Edit

Share via


Supported features in workforce and external tenants

There are two ways to configure a Microsoft Entra tenant, depending on how an organization intends to use the tenant and the resources that you want to manage:

  • A workforce tenant configuration is for your employees, internal business apps, and other organizational resources. A workforce tenant uses B2B collaboration in Microsoft Entra External ID for collaboration with external business partners and guests.
  • An external tenant configuration is exclusively for External ID scenarios where you want to publish apps to consumers or business customers.

This article gives a detailed comparison of the features and capabilities in workforce and external tenants. For more information about these tenants, see Workforce and external tenant configurations in Microsoft Entra External ID.

Note

During the preview, features or capabilities that require a premium license are unavailable in external tenants.

General feature comparison

The following table compares the general features and capabilities in workforce and external tenants.

Feature Workforce tenant External tenant
External identities scenario Allow business partners and other external users to collaborate with your workforce. Guests can securely access your business applications through invitations or self-service sign-up. Use External ID to help secure your applications. Consumers and business customers can access your consumer apps through self-service sign-up. Invitations are also supported.
Local accounts Local accounts are supported for internal members of your organization only. Local accounts are supported for:
  • Consumers and business customers who use self-service sign-up.
  • Admin-created internal accounts (with or without an admin role).
All users in an external tenant have default permissions unless they're assigned an admin role.
Groups Use groups to manage administrative and user accounts. Use groups to manage administrative accounts. Support for Microsoft Entra groups and application roles is being phased into customer tenants. For the latest updates, see Groups and application roles support.
Roles and administrators Roles and administrators are fully supported for administrative and user accounts. Roles are supported for all users. All users in an external tenant have default permissions unless they're assigned an admin role.
Microsoft Entra ID Protection This product provides ongoing risk detection for your Microsoft Entra tenant. It allows organizations to discover, investigate, and remediate identity-based risks. Not available.
Microsoft Entra ID Governance This product enables organizations to govern identity and access lifecycles, along with secure privileged access. Learn more. Not available.
Self-service password reset Allow users to reset their password by using up to two authentication methods. Allow users to reset their password by using email with a one-time passcode or SMS. Learn more.
Language customization Customize the sign-in experience based on browser language when users authenticate into your corporate intranet or web-based applications. Use languages to modify the strings displayed to your customers as part of the sign-in and sign-up process. Learn more.
Custom attributes Use directory extension attributes to store more data in the Microsoft Entra directory for user objects, groups, tenant details, and service principals. Use directory extension attributes to store more data in the customer directory for user objects. Create custom user attributes and add them to your sign-up user flow. Learn more.
Pricing Get monthly active users (MAU) pricing for external guests through B2B collaboration (UserType=Guest). Get MAU pricing for all users in the external tenant regardless of role or UserType value.

Interface customization

The following table compares the features for interface customization in workforce and external tenants.

Feature Workforce tenant External tenant
Company branding You can add company branding that applies to all these experiences to create a consistent sign-in experience for your users. Same as workforce. Learn more.
Language customization Customize the sign-in experience by browser language. Same as workforce. Learn more.
Custom domain names You can use custom domains for administrative accounts only. You can use the custom URL domain feature for external tenants to brand app sign-in endpoints with your own domain name.
Native authentication for mobile apps Not available. Microsoft Entra native authentication gives you full control over the design of your mobile application's sign-in experiences.

Adding your own business logic

You can use custom authentication extensions to customize the Microsoft Entra authentication experience by integrating with external systems. A custom authentication extension is essentially an event listener. When you activate it, it makes an HTTP call to a REST API endpoint where you define your own business logic.

The following table compares the events for custom authentication extensions in workforce and external tenants.

Event Workforce tenant External tenant
TokenIssuanceStart Add claims from external systems. Add claims from external systems.
OnAttributeCollectionStart Not available. This event occurs at the beginning of the sign-up's attribute collection step, before the attribute collection page renders. You can add actions such as prefilling values and displaying a blocking error. Learn more.
OnAttributeCollectionSubmit Not available. This event occurs during the sign-up flow, after the user enters and submits attributes. You can add actions such as validating or modifying the user's entries. Learn more.
OnOtpSend Not available. Configure a custom email provider for one-time passcode send events. Learn more.

