Skip to content

Commit 10f4efc

Browse files
authored
Update authentication-conditional-access.md
1 parent ce3deba commit 10f4efc

File tree

1 file changed

+6
-6
lines changed

1 file changed

+6
-6
lines changed

articles/active-directory/external-identities/authentication-conditional-access.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: B2B
88
ms.topic: conceptual
9-
ms.date: 10/12/2022
9+
ms.date: 04/03/2023
1010

1111
ms.author: mimart
1212
author: msmimart
@@ -72,10 +72,7 @@ The following diagram illustrates the flow when email one-time passcode authenti
7272

7373
Organizations can enforce [Conditional Access](../conditional-access/overview.md) policies for external B2B collaboration and B2B direct connect users in the same way that they’re enabled for full-time employees and members of the organization. With the introduction of cross-tenant access settings, you can also trust MFA and device claims from external Azure AD organizations. This section describes important considerations for applying Conditional Access to users outside of your organization.
7474

75-
### Assigning Conditional Access policies to external user types (preview)
76-
77-
> [!NOTE]
78-
> This section describes a preview feature of Azure Active Directory. For more information about previews, see [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/).
75+
### Assigning Conditional Access policies to external user types
7976

8077
When configuring a Conditional Access policy, you have granular control over the types of external users you want to apply the policy to. External users are categorized based on how they authenticate (internally or externally) and their relationship to your organization (guest or member).
8178

@@ -86,6 +83,9 @@ When configuring a Conditional Access policy, you have granular control over the
8683
- **Service provider users** - Organizations that serve as cloud service providers for your organization (the isServiceProvider property in the Microsoft Graph [partner-specific configuration](/graph/api/resources/crosstenantaccesspolicyconfigurationpartner) is true).
8784
- **Other external users** - Applies to any users who don't fall into the categories above, but who are not considered internal members of your organization, meaning they don't authenticate internally via Azure AD, and the user object created in the resource Azure AD directory does not have a UserType of Member.
8885

86+
>[!NOTE]
87+
> The "All guest and external users" selection has now been replaced with "Guest and external users" and all its sub types. For customers who previously had a Condtional Access policy with "All guest and external users" selected will now see "Guest and external users" along with all sub types being selected. This change in UX does not have any functional impact on how policy is evaluated by Conditional Access backend. The new selection provides customers the needed granularity to choose specifc types of guest and external users to include/exclude from user scope when creating their Conditional Access policy.
88+
8989
Learn more about [Conditional Access user assignments](../conditional-access/concept-conditional-access-users-groups.md).
9090

9191
### Comparing External Identities Conditional Access policies
@@ -282,4 +282,4 @@ For more information, see the following articles:
282282
- [What is Azure AD B2B collaboration?](./what-is-b2b.md)
283283
- [Identity Protection and B2B users](../identity-protection/concept-identity-protection-b2b.md)
284284
- [External Identities pricing](https://azure.microsoft.com/pricing/details/active-directory/external-identities/)
285-
- [Frequently Asked Questions (FAQs)](./faq.yml)
285+
- [Frequently Asked Questions (FAQs)](./faq.yml)

0 commit comments

Comments
 (0)