Skip to content

Commit 2a4b694

Browse files
committed
Merging main into branch
2 parents 0ffff98 + 2f88cdb commit 2a4b694

File tree

96 files changed

+2089
-1176
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

96 files changed

+2089
-1176
lines changed

articles/active-directory/conditional-access/concept-condition-filters-for-devices.md

Lines changed: 0 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -37,9 +37,6 @@ There are multiple scenarios that organizations can now enable using filter for
3737

3838
Filter for devices is an option when creating a Conditional Access policy in the Azure portal or using the Microsoft Graph API.
3939

40-
> [!IMPORTANT]
41-
> Device state and filter for devices cannot be used together in Conditional Access policy.
42-
4340
The following steps will help create two Conditional Access policies to support the first scenario under [Common scenarios](#common-scenarios).
4441

4542
Policy 1: All users with the directory role of Global Administrator, accessing the Microsoft Azure Management cloud app, and for Access controls, Grant access, but require multifactor authentication and require device to be marked as compliant.

articles/active-directory/conditional-access/concept-conditional-access-grant.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -194,7 +194,7 @@ When user risk is detected, administrators can employ the user risk policy condi
194194
When a user is prompted to change a password, they'll first be required to complete multifactor authentication. Make sure all users have registered for multifactor authentication, so they're prepared in case risk is detected for their account.
195195

196196
> [!WARNING]
197-
> Users must have previously registered for self-service password reset before triggering the user risk policy.
197+
> Users must have previously registered for multifactor authentication before triggering the user risk policy.
198198
199199
The following restrictions apply when you configure a policy by using the password change control:
200200

articles/active-directory/conditional-access/concept-conditional-access-policies.md

Lines changed: 0 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -83,10 +83,6 @@ The software the user is employing to access the cloud app. For example, 'Browse
8383

8484
The behavior of the client apps condition was updated in August 2020. If you have existing Conditional Access policies, they'll remain unchanged. However, if you select on an existing policy, the configure toggle has been removed and the client apps the policy applies to are selected.
8585

86-
#### Device state
87-
88-
This control is used to exclude devices that are hybrid Azure AD joined, or marked a compliant in Intune. This exclusion can be done to block unmanaged devices.
89-
9086
#### Filter for devices
9187

9288
This control allows targeting specific devices based on their attributes in a policy.

articles/active-directory/conditional-access/resilience-defaults.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -73,7 +73,7 @@ When resilience defaults are disabled, the Backup Authentication Service won't u
7373
7474
## Testing resilience defaults
7575

76-
It isn't possible to conduct a dry run using the Backup Authentication Service or simulate the result of a policy with resilience defaults enabled or disabled at this time. Azure AD will conduct monthly exercises using the Backup Authentication Service. The sign-in logs will display if the Backup Authentication Service was used to issue the access token.
76+
It isn't possible to conduct a dry run using the Backup Authentication Service or simulate the result of a policy with resilience defaults enabled or disabled at this time. Azure AD will conduct monthly exercises using the Backup Authentication Service. The sign-in logs will display if the Backup Authentication Service was used to issue the access token. In **Azure portal** > **Monitoring** > **Sign-in Logs** blade, you can add the filter "Token issuer type == Azure AD Backup Auth" to display the logs processed by Azure AD Backup Authentication service.
7777

7878
## Configuring resilience defaults
7979

Lines changed: 26 additions & 36 deletions
Original file line numberDiff line numberDiff line change
@@ -1,11 +1,11 @@
11
---
2-
title: Convert local guests into Azure AD B2B guest accounts
3-
description: Learn how to convert local guests into Azure AD B2B guest accounts
2+
title: Convert local guest accounts to Azure AD B2B guest accounts
3+
description: Learn to convert local guests into Azure AD B2B guest accounts by identifying apps and local guest accounts, migration, and more.
44
services: active-directory
55
author: gargi-sinha
66
ms.author: gasinh
77
manager: martinco
8-
ms.date: 11/03/2022
8+
ms.date: 02/22/2023
99
ms.topic: how-to
1010
ms.service: active-directory
1111
ms.subservice: enterprise-users
@@ -14,62 +14,52 @@ ms.custom: it-pro
1414
ms.collection: M365-identity-device-management
1515
---
1616

17-
# Convert local guests into Azure Active Directory B2B guest accounts
17+
# Convert local guest accounts to Azure Active Directory B2B guest accounts
1818

19-
Azure Active Directory (Azure AD B2B) allows external users to collaborate using their own identities. However, it isn't uncommon for organizations to issue local usernames and passwords to external users. This approach isn't recommended as the bring-your-own-identity (BYOI) capabilities provided
20-
by Azure AD B2B to provide better security, lower cost, and reduce
21-
complexity when compared to local account creation. Learn more
22-
[here.](./secure-external-access-resources.md)
19+
With Azure Active Directory (Azure AD B2B), external users collaborate with their identities. Although organizations can issue local usernames and passwords to external users, this approach isn't recommended. Azure AD B2B has improved security, lower cost, and less complexity, compared to creating local accounts. In addition, if your organization issues local credentials that external users manage, you can use Azure AD B2B instead. Use the guidance in this document to make the transition.
2320