Identity providers and authentication methods

The following table compares the identity providers and methods for primary authentication and multifactor authentication (MFA) in workforce and external tenants.

Feature Workforce tenant External tenant
Identity providers for external users (primary authentication) For self-service sign-up guests:
  • Microsoft Entra accounts
  • Microsoft accounts
  • Emailed one-time passcode
  • Google federation
  • Facebook federation

For invited guests:
  • Microsoft Entra accounts
  • Microsoft accounts
  • Emailed one-time passcode
  • Google federation
  • SAML/WS-Fed federation
For self-service sign-up users (consumers, business customers):
For invited guests (preview) via a directory role (for example, admins):
You can invite external users for administrative purposes only. You can't use this feature to invite customers to sign in to your apps. This feature isn't compatible with customer identity and access management (CIAM) user flows.
Authentication methods for MFA For internal users (employees and admins):
For guests (invited or self-service sign-up):
For self-service sign-up users (consumers, business customers):
For invited users (preview):

Authentication methods available in External ID

You can use some authentication methods as the primary factor when users sign in to an application, such username and password. Other authentication methods are available only as a secondary factor. The following table outlines when you can use an authentication method during sign-in, self-service sign-up, self-service password reset, and MFA in External ID.

Method Sign-in Sign-up Password reset MFA
Email with password
Email one-time passcode
SMS-based authentication
Apple federation
Facebook federation
Google federation
Microsoft personal account (OpenID Connect)
Microsoft Entra ID federation
OpenID Connect federation
SAML/WS-Fed federation

Application registration

The following table compares the features for application registration in each type of tenant.

Feature Workforce tenant External tenant
Protocol Protocols include SAML relying parties, OpenID Connect, and OAuth2. Protocols include SAML relying parties, OpenID Connect, and OAuth2.
Supported account types The following account types are available:
  • Accounts in this organizational directory only (single tenant)
  • Accounts in any organizational directory (any Microsoft Entra tenant in a multitenant configuration)
  • Accounts in any organizational directory (any Microsoft Entra tenant in a multitenant configuration) and personal Microsoft accounts (such as Skype and Xbox)
  • Personal Microsoft accounts only
Always use accounts in this organizational directory only (single tenant).
Platform The following platforms are available:
  • Public client/native (mobile and desktop)
  • Web
  • Single-page application (SPA)
The following platforms are available:
  • Public client (mobile and desktop)
  • Web
  • SPA
  • Native authentication for mobile and single-page applications
Redirect URIs for authentication Microsoft Entra ID accepts these URIs as destinations when it returns authentication responses (tokens) after successfully authenticating or signing out users. Same as workforce.
Front-channel logout URL for authentication This URL is where Microsoft Entra ID sends a request to have the application clear the user's session data. The front-channel logout URL is required for single sign-out to work correctly. Same as workforce.
Implicit grant and hybrid flows for authentication Request a token directly from the authorization endpoint. Same as workforce.
Certificates and secrets Multiple credentials are available: Same as workforce.
Rotation for certificates and secrets Update client credentials to help ensure that they remain valid and secure, while users can continue to sign-in. You can rotate certificates, secrets, and federated credentials by adding a new one and then removing the old one. Same as workforce.
Policy for certificates and secrets Configure the application management policies to enforce secret and certificate restrictions. Not available.
API permissions Add, remove, and replace permissions to an application. After permissions are added to your application, users or admins need to grant consent to the new permissions. Learn more about updating an app's requested permissions in Microsoft Entra ID. The following permissions are allowed: Microsoft Graph offline_access, openid, and User.Read, along with your My APIs delegated permissions. Only an admin can consent on behalf of the organization.
Expose an API Define custom scopes to restrict access to data and functionality that the API helps protect. An application that requires access to parts of this API can request user or admin consent to one or more of these scopes. Same as workforce.
Owners Application owners can view and edit the application registration. Additionally, any user (who might not be listed) with administrative privileges to manage any application (for example, Cloud Application Administrator) can view and edit the application registration. Same as workforce.
Roles and administrators Administrative roles are used for granting access for privileged actions in Microsoft Entra ID. Only the Cloud Application Administrator role can be used for apps in external tenants. This role grants the ability to create and manage all aspects of application registrations and enterprise applications.

