Skip to content

Commit 2d89a71

Browse files
authored
Merge pull request #107544 from itechedit/entitlement-management-organization
edit pass: entitlement-management-organization
2 parents f2d08c2 + 902471c commit 2d89a71

File tree

1 file changed

+42
-40
lines changed

1 file changed

+42
-40
lines changed

articles/active-directory/governance/entitlement-management-organization.md

Lines changed: 42 additions & 40 deletions
Original file line numberDiff line numberDiff line change
@@ -18,28 +18,28 @@ ms.reviewer: mwahl
1818
ms.collection: M365-identity-device-management
1919

2020

21-
#Customer intent: As a administrator, I want to allow users in certain partner organizations to request access packages so that our organization can collaborate on projects.
21+
#Customer intent: As an administrator, I want to allow users in certain partner organizations to request access packages so that our organizations can collaborate on projects.
2222

2323
---
2424

2525
# Add a connected organization in Azure AD entitlement management
2626

27-
Azure AD entitlement management enables you to collaborate with people outside your organization. If you frequently collaborate with users in an external Azure AD directory or domain, you can add them as a connected organization. This article describes how to add a connected organization so that you can allow users outside your organization to request resources in your directory.
27+
With Azure Active Directory (Azure AD) entitlement management, you can collaborate with people outside your organization. If you frequently collaborate with users in an external Azure AD directory or domain, you can add them as a connected organization. This article describes how to add a connected organization so that you can allow users outside your organization to request resources in your directory.
2828

2929
## What is a connected organization?
3030

3131
A connected organization is an external Azure AD directory or domain that you have a relationship with.
3232

3333
For example, suppose you work at Woodgrove Bank and you want to collaborate with two external organizations. These two organizations have different configurations:
3434

35-
- Graphic Design Institute uses Azure AD and their users have a user principal name that ends with `graphicdesigninstitute.com`
36-
- Contoso does not yet use Azure AD. Contoso users have a user principal name that ends with `contoso.com`.
35+
- Graphic Design Institute uses Azure AD, and their users have a user principal name that ends with *graphicdesigninstitute.com*.
36+
- Contoso does not yet use Azure AD. Contoso users have a user principal name that ends with *contoso.com*.
3737

38-
In this case, you can configure two connected organizations. You would create one connected organization for Graphic Design Institute and one for Contoso. If you then add those two connected organizations to a policy, users from each organization with a user principal name matching the policy can request access packages. Users with a user principal name that has a domain of graphicdesigninstitute.com would match the Graphic Design Institute connected organization and be allowed to submit requests, while users with a user principal name that has a domain of contoso.com would match the Contoso connected organization and would also be allowed to request packages. Furthermore, because Graphic Design Institute uses Azure AD, any users with a principal name matching a [verified domain](../fundamentals/add-custom-domain.md#verify-your-custom-domain-name) added to their tenant, such as graphicdesigninstitute.example will also be able to request access packages using the same policy.
38+
In this case, you can configure two connected organizations. You create one connected organization for Graphic Design Institute and one for Contoso. If you then add the two connected organizations to a policy, users from each organization with a user principal name that matches the policy can request access packages. Users with a user principal name that has a domain of *graphicdesigninstitute.com* would match the Graphic Design Institute-connected organization and be allowed to submit requests. Users with a user principal name that has a domain of *contoso.com* would match the Contoso-connected organization and would also be allowed to request packages. And, because Graphic Design Institute uses Azure AD, any users with a principal name that matches a [verified domain](../fundamentals/add-custom-domain.md#verify-your-custom-domain-name) that's added to their tenant, such as *graphicdesigninstitute.example*, would also be able to request access packages by using the same policy.
3939

4040
![Connected organization example](./media/entitlement-management-organization/connected-organization-example.png)
4141

42-
How users from the Azure AD directory or domain will authenticate depends on the authentication type. The authentication types for connected organizations are the following:
42+
How users from the Azure AD directory or domain authenticate depends on the authentication type. The authentication types for connected organizations are:
4343

4444
- Azure AD
4545
- [Direct federation](../b2b/direct-federation.md)
@@ -51,85 +51,87 @@ For a demonstration of how to add a connected organization, watch the following
5151
5252
## Add a connected organization
5353