24-
If your organization currently issues local credentials that external users have to manage and would like to migrate to using Azure AD B2B instead, this document provides a guide to make the transition as seamlessly as possible.
21+
Learn more: [Plan an Azure AD B2B collaboration deployment](secure-external-access-resources.md)
2522

2623
## Identify external-facing applications
2724

28-
Before migrating local accounts to Azure AD B2B, admins should understand what applications and workloads these external users need to access. For example, if external users need access to an application that is hosted on-premises, admins will need to validate that the application is integrated with Azure AD and that a provisioning process is implemented to provision the user from Azure AD to the application.
29-
The existence and use of on-premises applications could be a reason why local accounts are created in the first place. Learn more about
30-
[provisioning B2B guests to on-premises
31-
applications.](../external-identities/hybrid-cloud-to-on-premises.md)
25+
Before migrating local accounts to Azure AD B2B, confirm the applications and workloads external users can access. For example, for applications hosted on-premises, validate the application is integrated with Azure AD. On-premises applications are a good reason to create local accounts.
3226

33-
All external-facing applications should have single-sign on (SSO) and provisioning integrated with Azure AD for the best end user experience.
27+
Learn more: [Grant B2B users in Azure AD access to your on-premises applications](../external-identities/hybrid-cloud-to-on-premises.md)
28+
29+
We recommend that external-facing applications have single-sign on (SSO) and provisioning integrated with Azure AD for the best end user experience.
3430

3531
## Identify local guest accounts
3632

37-
Admins will need to identify which accounts should be migrated to Azure AD B2B. External identities in Active Directory should be easily identifiable, which can be done with an attribute-value pair. For example, making ExtensionAttribute15 = `External` for all external users. If these users are being provisioned via Azure AD Connect or Cloud Sync, admins can optionally configure these synced external users
38-
to have the `UserType` attributes set to `Guest`. If these users are being
39-
provisioned as cloud-only accounts, admins can directly modify the
40-
users' attributes. What is most important is being able to identify the
41-
users who you want to convert to B2B.
33+
Identify the accounts to be migrated to Azure AD B2B. External identities in Active Directory are identifiable with an attribute-value pair. For example, making ExtensionAttribute15 = `External` for external users. If these users are set up with Azure AD Connect or Cloud Sync, configure synced external users to have the `UserType` attributes set to `Guest`. If the users are set up as cloud-only accounts, you can modify user attributes. Primarily, identify users to convert to B2B.
4234

4335
## Map local guest accounts to external identities
4436

45-
Once you've identified which external user accounts you want to
46-
convert to Azure AD B2B, you need to identify the BYOI identities or external emails for each user. For example, admins will need to identify that the local account ([email protected]) is a user whose home identity/email address is [email protected]. How to identify the home identities is up to the organization, but some examples include:
47-
48-
- Asking the external user's sponsor to provide the information.
49-
50-
- Asking the external user to provide the information.
37+
Identify user identities or external emails. Confirm that the local account ([email protected]) is a user with the home identity and email address: [email protected]. To identify home identities:
5138

52-
- Referring to an internal database if this information is already known and stored by the organization.
39+
- The external user's sponsor provides the information
40+
- The external user provides the information
41+
- Refer to an internal database, if the information is known and stored
5342

54-
Once the mapping of each external local account to the BYOI identity is done, admins will need to add the external identity/email to the user.mail attribute on each local account.
43+
After mapping external local accounts to identities, add external identities or email to the user.mail attribute on local accounts.
5544

5645
## End user communications
5746

58-
External users should be notified that the migration will be taking place and when it will happen. Ensure you communicate the expectation that external users will stop using their existing password and post-migration will authenticate with their own home/corporate credentials going forward. Communications can include email campaigns, posters, and announcements.
47+
Notify external users about migration timing. Communicate expectations, such as when external users must stop using a current password to enable authenticate by home and corporate credentials. Communications can include email campaigns and announcements.
5948

6049
## Migrate local guest accounts to Azure AD B2B
6150

62-
Once the local accounts have their user.mail attributes populated with the external identity/email that they're mapped to, admins can [convert the local accounts to Azure AD B2B by inviting the local account.](../external-identities/invite-internal-users.md)
63-
This can be done in the UX or programmatically via PowerShell or the Microsoft Graph API. Once complete, the users will no longer
64-
authenticate with their local password, but will instead authenticate with their home identity/email that was populated in the user.mail attribute. You've successfully migrated to Azure AD B2B.
51+
After local accounts have user.mail attributes populated with the external identity and email, convert local accounts to Azure AD B2B by inviting the local account. You can use PowerShell or the Microsoft Graph API.
6552

66-
## Post-migration considerations
53+
Learn more: [Invite internal users to B2B collaboration](../external-identities/invite-internal-users.md)
6754

68-
If local accounts for external users were being synced from on-premises, admins should take steps to reduce their on-premises footprint and use cloud-native B2B guest accounts moving forward. Some possible actions can include:
55+
## Post-migration considerations
6956

