Skip to content

Commit 1a5b0be

Browse files
authored
Merge pull request #204786 from msmimart/mm-tenant-restrict-v2
[EXID] Tenant restrictions V2 documentation - cross-tenant access settings
2 parents c7f5a6b + 7af9622 commit 1a5b0be

31 files changed

+479
-2
lines changed

articles/active-directory/external-identities/b2b-fundamentals.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: B2B
88
ms.topic: conceptual
9-
ms.date: 08/30/2022
9+
ms.date: 05/17/2023
1010
ms.author: cmulligan
1111
author: csmulligan
1212
manager: celestedg
@@ -26,6 +26,7 @@ This article contains recommendations and best practices for business-to-busines
2626
| --- | --- |
2727
| Consult Azure AD guidance for securing your collaboration with external partners | Learn how to take a holistic governance approach to your organization's collaboration with external partners by following the recommendations in [Securing external collaboration in Azure Active Directory and Microsoft 365](../fundamentals/secure-external-access-resources.md). |
2828
| Carefully plan your cross-tenant access and external collaboration settings | Azure AD gives you a flexible set of controls for managing collaboration with external users and organizations. You can allow or block all collaboration, or configure collaboration only for specific organizations, users, and apps. Before configuring settings for cross-tenant access and external collaboration, take a careful inventory of the organizations you work and partner with. Then determine if you want to enable [B2B direct connect](b2b-direct-connect-overview.md) or [B2B collaboration](what-is-b2b.md) with other Azure AD tenants, and how you want to manage [B2B collaboration invitations](external-collaboration-settings-configure.md). |
29+
| Use tenant restrictions to control how external accounts are used on your networks and managed devices. | With tenant restrictions, you can prevent your users from using accounts they've created in unknown tenants or accounts they've received from external organizations. We recommend you disallow these accounts and use B2B collaboration instead. |
2930
| For an optimal sign-in experience, federate with identity providers | Whenever possible, federate directly with identity providers to allow invited users to sign in to your shared apps and resources without having to create Microsoft Accounts (MSAs) or Azure AD accounts. You can use the [Google federation feature](google-federation.md) to allow B2B guest users to sign in with their Google accounts. Or, you can use the [SAML/WS-Fed identity provider (preview) feature](direct-federation.md) to set up federation with any organization whose identity provider (IdP) supports the SAML 2.0 or WS-Fed protocol. |
3031
| Use the Email one-time passcode feature for B2B guests who can’t authenticate by other means | The [Email one-time passcode](one-time-passcode.md) feature authenticates B2B guest users when they can't be authenticated through other means like Azure AD, a Microsoft account (MSA), or Google federation. When the guest user redeems an invitation or accesses a shared resource, they can request a temporary code, which is sent to their email address. Then they enter this code to continue signing in. |
3132
| Add company branding to your sign-in page | You can customize your sign-in page so it's more intuitive for your B2B guest users. See how to [add company branding to sign in and Access Panel pages](../fundamentals/customize-branding.md). |

articles/active-directory/external-identities/cross-tenant-access-overview.md

Lines changed: 17 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ services: active-directory
55
ms.service: active-directory
66
ms.subservice: B2B
77
ms.topic: how-to
8-
ms.date: 05/05/2023
8+
ms.date: 05/17/2023
99

1010
ms.author: cmulligan
1111
author: csmulligan
@@ -77,6 +77,22 @@ For more information, see [Configure cross-tenant synchronization](../multi-tena
7777

7878
To configure this setting using Microsoft Graph, see the [Update crossTenantIdentitySyncPolicyPartner](/graph/api/crosstenantidentitysyncpolicypartner-update) API. For more information, see [Configure cross-tenant synchronization](../multi-tenant-organizations/cross-tenant-synchronization-configure.md).
7979

80+
## Tenant restrictions
81+
82+
With **Tenant Restrictions** settings, you can control the types of external accounts your users can use on the devices you manage, including:
83+
84+
- Accounts your users have created in unknown tenants.
85+
- Accounts that external organizations have given to your users so they can access that organization's resources.
86+
87+
We recommend configuring your tenant restrictions to disallow these types of external accounts and use B2B collaboration instead. B2B collaboration gives you the ability to:
88+
89+
- Use Conditional Access and force multi-factor authentication for B2B collaboration users.
90+
- Manage inbound and outbound access.
91+
- Terminate sessions and credentials when a B2B collaboration user's employment status changes or their credentials are breached.
92+
- Use sign-in logs to view details about the B2B collaboration user.
93+
94+
Tenant restrictions are independent of other cross-tenant access settings, so any inbound, outbound, or trust settings you've configured won't impact tenant restrictions. For details about configuring tenant restrictions, see [Set up tenant restrictions V2](tenant-restrictions-v2.md).
95+
8096
## Microsoft cloud settings
8197

8298
Microsoft cloud settings let you collaborate with organizations from different Microsoft Azure clouds. With Microsoft cloud settings, you can establish mutual B2B collaboration between the following clouds:
23.9 KB
Loading
16.4 KB
Loading
20.8 KB
Loading
122 KB
Loading
163 KB
Loading
158 KB
Loading
255 KB
Loading
22.3 KB
Loading

0 commit comments

Comments
 (0)