54-
Follow these steps to add an external Azure AD directory or domain as a connected organization.
54+
To add an external Azure AD directory or domain as a connected organization, follow the instructions in this section.
5555

56-
**Prerequisite role:** Global administrator, User administrator, or Guest inviter
56+
**Prerequisite role**: *Global administrator*, *User administrator*, or *Guest inviter*
5757

58-
1. In the Azure portal, click **Azure Active Directory** and then click **Identity Governance**.
58+
1. In the Azure portal, select **Azure Active Directory**, and then select **Identity Governance**.
5959

60-
1. In the left menu, click **Connected organizations** and then click **Add connected organization**.
60+
1. In the left pane, select **Connected organizations**, and then select **Add connected organization**.
6161

62-
![Identity Governance - Connected organizations - Add connected organization](./media/entitlement-management-organization/connected-organization.png)
62+
![The "Add connected organization" button](./media/entitlement-management-organization/connected-organization.png)
6363

64-
1. On the **Basics** tab, enter a display name and description for the organization.
64+
1. Select the **Basics** tab, and then enter a display name and description for the organization.
6565

66-
![Add connected organization - Basics tab](./media/entitlement-management-organization/organization-basics.png)
66+
![The "Add connected organization" Basics pane](./media/entitlement-management-organization/organization-basics.png)
6767

68-
1. On the **Directory + domain** tab, click **Add directory + domain** to open the Select directories + domains pane.
68+
1. Select the **Directory + domain** tab, and then select **Add directory + domain**.
6969

70-
1. Type a domain name to search for the Azure AD directory or domain. You must type the entire domain name.
70+
The **Select directories + domains** pane opens.
7171

72-
1. Verify it is the correct organization by the provided name and authentication type. How users will sign in depends on the authentication type.
72+
1. In the search box, enter a domain name to search for the Azure AD directory or domain. Be sure to enter the entire domain name.
7373

74-
![Add connected organization - Select directories + domains](./media/entitlement-management-organization/organization-select-directories-domains.png)
74+
1. Verify that the organization name and authentication type are correct. How users sign in depends on the authentication type.
7575

76-
1. Click **Add** to add the Azure AD directory or domain. Currently, you can only add one Azure AD directory or domain per connected organization.
76+
![The "Select directories + domains" pane](./media/entitlement-management-organization/organization-select-directories-domains.png)
77+
78+
1. Select **Add** to add the Azure AD directory or domain. Currently, you can add only one Azure AD directory or domain per connected organization.
7779

7880
> [!NOTE]
79-
> All users from the Azure AD directory or domain will be able to request this access package. This includes users in Azure AD from all subdomains associated with the directory, unless those domains are blocked by the Azure B2B allow or deny list. For more information, see [Allow or block invitations to B2B users from specific organizations](../b2b/allow-deny-list.md).
81+
> All users from the Azure AD directory or domain will be able to request this access package. This includes users in Azure AD from all subdomains associated with the directory, unless those domains are blocked by the Azure AD business to business (B2B) allow or deny list. For more information, see [Allow or block invitations to B2B users from specific organizations](../b2b/allow-deny-list.md).
8082
81-
1. Once you have added the Azure AD directory or domain, click **Select**.
83+
1. After you've added the Azure AD directory or domain, select **Select**.
8284

8385
The organization appears in the list.
8486

85-
![Add connected organization - Directories tab](./media/entitlement-management-organization/organization-directory-domain.png)
87+
![The "Directory + domain" pane](./media/entitlement-management-organization/organization-directory-domain.png)
8688

87-
1. On the **Sponsors** tab, add optional sponsors for this connected organization.
89+
1. Select the **Sponsors** tab, and then add optional sponsors for this connected organization.
8890

8991
Sponsors are internal or external users already in your directory that are the point of contact for the relationship with this connected organization. Internal sponsors are member users in your directory. External sponsors are guest users from the connected organization that were previously invited and are already in your directory. Sponsors can be utilized as approvers when users in this connected organization request access to this access package. For information about how to invite a guest user to your directory, see [Add Azure Active Directory B2B collaboration users in the Azure portal](../b2b/add-users-administrator.md).
9092

