Skip to content

Commit 1143e6c

Browse files
authored
Merge pull request #246541 from MicrosoftDocs/release-refactor-architecture
Release refactor architecture-- Scheduled publish ASAP
2 parents c1cc574 + baa18de commit 1143e6c

File tree

267 files changed

+2345
-1793
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

267 files changed

+2345
-1793
lines changed

.openpublishing.redirection.active-directory.json

Lines changed: 507 additions & 2 deletions
Large diffs are not rendered by default.
File renamed without changes.
Lines changed: 90 additions & 90 deletions
Original file line numberDiff line numberDiff line change
@@ -1,90 +1,90 @@
1-
---
2-
title: Convert local guest accounts to Azure AD B2B guest accounts
3-
description: Learn to convert local guests into Azure AD B2B guest accounts by identifying apps and local guest accounts, migration, and more.
4-
services: active-directory
5-
author: gargi-sinha
6-
ms.author: gasinh
7-
manager: martinco
8-
ms.date: 02/23/2023
9-
ms.topic: how-to
10-
ms.service: active-directory
11-
ms.subservice: enterprise-users
12-
ms.workload: identity
13-
ms.custom: it-pro
14-
ms.collection: M365-identity-device-management
15-
---
16-
17-
# Convert local guest accounts to Azure Active Directory B2B guest accounts
18-
19-
With Azure Active Directory (Azure AD B2B), external users collaborate with their identities. Although organizations can issue local usernames and passwords to external users, this approach isn't recommended. Azure AD B2B has improved security, lower cost, and less complexity, compared to creating local accounts. In addition, if your organization issues local credentials that external users manage, you can use Azure AD B2B instead. Use the guidance in this document to make the transition.
20-
21-
Learn more: [Plan an Azure AD B2B collaboration deployment](secure-external-access-resources.md)
22-
23-
## Before you begin
24-
25-
This article is number 10 in a series of 10 articles. We recommend you review the articles in order. Go to the **Next steps** section to see the entire series.
26-
27-
## Identify external-facing applications
28-
29-
Before migrating local accounts to Azure AD B2B, confirm the applications and workloads external users can access. For example, for applications hosted on-premises, validate the application is integrated with Azure AD. On-premises applications are a good reason to create local accounts.
30-
31-
Learn more: [Grant B2B users in Azure AD access to your on-premises applications](../external-identities/hybrid-cloud-to-on-premises.md)
32-
33-
We recommend that external-facing applications have single-sign on (SSO) and provisioning integrated with Azure AD for the best end user experience.
34-
35-
## Identify local guest accounts
36-
37-
Identify the accounts to be migrated to Azure AD B2B. External identities in Active Directory are identifiable with an attribute-value pair. For example, making ExtensionAttribute15 = `External` for external users. If these users are set up with Azure AD Connect or Cloud Sync, configure synced external users to have the `UserType` attributes set to `Guest`. If the users are set up as cloud-only accounts, you can modify user attributes. Primarily, identify users to convert to B2B.
38-
39-
## Map local guest accounts to external identities
40-
41-
Identify user identities or external emails. Confirm that the local account ([email protected]) is a user with the home identity and email address: [email protected]. To identify home identities:
42-
43-
- The external user's sponsor provides the information
44-
- The external user provides the information
45-
- Refer to an internal database, if the information is known and stored
46-
47-
After mapping external local accounts to identities, add external identities or email to the user.mail attribute on local accounts.
48-
49-
## End user communications
50-
51-
Notify external users about migration timing. Communicate expectations, for instance when external users must stop using a current password to enable authentication by home and corporate credentials. Communications can include email campaigns and announcements.
52-
53-
## Migrate local guest accounts to Azure AD B2B
54-
55-
After local accounts have user.mail attributes populated with the external identity and email, convert local accounts to Azure AD B2B by inviting the local account. You can use PowerShell or the Microsoft Graph API.
56-
57-
Learn more: [Invite internal users to B2B collaboration](../external-identities/invite-internal-users.md)
58-
59-
## Post-migration considerations
60-
61-
If external user local accounts were synced from on-premises, reduce their on-premises footprint and use B2B guest accounts. You can:
62-
63-
- Transition external user local accounts to Azure AD B2B and stop creating local accounts
64-
- Invite external users in Azure AD
65-
- Randomize external user's local-account passwords to prevent authentication to on-premises resources
66-
- This action ensures authentication and user lifecycle is connected to the external user home identity
67-
68-
## Next steps
69-
70-
Use the following series of articles to learn about securing external access to resources. We recommend you follow the listed order.
71-
72-
1. [Determine your security posture for external access with Azure AD](1-secure-access-posture.md)
73-
74-
2. [Discover the current state of external collaboration in your organization](2-secure-access-current-state.md)
75-
76-
3. [Create a security plan for external access to resources](3-secure-access-plan.md)
77-
78-
4. [Secure external access with groups in Azure AD and Microsoft 365](4-secure-access-groups.md)
79-
80-
5. [Transition to governed collaboration with Azure AD B2B collaboration](5-secure-access-b2b.md)
81-
82-
6. [Manage external access with Azure AD entitlement management](6-secure-access-entitlement-managment.md)
83-
84-
7. [Manage external access to resources with Conditional Access policies](7-secure-access-conditional-access.md)
85-
86-
8. [Control external access to resources in Azure AD with sensitivity labels](8-secure-access-sensitivity-labels.md)