Access control for applications

The following table compares the features for application authorization in each type of tenant.

Feature Workforce tenant External tenant
Role-based access control (RBAC) You can define application roles for your application and assign those roles to users and groups. Microsoft Entra ID includes the user roles in the security token. Your application can then make authorization decisions based on the values in the security token. Same as workforce. Learn more about using role-based access control for applications in an external tenant. For available features, see Groups and application roles support.
Security groups You can use security groups to implement RBAC in your applications, where the memberships of users in specific groups are interpreted as their role memberships. Microsoft Entra ID includes user group membership in the security token. Your application can then make authorization decisions based on the values in the security token. Same as workforce. The group optional claims are limited to the group object ID.
Attribute-based access control (ABAC) You can configure the app to include user attributes in the access token. Your application can then make authorization decisions based on the values in the security token. For more information, see Token customization. Same as workforce.
Require user assignment When user assignment is required, only the users you assign to the application (either through direct user assignment or based on group membership) can sign in. For more information, see Manage user and group assignments to an application. Same as workforce. For details, see Groups and application roles support.

Enterprise applications

The following table compares the unique features for enterprise application registration in workforce and external tenants.

Feature Workforce tenant External tenant
Application gallery The application gallery contains thousands of applications that are integrated into Microsoft Entra ID. Choose from a range of integrated apps. To find a partner app, use the search bar. The application gallery catalog isn't available.
Register a custom enterprise application Add an enterprise application. Register a SAML app in your external tenant.
Self-service application assignment Let users self-discover apps. Self-service application assignment in the My Apps portal isn't available.
Application proxy Microsoft Entra application proxy provides secure remote access to on-premises web applications. Not available.
Deactivate app registration Deactivate an app registration to prevent token issuance while preserving configuration. Same as workforce.

The following table shows which consent and permission features are available for enterprise applications in each type of tenant.

Feature Workforce tenant External tenant
Admin consent for enterprise applications You can grant tenant-wide admin permissions. You can also review and revoke them. Same as workforce.
User consent for enterprise applications You can configure how users consent to applications, and you can update these permissions. Limited to permissions that don't require admin consent.
Review or revoke admin consent Review and revoke permissions. Use the Microsoft Entra admin center to revoke admin consent.
Review or revoke user consent Review and revoke permissions. Use Microsoft Graph API or PowerShell to revoke user consent.
Assign users or groups to apps You can manage access to apps in an individual or group-based assignment. Nested group memberships aren't supported. Same as workforce.
RBAC for app roles You can define and assign roles for fine-grained access control. Same as workforce.

OpenID Connect and OAuth2 flows

The following table compares the features for OAuth 2.0 and OpenID Connect authorization flows in each type of tenant.

Feature Workforce tenant External tenant
OpenID Connect Yes Yes
Authorization code Yes Yes
Authorization code with Proof Key for Code Exchange (PKCE) Yes Yes
Client credentials Yes v2.0 applications
Device authorization Yes Yes
On-behalf-of flow Yes Yes
Implicit grant Yes Yes
Resource owner password credentials Yes No; for mobile applications, use native authentication

Authority URL in OpenID Connect and OAuth2 flows

The authority URL indicates a directory that the Microsoft Authentication Library (MSAL) can request tokens from. For apps in external tenants, always use the following format: <tenant-name>.ciamlogin.com.

The following JSON shows an example of a .NET application appsettings.json file with an authority URL:

{
    "AzureAd": {
        "Authority": "https://<Enter_the_Tenant_Subdomain_Here>.ciamlogin.com/",
        "ClientId": "<Enter_the_Application_Id_Here>"
    }
}

Conditional Access

The following table compares the features for Microsoft Entra Conditional Access in each type of tenant.

