{"id":3162,"date":"2024-06-28T15:17:22","date_gmt":"2024-06-28T14:17:22","guid":{"rendered":"https:\/\/cwsisecurity.com\/?p=3162"},"modified":"2026-04-07T17:01:16","modified_gmt":"2026-04-07T16:01:16","slug":"what-is-microsoft-azure-b2b","status":"publish","type":"post","link":"https:\/\/cwsisecurity.com\/nl\/what-is-microsoft-azure-b2b\/","title":{"rendered":"What is Microsoft Azure B2B?"},"content":{"rendered":"\n<p>Granting external users access to your resources while maintaining security can be quite the challenge. Efficiently granting access to external suppliers and collaborators is essential for organisations, as it allows them to leverage the specialised skills of their partners. However, these external users often lack the same onboarding, offboarding, and governance procedures as internal employees.<\/p>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-28f84493 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<p>Many organisations still provide external users with access by creating a local account within their directory and giving them username and password logins. The downside of this approach is that it introduces an extra set of credentials that the security team needs to protect and manage. Additionally, this method disassociates the partner&#8217;s access from their own company. This means that if users leave their original organisation, they may still retain access to your systems, posing a significant security threat. In this blog post, we will explore what <a href=\"https:\/\/cwsisecurity.com\/our-services-old\/azure-security-services\/\">Azure<\/a> B2B (now <a href=\"https:\/\/cwsisecurity.com\/our-four-practices\/secure-productivity\/identity-and-access-management\/microsoft-entra\/\" target=\"_blank\" rel=\"noreferrer noopener\">Entra<\/a> B2B) is and how it can help facilitate collaboration with external partners without increasing security risks.<\/p>\n<\/div>\n<\/div>\n\n\n\n<div style=\"height:40px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-what-is-azure-active-directory\">What is Azure Active Directory?<\/h2>\n\n\n\n<div style=\"height:14px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p><strong><a href=\"https:\/\/cwsisecurity.com\/our-four-practices\/secure-cloud\/platform-security-services\/azure-security-services\/\" target=\"_blank\" rel=\"noreferrer noopener\">Azure<\/a> Active Directory (Azure AD) is the core of <a href=\"https:\/\/cwsisecurity.com\/our-four-practices\/secure-productivity\/identity-and-access-management\/\" target=\"_blank\" rel=\"noreferrer noopener\">identity management<\/a> services and features in Azure. It offers traditional username and password identity management, allowing users to be created in Azure AD manually using the Azure portal or programmatically using the Azure SDK, PowerShell, and the Graph API.<\/strong><\/p>\n\n\n\n<p>Azure AD also offers roles and permission management, known as role-based access control (RBAC), to give access and permissions to various resources in Azure, such as management and resource groups, databases, applications, and more. In addition, Azure AD provides enterprise-grade solutions, such as <a href=\"https:\/\/cwsisecurity.com\/number-matching-and-additional-context-in-microsoft-authenticator\/\">multifactor authentication (MFA)<\/a>, application monitoring, solution monitoring, and alerting. Azure AD can easily be integrated with your on-premises Active Directory to create a hybrid infrastructure.<\/p>\n\n\n\n<div style=\"height:40px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-what-is-azure-b2b\">What is Azure B2B?<\/h2>\n\n\n\n<div style=\"height:14px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p><strong>Azure AD B2B is a feature of Azure AD that facilitates seamless and secure collaboration with external users. By using the Azure B2B invitation manager API, you can create a shadow user object in your directory and provision access while linking this access to the partner&#8217;s company identity.<\/strong><\/p>\n\n\n\n<p>During authentication, the user will identify with their company account. You maintain full control over their access permissions and your corporate data. Azure AD B2B is suitable for partners of any size, regardless of whether they have Azure AD or an IT department.