You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/b2b/add-users-administrator.md
+24-23Lines changed: 24 additions & 23 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -7,7 +7,7 @@ services: active-directory
7
7
ms.service: active-directory
8
8
ms.component: B2B
9
9
ms.topic: article
10
-
ms.date: 05/11/2018
10
+
ms.date: 07/10/2018
11
11
12
12
ms.author: mimart
13
13
author: msmimart
@@ -31,16 +31,16 @@ To add B2B collaboration users to the directory, follow these steps:
31
31
32
32
1. Sign in to the [Azure portal](https://portal.azure.com) as an Azure AD administrator.
33
33
2. In the navigation pane, select **Azure Active Directory**.
34
-
3. Under **Manage**, select **Users and groups** > **All users**.
34
+
3. Under **Manage**, select **Users**.
35
35
4. Select **New guest user**.
36
36
37
37

38
38
39
-
7. Under **Invite a guest**, enter the email address of the external user. Optionally, include a welcome message. For example:
39
+
5. Under **User name**, enter the email address of the external user. Optionally, include a welcome message. For example:
40
40
41
41

42
42
43
-
8. Select **Invite** to automatically send the invitation to the guest user. In the **Notification** area, look for a **Successfully invited user** message.
43
+
6. Select **Invite** to automatically send the invitation to the guest user.
44
44
45
45
After you send the invitation, the user account is automatically added to the directory as a guest.
46
46
@@ -52,18 +52,15 @@ If you need to manually add B2B collaboration users to a group as an Azure AD ad
52
52
53
53
1. Sign in to the [Azure portal](https://portal.azure.com) as an Azure AD administrator.
54
54
2. In the navigation pane, select **Azure Active Directory**.
55
-
3. Under **Manage**, select **Users and groups** > **All groups**.
55
+
3. Under **Manage**, select **Groups**.
56
56
4. Select a group (or click **New group** to create a new one). It's a good idea to include in the group description that the group contains B2B guest users.
57
-
5. Select **Members** > **Add members**.
57
+
5. Select **Members**.
58
58
6. Do one of the following:
59
-
- If the guest user already exists in the directory, search for the B2B user. Select the user > click **Select** to add the user to the group.
60
-
- If the guest user does not already exist in the directory, select **Invite**.
61
-

59
+
- If the guest user already exists in the directory, search for the B2B user. Select the user, and then click **Select** to add the user to the group.
60
+
- If the guest user does not already exist in the directory, invite them to the group by typing their email address in the search box, typing an optional personal message, and then clicking **Select**. The invitation automatically goes out to the invited user.
61
+
62
+

62
63
63
-
Under **Invite a guest**, enter the email address, and an optional personal message > select **Invite**. Click **Select** to add the user to the group.
64
-
65
-
The invitation automatically goes out to the invited user. In the **Notification** area, look for a successful **Invited user** message.
66
-
67
64
You can also use dynamic groups with Azure AD B2B collaboration. For more information, see [Dynamic groups and Azure Active Directory B2B collaboration](use-dynamic-groups.md).
68
65
69
66
## Add guest users to an application
@@ -74,29 +71,33 @@ To add B2B collaboration users to an application as an Azure AD administrator, f
74
71
2. In the navigation pane, select **Azure Active Directory**.
75
72
3. Under **Manage**, select **Enterprise applications** > **All applications**.
76
73
4. Select the application to which you want to add guest users.
77
-
5. Under **Manage**, select **Users and groups**.
74
+
5. On the application's dashboard, select **Total Users** to open the **Users and groups** pane.
75
+
76
+

77
+
78
78
6. Select **Add user**.
79
79
7. Under **Add Assignment**, select **User and groups**.
80
80
8. Do one of the following:
81
-
- If the guest user already exists in the directory, search for the B2B user. Select the user, and then click **Select** to add the user to the app.
81
+
- If the guest user already exists in the directory, search for the B2B user. Select the user, click **Select**, and then click **Assign** to add the user to the app.
82
82
- If the guest user does not already exist in the directory, select **Invite**.
83
-