70-
- Transition existing local accounts for external users to Azure AD B2B and stop creating local accounts. Post-migration, admins should invite external users natively in Azure AD.
57+
If external user local accounts were synced from on-premises, reduce their on-premises footprint and use B2B guest accounts. You can:
7158

72-
- Randomize the passwords of existing local accounts for external users to ensure they can't authenticate locally to on-premises resources. This will increase security by ensuring that authentication and user lifecycle is tied to the external user's home identity.
59+
- Transition external user local accounts to Azure AD B2B and stop creating local accounts
60+
- Invite external users in Azure AD
61+
- Randomize external user's local-account passwords to prevent authentication to on-premises resources
62+
- This action ensures authentication and user lifecycle is connected to the external user home identity
7363

7464
## Next steps
7565

@@ -84,4 +74,4 @@ See the following articles on securing external access to resources. We recommen
8474
1. [Secure access with Conditional Access policies](7-secure-access-conditional-access.md)
8575
1. [Secure access with Sensitivity labels](8-secure-access-sensitivity-labels.md)
8676
1. [Secure access to Microsoft Teams, OneDrive, and SharePoint](9-secure-access-teams-sharepoint.md)
87-
1. [Convert local guest accounts to B2B](10-secure-local-guest.md) (You’re here)
77+
1. [Convert local guest accounts to B2B](10-secure-local-guest.md) (You’re here)

articles/active-directory/identity-protection/howto-identity-protection-configure-notifications.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -24,7 +24,8 @@ Azure AD Identity Protection sends two types of automated notification emails to
2424

2525
This article provides you with an overview of both notification emails.
2626

27-
We don't support sending emails to users in group-assigned roles.
27+
> [!Note]
28+
> **We don't support sending emails to users in group-assigned roles.**
2829
2930
## Users at risk detected email
3031

articles/active-directory/identity-protection/howto-identity-protection-configure-risk-policies.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -34,23 +34,23 @@ Configured trusted [network locations](../conditional-access/location-condition.
3434

3535
### Risk remediation
3636

37-
Organizations can choose to block access when risk is detected. Blocking sometimes stops legitimate users from doing what they need to. A better solution is to allow self-remediation using Azure AD multifactor authentication (MFA) and secure self-service password reset (SSPR).
37+
Organizations can choose to block access when risk is detected. Blocking sometimes stops legitimate users from doing what they need to. A better solution is to allow self-remediation using Azure AD multifactor authentication (MFA) and secure password change.
3838

3939
> [!WARNING]
40-
> Users must register for Azure AD MFA and SSPR before they face a situation requiring remediation. Users not registered are blocked and require administrator intervention.
40+
> Users must register for Azure AD MFA before they face a situation requiring remediation. For hybrid users that are synced from on-premises to cloud, password writeback must have been enabled on them. Users not registered are blocked and require administrator intervention.
4141
>
42-
> Password change (I know my password and want to change it to something new) outside of the risky user policy remediation flow does not meet the requirement for secure password reset.
42+
> Password change (I know my password and want to change it to something new) outside of the risky user policy remediation flow does not meet the requirement for secure password change.
4343
4444
### Microsoft's recommendation
4545

4646
Microsoft recommends the below risk policy configurations to protect your organization:
4747

4848
- User risk policy
49-
- Require a secure password reset when user risk level is **High**. Azure AD MFA is required before the user can create a new password with SSPR to remediate their risk.
49+
- Require a secure password change when user risk level is **High**. Azure AD MFA is required before the user can create a new password with password writeback to remediate their risk.
5050
- Sign-in risk policy
5151
- Require Azure AD MFA when sign-in risk level is **Medium** or **High**, allowing users to prove it's them by using one of their registered authentication methods, remediating the sign-in risk.
5252

53-
Requiring access control when risk level is low will introduce more user interrupts. Choosing to block access rather than allowing self-remediation options, like secure password reset and multifactor authentication, will impact your users and administrators. Weigh these choices when configuring your policies.
53+
Requiring access control when risk level is low will introduce more user interrupts. Choosing to block access rather than allowing self-remediation options, like secure password change and multifactor authentication, will impact your users and administrators. Weigh these choices when configuring your policies.
5454

5555
## Exclusions
5656

articles/active-directory/manage-apps/grant-admin-consent.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -73,13 +73,13 @@ When granting tenant-wide admin consent using either method described above, a w
7373
The tenant-wide admin consent URL follows the following format:
7474

7575
```http
76-
https://login.microsoftonline.com/{tenant-id}/adminconsent?client_id={client-id}
76+
https://login.microsoftonline.com/{organization}/adminconsent?client_id={client-id}
7777
```
7878

7979
where:
8080

8181
- `{client-id}` is the application's client ID (also known as app ID).
82-
- `{tenant-id}` is your organization's tenant ID or any verified domain name.
82+
- `{organization}` is the tenant ID or any verified domain name of the tenant you want to consent the application in. You can use the value `common`, which will cause the consent to happen in the home tenant of the user you sign in with.
8383

8484
As always, carefully review the permissions an application requests before granting consent.
8585

0 commit comments

Comments
 (0)