Skip to content

Commit 2f10381

Browse files
authored
Merge pull request #250016 from garrodonnell/Update-portal-instructions
[B2B] Update steps from Azure portal to Entra admin center - 147894
2 parents 03c481b + 4d1eb97 commit 2f10381

21 files changed

+138
-166
lines changed

articles/active-directory/external-identities/add-users-administrator.md

Lines changed: 10 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22

3-
title: Add B2B collaboration users in the Azure portal
3+
title: Add B2B collaboration users in the Microsoft Entra admin center
44
description: Shows how an admin can add guest users to their directory from a partner organization using Azure Active Directory (Azure AD) B2B collaboration.
55

66
services: active-directory
@@ -15,9 +15,9 @@ manager: celestedg
1515
ms.collection: M365-identity-device-management
1616
---
1717

18-
# Add Azure Active Directory B2B collaboration users in the Azure portal
18+
# Add Azure Active Directory B2B collaboration users in the Microsoft Entra admin center
1919

20-
As a user who is assigned any of the limited administrator directory roles, you can use the Azure portal to invite B2B collaboration users. You can invite guest users to the directory, to a group, or to an application. After you invite a user through any of these methods, the invited user's account is added to Azure Active Directory (Azure AD), with a user type of *Guest*. The guest user must then redeem their invitation to access resources. An invitation of a user doesn't expire.
20+
As a user who is assigned any of the limited administrator directory roles, you can use the Microsoft Entra admin center to invite B2B collaboration users. You can invite guest users to the directory, to a group, or to an application. After you invite a user through any of these methods, the invited user's account is added to Azure Active Directory (Azure AD), with a user type of *Guest*. The guest user must then redeem their invitation to access resources. An invitation of a user doesn't expire.
2121

2222
After you add a guest user to the directory, you can either send the guest user a direct link to a shared app, or the guest user can select the redemption URL in the invitation email. For more information about the redemption process, see [B2B collaboration invitation redemption](redemption-experience.md).
2323

@@ -38,11 +38,11 @@ Make sure your organization's external collaboration settings are configured suc
3838

3939
To add B2B collaboration users to the directory, follow these steps:
4040

41-
1. Sign in to the [Azure portal](https://portal.azure.com) in the **User Administrator** role. A role with Guest Inviter privileges can also invite external users.
41+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [User administrator](../roles/permissions-reference.md#user-administrator).
4242

43-
1. Navigate to **Azure Active Directory** > **Users**.
43+
1. Browse to **Identity** > **Users** > **All users**.
4444

45-
1. Select **Invite external user** from the menu.
45+
1. Select **New user** > **Invite external user** from the menu.
4646

4747
![Screenshot of the invite external user menu option.](media/add-users-administrator/invite-external-user-menu.png)
4848

@@ -121,9 +121,8 @@ The user is added to your directory with a user principal name (UPN) in the form
121121

122122
If you need to manually add B2B collaboration users to a group after the user was invited, follow these steps:
123123

124-
1. Sign in to the [Azure portal](https://portal.azure.com) as an Azure AD administrator.
125-
2. Search for and select **Azure Active Directory** from any page.
126-
3. Under **Manage**, select **Groups**.
124+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [User administrator](../roles/permissions-reference.md#user-administrator).
125+
1. Browse to **Identity** > **Groups** > **All groups**.
127126
4. Select a group (or select **New group** to create a new one). It's a good idea to include in the group description that the group contains B2B guest users.
128127
5. Under **Manage**, select **Members**.
129128
6. Select **Add members**.
@@ -149,9 +148,8 @@ You can also use dynamic groups with Azure AD B2B collaboration. For more inform
149148

150149
To add B2B collaboration users to an application, follow these steps:
151150

152-
1. Sign in to the [Azure portal](https://portal.azure.com) as an Azure AD administrator.
153-
2. Search for and select **Azure Active Directory** from any page.
154-
3. Under **Manage**, select **Enterprise applications**.
151+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [User administrator](../roles/permissions-reference.md#user-administrator).
152+
1. Browse to **Identity** > **Applications** > **Enterprise applications**.
155153
4. On the **All applications** page, select the application to which you want to add guest users.
156154
5. Under **Manage**, select **Users and groups**.
157155
6. Select **Add user/group**.