83
+
84
+

84
85
85
-
Under **Invite a guest**, enter the email address, and an optional personal message > select **Invite**. Click **Select** to add the user to the app.
86
-
87
-
The invitation automatically goes out to the invited user. In the **Notification** area, look for a successful **Invited user** message.
86
+
Under **Invite a guest**, enter the email address, type an optional personal message, and then select **Invite**. Click **Select**, and then click **Assign** to add the user to the app. An invitation automatically goes out to the invited user.
88
87
89
-
9. Under **Add Assignment**, click **Select Role** > select a role to apply to the selected user (if applicable) > select **OK**.
90
-
10. Click **Assign**.
88
+
9. The guest user appears in the application's **Users and groups** list with the assigned role of **Default Access**. If you want to change the role, do the following:
89
+
- Select the guest user, and then select **Edit**.
90
+
- Under **Edit Assignment**, click **Select Role**, and select the role you want to assign to the selected user.
91
+
- Click **Select**.
92
+
- Click **Assign**.
91
93
92
94
## Resend invitations to guest users
93
95
94
96
If a guest user has not yet redeemed their invitation, you can resend the invitation email.
95
97
96
98
1. Sign in to the [Azure portal](https://portal.azure.com) as an Azure AD administrator.
97
99
2. In the navigation pane, select **Azure Active Directory**.
98
-
3. Under **Manage**, select **Users and groups**.
99
-
4. Select **All users**.
100
+
3. Under **Manage**, select **Users**.
100
101
5. Select the user account.
101
102
6. Under **Manage**, select **Profile**.
102
103
7. If the user has not yet accepted the invitation, a **Resend invitation** option is available. Select this button to resend.
Copy file name to clipboardExpand all lines: articles/active-directory/develop/active-directory-optional-claims.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -62,7 +62,7 @@ The set of optional claims available by default for applications to use are list
62
62
|`enfpolids`| Enforced policy IDs. A list of the policy IDs that were evaluated for the current user. | JWT |||
63
63
|`vnet`| VNET specifier information. | JWT |||
64
64
|`fwd`| IP address.| JWT || Adds the original IPv4 address of the requesting client (when inside a VNET) |
65
-
|`ctry`| User’s country | JWT |||
65
+
|`ctry`| User’s country | JWT ||Azure AD returns the `ctry` optional claim if it's present and the value of the claim is a standard two-letter country code, such as FR, JP, SZ, and so on. |
66
66
|`tenant_ctry`| Resource tenant’s country | JWT |||
67
67
|`xms_pdl`| Preferred data location | JWT || For Multi-Geo tenants, this is the 3-letter code showing which geographic region the user is in. For more details, see the [Azure AD Connect documentation about preferred data location](https://docs.microsoft.com/azure/active-directory/connect/active-directory-aadconnectsync-feature-preferreddatalocation). <br> For example: `APC` for Asia Pacific. |
68
68
|`xms_pl`| User preferred language | JWT ||The user’s preferred language, if set. Sourced from their home tenant, in guest access scenarios. Formatted LL-CC (“en-us”). |
Copy file name to clipboardExpand all lines: articles/active-directory/managed-service-identity/howto-assign-access-portal.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -37,20 +37,20 @@ After you've enabled MSI on an Azure resource, such as an [Azure VM](qs-configur
37
37
38
38
3. For an Azure virtual machine, select the **Access control (IAM)** page of the resource, and select **+ Add**. Then specify the **Role**, **Assign access to Virtual Machine**, and specify the corresponding **Subscription** and **Resource Group** where the resource resides. Under the search criteria area, you should see the resource. Select the resource, and select **Save**.
39
39
40
-

40
+

41
41
For an Azure virtual machine scale set, select the **Access control (IAM)** page of the resource, and select **+ Add**. Then specify the **Role**, **Assign access to**. Under the search criteria area, search for your virtual machine scale set. Select the resource, and select **Save**.
42
42
43
-

43
+

44
44
45
45
4. You are returned to the main **Access control (IAM)** page, where you see a new entry for the resource's MSI.
46
46
47
47
Azure virtual machine:
48
48
49
-

49
+

50
50
51
51
Azure virtual machine scale set:
52
52
53
-

53
+

0 commit comments