87-
88-
9. [Secure external access to Microsoft Teams, SharePoint, and OneDrive for Business with Azure AD](9-secure-access-teams-sharepoint.md) (You're here)
89-
90-
10. [Convert local guest accounts to Azure Active Directory B2B guest accounts](10-secure-local-guest.md) (You're here)
1+
---
2+
title: Convert local guest accounts to Azure AD B2B guest accounts
3+
description: Learn to convert local guests into Azure AD B2B guest accounts by identifying apps and local guest accounts, migration, and more.
4+
services: active-directory
5+
author: gargi-sinha
6+
ms.author: gasinh
7+
manager: martinco
8+
ms.date: 02/23/2023
9+
ms.topic: how-to
10+
ms.service: active-directory
11+
ms.subservice: enterprise-users
12+
ms.workload: identity
13+
ms.custom: it-pro
14+
ms.collection: M365-identity-device-management
15+
---
16+
17+
# Convert local guest accounts to Azure Active Directory B2B guest accounts
18+
19+
With Azure Active Directory (Azure AD B2B), external users collaborate with their identities. Although organizations can issue local usernames and passwords to external users, this approach isn't recommended. Azure AD B2B has improved security, lower cost, and less complexity, compared to creating local accounts. In addition, if your organization issues local credentials that external users manage, you can use Azure AD B2B instead. Use the guidance in this document to make the transition.
20+
21+
Learn more: [Plan an Azure AD B2B collaboration deployment](secure-external-access-resources.md)
22+
23+
## Before you begin
24+
25+
This article is number 10 in a series of 10 articles. We recommend you review the articles in order. Go to the **Next steps** section to see the entire series.
26+
27+
## Identify external-facing applications
28+
29+
Before migrating local accounts to Azure AD B2B, confirm the applications and workloads external users can access. For example, for applications hosted on-premises, validate the application is integrated with Azure AD. On-premises applications are a good reason to create local accounts.
30+
31+
Learn more: [Grant B2B users in Azure AD access to your on-premises applications](../external-identities/hybrid-cloud-to-on-premises.md)
32+
33+
We recommend that external-facing applications have single-sign on (SSO) and provisioning integrated with Azure AD for the best end user experience.
34+
35+
## Identify local guest accounts
36+
37+
Identify the accounts to be migrated to Azure AD B2B. External identities in Active Directory are identifiable with an attribute-value pair. For example, making ExtensionAttribute15 = `External` for external users. If these users are set up with Azure AD Connect or Cloud Sync, configure synced external users to have the `UserType` attributes set to `Guest`. If the users are set up as cloud-only accounts, you can modify user attributes. Primarily, identify users to convert to B2B.
38+
39+
## Map local guest accounts to external identities
40+
41+
Identify user identities or external emails. Confirm that the local account ([email protected]) is a user with the home identity and email address: [email protected]. To identify home identities:
42+
43+
- The external user's sponsor provides the information
44+
- The external user provides the information
45+
- Refer to an internal database, if the information is known and stored
46+
47+
After mapping external local accounts to identities, add external identities or email to the user.mail attribute on local accounts.
48+
49+
## End user communications
50+
51+
Notify external users about migration timing. Communicate expectations, for instance when external users must stop using a current password to enable authentication by home and corporate credentials. Communications can include email campaigns and announcements.
52+
53+
## Migrate local guest accounts to Azure AD B2B
54+
55+
After local accounts have user.mail attributes populated with the external identity and email, convert local accounts to Azure AD B2B by inviting the local account. You can use PowerShell or the Microsoft Graph API.
56+
57+
Learn more: [Invite internal users to B2B collaboration](../external-identities/invite-internal-users.md)
58+
59+
## Post-migration considerations
60+
61+
If external user local accounts were synced from on-premises, reduce their on-premises footprint and use B2B guest accounts. You can:
62+
63+
- Transition external user local accounts to Azure AD B2B and stop creating local accounts
64+
- Invite external users in Azure AD
65+
- Randomize external user's local-account passwords to prevent authentication to on-premises resources
66+
- This action ensures authentication and user lifecycle is connected to the external user home identity
67+
68+
## Next steps
69+
70+
Use the following series of articles to learn about securing external access to resources. We recommend you follow the listed order.
71+
72+
1. [Determine your security posture for external access with Azure AD](1-secure-access-posture.md)
73+
74+
2. [Discover the current state of external collaboration in your organization](2-secure-access-current-state.md)
75+
76+
3. [Create a security plan for external access to resources](3-secure-access-plan.md)
77+
78+
4. [Secure external access with groups in Azure AD and Microsoft 365](4-secure-access-groups.md)
79+
80+
5. [Transition to governed collaboration with Azure AD B2B collaboration](5-secure-access-b2b.md)
81+
82+
6. [Manage external access with Azure AD entitlement management](6-secure-access-entitlement-managment.md)
83+
84+
7. [Manage external access to resources with Conditional Access policies](7-secure-access-conditional-access.md)
85+
86+
8. [Control external access to resources in Azure AD with sensitivity labels](8-secure-access-sensitivity-labels.md)
87+
88+
9. [Secure external access to Microsoft Teams, SharePoint, and OneDrive for Business with Azure AD](9-secure-access-teams-sharepoint.md) (You're here)
89+
90+
10. [Convert local guest accounts to Azure Active Directory B2B guest accounts](10-secure-local-guest.md) (You're here)

0 commit comments

Comments
 (0)