Why Azure AD B2C's Retirement Is a Test of Your Identity Architecture
- Johann Nallathamby
- Director - Solutions Architecture, WSO2
Microsoft’s decision to retire Azure AD B2C Premium P2 and the looming uncertainty surrounding the P1 tier after 2030, is worth treating as more than a mere product transition. It is a loud signal about what happens when a critical piece of your enterprise architecture is dictated by a vendor's roadmap.
Customer identity sits at the center of your digital business. It dictates how customers access services, how fraud is detected, how revenue is protected, and how regulatory obligations are met. When a cloud provider retires or restructures a service this deeply embedded, the question it forces is not just operational; it is architectural: Do you control your identity platform, or does your vendor?
This article examines the practical implications of that question and explores why this retirement event is the ideal trigger to reassess the long-term design, flexibility, and governance of your identity architecture.
The dependency hidden inside bundled identity
Azure AD B2C packaged authentication, conditional access, and risk-based access controls into a single subscription model. For organizations already running on Azure, this made initial deployment straightforward and cost-effective.
However, the retirement of the P2 tier exposes the true cost of that convenience. The advanced capabilities your teams built fraud and authentication logic around were not owned by your organization; they were licensed features tied to a specific subscription tier. When Microsoft’s product strategy shifted toward Entra External ID, those capabilities shifted with it. The underlying business need for risk-based authentication did not disappear, but the subscription that delivered it did.
This is the inherent risk of bundled identity services. When policy, risk logic, and authentication are tightly coupled inside a single vendor product, your architectural decisions remain forever constrained by how that vendor chooses to package, price, and deprecate its platform.
Composable identity: A strategic decision, not a tactical migration
The immediate instinct for most engineering teams facing this retirement is to find the closest equivalent platform and execute a lift-and-shift migration. While a reasonable short-term response, it fails to ask whether the architecture that produced this dependency in the first place should be carried forward.
| Architectural Layer | Bundled Identity (Legacy) | Composable Identity (Modern) |
| Authentication & Tokens | Tied to the vendor ecosystem | Standards-based, vendor-agnostic |
| Risk & Fraud Scoring | "Black box" proprietary engine | Bring-your-own or best-of-breed external APIs |
| Policy Enforcement | Limited to vendor subscription tiers | Granular, organization-owned logic |
| Deployment & Data | Locked to the vendor's public cloud | Flexible (SaaS, Private Cloud, On-Premises) |
Composable identity solves this by separating the concerns that bundled platforms force together.The practical implication of this separation is control. When risk scoring is handled by an external engine your security team already owns, a change in your identity provider doesn't compromise your fraud capabilities. When authentication logic runs on open standards, your applications do not need deep code rewrites each time you adjust your platform strategy.
The question isn’t whether another solution can replicate P1 and P2 features. It is whether your next architecture gives your organization the ability to make platform decisions independently.
Reusing existing fraud investments
Many organizations using Azure AD B2C P2 relied on Microsoft's built-in risk framework to drive adaptive authentication. Its retirement raises an immediate question: What replaces that risk signal?
An underexamined option is the integration of fraud systems your organization already operates. If your security team has already built models, tuned thresholds, and established trust in a specific risk engine (e.g., Sift, LexisNexis, or an internal tool), that investment does not need to be retired alongside P2.
Through a composable approach, platforms like the WSO2 Identity Platform can call an external risk or fraud API in real-time during the login flow. By using the returned score to determine whether to allow access, require step-up authentication, or block the attempt, you carry your existing, proven fraud logic forward into the new architecture.
Deployment flexibility as a compliance strategy
Customer identity data like profiles, authentication events, session history, and behavioral signals is highly sensitive. It is increasingly subject to strict regulatory requirements dictating exactly where it can be stored and processed.
In hyperscaler-based CIAM deployments, this data typically lives inside the vendor’s public cloud environment. Depending on your regulatory context, this can create compliance exposure or limit your ability to pivot as data residency laws evolve. To act as a practical hedge against these constraints, WSO2 supports three distinct deployment models:
- Multi-tenant SaaS (Asgardeo): Shared infrastructure with logical resource separation, currently serving North America and Europe.
- Single-tenant SaaS (Asgardeo Private): Delivers the operational benefits of SaaS on fully isolated cloud environments for each customer.
- Self-Managed (WSO2 Identity Server): For organizations with stringent data residency requirements, the platform can be hosted and managed entirely within a data center you control.
For regulated industries, this level of deployment flexibility is a core compliance requirement, not merely a feature preference.
How P1 and P2 Capabilities Map to WSO2
The capabilities Microsoft packaged into P1 and P2 are not exclusive to the Azure ecosystem. They can be effectively replicated, and often enhanced, through WSO2's composable architecture.
1. Core Authentication & Federation (P1 Equivalents)
WSO2 Identity Platform provides SSO, social login, and token issuance based on open standards (OAuth 2.0, OIDC, SAML, WS-Federation). Applications currently integrating with B2C via these protocols can connect to WSO2 using the exact same integration model, minimizing migration friction.
Furthermore, WSO2 moves beyond core B2C capabilities by offering deep per-application branding, Financial-grade API (FAPI) support, and a visual page editor for complex user journeys without custom development.
2. Adaptive Authentication (P2 Equivalents)
Rather than relying on a proprietary risk engine, WSO2 achieves conditional access through orchestration. The platform runs adaptive authentication policies during the login flow, calls your preferred external risk engine to retrieve a real-time score, and executes configurable policy enforcement (allow, step-up, block, or flag for review). The risk intelligence is entirely decoupled and controlled by your security team.
When staying in the Microsoft ecosystem makes sense
A composable approach is not the right answer for every organization.
If your enterprise has made wall-to-wall investments in the Microsoft stack, your CIAM requirements are relatively standard, and you have no need for advanced user journey customization, Microsoft Entra External ID is likely your most practical path. The integration overhead is lower, the tooling is familiar, and the migration stays within an ecosystem your operations team already understands. You should, however, consider the licensing costs of Microsoft Entra External ID vs. other perhaps less expensive options.
However, if your organization has complex authentication requirements, existing fraud systems you wish to retain, strict data sovereignty constraints, or a mandate to decouple your security logic from your infrastructure provider, a composable architecture is the superior choice. The trade-off is upfront architectural planning; decoupling identity, risk, and policy layers requires more design work than a simple vendor swap.
Ultimately, the question is not which approach is objectively better, but which set of trade-offs your organization is best positioned to manage.
If you are evaluating what comes next after Azure AD B2C, the WSO2 Identity Platform warrants a closer look. Talk to us to understand how a composable identity strategy fits your enterprise architecture.