Skip to content

Commit 04fc178

Browse files
authored
Merge pull request #46556 from MicrosoftDocs/master
7/13 AM Publish
2 parents e0a678a + 2b17439 commit 04fc178

File tree

93 files changed

+637
-578
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

93 files changed

+637
-578
lines changed

articles/active-directory/b2b/add-users-administrator.md

Lines changed: 24 additions & 23 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ services: active-directory
77
ms.service: active-directory
88
ms.component: B2B
99
ms.topic: article
10-
ms.date: 05/11/2018
10+
ms.date: 07/10/2018
1111

1212
ms.author: mimart
1313
author: msmimart
@@ -31,16 +31,16 @@ To add B2B collaboration users to the directory, follow these steps:
3131

3232
1. Sign in to the [Azure portal](https://portal.azure.com) as an Azure AD administrator.
3333
2. In the navigation pane, select **Azure Active Directory**.
34-
3. Under **Manage**, select **Users and groups** > **All users**.
34+
3. Under **Manage**, select **Users**.
3535
4. Select **New guest user**.
3636

3737
![Shows where New guest user is in the UI](./media/add-users-administrator/NewGuestUser-Directory.png)
3838

39-
7. Under **Invite a guest**, enter the email address of the external user. Optionally, include a welcome message. For example:
39+
5. Under **User name**, enter the email address of the external user. Optionally, include a welcome message. For example:
4040

4141
![Shows where New guest user is in the UI](./media/add-users-administrator/InviteGuest.png)
4242

43-
8. Select **Invite** to automatically send the invitation to the guest user. In the **Notification** area, look for a **Successfully invited user** message.
43+
6. Select **Invite** to automatically send the invitation to the guest user.
4444

4545
After you send the invitation, the user account is automatically added to the directory as a guest.
4646

@@ -52,18 +52,15 @@ If you need to manually add B2B collaboration users to a group as an Azure AD ad
5252

5353
1. Sign in to the [Azure portal](https://portal.azure.com) as an Azure AD administrator.
5454
2. In the navigation pane, select **Azure Active Directory**.
55-
3. Under **Manage**, select **Users and groups** > **All groups**.
55+
3. Under **Manage**, select **Groups**.
5656
4. Select a group (or click **New group** to create a new one). It's a good idea to include in the group description that the group contains B2B guest users.
57-
5. Select **Members** > **Add members**.
57+
5. Select **Members**.
5858
6. Do one of the following:
59-
- If the guest user already exists in the directory, search for the B2B user. Select the user > click **Select** to add the user to the group.
60-
- If the guest user does not already exist in the directory, select **Invite**.
61-
![Add invite button to add guest members](./media/add-users-administrator/GroupInvite.png)
59+
- If the guest user already exists in the directory, search for the B2B user. Select the user, and then click **Select** to add the user to the group.
60+
- If the guest user does not already exist in the directory, invite them to the group by typing their email address in the search box, typing an optional personal message, and then clicking **Select**. The invitation automatically goes out to the invited user.
61+
62+
![Add invite button to add guest members](./media/add-users-administrator/GroupInvite.png)
6263

63-
Under **Invite a guest**, enter the email address, and an optional personal message > select **Invite**. Click **Select** to add the user to the group.
64-
65-
The invitation automatically goes out to the invited user. In the **Notification** area, look for a successful **Invited user** message.
66-
6764
You can also use dynamic groups with Azure AD B2B collaboration. For more information, see [Dynamic groups and Azure Active Directory B2B collaboration](use-dynamic-groups.md).
6865

6966
## Add guest users to an application
@@ -74,29 +71,33 @@ To add B2B collaboration users to an application as an Azure AD administrator, f
7471
2. In the navigation pane, select **Azure Active Directory**.
7572
3. Under **Manage**, select **Enterprise applications** > **All applications**.
7673
4. Select the application to which you want to add guest users.
77-
5. Under **Manage**, select **Users and groups**.
74+
5. On the application's dashboard, select **Total Users** to open the **Users and groups** pane.
75+
76+
![Total Users button to add open Users and Groups](./media/add-users-administrator/AppUsersAndGroups.png)
77+
7878
6. Select **Add user**.
7979
7. Under **Add Assignment**, select **User and groups**.
8080
8. Do one of the following:
81-
- If the guest user already exists in the directory, search for the B2B user. Select the user, and then click **Select** to add the user to the app.
81+
- If the guest user already exists in the directory, search for the B2B user. Select the user, click **Select**, and then click **Assign** to add the user to the app.
8282
- If the guest user does not already exist in the directory, select **Invite**.
83-
![Add invite button to add guest members](./media/add-users-administrator/AppInviteUsers.png)
83+
84+
![Add invite button to add guest members](./media/add-users-administrator/AppInviteUsers.png)
8485

85-
Under **Invite a guest**, enter the email address, and an optional personal message > select **Invite**. Click **Select** to add the user to the app.
86-
87-
The invitation automatically goes out to the invited user. In the **Notification** area, look for a successful **Invited user** message.
86+
Under **Invite a guest**, enter the email address, type an optional personal message, and then select **Invite**. Click **Select**, and then click **Assign** to add the user to the app. An invitation automatically goes out to the invited user.
8887

