You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/governance/entitlement-management-organization.md
+42-40Lines changed: 42 additions & 40 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -18,28 +18,28 @@ ms.reviewer: mwahl
18
18
ms.collection: M365-identity-device-management
19
19
20
20
21
-
#Customer intent: As a administrator, I want to allow users in certain partner organizations to request access packages so that our organization can collaborate on projects.
21
+
#Customer intent: As an administrator, I want to allow users in certain partner organizations to request access packages so that our organizations can collaborate on projects.
22
22
23
23
---
24
24
25
25
# Add a connected organization in Azure AD entitlement management
26
26
27
-
Azure AD entitlement management enables you to collaborate with people outside your organization. If you frequently collaborate with users in an external Azure AD directory or domain, you can add them as a connected organization. This article describes how to add a connected organization so that you can allow users outside your organization to request resources in your directory.
27
+
With Azure Active Directory (Azure AD) entitlement management, you can collaborate with people outside your organization. If you frequently collaborate with users in an external Azure AD directory or domain, you can add them as a connected organization. This article describes how to add a connected organization so that you can allow users outside your organization to request resources in your directory.
28
28
29
29
## What is a connected organization?
30
30
31
31
A connected organization is an external Azure AD directory or domain that you have a relationship with.
32
32
33
33
For example, suppose you work at Woodgrove Bank and you want to collaborate with two external organizations. These two organizations have different configurations:
34
34
35
-
- Graphic Design Institute uses Azure AD and their users have a user principal name that ends with `graphicdesigninstitute.com`
36
-
- Contoso does not yet use Azure AD. Contoso users have a user principal name that ends with `contoso.com`.
35
+
- Graphic Design Institute uses Azure AD, and their users have a user principal name that ends with *graphicdesigninstitute.com*.
36
+
- Contoso does not yet use Azure AD. Contoso users have a user principal name that ends with *contoso.com*.
37
37
38
-
In this case, you can configure two connected organizations. You would create one connected organization for Graphic Design Institute and one for Contoso. If you then add those two connected organizations to a policy, users from each organization with a user principal name matching the policy can request access packages. Users with a user principal name that has a domain of graphicdesigninstitute.com would match the Graphic Design Instituteconnected organization and be allowed to submit requests, while users with a user principal name that has a domain of contoso.com would match the Contosoconnected organization and would also be allowed to request packages. Furthermore, because Graphic Design Institute uses Azure AD, any users with a principal name matching a [verified domain](../fundamentals/add-custom-domain.md#verify-your-custom-domain-name) added to their tenant, such as graphicdesigninstitute.example will also be able to request access packages using the same policy.
38
+
In this case, you can configure two connected organizations. You create one connected organization for Graphic Design Institute and one for Contoso. If you then add the two connected organizations to a policy, users from each organization with a user principal name that matches the policy can request access packages. Users with a user principal name that has a domain of *graphicdesigninstitute.com* would match the Graphic Design Institute-connected organization and be allowed to submit requests. Users with a user principal name that has a domain of *contoso.com* would match the Contoso-connected organization and would also be allowed to request packages. And, because Graphic Design Institute uses Azure AD, any users with a principal name that matches a [verified domain](../fundamentals/add-custom-domain.md#verify-your-custom-domain-name)that's added to their tenant, such as *graphicdesigninstitute.example*, would also be able to request access packages by using the same policy.
How users from the Azure AD directory or domain will authenticate depends on the authentication type. The authentication types for connected organizations are the following:
42
+
How users from the Azure AD directory or domain authenticate depends on the authentication type. The authentication types for connected organizations are:
43
43
44
44
- Azure AD
45
45
-[Direct federation](../b2b/direct-federation.md)
@@ -51,85 +51,87 @@ For a demonstration of how to add a connected organization, watch the following
51
51
52
52
## Add a connected organization
53
53
54
-
Follow these steps to add an external Azure AD directory or domain as a connected organization.
54
+
To add an external Azure AD directory or domain as a connected organization, follow the instructions in this section.
55
55
56
-
**Prerequisite role:**Global administrator, User administrator, or Guest inviter
56
+
**Prerequisite role**: *Global administrator*, *User administrator*, or *Guest inviter*
57
57
58
-
1. In the Azure portal, click**Azure Active Directory** and then click**Identity Governance**.
58
+
1. In the Azure portal, select**Azure Active Directory**, and then select**Identity Governance**.
59
59
60
-
1. In the left menu, click**Connected organizations** and then click**Add connected organization**.
60
+
1. In the left pane, select**Connected organizations**, and then select**Add connected organization**.
1. Select **Add** to add the Azure AD directory or domain. Currently, you can add only one Azure AD directory or domain per connected organization.
