You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/external-identities/cross-tenant-access-overview.md
+9-9Lines changed: 9 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -60,7 +60,11 @@ You can configure organization-specific settings by adding an organization and m
60
60
> [!IMPORTANT]
61
61
> Changing the default inbound or outbound settings to block access could block existing business-critical access to apps in your organization or partner organizations. Be sure to use the tools described in this article and consult with your business stakeholders to identify the required access.
62
62
63
-
- Cross-tenant access settings are used to manage B2B collaboration with other Azure AD organizations. For non-Azure AD identities (for example, social identities or non-IT managed external accounts), use [external collaboration settings](external-collaboration-settings-configure.md). External collaboration settings include options for restricting guest user access, specifying who can invite guests, and allowing or blocking domains.
63
+
- To configure cross-tenant access settings in the Azure portal, you'll need an account with a Global administrator or Security administrator role.
64
+
65
+
- To configure trust settings or apply access settings to specific users, groups, or applications, you'll need an Azure AD Premium P1 license.
66
+
67
+
- Cross-tenant access settings are used to manage B2B collaboration and B2B direct connect with other Azure AD organizations. For B2B collaboration with non-Azure AD identities (for example, social identities or non-IT managed external accounts), use [external collaboration settings](external-collaboration-settings-configure.md). External collaboration settings include B2B collaboration options for restricting guest user access, specifying who can invite guests, and allowing or blocking domains.
64
68
65
69
- If you want to apply access settings to specific users, groups, or applications in an external organization, you'll need to contact the organization for information before configuring your settings. Obtain their user object IDs, group object IDs, or application IDs (*client app IDs* or *resource app IDs*) so you can target your settings correctly.
66
70
@@ -69,18 +73,14 @@ You can configure organization-specific settings by adding an organization and m
69
73
70
74
- The access settings you configure for users and groups must match the access settings for applications. Conflicting settings aren't allowed, and you’ll see warning messages if you try to configure them.
71
75
72
-
-**Example 1**: If you block inbound B2B collaboration for all external users and groups, access to all your applications must also be blocked.
73
-
74
-
-**Example 2**: If you allow outbound B2B collaboration for all your users (or specific users or groups), you’ll be prevented from blocking all access to external applications; access to at least one application must be allowed.
75
-
76
-
- If you block access to all apps by default, users will be unable to read emails encrypted with Microsoft Rights Management Service (also known as Office 365 Message Encryption or OME). To avoid this issue, we recommend configuring your outbound settings to allow your users to access this app ID: 00000012-0000-0000-c000-000000000000. If this is the only application you allow, access to all other apps will be blocked by default.
77
-
78
-
- To configure cross-tenant access settings in the Azure portal, you'll need an account with a Global administrator or Security administrator role.
76
+
-**Example 1**: If you block inbound access for all external users and groups, access to all your applications must also be blocked.
79
77
80
-
- To configure trust settings or apply access settings to specific users, groups, or applications, you'll need an Azure AD Premium P1 license.
78
+
-**Example 2**: If you allow outbound access for all your users (or specific users or groups), you’ll be prevented from blocking all access to external applications; access to at least one application must be allowed.
81
79
82
80
- If you want to allow B2B direct connect with an external organization and your Conditional Access policies require MFA, you must configure your trust settings so that your Conditional Access policies will accept MFA claims from the external organization.
83
81
82
+
- If you block access to all apps by default, users will be unable to read emails encrypted with Microsoft Rights Management Service (also known as Office 365 Message Encryption or OME). To avoid this issue, we recommend configuring your outbound settings to allow your users to access this app ID: 00000012-0000-0000-c000-000000000000. If this is the only application you allow, access to all other apps will be blocked by default.
83
+
84
84
## Identify inbound and outbound sign-ins
85
85
86
86
Several tools are available to help you identify the access your users and partners need before you set inbound and outbound access settings. To ensure you don’t remove access that your users and partners need, you should examine current sign-in behavior. Taking this preliminary step will help prevent loss of desired access for your end users and partner users. However, in some cases these logs are only retained for 30 days, so we strongly recommend you speak with your business stakeholders to ensure required access isn't lost.
Copy file name to clipboardExpand all lines: articles/active-directory/external-identities/cross-tenant-access-settings-b2b-collaboration.md
+15-14Lines changed: 15 additions & 14 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,7 @@ services: active-directory
5
5
ms.service: active-directory
6
6
ms.subservice: B2B
7
7
ms.topic: how-to
8
-
ms.date: 01/31/2022
8
+
ms.date: 03/21/2022
9
9
10
10
ms.author: mimart
11
11
author: msmimart
@@ -106,12 +106,12 @@ With inbound settings, you select which external users and groups will be able t
106
106
107
107
1. Under **Access status**, select one of the following:
108
108
109
-
-**Allow access**: Allows the users and groups specified under **Target** to be invited for B2B collaboration.
110
-
-**Block access**: Blocks the users and groups specified under **Target** from being invited to B2B collaboration.
109
+
-**Allow access**: Allows the users and groups specified under **Applies to** to be invited for B2B collaboration.
110
+
-**Block access**: Blocks the users and groups specified under **Applies to** from being invited to B2B collaboration.
111
111
112
112