articles/active-directory/external-identities/add-users-information-worker.md

Lines changed: 7 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -85,18 +85,16 @@ Self-service app management requires some initial setup by a Global Administrato
8585

8686
[!INCLUDE [portal updates](~/articles/active-directory/includes/portal-update.md)]
8787

88-
1. Sign in to the [Azure portal](https://portal.azure.com) as a Global Administrator.
89-
2. In the navigation panel, select **Azure Active Directory**.
90-
3. Select **Groups**.
88+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [User administrator](../roles/permissions-reference.md#user-administrator).
89+
1. Browse to **Identity** > **Groups** > **All groups**.
9190
4. Under **Settings**, select **General**.
9291
5. Under **Self Service Group Management**, next to **Owners can manage group membership requests in the Access Panel**, select **Yes**.
9392
6. Select **Save**.
9493

9594
### Create a group to assign to the app and make the user an owner
9695

97-
1. Sign in to the [Azure portal](https://portal.azure.com) as an Azure AD administrator or Global Administrator.
98-
2. In the navigation panel, select **Azure Active Directory**.
99-
3. Select **Groups**.
96+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [User administrator](../roles/permissions-reference.md#user-administrator).
97+
1. Browse to **Identity** > **Groups** > **All groups**.
10098
4. Select **New group**.
10199
5. Under **Group type**, select **Security**.
102100
6. Type a **Group name** and **Group description**.
@@ -107,10 +105,9 @@ Self-service app management requires some initial setup by a Global Administrato
107105

108106
### Configure the app for self-service and assign the group to the app
109107

110-
1. Sign in to the [Azure portal](https://portal.azure.com) as an Azure AD administrator or Global Administrator.
111-
2. In the navigation pane, select **Azure Active Directory**.
112-
3. Under **Manage**, select **Enterprise applications** > **All applications**.
113-
4. In the application list, find and open the app.
108+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [User administrator](../roles/permissions-reference.md#user-administrator).
109+
1. Browse to **Identity** > **Applications** > **Enterprise applications**.
110+
4. Select **All applications**, in the application list, find and open the app.
114111
5. Under **Manage**, select **Single sign-on**, and configure the application for single sign-on. (For details, see [how to manage single sign-on for enterprise apps](../manage-apps/add-application-portal-setup-sso.md).)
115112
6. Under **Manage**, select **Self-service**, and set up self-service app access. (For details, see [how to use self-service app access](../manage-apps/manage-self-service-access.md).)
116113

articles/active-directory/external-identities/allow-deny-list.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22

33
title: Allow or block invites to specific organizations
4-
description: Shows how an administrator can use the Azure portal or PowerShell to set an access or blocklist to allow or block B2B users from certain domains.
4+
description: Shows how an administrator can use the Microsoft Entra admin center or PowerShell to set an access or blocklist to allow or block B2B users from certain domains.
55

66
services: active-directory
77
ms.service: active-directory
@@ -46,8 +46,8 @@ This is the most typical scenario, where your organization wants to work with al
4646

4747
To add a blocklist:
4848

49-
1. Sign in to the [Azure portal](https://portal.azure.com).
50-
2. Select **Azure Active Directory** > **Users** > **User settings**.
49+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [User administrator](../roles/permissions-reference.md#user-administrator).
50+
1. Browse to **Identity** > **Users** > **User settings**.
5151
3. Under **External users**, select **Manage external collaboration settings**.
5252
4. Under **Collaboration restrictions**, select **Deny invitations to the specified domains**.
5353
5. Under **Target domains**, enter the name of one of the domains that you want to block. For multiple domains, enter each domain on a new line. For example:
@@ -67,8 +67,8 @@ If you want to use an allowlist, make sure that you spend time to fully evaluate
6767

6868
To add an allowlist:
6969

70-
1. Sign in to the [Azure portal](https://portal.azure.com).
71-
2. Select **Azure Active Directory** > **Users** > **User settings**.
70+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [User administrator](../roles/permissions-reference.md#user-administrator).
71+
1. Browse to **Identity** > **Users** > **User settings**.
7272
3. Under **External users**, select **Manage external collaboration settings**.
7373
4. Under **Collaboration restrictions**, select **Allow invitations only to the specified domains (most restrictive)**.
7474
5. Under **Target domains**, enter the name of one of the domains that you want to allow. For multiple domains, enter each domain on a new line. For example:

articles/active-directory/external-identities/b2b-government-national-clouds.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -28,7 +28,7 @@ To set up B2B collaboration between tenants in different clouds, both tenants ne
2828