Feature Workforce tenant External tenant
Assignments Users, groups, and workload identities. Include all users, and exclude users and groups. For more information, see Add multifactor authentication (MFA) to an app.
Target resources
Conditions
Grant Grant or block access to resources
Session Session controls The following session controls are available:
  • Sign-in frequency
  • Persistent browser session

Terms-of-use policies

The following table compares the features for terms-of-use policies in each type of tenant.

Feature Workforce tenant External tenant
Conditional Access policies See the Microsoft Entra terms of use. Not available.
Self-service sign-up Not available. Add a required attribute linked to your terms-of-use policies on the sign-up page. You can customize the hyperlink to support various languages.
Sign-in page You can add links to the lower-right corner for privacy information by using company branding. Same as workforce.

Account management

The following table compares the features for user management in each type of tenant. As noted in the table, certain account types are created through invitation or self-service sign-up. A user admin in the tenant can also create accounts via the admin center.

Feature Workforce tenant External tenant
Types of accounts
  • Internal members, such as employees and admins.
  • External users who are invited or use self-service sign-up.
  • External users created through self-service sign-up or by an admin.
  • Internal users, with or without an admin role.
  • Invited users (preview), with or without an admin role.
All users in an external tenant have default permissions unless they're assigned an admin role.
Manage user profile info Same as workforce, except cross-tenant synchronization isn't available.
Reset a user's password Administrators can reset a user's password if the user forgets the password, is locked out of a device, or never received a password. Same as workforce.
Restore or remove a recently deleted user After you delete a user, the account remains in a suspended state for 30 days. During that 30-day window, the user account can be restored, along with all its properties. Same as workforce.
Disable accounts Prevent the new user from signing in. Same as workforce.

Password protection

The following table compares the features for password protection in each type of tenant.

Feature Workforce tenant External tenant
Smart lockout Smart lockout helps lock out bad actors who try to guess your users' passwords or use brute-force methods to get in. Same as workforce.
Global banned passwords The global banned passwords list automatically blocks commonly used weak or compromised passwords based on analysis of Microsoft Entra security data. Same as workforce.
Custom banned passwords Use the custom banned passwords list to add specific strings to evaluate and block during password creation and reset. Same as workforce.

Token customization

The following table compares the features for token customization in each type of tenant.

Feature Workforce tenant External tenant
Claims mapping Customize claims issued in the JSON web token (JWT) for enterprise applications. Same as workforce. Optional claims must be configured through Attributes & Claims.
Claims transformation Apply a transformation to a user attribute issued in the JWT for enterprise applications. Same as workforce.
Custom claims provider Use a custom authentication extension that calls an external REST API to fetch claims from external systems. Same as workforce. Learn more.
Security groups Configure group optional claims. Configure group optional claims, limited to the group object ID.
Token lifetimes Specify the lifetime of security tokens issued by Microsoft Entra ID. Same as workforce.
Session and token revocation An administrator can invalidate all the refresh tokens and session for a user. Same as workforce.

Single sign-on

Single sign-on (SSO) provides a more seamless experience by reducing the number of times a user is asked for credentials. Users enter their credentials once. Other applications can reuse the established session on the same device and web browser without further prompting.

The following table compares the features for SSO in each type of tenant.

Feature Workforce tenant External tenant
Types of application registration
  • OpenID Connect
  • OAuth 2.0
  • SAML (enterprise application)

Enterprise applications offer more options, like password-based, linked, and header-based registration.
  • OpenID Connect
  • OAuth 2.0
  • SAML (enterprise application)
Domain name When a user is authenticated, a session cookie is set on the Microsoft Entra domain login.microsoftonline.com in the web browser. When a user is authenticated, a session cookie is set on the Microsoft Entra External ID domain <tenant-name>.ciamlogin.com or a custom URL domain in the web browser. To ensure that SSO functions correctly, use a single URL domain.
Stay signed in You can turn on or turn off the option to stay signed in. Same as workforce.
User provisioning Use automatic user provisioning with System for Cross-domain Identity Management (SCIM) to sync user accounts between External ID and supported apps. This approach keeps user data up to date automatically.

