Skip to content

Commit 1e64487

Browse files
committed
making updates to the wording around verified domains
1 parent 95c8b07 commit 1e64487

File tree

1 file changed

+6
-3
lines changed

1 file changed

+6
-3
lines changed

articles/active-directory/governance/entitlement-management-organization.md

Lines changed: 6 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ ms.tgt_pltfrm: na
1212
ms.devlang: na
1313
ms.topic: conceptual
1414
ms.subservice: compliance
15-
ms.date: 10/24/2019
15+
ms.date: 01/22/2020
1616
ms.author: ajburnle
1717
ms.reviewer: mwahl
1818
ms.collection: M365-identity-device-management
@@ -30,9 +30,12 @@ Azure AD entitlement management enables you to collaborate with people outside y
3030

3131
A connected organization is an external Azure AD directory or domain that you have a relationship with.
3232

33-
For example, suppose you work at Woodgrove Bank and you want to collaborate with two external organizations: Graphic Design Institute and Contoso. You've been told by your contact at Graphic Design Institute that they use Azure AD, and that Graphic Design Institute's users have a user principal name that ends with `graphicdesigninstitute.com`. And you've been told by your contact at Contoso that they do not yet use Azure AD, but that Contoso's users have a user principal name that ends with `contoso.com`.
33+
For example, suppose you work at Woodgrove Bank and you want to collaborate with two external organizations. These two organizations have different configurations:
3434

35-
You can configure two connected organizations -- one for Graphic Design Institute with the domain `graphicdesigninstitute.com`, and one for Contoso with the domain `contoso.com`. If you then add those two connected organizations to a policy, users from each organization that have a user principal name that matches the policy can request access packages. Furthermore, because Graphic Design Institute has been identified as using Azure AD, then if Graphic Design Institute subsequently has subdomains, such as `graphicdesigninstitute.example`, then users with that user principal name will also be able to request access packages using the same policy.
35+
- Graphic Design Institute uses Azure AD and their users have a user principal name that ends with `graphicdesigninstitute.com`
36+
- Contoso does not yet use Azure AD. Contoso users have a user principal name that ends with `contoso.com`.
37+
38+
In this case, you can configure two connected organizations. You would create one connected organization for Graphic design institute and one for Contoso. If you then add those two connected organizations to a policy, users from each organization with a user principal name matching the policy can request access packages. Furthermore, because Graphic Design Institute uses Azure AD, then any users with a principal name matching a [verified domain](../fundamentals/add-custom-domain.md#verify-your-custom-domain-name) added to their tenant, such as graphicdesigninstitute.example will also be able to request access packages using the same policy.
3639

3740
![Connected organization example](./media/entitlement-management-organization/connected-organization-example.png)
3841

0 commit comments

Comments
 (0)