You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory-b2c/api-connectors-overview.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -87,7 +87,7 @@ Using Azure AD B2C, you can add your own business logic to a user journey by cal
87
87

88
88
89
89
> [!NOTE]
90
-
> HTTP requests may be cancelled if there is a slow or no response from the RESTful service to Azure AD B2C. The default timeout is 10 seconds and the default retry count is one (meaning there are 2 tries in total).
90
+
> HTTP requests may be cancelled if there is a slow or no response from the RESTful service to Azure AD B2C. The default timeout is 10 seconds for custom policies and 5 seconds for user flows. The default retry count is one (meaning there are 2 tries in total).
Copy file name to clipboardExpand all lines: articles/active-directory-b2c/authorization-code-flow.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -233,7 +233,7 @@ A successful token response looks like this:
233
233
| access_token |The signed JWT that you requested. |
234
234
| scope |The scopes that the token is valid for. You also can use the scopes to cache tokens for later use. |
235
235
| expires_in |The length of time that the token is valid (in seconds). |
236
-
| refresh_token |An OAuth 2.0 refresh token. The app can use this token to acquire additional tokens after the current token expires. Refresh tokens are long-lived, and can be used to retain access to resources for extended periods of time. For more information, see the [Azure AD B2C token reference](tokens-overview.md). |
236
+
| refresh_token |An OAuth 2.0 refresh token. The app can use this token to acquire additional tokens after the current token expires. Refresh tokens are long-lived and can be used to retain access to resources for extended periods of time. For more information, see the [Azure AD B2C token reference](tokens-overview.md). |
Copy file name to clipboardExpand all lines: articles/active-directory-b2c/billing.md
+1-40Lines changed: 1 addition & 40 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,7 @@ author: kengaderdus
5
5
manager: CelesteDG
6
6
ms.service: azure-active-directory
7
7
ms.topic: reference
8
-
ms.date: 03/10/2025
8
+
ms.date: 06/10/2025
9
9
ms.author: kengaderdus
10
10
ms.subservice: b2c
11
11
ms.custom: fasttrack-edit
@@ -36,18 +36,6 @@ Also, if you choose to provide higher levels of assurance by using multifactor a
36
36
> [!IMPORTANT]
37
37
> This article does not contain pricing details. For the latest information about usage billing and pricing, see [Azure Active Directory B2C pricing](https://azure.microsoft.com/pricing/details/active-directory-b2c/). See also [Azure AD B2C region availability and data residency](data-residency.md) for details about where the Azure AD B2C service is available and where user data is stored.
38
38
39
-
## What do I need to do?
40
-
41
-
To take advantage of MAU billing, your Azure AD B2C tenant must be linked to an Azure subscription. You might also need to switch your Azure AD B2C tenant to another pricing tier if you want to use Azure AD B2C Premium P2 features, like risk-based Conditional Access policies.
42
-
43
-
|If your tenant is: |You need to: |
44
-
|---------|---------|
45
-
| An Azure AD B2C tenant already billed on a per-MAU basis | Do nothing. When users authenticate to your Azure AD B2C tenant, you'll be automatically billed using the MAU-based billing model. |
46
-
| An Azure AD B2C tenant not yet linked to a subscription |[Link your Azure AD B2C tenant to a subscription](#link-an-azure-ad-b2c-tenant-to-a-subscription) to activate MAU billing. |
47
-
| An Azure AD B2C tenant that was linked to a subscription before November 1, 2019 |[Switch to MAU billing (recommended)](#switch-to-mau-billing-pre-november-2019-azure-ad-b2c-tenants), or stay on the per-authentication billing model. |
48
-
| An Azure AD B2C tenant and you want to use premium features (like risk-based Conditional Access policies) |[Change to a Microsoft Entra pricing tier](#change-your-azure-ad-pricing-tier) that supports the features you want to use. |
49
-
|||
50
-
51
39
## About the monthly active users (MAU) billing model
52
40
53
41
MAU billing went into effect for Azure AD B2C tenants on **November 1, 2019**. Any Azure AD B2C tenants that you created and linked to a subscription on or after that date have been billed on a per-MAU basis.
@@ -99,33 +87,6 @@ A subscription linked to an Azure AD B2C tenant can be used for the billing of A
99
87
100
88
After you complete these steps for an Azure AD B2C tenant, your Azure subscription is billed based on your Azure Direct or Enterprise Agreement details, if applicable.
101
89
102
-
103
-
<aname='change-your-azure-ad-pricing-tier'></a>
104
-
105
-
## Change your Microsoft Entra pricing tier
106
-
107
-
A tenant must be linked to the appropriate Azure pricing tier based on the features you want to use with your Azure AD B2C tenant. Premium features require Azure AD B2C Premium P1 or P2, as described in the [Azure Active Directory B2C pricing](https://azure.microsoft.com/pricing/details/active-directory-b2c/).
108
-
109
-
In some cases, you'll need to upgrade your pricing tier as you use new features. For example, if you want to use [Identity Protection](conditional-access-identity-protection-overview.md), risk-based Conditional Access policies, and any future Premium P2 capabilities with Azure AD B2C.
110
-
111
-
To change your pricing tier, follow these steps:
112
-
113
-
1. Sign in to the [Azure portal](https://portal.azure.com/).
114
-
115
-
1. If you have access to multiple tenants, select the **Settings** icon in the top menu to switch to your Microsoft Entra ID tenant from the **Directories + subscriptions** menu.
116
-
117
-
1. In the search box at the top of the portal, enter the name of your Azure AD B2C tenant. Then select the tenant in the search results under **Resources**.
118
-
119
-