77
79
78
80
> [!NOTE]
79
-
> All users from the Azure AD directory or domain will be able to request this access package. This includes users in Azure AD from all subdomains associated with the directory, unless those domains are blocked by the Azure B2B allow or deny list. For more information, see [Allow or block invitations to B2B users from specific organizations](../b2b/allow-deny-list.md).
81
+
> All users from the Azure AD directory or domain will be able to request this access package. This includes users in Azure AD from all subdomains associated with the directory, unless those domains are blocked by the Azure AD business to business (B2B) allow or deny list. For more information, see [Allow or block invitations to B2B users from specific organizations](../b2b/allow-deny-list.md).
80
82
81
-
1.Once you have added the Azure AD directory or domain, click**Select**.
83
+
1.After you've added the Azure AD directory or domain, select**Select**.
1.On the **Sponsors** tab, add optional sponsors for this connected organization.
89
+
1.Select the **Sponsors** tab, and then add optional sponsors for this connected organization.
88
90
89
91
Sponsors are internal or external users already in your directory that are the point of contact for the relationship with this connected organization. Internal sponsors are member users in your directory. External sponsors are guest users from the connected organization that were previously invited and are already in your directory. Sponsors can be utilized as approvers when users in this connected organization request access to this access package. For information about how to invite a guest user to your directory, see [Add Azure Active Directory B2B collaboration users in the Azure portal](../b2b/add-users-administrator.md).
90
92
91
-
When you click**Add/Remove**, a pane appears to select the internal or external sponsors. The pane displays an unfiltered list of users and groups in your directory.
93
+
When you select**Add/Remove**, a pane opens in which you can choose internal or external sponsors. The pane displays an unfiltered list of users and groups in your directory.
If the connected organization changes to a different domain, if you have a new name for that organization, or you wish to change the sponsors, you can update the connected organization.
103
+
If the connected organization changes to a different domain, the organization's name changes, or you want to change the sponsors, you can update the connected organization by following the instructions in this section.
102
104
103
-
**Prerequisite role:**Global administrator, User administrator, or Guest inviter
105
+
**Prerequisite role**: *Global administrator*, *User administrator*, or *Guest inviter*
104
106
105
-
1. In the Azure portal, click**Azure Active Directory** and then click**Identity Governance**.
107
+
1. In the Azure portal, select**Azure Active Directory**, and then select**Identity Governance**.
106
108
107
-
1. In the left menu, click**Connected organizations** and then click to open the connected organization.
109
+
1. In the left pane, select**Connected organizations**, and then select the connected organization to open it.
108
110
109
-
1.On the Overview page, click**Edit** to change the organization name or description.
111
+
1.In the connected organization's overview pane, select**Edit** to change the organization name or description.
110
112
111
-
1.On the Directory + domain page, click**Update directory + domain** to change to a different directory or domain.
113
+
1.In the **Directory + domain** pane, select**Update directory + domain** to change to a different directory or domain.
112
114
113
-
1.On the Sponsors page, click**Add internal sponsors** or **Add external sponsors** to add a user as a sponsor. To remove a sponsor, click on the sponsor and on the menu on the right, click**Delete**.
115
+
1.In the **Sponsors** pane, select**Add internal sponsors** or **Add external sponsors** to add a user as a sponsor. To remove a sponsor, select the sponsor and, in the right pane, select**Delete**.
114
116
115
117
116
118
## Delete a connected organization
117
119
118
120
If you no longer have a relationship with an external Azure AD directory or domain, you can delete the connected organization.
119
121
120
-
**Prerequisite role:**Global administrator, User administrator, or Guest inviter
122
+
**Prerequisite role**: *Global administrator*, *User administrator*, or *Guest inviter*
121
123
122
-
1. In the Azure portal, click**Azure Active Directory** and then click**Identity Governance**.
124
+
1. In the Azure portal, select**Azure Active Directory**, and then select**Identity Governance**.
123
125
124
-
1. In the left menu, click**Connected organizations** and then click to open the connected organization.
126
+
1. In the left pane, select**Connected organizations**, and then select the connected organization to open it.
125
127
126
-
1.On the Overview page, click**Delete** to delete the connected organization.
128
+
1.In the connected organization's overview pane, select**Delete** to delete it.
127
129
128
-
Currently, you can only delete a connected organization if there are no connected users.
130
+
Currently, you can delete a connected organization only if there are no connected users.
0 commit comments