91-
When you click **Add/Remove**, a pane appears to select the internal or external sponsors. The pane displays an unfiltered list of users and groups in your directory.
93+
When you select **Add/Remove**, a pane opens in which you can choose internal or external sponsors. The pane displays an unfiltered list of users and groups in your directory.
9294

93-
![Access package - Policy - Add connected organization - Sponsors tab](./media/entitlement-management-organization/organization-sponsors.png)
95+
![The Sponsors pane](./media/entitlement-management-organization/organization-sponsors.png)
9496

95-
1. On the **Review + create** tab, review your organization settings and then click **Create**.
97+
1. Select the **Review + create** tab, review your organization settings, and then select **Create**.
9698

97-
![Access package - Policy - Add connected organization - Review + create tab](./media/entitlement-management-organization/organization-review-create.png)
99+
![The "Review + create" pane](./media/entitlement-management-organization/organization-review-create.png)
98100

99101
## Update a connected organization
100102

101-
If the connected organization changes to a different domain, if you have a new name for that organization, or you wish to change the sponsors, you can update the connected organization.
103+
If the connected organization changes to a different domain, the organization's name changes, or you want to change the sponsors, you can update the connected organization by following the instructions in this section.
102104

103-
**Prerequisite role:** Global administrator, User administrator, or Guest inviter
105+
**Prerequisite role**: *Global administrator*, *User administrator*, or *Guest inviter*
104106

105-
1. In the Azure portal, click **Azure Active Directory** and then click **Identity Governance**.
107+
1. In the Azure portal, select **Azure Active Directory**, and then select **Identity Governance**.
106108

107-
1. In the left menu, click **Connected organizations** and then click to open the connected organization.
109+
1. In the left pane, select **Connected organizations**, and then select the connected organization to open it.
108110

109-
1. On the Overview page, click **Edit** to change the organization name or description.
111+
1. In the connected organization's overview pane, select **Edit** to change the organization name or description.
110112

111-
1. On the Directory + domain page, click **Update directory + domain** to change to a different directory or domain.
113+
1. In the **Directory + domain** pane, select **Update directory + domain** to change to a different directory or domain.
112114

113-
1. On the Sponsors page, click **Add internal sponsors** or **Add external sponsors** to add a user as a sponsor. To remove a sponsor, click on the sponsor and on the menu on the right, click **Delete**.
115+
1. In the **Sponsors** pane, select **Add internal sponsors** or **Add external sponsors** to add a user as a sponsor. To remove a sponsor, select the sponsor and, in the right pane, select **Delete**.
114116

115117

116118
## Delete a connected organization
117119

118120
If you no longer have a relationship with an external Azure AD directory or domain, you can delete the connected organization.
119121

120-
**Prerequisite role:** Global administrator, User administrator, or Guest inviter
122+
**Prerequisite role**: *Global administrator*, *User administrator*, or *Guest inviter*
121123

122-
1. In the Azure portal, click **Azure Active Directory** and then click **Identity Governance**.
124+
1. In the Azure portal, select **Azure Active Directory**, and then select **Identity Governance**.
123125

124-
1. In the left menu, click **Connected organizations** and then click to open the connected organization.
126+
1. In the left pane, select **Connected organizations**, and then select the connected organization to open it.
125127

126-
1. On the Overview page, click **Delete** to delete the connected organization.
128+
1. In the connected organization's overview pane, select **Delete** to delete it.
127129

128-
Currently, you can only delete a connected organization if there are no connected users.
130+
Currently, you can delete a connected organization only if there are no connected users.
129131

130-
![Identity Governance - Connected organizations - Delete connected organization](./media/entitlement-management-organization/organization-delete.png)
132+
![The connected organization Delete button](./media/entitlement-management-organization/organization-delete.png)
131133

132134
## Next steps
133135

134136
- [Govern access for external users](https://docs.microsoft.com/azure/active-directory/governance/entitlement-management-external-users)
135-
- [For users not in your directory](entitlement-management-access-package-request-policy.md#for-users-not-in-your-directory)
137+
- [Govern access for users not in your directory](entitlement-management-access-package-request-policy.md#for-users-not-in-your-directory)

0 commit comments

Comments
 (0)