120
-
121
-
1. On the resource **Overview** page, under **Pricing tier**, select **change**.
122
-
123
-

124
-
125
-
1. Select the pricing tier that includes the features you want to enable.
126
-
127
-

128
-
129
90
Learn about the [Microsoft Entra ID features, which are supported in Azure AD B2C](supported-azure-ad-features.md).
Copy file name to clipboardExpand all lines: articles/active-directory-b2c/conditional-access-identity-protection-overview.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,10 +4,10 @@ description: Learn how Identity Protection gives you visibility into risky sign-
4
4
ms.service: azure-active-directory
5
5
ms.subservice: b2c
6
6
ms.topic: overview
7
-
ms.date: 01/11/2024
7
+
ms.date: 06/12/2025
8
8
ms.author: kengaderdus
9
9
author: kengaderdus
10
-
manager: CelesteDG
10
+
manager: mwongerapk
11
11
ms.collection: M365-identity-device-management
12
12
13
13
#Customer intent: As an Azure AD B2C application owner, I want to enhance the security of my applications by using Identity Protection and Conditional Access, so that I can detect and respond to risky authentications and enforce organizational policies.
@@ -24,7 +24,7 @@ If you're already familiar with [Identity Protection](../active-directory/identi
24
24

25
25
26
26
> [!NOTE]
27
-
> Azure AD B2C **Premium P2** is required to create risky sign-in policies.**Premium P1** tenants can create a policy that is based on location, application, user-based, or group-based policies. For more information, see [Change your Azure AD B2C pricing tier](billing.md#change-your-azure-ad-pricing-tier).
27
+
> Azure AD B2C **Premium P2** is required to create risky sign-in policies but it has now been deprecated as of May 1, 2025..**Premium P1** tenants can create a policy that is based on location, application, user-based, or group-based policies.
28
28
29
29
## Benefits of Identity Protection and Conditional Access for Azure AD B2C
Copy file name to clipboardExpand all lines: articles/active-directory-b2c/conditional-access-user-flow.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,7 @@ description: Learn how to add Conditional Access to Azure AD B2C user flows. Con
5
5
ms.service: azure-active-directory
6
6
ms.subservice: b2c
7
7
ms.topic: overview
8
-
ms.date: 02/18/2025
8
+
ms.date: 06/12/2025
9
9
ms.author: kengaderdus
10
10
author: kengaderdus
11
11
manager: CelesteDG
@@ -86,7 +86,7 @@ When using the Microsoft Entra Conditional Access, consider the following:
86
86
87
87
## Pricing tier
88
88
89
-
Azure AD B2C **Premium P2** is required to create risky sign-in policies. **Premium P1** tenants can create a policy that is based on location, application, user-based, or group-based policies. For more information, see [Change your Azure AD B2C pricing tier](billing.md#change-your-azure-ad-pricing-tier)
89
+
Azure AD B2C **Premium P2** is required to create risky sign-in policies but it has now been deprecated as of May 1, 2025. **Premium P1** tenants can create a policy that is based on location, application, user-based, or group-based policies.
90
90
91
91
## Prepare your Azure AD B2C tenant
92
92
@@ -438,4 +438,4 @@ To review the result of a Conditional Access event:
438
438
439
439
## Related content
440
440
441
-
[Customize the user interface in an Azure AD B2C user flow](customize-ui-with-html.md)
441
+
[Customize the user interface in an Azure AD B2C user flow](customize-ui-with-html.md)
0 commit comments