2929
## B2B collaboration within the Microsoft Azure Government cloud
3030

31-
Within the Azure US Government cloud, B2B collaboration is enabled between tenants that are both within Azure US Government cloud and that both support B2B collaboration. Azure US Government tenants that support B2B collaboration can also collaborate with social users using Microsoft, Google accounts, or email one-time passcode accounts. If you invite a user outside of these groups (for example, if the user is in a tenant that isn't part of the Azure US Government cloud or doesn't yet support B2B collaboration), the invitation will fail or the user won't be able to redeem the invitation. For Microsoft accounts (MSAs), there are known limitations with accessing the Azure portal: newly invited MSA guests are unable to redeem direct link invitations to the Azure portal, and existing MSA guests are unable to sign in to the Azure portal. For details about other limitations, see [Azure Active Directory Premium P1 and P2 Variations](../../azure-government/compare-azure-government-global-azure.md#azure-active-directory-premium-p1-and-p2).
31+
Within the Azure US Government cloud, B2B collaboration is enabled between tenants that are both within Azure US Government cloud and that both support B2B collaboration. Azure US Government tenants that support B2B collaboration can also collaborate with social users using Microsoft, Google accounts, or email one-time passcode accounts. If you invite a user outside of these groups (for example, if the user is in a tenant that isn't part of the Azure US Government cloud or doesn't yet support B2B collaboration), the invitation will fail or the user won't be able to redeem the invitation. For Microsoft accounts (MSAs), there are known limitations with accessing the Microsoft Entra admin center: newly invited MSA guests are unable to redeem direct link invitations to the Microsoft Entra admin center, and existing MSA guests are unable to sign in to the Microsoft Entra admin center. For details about other limitations, see [Azure Active Directory Premium P1 and P2 Variations](../../azure-government/compare-azure-government-global-azure.md#azure-active-directory-premium-p1-and-p2).
3232

3333
### How can I tell if B2B collaboration is available in my Azure US Government tenant?
3434
To find out if your Azure US Government cloud tenant supports B2B collaboration, do the following:

articles/active-directory/external-identities/b2b-quickstart-add-guest-users-portal.md

Lines changed: 8 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
title: 'Quickstart: Add a guest user and send an invitation'
3-
description: Use this quickstart to learn how Azure AD admins can add B2B guest users in the Azure portal and walk through the B2B invitation workflow.
3+
description: Use this quickstart to learn how Azure AD admins can add B2B guest users in the Microsoft Entra admin center and walk through the B2B invitation workflow.
44
services: active-directory
55
ms.author: cmulligan
66
author: csmulligan
@@ -18,7 +18,7 @@ ms.collection: M365-identity-device-management
1818

1919
With Azure AD [B2B collaboration](what-is-b2b.md), you can invite anyone to collaborate with your organization using their own work, school, or social account.
2020

21-
In this quickstart, you'll learn how to add a new guest user to your Azure AD directory in the Azure portal. You'll also send an invitation and see what the guest user's invitation redemption process looks like.
21+
In this quickstart, you'll learn how to add a new guest user to your Azure AD directory in the Microsoft Entra admin center. You'll also send an invitation and see what the guest user's invitation redemption process looks like.
2222

2323
If you don’t have an Azure subscription, create a [free account](https://azure.microsoft.com/free/?WT.mc_id=A261C142F) before you begin.
2424

@@ -40,9 +40,9 @@ To complete the scenario in this quickstart, you need:
4040

4141
This quickstart guide provides the basic steps to invite an external user. To learn about all of the properties and settings that you can include when you invite an external user, see [How to create and delete a user](../fundamentals/how-to-create-delete-users.md).
4242

43-
1. Sign in to the [Azure portal](https://portal.azure.com) using one of the roles listed in the Prerequisites.
43+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [User administrator](../roles/permissions-reference.md#user-administrator).
4444

