Managing external identities to enable secure access for partners, customers, and other non-employees
In Microsoft Entra External ID for customers, the new sign-in experience is based on home realm discovery and a two-step flow where the identifier (email/username) is collected first and then the credential. This behavior is part of the platform’s design to support multiple authentication methods and improved error messaging.
The provided documentation describes how, during sign-in, Microsoft Entra ID now performs a username lookup and returns clearer errors when the username or domain is not found, or when a consumer domain is used. This lookup behavior is built into the service and is not configurable in External ID user flows to behave like the legacy B2C one-page, opaque error model.
To avoid exposing different messages for existing vs. non‑existing users in External ID, the only supported option is to move away from the built‑in user flows and implement a fully custom experience, similar to what was done previously with B2C custom policies. With a custom front end and custom policies/HTML, the app can:
- Collect email and password on a single page.
- Call External ID (or a custom API) and always display a generic error message to the end user, regardless of whether the account exists.
The platform’s default External ID sign-in pages do not currently provide a setting to suppress user‑not‑found messaging or revert to the legacy one‑page behavior; achieving that requires a custom sign‑in experience.
References: