Skip to content

Commit 2bc8ca0

Browse files
committed
expanded CA info
1 parent 2f5de56 commit 2bc8ca0

File tree

1 file changed

+8
-8
lines changed

1 file changed

+8
-8
lines changed

articles/active-directory/external-identities/authentication-conditional-access.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -70,21 +70,21 @@ The following diagram illustrates the flow when email one-time passcode authenti
7070

7171
## Conditional Access for external users
7272

73-
Organizations can enforce Conditional Access policies for external B2B collaboration and B2B direct connect users in the same way that they’re enabled for full-time employees and members of the organization. This section describes important considerations for applying Conditional Access to users outside of your organization.
73+
Organizations can enforce Conditional Access policies for external B2B collaboration and B2B direct connect users in the same way that they’re enabled for full-time employees and members of the organization. With the introduction of cross-tenant access settings, you can also trust MFA and device claims from external Azure AD organizations. This section describes important considerations for applying Conditional Access to users outside of your organization.
7474

7575
### MFA for Azure AD external users
7676

77-
In an Azure AD cross-tenant scenario, the resource organization can create Conditional Access policies that require MFA or device compliance for all guest and external users. Generally, an external user accessing a resource is then required to set up their Azure AD MFA with the resource tenant. However, Azure AD now offers the ability to trust MFA claims from other Azure AD tenants. Enabling MFA trust with another tenant streamlines the sign-in process for B2B collaboration users and enables access for B2B direct connect users.
77+
In an Azure AD cross-tenant scenario, the resource organization can create Conditional Access policies that require MFA or device compliance for all guest and external users. Generally, a B2B collaboration user accessing a resource is then required to set up their Azure AD MFA with the resource tenant. However, Azure AD now offers the ability to trust MFA claims from other Azure AD tenants. Enabling MFA trust with another tenant streamlines the sign-in process for B2B collaboration users and enables access for B2B direct connect users.
7878

79-
If you've configured your inbound trust settings to accept MFA claims from a B2B collaboration or B2B direct connect user's home tenant, Azure AD checks the user's credentials during authentication. If the credentials contain an claim indicating that MFA policies have already been met in the user's home tenant, the user is granted seamless sign-on to your shared resource.
79+
If you've configured your inbound trust settings to accept MFA claims from a B2B collaboration or B2B direct connect user's home tenant, Azure AD checks the user's credentials during authentication. If the credentials contain a claim indicating that MFA policies have already been met in the user's home tenant, the user is granted seamless sign-on to your shared resource.
8080

81-
If MFA trust isn't enabled, the user experience is different for B2B collaboration users and B2B direct connect users.
81+
If MFA trust isn't enabled, the user experience is different for B2B collaboration users and B2B direct connect users:
8282

83-
- **B2B collaboration users:** If the resource organization hasn't enabled MFA trust with the B2B collaboration user's home tenant, the external user is presented with an MFA challenge. The flow is the same as the [MFA flow for non-Azure AD external users](#mfa-for-non-azure-ad-external-users).
83+
- **B2B collaboration users**: If the resource organization hasn't enabled MFA trust with the user's home tenant, the user is presented with an MFA challenge from the resource organization. (The flow is the same as the [MFA flow for non-Azure AD external users](#mfa-for-non-azure-ad-external-users).)
8484

85-
- **B2B direct connect users:** If the resource organization hasn't enabled MFA trust with the B2B direct connect user's home tenant, the user is blocked from accessing resources. If you want to allow B2B direct connect with an external organization and your Conditional Access policies require MFA, you *must* configure your inbound trust settings to accept MFA claims from the organization.
85+
- **B2B direct connect users**: If the resource organization hasn't enabled MFA trust with the user's home tenant, the user is blocked from accessing resources. If you want to allow B2B direct connect with an external organization and your Conditional Access policies require MFA, you *must* configure your inbound trust settings to accept MFA claims from the organization.
8686

87-
For details, see [Configuring cross-tenant access settings for B2B collaboration](cross-tenant-access-settings-b2b-collaboration.md).
87+
Learn more about how to [configure inbound trust settings for MFA](cross-tenant-access-settings-b2b-collaboration.md#to-change-inbound-trust-settings-for-mfa-and-device-claims).
8888

8989
### MFA for non-Azure AD external users
9090

@@ -154,7 +154,7 @@ Device filters can be used together with cross-tenant access settings to base po
154154
- Assign the device attribute you want to use for filtering to one of the [supported device extension attributes](../conditional-access/concept-condition-filters-for-devices.md#supported-operators-and-device-properties-for-filters).
155155
- Create a Conditional Access policy with a device filter that blocks access to devices containing that attribute.
156156

157-
For more information, see [Conditional Access: Filter for devices](../conditional-access/concept-condition-filters-for-devices.md).
157+
Learn more about [filtering for devices with Conditional Access](../conditional-access/concept-condition-filters-for-devices.md).
158158
### Mobile application management policies
159159

160160
We don't recommend requiring an app protection policy for external users. Conditional Access grant controls such as **Require approved client apps** and **Require app protection policies** require the device to be registered in the resource tenant. These controls can only be applied to [iOS and Android devices](../conditional-access/concept-conditional-access-conditions.md#device-platforms). However, because a user’s device can only be managed by their home tenant, these controls can't be applied to external guest users.

0 commit comments

Comments
 (0)