89-
9. Under **Add Assignment**, click **Select Role** > select a role to apply to the selected user (if applicable) > select **OK**.
90-
10. Click **Assign**.
88+
9. The guest user appears in the application's **Users and groups** list with the assigned role of **Default Access**. If you want to change the role, do the following:
89+
- Select the guest user, and then select **Edit**.
90+
- Under **Edit Assignment**, click **Select Role**, and select the role you want to assign to the selected user.
91+
- Click **Select**.
92+
- Click **Assign**.
9193

9294
## Resend invitations to guest users
9395

9496
If a guest user has not yet redeemed their invitation, you can resend the invitation email.
9597

9698
1. Sign in to the [Azure portal](https://portal.azure.com) as an Azure AD administrator.
9799
2. In the navigation pane, select **Azure Active Directory**.
98-
3. Under **Manage**, select **Users and groups**.
99-
4. Select **All users**.
100+
3. Under **Manage**, select **Users**.
100101
5. Select the user account.
101102
6. Under **Manage**, select **Profile**.
102103
7. If the user has not yet accepted the invitation, a **Resend invitation** option is available. Select this button to resend.
-24.2 KB
Loading
27.7 KB
Loading
-31.7 KB
Loading
-14.9 KB
Loading
2.76 KB
Loading
-8.38 KB
Loading
30 Bytes
Loading

articles/active-directory/develop/active-directory-optional-claims.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -62,7 +62,7 @@ The set of optional claims available by default for applications to use are list
6262
| `enfpolids` | Enforced policy IDs. A list of the policy IDs that were evaluated for the current user. | JWT | | |
6363
| `vnet` | VNET specifier information. | JWT | | |
6464
| `fwd` | IP address.| JWT | | Adds the original IPv4 address of the requesting client (when inside a VNET) |
65-
| `ctry` | User’s country | JWT | | |
65+
| `ctry` | User’s country | JWT | | Azure AD returns the `ctry` optional claim if it's present and the value of the claim is a standard two-letter country code, such as FR, JP, SZ, and so on. |
6666
| `tenant_ctry` | Resource tenant’s country | JWT | | |
6767
| `xms_pdl` | Preferred data location | JWT | | For Multi-Geo tenants, this is the 3-letter code showing which geographic region the user is in. For more details, see the [Azure AD Connect documentation about preferred data location](https://docs.microsoft.com/azure/active-directory/connect/active-directory-aadconnectsync-feature-preferreddatalocation). <br> For example: `APC` for Asia Pacific. |
6868
| `xms_pl` | User preferred language | JWT ||The user’s preferred language, if set. Sourced from their home tenant, in guest access scenarios. Formatted LL-CC (“en-us”). |

articles/active-directory/managed-service-identity/howto-assign-access-portal.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -37,20 +37,20 @@ After you've enabled MSI on an Azure resource, such as an [Azure VM](qs-configur
3737

3838
3. For an Azure virtual machine, select the **Access control (IAM)** page of the resource, and select **+ Add**. Then specify the **Role**, **Assign access to Virtual Machine**, and specify the corresponding **Subscription** and **Resource Group** where the resource resides. Under the search criteria area, you should see the resource. Select the resource, and select **Save**.
3939

40-
![Access control (IAM) screenshot](../media/msi-howto-assign-access-portal/assign-access-control-iam-blade-before.png)
40+
![Access control (IAM) screenshot](../managed-service-identity/media/msi-howto-assign-access-portal/assign-access-control-iam-blade-before.png)
4141
For an Azure virtual machine scale set, select the **Access control (IAM)** page of the resource, and select **+ Add**. Then specify the **Role**, **Assign access to**. Under the search criteria area, search for your virtual machine scale set. Select the resource, and select **Save**.
4242

43-
![Access control (IAM) screenshot](../media/msi-howto-assign-access-vmss-portal/assign-access-control-vmss-iam-blade-before.png)
43+
![Access control (IAM) screenshot](../managed-service-identity/media/msi-howto-assign-access-vmss-portal/assign-access-control-vmss-iam-blade-before.png)
4444

4545
4. You are returned to the main **Access control (IAM)** page, where you see a new entry for the resource's MSI.
4646

4747
Azure virtual machine:
4848

49-
![Access control (IAM) screenshot](../media/msi-howto-assign-access-portal/assign-access-control-iam-blade-after.png)
49+
![Access control (IAM) screenshot](../managed-service-identity/media/msi-howto-assign-access-portal/assign-access-control-iam-blade-after.png)
5050

5151
Azure virtual machine scale set:
5252

53-
![Access control (IAM) screenshot](../media/msi-howto-assign-access-vmss-portal/assign-access-control-vmss-iam-blade-after.png)
53+
![Access control (IAM) screenshot](../managed-service-identity/media/msi-howto-assign-access-vmss-portal/assign-access-control-vmss-iam-blade-after.png)
5454

5555
## Troubleshooting
5656

0 commit comments

Comments
 (0)