Skip to content

Commit 26745fd

Browse files
committed
July rollout
1 parent c0655f8 commit 26745fd

File tree

1 file changed

+5
-5
lines changed

1 file changed

+5
-5
lines changed

articles/active-directory/external-identities/one-time-passcode.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -162,17 +162,17 @@ Your existing guest users won't be affected if you enable email one-time passcod
162162

163163
**What is the user experience for guests during global rollout?**
164164

165-
During the global rollout of email one-time passcode, the user experience for guests depends on your email one-time passcode configuration and your guest's scenario. Before and after the change is rolled out to your region, the fallback authentication method could change depending on your current email one-time passcode settings, whether a guest user already has an unmanaged account, and whether you [reset a user's redemption status](reset-redemption-status.md). These scenarios are described in the following table.
165+
The user experience depends on your current email one-time passcode settings, whether the user already has an unmanaged account, and whether you [reset a user's redemption status](reset-redemption-status.md). The following table describes these scenarios.
166166

167167
|User scenario |With email one-time passcode enabled prior to rollout |With email one-time passcode disabled prior to rollout |
168168
|---------|---------|---------|
169-
|**User already has an unmanaged Azure AD account (not from redemption in your tenant)** |Both before and after rollout, the user redeems invitations using email one-time passcode. |Both before and after rollout, the user continues signing in with their unmanaged account.<sup>1</sup> |
170-
|**User with an unmanaged Azure AD account, from previous redemption in your tenant** |Both before and after rollout, the user continues to use their unmanaged account. Or, you can [reset their redemption status](reset-redemption-status.md) so they can redeem a new invitation using email one-time passcode. |Before rollout, if you reset the user's redemption status and reinvite them, they'll continue signing in with their unmanaged account. </br>After rollout, they'll continue signing in with their unmanaged account.<sup>1</sup> |
171-
|**New user with no unmanaged Azure AD account** |Both before and after rollout, the user redeems invitations using email one-time passcode. |Both before and after rollout, the user redeems invitations using an unmanaged account.<sup>2</sup> |
169+
|**Users has an existing unmanaged Azure AD account (not from redemption in your tenant)** |Both before and after rollout, the user redeems invitations using email one-time passcode. |Both before and after rollout, the user continues signing in with their unmanaged account.<sup>1</sup> |
170+
|**User previously redeemed an invitation to your tenant using an unmanaged Azure AD account** |Both before and after rollout, the user continues to use their unmanaged account. Or, you can [reset their redemption status](reset-redemption-status.md) so they can redeem a new invitation using email one-time passcode. |Both before and after rollout, the user continues to use their unmanaged account, even if you reset their redemption status and reinvite them.<sup>1</sup> |
171+
|**User with no unmanaged Azure AD account** |Both before and after rollout, the user redeems invitations using email one-time passcode. |Both before and after rollout, the user redeems invitations using an unmanaged account.<sup>2</sup> |
172172

173173
<sup>1</sup> In a separate release, we’ll roll out a change that will enforce redemption with a Microsoft account. To prevent your users from having to manage both an unmanaged Azure AD account and an MSA, we strongly encourage you to enable email one-time passcode.
174174

175-
<sup>2</sup> The user might see a sign-in error if they're redeeming a direct application link and weren't added to your directory in advance. In a separate release, we’ll roll out a change that will enforce redemption and future sign-ins with a Microsoft account.
175+
<sup>2</sup> The user might see a sign-in error when they're redeeming a direct application link and they weren't added to your directory in advance. In a separate release, we’ll roll out a change that will enforce redemption and future sign-ins with a Microsoft account.
176176

177177
For more information about the different redemption pathways, see [B2B collaboration invitation redemption](redemption-experience.md).
178178

0 commit comments

Comments
 (0)