Skip to content

Commit 36e1653

Browse files
authored
Merge pull request #195093 from kengaderdus/limit-increase
[Azure AD B2C] Add note to contact support if customer wished to increase service limit
2 parents 0a586e9 + 6be3cea commit 36e1653

File tree

1 file changed

+13
-11
lines changed

1 file changed

+13
-11
lines changed

articles/active-directory-b2c/service-limits.md

Lines changed: 13 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -1,16 +1,15 @@
11
---
2-
title: Azure AD B2C service limits and restrictions
3-
titleSuffix: Azure AD B2C
2+
title: Azure Active Directory B2C service limits and restrictions
43
description: Reference for service limits and restrictions for Azure Active Directory B2C service.
54
services: active-directory-b2c
65
author: kengaderdus
7-
manager: celestedg
6+
manager: CelesteDG
87

98
ms.service: active-directory
109
ms.workload: identity
1110
ms.topic: reference
12-
ms.date: 12/21/2021
13-
ms.author: mimart
11+
ms.author: kengaderdus
12+
ms.date: 04/15/2022
1413
ms.subservice: B2C
1514
zone_pivot_groups: b2c-policy-type
1615
---
@@ -21,6 +20,9 @@ zone_pivot_groups: b2c-policy-type
2120

2221
This article outlines the usage constraints and other service limits for the Azure Active Directory B2C (Azure AD B2C) service. These limits are in place to protect by effectively managing threats and ensuring a high level of service quality.
2322

23+
> [!NOTE]
24+
> To increase any of the service limits mentioned in this article, contact **[Support](find-help-open-support-ticket.md)**.
25+
2426
## User/consumption related limits
2527

2628
The number of users able to authenticate through an Azure AD B2C tenant is gated through request limits. The following table illustrates the request limits for your Azure AD B2C tenant.
@@ -34,7 +36,7 @@ The number of users able to authenticate through an Azure AD B2C tenant is gated
3436

3537
Azure AD B2C is compliant with [OAuth 2.0](https://datatracker.ietf.org/doc/html/rfc6749), [OpenID Connect (OIDC)](https://openid.net/certification), and [SAML](http://saml.xml.org/saml-specifications) protocols. It provides user authentication and single sign-on (SSO) functionality, with the endpoints listed in the following table.
3638

37-
The frequency of requests made to Azure AD B2C endpoints determine the overall token issuance capability. Azure AD B2C exposes endpoints which consume a different number of requests. Review the [Authentication Protocols](./protocols-overview.md) article for more information on which endpoints are consumed by your application.
39+
The frequency of requests made to Azure AD B2C endpoints determines the overall token issuance capability. Azure AD B2C exposes endpoints, which consume a different number of requests. Review the [Authentication Protocols](./protocols-overview.md) article for more information on which endpoints are consumed by your application.
3840

3941
|Endpoint |Endpoint type |Requests consumed |
4042
|-----------------------------|---------|------------------|
@@ -103,9 +105,9 @@ The token issuance rate of a Custom Policy is dependent on the number of request
103105
|SocialAndLocalAccounts| Federated account sign-in|SignUpOrSignIn| 4|
104106
|SocialAndLocalAccounts| Federated account sign-up|SignUpOrSignIn| 6|
105107
|SocialAndLocalAccountsWithMfa| Local account sign-in with MFA|SignUpOrSignIn |6|
106-
|SocialAndLocalAccountsWithMfa| Local account sign-up with MFA|SignUpOrSignIn |10|
108+
|SocialAndLocalAccountsWithMfa| Local account sign up with MFA|SignUpOrSignIn |10|
107109
|SocialAndLocalAccountsWithMfa| Federated account sign-in with MFA|SignUpOrSignIn| 8|
108-
|SocialAndLocalAccountsWithMfa| Federated account sign-up with MFA|SignUpOrSignIn |10|
110+
|SocialAndLocalAccountsWithMfa| Federated account sign up with MFA|SignUpOrSignIn |10|
109111

110112
To obtain the token issuance rate per second for a particular user journey:
111113

@@ -119,7 +121,7 @@ Tokens/sec = 200/requests-consumed
119121

120122
## Calculate the token issuance rate of your Custom Policy
121123

122-
You can craete your own Custom Policy to provide a unique authentication experience for your application. The number of requests consumed at the dynamic endpoint depends on which features a user traverses through your Custom Policy. The below table shows how many requests are consumed for each feature in a Custom Policy.
124+
You can create your own Custom Policy to provide a unique authentication experience for your application. The number of requests consumed at the dynamic endpoint depends on which features a user traverses through your Custom Policy. The below table shows how many requests are consumed for each feature in a Custom Policy.
123125

124126
|Feature |Requests consumed|
125127
|-------------------------------------------------|-----------------|
@@ -148,7 +150,7 @@ You can optimize the token issuance rate by considering the following configurat
148150
- Increasing access and refresh [token lifetimes](./configure-tokens.md).
149151
- Increasing the Azure AD B2C [web session lifetime](./session-behavior.md).
150152
- Enabling [Keep Me Signed In](./session-behavior.md#enable-keep-me-signed-in-kmsi).
151-
- Caching the [OpenId Connect metadata](./openid-connect.md#validate-the-id-token) documents at your API's.
153+
- Caching the [OpenId Connect metadata](./openid-connect.md#validate-the-id-token) documents at your APIs.
152154
- Enforcing conditional MFA using [Conditional Access](./conditional-access-identity-protection-overview.md).
153155

154156
## Azure AD B2C configuration limits
@@ -160,7 +162,7 @@ The following table lists the administrative configuration limits in the Azure A
160162
|Number of scopes per application  |1000 |
161163
|Number of [custom attributes](user-profile-attributes.md#extension-attributes) per user <sup>1</sup> |100 |
162164
|Number of redirect URLs per application |100 |
163-
|Number of sign out URLs per application  |1 |
165+
|Number of sign-out URLs per application  |1 |
164166
|String Limit per Attribute |250 Chars |
165167
|Number of B2C tenants per subscription |20 |
166168
|Levels of [inheritance](custom-policy-overview.md#inheritance-model) in custom policies |10 |

0 commit comments

Comments
 (0)