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/cwsisecurity.com\/wp-content\/uploads\/2024\/07\/Azure-B-B-images-1024x597.png\" alt=\"What is Azure AD B2B\" class=\"wp-image-3169\"\/><\/figure>\n\n\n\n<div style=\"height:15px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-benefits-of-azure-b2b\">Benefits of Azure B2B<\/h2>\n\n\n\n<div style=\"height:14px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>Azure B2B offers a robust and versatile solution for managing external collaboration and access. By leveraging Azure B2B, organisations can enjoy numerous benefits that enhance productivity, security, and control. Here are some of the key advantages:<\/p>\n\n\n\n<div style=\"height:14px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-1-integration-with-office-365\"><mark style=\"background-color:rgba(0, 0, 0, 0);color:#2e328c\" class=\"has-inline-color\">1. Integration with Office 365<\/mark><\/h3>\n\n\n\n<div style=\"height:14px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>Azure B2B is fully integrated into Office 365 apps, making it easy to share rich experiences.<\/p>\n\n\n\n<div style=\"height:40px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-2-compatibility-with-custom-apps\"><mark style=\"background-color:rgba(0, 0, 0, 0);color:#2e328c\" class=\"has-inline-color\">2. Compatibility with Custom Apps<\/mark><\/h3>\n\n\n\n<div style=\"height:14px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>It works seamlessly with custom apps and resources that use Azure AD, allowing guests to access your custom business applications and third-party applications.<\/p>\n\n\n\n<div style=\"height:40px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-3-seamless-collaboration\"><mark style=\"background-color:rgba(0, 0, 0, 0);color:#2e328c\" class=\"has-inline-color\">3. Seamless Collaboration<\/mark><\/h3>\n\n\n\n<div style=\"height:14px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>Azure B2B enables smooth <a href=\"https:\/\/cwsisecurity.com\/secure-productivity-and-collaboration\/\" target=\"_blank\" rel=\"noreferrer noopener\">collaboration<\/a> between your organisation\u2019s users and trusted guests from external organisations.<\/p>\n\n\n\n<div style=\"height:40px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-4-secure-access\"><mark style=\"background-color:rgba(0, 0, 0, 0);color:#2e328c\" class=\"has-inline-color\">4. Secure Access<\/mark><\/h3>\n\n\n\n<div style=\"height:14px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>External users can sign in with their own credentials and securely access shared resources and applications.<\/p>\n\n\n\n<div style=\"height:40px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-5-full-control\"><mark style=\"background-color:rgba(0, 0, 0, 0);color:#2e328c\" class=\"has-inline-color\">5. Full Control<\/mark><\/h3>\n\n\n\n<div style=\"height:14px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>You maintain complete control over what external users can access, ensuring your data remains protected.<\/p>\n\n\n\n<div style=\"height:40px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-how-does-azure-b2b-authentication-work\">How Does Azure B2B Authentication Work?<\/h2>\n\n\n\n<div style=\"height:14px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>Azure B2B authentication works by linking external users&#8217; access to their own organization&#8217;s credentials. When an external user is invited to collaborate, they receive an email invitation. Upon accepting, they authenticate using their home organisation&#8217;s identity provider. Azure AD then creates a shadow account for the user in your directory, allowing you to manage their permissions and access without having to manage their credentials.<\/p>\n\n\n\n<p>In essence, Azure AD B2B provides a robust solution for organisations looking to collaborate securely with external partners. By integrating external users through their existing credentials, Azure B2B minimises security risks and simplifies access management. This makes it an ideal choice for any organisation aiming to enhance collaboration while maintaining a strong security posture.<\/p>\n\n\n\n<div style=\"height:40px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-enabling-azure-ad-b2b\">Enabling Azure AD B2B<\/h2>\n\n\n\n<div style=\"height:14px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-sign-in\"><mark style=\"background-color:rgba(0, 0, 0, 0);color:#2e328c\" class=\"has-inline-color\">Sign In<\/mark><\/h3>\n\n\n\n<div style=\"height:14px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>To begin enabling Azure AD B2B, sign in to the Azure B2B portal using a global administrator account. Then, open the Azure Active Directory service. Select \u2018External Identities\u2019, then \u2018External collaboration settings\u2019.