In Azure AD B2C we had the following setup:
We configured Entra ID as an identity provider using a multi-tenant app.
This allowed any Entra ID user (from any tenant) to log in.
After login, we had a technical profile that called an Azure Function. The function would check if the user’s tenant ID was in a list of allowed tenants, and either continue or block the sign-in.
This gave us a nice pattern: users didn’t need an invitation or pre-registration. They just logged in with their Entra ID account, and we handled tenant allow/deny logic ourselves.
Now we are migrating to Azure External ID (customers). What I see is:
Users must either be invited first or go through sign-up to create a customer account.
There doesn’t seem to be a way to reproduce the “just-in-time” federation flow we had in B2C with Entra ID as IdP.
I thought about bypassing this by adding Entra ID as a custom OIDC provider pointing to https://login.microsoftonline.com/organizations/v2.0/.well-known/openid-configuration, but it looks like External ID doesn’t allow Microsoft Entra as a custom OIDC IdP (issuer URI validation blocks it).
Question: Is there any way in Azure External ID (customers) to reproduce the old B2C pattern where any Entra ID user can sign in without invitation or self-service sign-up, and I implement my own logic to restrict tenants (e.g., via API call/claims validation)? Or is this simply not supported in External ID?