113
113
114
-
1. Under **Target**, select one of the following:
114
+
1. Under **Applies to**, select one of the following:
115
115
116
116
-**All external users and groups**: Applies the action you chose under **Access status** to all users and groups from external Azure AD organizations.
117
117
-**Select external users and groups** (requires an Azure AD premium subscription): Lets you apply the action you chose under **Access status** to specific users and groups within the external organization.
@@ -138,12 +138,12 @@ With inbound settings, you select which external users and groups will be able t
138
138
139
139
1. Under **Access status**, select one of the following:
140
140
141
-
-**Allow access**: Allows the applications specified under **Target** to be accessed by B2B collaboration users.
142
-
-**Block access**: Blocks the applications specified under **Target** from being accessed by B2B collaboration users.
141
+
-**Allow access**: Allows the applications specified under **Applies to** to be accessed by B2B collaboration users.
142
+
-**Block access**: Blocks the applications specified under **Applies to** from being accessed by B2B collaboration users.
1. Under **Applies to**, select one of the following:
147
147
148
148
-**All applications**: Applies the action you chose under **Access status** to all of your applications.
149
149
-**Select applications** (requires an Azure AD premium subscription): Lets you apply the action you chose under **Access status** to specific applications in your organization.
@@ -211,12 +211,12 @@ With outbound settings, you select which of your users and groups will be able t
211
211
212
212
1. Under **Access status**, select one of the following:
213
213
214
-
-**Allow access**: Allows your users and groups specified under **Target** to be invited to external organizations for B2B collaboration.
215
-
-**Block access**: Blocks your users and groups specified under **Target** from being invited to B2B collaboration. If you block access for all users and groups, this will also block all external applications from being accessed via B2B collaboration.
214
+
-**Allow access**: Allows your users and groups specified under **Applies to** to be invited to external organizations for B2B collaboration.
215
+
-**Block access**: Blocks your users and groups specified under **Applies to** from being invited to B2B collaboration. If you block access for all users and groups, this will also block all external applications from being accessed via B2B collaboration.
216
216
217
217

218
218
219
-
1. Under **Target**, select one of the following:
219
+
1. Under **Applies to**, select one of the following:
220
220
221
221
-**All \<your organization\> users**: Applies the action you chose under **Access status** to all your users and groups.
222
222
-**Select \<your organization\> users and groups** (requires an Azure AD premium subscription): Lets you apply the action you chose under **Access status** to specific users and groups.
@@ -237,12 +237,12 @@ With outbound settings, you select which of your users and groups will be able t
237
237
238
238
1. Under **Access status**, select one of the following:
239
239
240
-
-**Allow access**: Allows the external applications specified under **Target** to be accessed by your users via B2B collaboration.
241
-
-**Block access**: Blocks the external applications specified under **Target** from being accessed by your users via B2B collaboration.
240
+
-**Allow access**: Allows the external applications specified under **Applies to** to be accessed by your users via B2B collaboration.
241
+
-**Block access**: Blocks the external applications specified under **Applies to** from being accessed by your users via B2B collaboration.
242
242
243
243

244
244
245
-
1. Under **Target**, select one of the following:
245
+
1. Under **Applies to**, select one of the following:
246
246
247
247
-**All external applications**: Applies the action you chose under **Access status** to all external applications.
248
248
-**Select external applications**: Applies the action you chose under **Access status** to all external applications.
@@ -264,4 +264,5 @@ With outbound settings, you select which of your users and groups will be able t
264
264
265
265
## Next steps
266
266
267
-
See [Configure external collaboration settings](external-collaboration-settings-configure.md) for B2B collaboration with non-Azure AD identities, social identities, and non-IT managed external accounts.
267
+
- See [Configure external collaboration settings](external-collaboration-settings-configure.md) for B2B collaboration with non-Azure AD identities, social identities, and non-IT managed external accounts.
268
+
-[Configure cross-tenant access settings for B2B direct connect](cross-tenant-access-settings-b2b-direct-connect.md)
0 commit comments