<\/p>\n\n\n\n<div style=\"height:40px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-guest-user-access\"><mark style=\"background-color:rgba(0, 0, 0, 0);color:#2e328c\" class=\"has-inline-color\">Guest User Access<\/mark><\/h3>\n\n\n\n<div style=\"height:14px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>This is where you will select your guests\u2019 user access level:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Same access as members<\/strong> &#8211; Guests have full access to Azure AD resources.<\/li>\n\n\n\n<li><strong>Default limited access<\/strong> &#8211; Guests have limited access to tasks and data.<\/li>\n\n\n\n<li><strong>Restricted to own data<\/strong> &#8211; This is the most restrictive option, where guests can only access their own profiles.<\/li>\n<\/ul>\n\n\n\n<div style=\"height:40px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-guest-invite\"><mark style=\"background-color:rgba(0, 0, 0, 0);color:#2e328c\" class=\"has-inline-color\">Guest Invite<\/mark><\/h3>\n\n\n\n<div style=\"height:14px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Anyone can invite guests<\/strong> &#8211; Guests and non-admins can invite other guests.<\/li>\n\n\n\n<li><strong>Members and select admins can invite<\/strong> &#8211; Specific members and admins with select roles can invite guests.<\/li>\n\n\n\n<li><strong>Specific admins can invite<\/strong> &#8211; Admins with roles such as Global Administrators or Guest Inviter can invite guests.<\/li>\n\n\n\n<li><strong>No one can invite<\/strong> &#8211; Most restrictive setting, where no one can invite guests.<\/li>\n<\/ul>\n\n\n\n<div style=\"height:40px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-external-user-leave-amp-user-flows\"><mark style=\"background-color:rgba(0, 0, 0, 0);color:#2e328c\" class=\"has-inline-color\">External User Leave &amp; User Flows<\/mark><\/h3>\n\n\n\n<div style=\"height:14px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>To allow users to sign up successfully, select \u2018yes\u2019 to enable guest self-service sign-up. In terms of external user leave, this is where users can remove themselves from your organisation. Selecting \u2018yes\u2019 will allow them to leave without admin permission.<\/p>\n\n\n\n<div style=\"height:40px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-is-azure-b2b-free\">Is Azure B2B Free?<\/h2>\n\n\n\n<div style=\"height:14px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>Azure AD B2B pricing follows the External Identities model, based on monthly active users. It offers three tiers:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Free Tier <\/strong>&#8211; 50,000 free MAU for Premium P1 and P2 features.<\/li>\n\n\n\n<li><strong>Flexible Tiers<\/strong> &#8211; This lets you connect with customers and partners based on the usage and features you require.<\/li>\n\n\n\n<li><strong>Predictable Tier<\/strong> &#8211; Pay only for what you use, with no extra charges.<\/li>\n<\/ul>\n\n\n\n<p>This model is designed to provide flexible and cost-effective billing, with most customers utilising Azure AD External Identities for free.<\/p>\n\n\n\n<div style=\"height:40px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-comparing-azure-b2b-to-b2c\">Comparing Azure B2B to B2C<\/h2>\n\n\n\n<div style=\"height:14px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>Azure AD offers two solutions: B2B and B2C. B2C, as a customer identity access management (CIAM) solution, supports millions of users, allowing sign-ins with external identities like Facebook or Gmail. It provides customisable sign-up, sign-in, and profile management options.<\/p>\n\n\n\n<p>B2C is currently more customisable, however, B2B is rapidly gaining new features, such as API connectors and custom layouts. Microsoft may eventually merge their functionality into an identity portal.