Skip to content

Commit 17fbeaa

Browse files
committed
B2B direct connect
1 parent 534a347 commit 17fbeaa

26 files changed

+51
-46
lines changed

articles/active-directory/external-identities/cross-tenant-access-overview.md

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -60,7 +60,11 @@ You can configure organization-specific settings by adding an organization and m
6060
> [!IMPORTANT]
6161
> Changing the default inbound or outbound settings to block access could block existing business-critical access to apps in your organization or partner organizations. Be sure to use the tools described in this article and consult with your business stakeholders to identify the required access.
6262
63-
- Cross-tenant access settings are used to manage B2B collaboration with other Azure AD organizations. For non-Azure AD identities (for example, social identities or non-IT managed external accounts), use [external collaboration settings](external-collaboration-settings-configure.md). External collaboration settings include options for restricting guest user access, specifying who can invite guests, and allowing or blocking domains.
63+
- To configure cross-tenant access settings in the Azure portal, you'll need an account with a Global administrator or Security administrator role.
64+
65+
- To configure trust settings or apply access settings to specific users, groups, or applications, you'll need an Azure AD Premium P1 license.
66+
67+
- Cross-tenant access settings are used to manage B2B collaboration and B2B direct connect with other Azure AD organizations. For B2B collaboration with non-Azure AD identities (for example, social identities or non-IT managed external accounts), use [external collaboration settings](external-collaboration-settings-configure.md). External collaboration settings include B2B collaboration options for restricting guest user access, specifying who can invite guests, and allowing or blocking domains.
6468

6569
- If you want to apply access settings to specific users, groups, or applications in an external organization, you'll need to contact the organization for information before configuring your settings. Obtain their user object IDs, group object IDs, or application IDs (*client app IDs* or *resource app IDs*) so you can target your settings correctly.
6670

@@ -69,18 +73,14 @@ You can configure organization-specific settings by adding an organization and m
6973
7074
- The access settings you configure for users and groups must match the access settings for applications. Conflicting settings aren't allowed, and you’ll see warning messages if you try to configure them.
7175

72-
- **Example 1**: If you block inbound B2B collaboration for all external users and groups, access to all your applications must also be blocked.
73-
74-
- **Example 2**: If you allow outbound B2B collaboration for all your users (or specific users or groups), you’ll be prevented from blocking all access to external applications; access to at least one application must be allowed.
75-
76-
- If you block access to all apps by default, users will be unable to read emails encrypted with Microsoft Rights Management Service (also known as Office 365 Message Encryption or OME). To avoid this issue, we recommend configuring your outbound settings to allow your users to access this app ID: 00000012-0000-0000-c000-000000000000. If this is the only application you allow, access to all other apps will be blocked by default.
77-
78-
- To configure cross-tenant access settings in the Azure portal, you'll need an account with a Global administrator or Security administrator role.
76+
- **Example 1**: If you block inbound access for all external users and groups, access to all your applications must also be blocked.
7977

80-
- To configure trust settings or apply access settings to specific users, groups, or applications, you'll need an Azure AD Premium P1 license.
78+
- **Example 2**: If you allow outbound access for all your users (or specific users or groups), youll be prevented from blocking all access to external applications; access to at least one application must be allowed.
8179

8280
- If you want to allow B2B direct connect with an external organization and your Conditional Access policies require MFA, you must configure your trust settings so that your Conditional Access policies will accept MFA claims from the external organization.
8381

82+
- If you block access to all apps by default, users will be unable to read emails encrypted with Microsoft Rights Management Service (also known as Office 365 Message Encryption or OME). To avoid this issue, we recommend configuring your outbound settings to allow your users to access this app ID: 00000012-0000-0000-c000-000000000000. If this is the only application you allow, access to all other apps will be blocked by default.
83+
8484
## Identify inbound and outbound sign-ins
8585

8686
Several tools are available to help you identify the access your users and partners need before you set inbound and outbound access settings. To ensure you don’t remove access that your users and partners need, you should examine current sign-in behavior. Taking this preliminary step will help prevent loss of desired access for your end users and partner users. However, in some cases these logs are only retained for 30 days, so we strongly recommend you speak with your business stakeholders to ensure required access isn't lost.

articles/active-directory/external-identities/cross-tenant-access-settings-b2b-collaboration.md

Lines changed: 15 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ services: active-directory
55
ms.service: active-directory
66
ms.subservice: B2B
77
ms.topic: how-to
8-
ms.date: 01/31/2022
8+
ms.date: 03/21/2022
99

1010
ms.author: mimart
1111
author: msmimart
@@ -106,12 +106,12 @@ With inbound settings, you select which external users and groups will be able t
106106

