID is not overly complex, although it's essential for an administrator to fully understand the background theory and architecture of both Microsoft Entra External ID and Azure portal, as well as Entra ID itself. This understanding can be challenging for ordinary engineers.
Once you grasp the components and architecture—that is, having a tenant for Microsoft Entra External ID, Entra ID, and Azure AD B2C—it's not difficult to create the tenant and add users or external identity providers. However, bringing in an identity consultant during the initial setup phase can greatly streamline the introduction of Entra ID; after that, operation and administration become much easier.
What about the implementation team?
I do not have support from Microsoft; the only assistance I've received was regarding the discontinuation date of Azure AD B2C. From May onward, customers who purchased Azure AD B2C can still create tenants and utilize the service until 2030.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.