<\/p>\n\n\n\n<div style=\"height:40px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-contact-cwsi-today\"><mark style=\"background-color:rgba(0, 0, 0, 0);color:#52a6db\" class=\"has-inline-color\">Contact CWSI Today<\/mark><\/h2>\n\n\n\n<div style=\"height:14px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>For over a decade, CWSI has played a crucial role in helping customers stay safe and secure. CWSI\u2019s specialist expertise in the Microsoft stack has led them to become a selected member of the <a href=\"https:\/\/cwsisecurity.com\/microsoft-intelligent-security-association-misa\/\" target=\"_blank\" rel=\"noreferrer noopener\">Microsoft Intelligent Security Association<\/a>, which is an exclusive group of premiere <a href=\"https:\/\/cwsisecurity.com\/partners\/\">security partners<\/a>.With three Microsoft Security Specialisations in <a href=\"https:\/\/cwsisecurity.com\/identity-and-access-management\/\" target=\"_blank\" rel=\"noreferrer noopener\">Identity and Access Management<\/a>, Information Protection and <a href=\"https:\/\/cwsisecurity.com\/governance-risk-and-compliance\/\" target=\"_blank\" rel=\"noreferrer noopener\">Governance<\/a>, and <a href=\"https:\/\/cwsisecurity.com\/threat-protection-engagement\/\" target=\"_blank\" rel=\"noreferrer noopener\">Threat Protection<\/a>, CWSI is your trusted <a href=\"https:\/\/cwsisecurity.com\/vendors\/microsoft\/\" target=\"_blank\" rel=\"noreferrer noopener\">Microsoft security partner<\/a>. <a href=\"https:\/\/cwsisecurity.com\/contact-us\/\" target=\"_blank\" rel=\"noreferrer noopener\">Get in touch<\/a> with our security experts today to begin your Microsoft security journey.<\/p>\n\n\n\n<div style=\"height:16px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<iframe loading=\"lazy\" src=\"https:\/\/cwsiinsights.cwsi.ie\/l\/1024581\/2024-06-28\/grgz1\" width=\"100%\" height=\"650\" type=\"text\/html\" frameborder=\"0\" allowTransparency=\"true\" style=\"border: 0\"><\/iframe>\n","protected":false},"excerpt":{"rendered":"<p>Granting external users access to your resources while maintaining security can be quite the challenge. Efficiently granting access to external suppliers and collaborators is essential for organisations, as it allows them to leverage the specialised skills of their partners. However, these external users often lack the same onboarding, offboarding, and governance procedures as internal employees. [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":495,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[93,4],"tags":[],"class_list":["post-3162","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-insights","category-our-voice"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.4 (Yoast SEO v27.5) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>What is Microsoft Azure B2B? | Blog | CWS<\/title>\n<meta name=\"description\" content=\"Learn the impressive benefits of Microsoft Azure B2B in this guide from CWSI Security. We discuss Azure Active Directory, B2B, and authentication in detail.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/cwsisecurity.com\/nl\/what-is-microsoft-azure-b2b\/\" \/>\n<meta property=\"og:locale\" content=\"nl_NL\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What is Microsoft Azure B2B?\" \/>\n<meta property=\"og:description\" content=\"Security made human. Compliance made simple. Protect your business without slowing it down.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cwsisecurity.com\/nl\/what-is-microsoft-azure-b2b\/\" \/>\n<meta property=\"og:site_name\" content=\"CWSI\" \/>\n<meta property=\"article:published_time\" content=\"2024-06-28T14:17:22+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-07T16:01:16+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Geschreven door\" \/>\n\t<meta name=\"twitter:data1\" content=\"fluroltd\" \/>\n\t<meta name=\"twitter:label2\" content=\"Geschatte leestijd\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/what-is-microsoft-azure-b2b\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/what-is-microsoft-azure-b2b\\\/\"},\"headline\":\"What is Microsoft Azure B2B?