User provisioning supports differential queries. These queries sync only the changes since the last update. This behavior improves performance and reduces system load.
Same as workforce.
Session invalidation Scenarios where SSO might be invalidated, which requires reauthentication:
  • Session expiry
  • Browser issues, such as clearing browser cookies or cache
  • Conditional Access policy, such as a multifactor authentication requirement
  • Session revocation
  • Security issues, such as suspicious activity

The application specifies in the authorization request to prompt the user for credentials by using the login=prompt query string parameter in OpenID Connect and the ForceAuthn attribute in the SAML request.
Same as workforce.
Conditional Access Check the Conditional Access section. Check the Conditional Access section.
Microsoft Entra native authentication Not available. Native authentication doesn't support SSO.
Sign-out When a SAML or OpenID Connect application directs the user to the logout endpoint, Microsoft Entra ID removes and invalidates the user's session from the browser. Same as workforce.
Single sign-out Upon successful sign-out, Microsoft Entra ID sends a sign-out notification to all other SAML and OpenID Connect applications that the user is signed in to. Same as workforce.

Integrated security solutions

Microsoft Entra External ID supports integrated security features and partner solutions to help protect identities across the lifecycle. These capabilities include protection against distributed denial-of-service (DDoS) attacks, prevention of sign-up fraud, and unified monitoring.

You can enable these solutions directly in External ID and access partner integrations through the Microsoft Security Store. This approach allows organizations to deploy trusted security tools quickly without complex setup.

Feature Workforce tenant External tenant
Sign-up fraud protection The Security Store wizard experience isn't available. Use Arkose Labs and HUMAN Security to help protect against sign-up fraud and block automated bot attacks.
DDoS and web application firewall (WAF) protection The Security Store wizard experience isn't available. Use Cloudflare and Akamai to help protect against DDoS attacks and secure apps with a WAF.
Security analytics The Security Store wizard experience isn't available. Use Azure Monitor and Microsoft Sentinel to enable one-click monitoring, Log Analytics, and advanced threat detection.

Akamai and Cloudflare

Akamai and Cloudflare provide DDoS protection, bot mitigation, and WAF capabilities. These capabilities help defend applications against malicious traffic, abusive automation, and common web vulnerabilities such as SQL injection, cross‑site scripting, and API‑based attacks.

When you integrate either service with External ID, you can apply these security controls in front of your customer-facing identity flows. This action improves resilience and reduces exposure to credential stuffing and other identity‑targeted threats.

Activity logs and reports

The following table compares the features for activity logs and reports across various types of tenants.

Feature Workforce tenant External tenant
Audit logs These logs provide a detailed report of all events logged in Microsoft Entra ID, including modifications to applications, groups, and users. Same as workforce.
Sign-in logs The sign-in logs track all sign-in activities within a Microsoft Entra tenant, including access to your applications and resources. Same as workforce.
Sign-up logs (preview) Not available. Microsoft Entra External ID logs all self-service sign-up events, including both successful sign-ups and failed attempts.
Provisioning logs The provisioning logs provide detailed records of provisioning events within a tenant, such as user account creations, updates, and deletions. Not available.
Activity logs for retention policies Microsoft Entra data retention policies determine how long various types of logs (like audit, sign-in, and provisioning logs) are stored. Seven days.
Export activity logs By using diagnostic settings in Microsoft Entra ID, you can integrate logs with Azure Monitor, stream logs to an event hub, or integrate with security information and event management (SIEM) tools. Azure Monitor for external tenants (preview).
Reports for application user activity Not available. Application user activity provides analytics on how users interact with registered applications in your tenant. It tracks metrics like active users, new users, sign-ins, and MFA success rates.

Microsoft Graph APIs

All features that are supported in external tenants are also supported for automation through Microsoft Graph APIs. Some features that are in preview in external tenants might be generally available through Microsoft Graph. For more information, see Manage Microsoft Entra identity and network access by using Microsoft Graph.