45-
1. Navigate to **Azure Active Directory** > **Users**.
45+
1. Browse to **Identity** > **Users** > **All users**.
4646

4747
1. Select **Invite external user** from the menu.
4848

@@ -94,14 +94,13 @@ Now sign in as the guest user to see the invitation.
9494

9595
When no longer needed, delete the test guest user.
9696

97-
1. Sign in to the [Azure portal](https://portal.azure.com) with an account that's been assigned the Global administrator or User administrator role.
98-
1. Select the **Azure Active Directory** service.
99-
1. Under **Manage**, select **Users**.
97+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [User administrator](../roles/permissions-reference.md#user-administrator).
98+
1. Browse to **Identity** > **Users** > **User settings**.
10099
1. Select the test user, and then select **Delete user**.
101100

102101
## Next steps
103102

104-
In this quickstart, you created a guest user in the Azure portal and sent an invitation to share apps. Then you viewed the redemption process from the guest user's perspective, and verified that the guest user was able to access their My Apps page.
105-
To learn more about adding guest users for collaboration, see [Add Azure Active Directory B2B collaboration users in the Azure portal](add-users-administrator.md).
103+
In this quickstart, you created a guest user in the Microsoft Entra admin center and sent an invitation to share apps. Then you viewed the redemption process from the guest user's perspective, and verified that the guest user was able to access their My Apps page.
104+
To learn more about adding guest users for collaboration, see [Add Azure Active Directory B2B collaboration users in the Microsoft Entra admin center](add-users-administrator.md).
106105
To learn more about adding guest users with PowerShell, see [Add and invite guests with PowerShell](b2b-quickstart-invite-powershell.md).
107106
You can also bulk invite guest users [via the portal](tutorial-bulk-invite.md) or [via PowerShell](bulk-invite-powershell.md).

articles/active-directory/external-identities/b2b-sponsors.md

Lines changed: 6 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: Add sponsors to a guest user in the Azure portal - Azure AD (preview)
2+
title: Add sponsors to a guest user in the Microsoft Entra admin center - Azure AD (preview)
33
description: Shows how an admin can add sponsors to guest users in Azure Active Directory (Azure AD) B2B collaboration.
44

55
services: active-directory
@@ -44,9 +44,9 @@ The Azure Active Directory B2B collaboration sponsor feature serves as a foundat
4444

4545
You can add up to five sponsors when inviting a new guest user. If you don’t specify a sponsor, the inviter will be added as a sponsor. To invite a guest user, you need to have the Global Administrator role or a limited administrator directory role such as Guest Inviter or User Administrator.
4646

47-
1. Sign in to the [Azure portal](https://portal.azure.com/) .
48-
1. Navigate to **Azure Active Directory** > **Users**.
49-
1. Select **Invite external user** from the menu.
47+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [User administrator](../roles/permissions-reference.md#user-administrator).
48+
1. Browse to **Identity** > **Users** > **All users**.
49+
1. Select **New user** > **Invite external user** from the menu.
5050
1. Entered the details on the Basics tab and select **Next: Properties**.
5151
1. You can add sponsors under  **Job information** on the **Properties** tab,
5252
:::image type="content" source="media/b2b-sponsors/add-sponsors.png" alt-text="Screenshot showing the Add sponsor option.":::
@@ -60,9 +60,8 @@ You can also add sponsors with the Microsoft Graph API, using invitation manager
6060

6161
When you invite a guest user, you became their sponsor by default. If you need to manually change the guest user's sponsor, follow these steps:
6262

63-
1. Sign in to the [Azure portal](https://portal.azure.com) as an Azure AD administrator.
64-
2. Search for and select **Azure Active Directory** from any page.
65-
3. Under **Manage**, select **Users**.
63+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [User administrator](../roles/permissions-reference.md#user-administrator).
64+
1. Browse to **Identity** > **Users** > **All users**.
6665
4. In the list, select the user's name to open their user profile
6766
5. Under **Properties** > **Job information** check the **Sponsors** field. If the guest user already has a sponsor, you can select **View** to see the sponsor's name.
6867
:::image type="content" source="media/b2b-sponsors/sponsors-under-properties.png" alt-text="Screenshot of the sponsors field under the job information.":::

0 commit comments

Comments
 (0)