\",\"datePublished\":\"2024-06-28T14:17:22+00:00\",\"dateModified\":\"2026-04-07T16:01:16+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/what-is-microsoft-azure-b2b\\\/\"},\"wordCount\":1129,\"publisher\":{\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/what-is-microsoft-azure-b2b\\\/#primaryimage\"},\"thumbnailUrl\":\"\",\"articleSection\":[\"Insights\",\"Our Voice\"],\"inLanguage\":\"nl-NL\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/what-is-microsoft-azure-b2b\\\/\",\"url\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/what-is-microsoft-azure-b2b\\\/\",\"name\":\"What is Microsoft Azure B2B? | Blog | CWS\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/what-is-microsoft-azure-b2b\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/what-is-microsoft-azure-b2b\\\/#primaryimage\"},\"thumbnailUrl\":\"\",\"datePublished\":\"2024-06-28T14:17:22+00:00\",\"dateModified\":\"2026-04-07T16:01:16+00:00\",\"description\":\"Learn the impressive benefits of Microsoft Azure B2B in this guide from CWSI Security. We discuss Azure Active Directory, B2B, and authentication in detail.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/what-is-microsoft-azure-b2b\\\/#breadcrumb\"},\"inLanguage\":\"nl-NL\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/what-is-microsoft-azure-b2b\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"nl-NL\",\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/what-is-microsoft-azure-b2b\\\/#primaryimage\",\"url\":\"\",\"contentUrl\":\"\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/what-is-microsoft-azure-b2b\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What is Microsoft Azure B2B?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/#website\",\"url\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/\",\"name\":\"CWSI\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"nl-NL\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/#organization\",\"name\":\"CWSI\",\"url\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"nl-NL\",\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/cwsisecurity.com\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/cwsi-logo-1.svg\",\"contentUrl\":\"https:\\\/\\\/cwsisecurity.com\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/cwsi-logo-1.svg\",\"width\":125,\"height\":30,\"caption\":\"CWSI\"},\"image\":{\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/company\\\/cwsi\\\/\",\"https:\\\/\\\/www.youtube.com\\\/@cwsimobileandcloudsecurity361\"],\"description\":\"Security made human. Compliance made simple. Protect your business without slowing it down.\",\"email\":\"info.uk@cwsisecurity.com\",\"telephone\":\"+44 1189 344 300\",\"legalName\":\"CWSI Security\",\"numberOfEmployees\":{\"@type\":\"QuantitativeValue\",\"minValue\":\"51\",\"maxValue\":\"200\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/#\\\/schema\\\/person\\\/870becf0b1e6869361f9510f90f8ce2a\",\"name\":\"fluroltd\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"nl-NL\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/0492477e307cc28ed8761cab1677dce42cc40ae7f2916d59342459994fc75bc6?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/0492477e307cc28ed8761cab1677dce42cc40ae7f2916d59342459994fc75bc6?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/0492477e307cc28ed8761cab1677dce42cc40ae7f2916d59342459994fc75bc6?s=96&d=mm&r=g\",\"caption\":\"fluroltd\"},\"sameAs\":[\"https:\\\/\\\/cwsisecurity.com\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"What is Microsoft Azure B2B? | Blog | CWS","description":"Learn the impressive benefits of Microsoft Azure B2B in this guide from CWSI Security. We discuss Azure Active Directory, B2B, and authentication in detail.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/cwsisecurity.com\/nl\/what-is-microsoft-azure-b2b\/","og_locale":"nl_NL","og_type":"article","og_title":"What is Microsoft Azure B2B?","og_description":"Security made human. Compliance made simple. Protect your business without slowing it down.","og_url":"https:\/\/cwsisecurity.com\/nl\/what-is-microsoft-azure-b2b\/","og_site_name":"CWSI","article_published_time":"2024-06-28T14:17:22+00:00","article_modified_time":"2026-04-07T16:01:16+00:00","twitter_card":"summary_large_image","twitter_misc":{"Geschreven door":"fluroltd","Geschatte leestijd":"5 minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/cwsisecurity.com\/nl\/what-is-microsoft-azure-b2b\/#article","isPartOf":{"@id":"https:\/\/cwsisecurity.com\/nl\/what-is-microsoft-azure-b2b\/"},"headline":"What is Microsoft Azure B2B?","datePublished":"2024-06-28T14:17:22+00:00","dateModified":"2026-04-07T16:01:16+00:00","mainEntityOfPage":{"@id":"https:\/\/cwsisecurity.com\/nl\/what-is-microsoft-azure-b2b\/"},"wordCount":1129,"publisher":{"@id":"https:\/\/cwsisecurity.com\/nl\/#organization"},"image":{"@id":"https:\/\/cwsisecurity.com\/nl\/what-is-microsoft-azure-b2b\/#primaryimage"},"thumbnailUrl":"","articleSection":["Insights","Our