107107
1. Under **Access status**, select one of the following:
108108

109-
- **Allow access**: Allows the users and groups specified under **Target** to be invited for B2B collaboration.
110-
- **Block access**: Blocks the users and groups specified under **Target** from being invited to B2B collaboration.
109+
- **Allow access**: Allows the users and groups specified under **Applies to** to be invited for B2B collaboration.
110+
- **Block access**: Blocks the users and groups specified under **Applies to** from being invited to B2B collaboration.
111111

112112
![Screenshot showing selecting the user access status for B2B collaboration](media/cross-tenant-access-settings-b2b-collaboration/generic-inbound-external-users-groups-access.png)
113113

114-
1. Under **Target**, select one of the following:
114+
1. Under **Applies to**, select one of the following:
115115

116116
- **All external users and groups**: Applies the action you chose under **Access status** to all users and groups from external Azure AD organizations.
117117
- **Select external users and groups** (requires an Azure AD premium subscription): Lets you apply the action you chose under **Access status** to specific users and groups within the external organization.
@@ -138,12 +138,12 @@ With inbound settings, you select which external users and groups will be able t
138138

139139
1. Under **Access status**, select one of the following:
140140

141-
- **Allow access**: Allows the applications specified under **Target** to be accessed by B2B collaboration users.
142-
- **Block access**: Blocks the applications specified under **Target** from being accessed by B2B collaboration users.
141+
- **Allow access**: Allows the applications specified under **Applies to** to be accessed by B2B collaboration users.
142+
- **Block access**: Blocks the applications specified under **Applies to** from being accessed by B2B collaboration users.
143143

144144
![Screenshot showing applications access status](media/cross-tenant-access-settings-b2b-collaboration/generic-inbound-applications-access.png)
145145

146-
1. Under **Target**, select one of the following:
146+
1. Under **Applies to**, select one of the following:
147147

148148
- **All applications**: Applies the action you chose under **Access status** to all of your applications.
149149
- **Select applications** (requires an Azure AD premium subscription): Lets you apply the action you chose under **Access status** to specific applications in your organization.
@@ -211,12 +211,12 @@ With outbound settings, you select which of your users and groups will be able t
211211

212212
1. Under **Access status**, select one of the following:
213213

214-
- **Allow access**: Allows your users and groups specified under **Target** to be invited to external organizations for B2B collaboration.
215-
- **Block access**: Blocks your users and groups specified under **Target** from being invited to B2B collaboration. If you block access for all users and groups, this will also block all external applications from being accessed via B2B collaboration.
214+
- **Allow access**: Allows your users and groups specified under **Applies to** to be invited to external organizations for B2B collaboration.
215+
- **Block access**: Blocks your users and groups specified under **Applies to** from being invited to B2B collaboration. If you block access for all users and groups, this will also block all external applications from being accessed via B2B collaboration.
216216

217217
![Screenshot showing users and groups access status for b2b collaboration](media/cross-tenant-access-settings-b2b-collaboration/generic-outbound-external-users-groups-access.png)
218218

219-
1. Under **Target**, select one of the following:
219+
1. Under **Applies to**, select one of the following:
220220

221221
- **All \<your organization\> users**: Applies the action you chose under **Access status** to all your users and groups.
222222
- **Select \<your organization\> users and groups** (requires an Azure AD premium subscription): Lets you apply the action you chose under **Access status** to specific users and groups.
@@ -237,12 +237,12 @@ With outbound settings, you select which of your users and groups will be able t
237237

238238
1. Under **Access status**, select one of the following:
239239

240-
- **Allow access**: Allows the external applications specified under **Target** to be accessed by your users via B2B collaboration.
241-
- **Block access**: Blocks the external applications specified under **Target** from being accessed by your users via B2B collaboration.
240+
- **Allow access**: Allows the external applications specified under **Applies to** to be accessed by your users via B2B collaboration.
241+
- **Block access**: Blocks the external applications specified under **Applies to** from being accessed by your users via B2B collaboration.
242242

243243
![Screenshot showing applications access status for b2b collaboration](media/cross-tenant-access-settings-b2b-collaboration/generic-outbound-applications-access.png)
244244

245-
1. Under **Target**, select one of the following:
245+
1. Under **Applies to**, select one of the following:
246246

247247
- **All external applications**: Applies the action you chose under **Access status** to all external applications.
248248
- **Select external applications**: Applies the action you chose under **Access status** to all external applications.
@@ -264,4 +264,5 @@ With outbound settings, you select which of your users and groups will be able t
264264

265265
## Next steps
266266

267-
See [Configure external collaboration settings](external-collaboration-settings-configure.md) for B2B collaboration with non-Azure AD identities, social identities, and non-IT managed external accounts.
267+
- See [Configure external collaboration settings](external-collaboration-settings-configure.md) for B2B collaboration with non-Azure AD identities, social identities, and non-IT managed external accounts.
268+
- [Configure cross-tenant access settings for B2B direct connect](cross-tenant-access-settings-b2b-direct-connect.md)

0 commit comments

Comments
 (0)