Voice"],"inLanguage":"nl-NL"},{"@type":"WebPage","@id":"https:\/\/cwsisecurity.com\/nl\/what-is-microsoft-azure-b2b\/","url":"https:\/\/cwsisecurity.com\/nl\/what-is-microsoft-azure-b2b\/","name":"What is Microsoft Azure B2B? | Blog | CWS","isPartOf":{"@id":"https:\/\/cwsisecurity.com\/nl\/#website"},"primaryImageOfPage":{"@id":"https:\/\/cwsisecurity.com\/nl\/what-is-microsoft-azure-b2b\/#primaryimage"},"image":{"@id":"https:\/\/cwsisecurity.com\/nl\/what-is-microsoft-azure-b2b\/#primaryimage"},"thumbnailUrl":"","datePublished":"2024-06-28T14:17:22+00:00","dateModified":"2026-04-07T16:01:16+00:00","description":"Learn the impressive benefits of Microsoft Azure B2B in this guide from CWSI Security. We discuss Azure Active Directory, B2B, and authentication in detail.","breadcrumb":{"@id":"https:\/\/cwsisecurity.com\/nl\/what-is-microsoft-azure-b2b\/#breadcrumb"},"inLanguage":"nl-NL","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cwsisecurity.com\/nl\/what-is-microsoft-azure-b2b\/"]}]},{"@type":"ImageObject","inLanguage":"nl-NL","@id":"https:\/\/cwsisecurity.com\/nl\/what-is-microsoft-azure-b2b\/#primaryimage","url":"","contentUrl":""},{"@type":"BreadcrumbList","@id":"https:\/\/cwsisecurity.com\/nl\/what-is-microsoft-azure-b2b\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/cwsisecurity.com\/nl\/"},{"@type":"ListItem","position":2,"name":"What is Microsoft Azure B2B?"}]},{"@type":"WebSite","@id":"https:\/\/cwsisecurity.com\/nl\/#website","url":"https:\/\/cwsisecurity.com\/nl\/","name":"CWSI","description":"","publisher":{"@id":"https:\/\/cwsisecurity.com\/nl\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/cwsisecurity.com\/nl\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"nl-NL"},{"@type":"Organization","@id":"https:\/\/cwsisecurity.com\/nl\/#organization","name":"CWSI","url":"https:\/\/cwsisecurity.com\/nl\/","logo":{"@type":"ImageObject","inLanguage":"nl-NL","@id":"https:\/\/cwsisecurity.com\/nl\/#\/schema\/logo\/image\/","url":"https:\/\/cwsisecurity.com\/wp-content\/uploads\/2026\/03\/cwsi-logo-1.svg","contentUrl":"https:\/\/cwsisecurity.com\/wp-content\/uploads\/2026\/03\/cwsi-logo-1.svg","width":125,"height":30,"caption":"CWSI"},"image":{"@id":"https:\/\/cwsisecurity.com\/nl\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/cwsi\/","https:\/\/www.youtube.com\/@cwsimobileandcloudsecurity361"],"description":"Security made human. Compliance made simple. Protect your business without slowing it down.","email":"info.uk@cwsisecurity.com","telephone":"+44 1189 344 300","legalName":"CWSI Security","numberOfEmployees":{"@type":"QuantitativeValue","minValue":"51","maxValue":"200"}},{"@type":"Person","@id":"https:\/\/cwsisecurity.com\/nl\/#\/schema\/person\/870becf0b1e6869361f9510f90f8ce2a","name":"fluroltd","image":{"@type":"ImageObject","inLanguage":"nl-NL","@id":"https:\/\/secure.gravatar.com\/avatar\/0492477e307cc28ed8761cab1677dce42cc40ae7f2916d59342459994fc75bc6?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/0492477e307cc28ed8761cab1677dce42cc40ae7f2916d59342459994fc75bc6?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0492477e307cc28ed8761cab1677dce42cc40ae7f2916d59342459994fc75bc6?s=96&d=mm&r=g","caption":"fluroltd"},"sameAs":["https:\/\/cwsisecurity.com"]}]}},"_links":{"self":[{"href":"https:\/\/cwsisecurity.com\/nl\/wp-json\/wp\/v2\/posts\/3162","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cwsisecurity.com\/nl\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cwsisecurity.com\/nl\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cwsisecurity.com\/nl\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cwsisecurity.com\/nl\/wp-json\/wp\/v2\/comments?post=3162"}],"version-history":[{"count":1,"href":"https:\/\/cwsisecurity.com\/nl\/wp-json\/wp\/v2\/posts\/3162\/revisions"}],"predecessor-version":[{"id":8351,"href":"https:\/\/cwsisecurity.com\/nl\/wp-json\/wp\/v2\/posts\/3162\/revisions\/8351"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cwsisecurity.com\/nl\/wp-json\/"}],"wp:attachment":[{"href":"https:\/\/cwsisecurity.com\/nl\/wp-json\/wp\/v2\/media?parent=3162"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cwsisecurity.com\/nl\/wp-json\/wp\/v2\/categories?post=3162"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cwsisecurity.com\/nl\/wp-json\/wp\/v2\/tags?post=3162"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}