You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/external-identities/add-users-administrator.md
+10-12Lines changed: 10 additions & 12 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,6 +1,6 @@
1
1
---
2
2
3
-
title: Add B2B collaboration users in the Azure portal
3
+
title: Add B2B collaboration users in the Microsoft Entra admin center
4
4
description: Shows how an admin can add guest users to their directory from a partner organization using Azure Active Directory (Azure AD) B2B collaboration.
5
5
6
6
services: active-directory
@@ -15,9 +15,9 @@ manager: celestedg
15
15
ms.collection: M365-identity-device-management
16
16
---
17
17
18
-
# Add Azure Active Directory B2B collaboration users in the Azure portal
18
+
# Add Azure Active Directory B2B collaboration users in the Microsoft Entra admin center
19
19
20
-
As a user who is assigned any of the limited administrator directory roles, you can use the Azure portal to invite B2B collaboration users. You can invite guest users to the directory, to a group, or to an application. After you invite a user through any of these methods, the invited user's account is added to Azure Active Directory (Azure AD), with a user type of *Guest*. The guest user must then redeem their invitation to access resources. An invitation of a user doesn't expire.
20
+
As a user who is assigned any of the limited administrator directory roles, you can use the Microsoft Entra admin center to invite B2B collaboration users. You can invite guest users to the directory, to a group, or to an application. After you invite a user through any of these methods, the invited user's account is added to Azure Active Directory (Azure AD), with a user type of *Guest*. The guest user must then redeem their invitation to access resources. An invitation of a user doesn't expire.
21
21
22
22
After you add a guest user to the directory, you can either send the guest user a direct link to a shared app, or the guest user can select the redemption URL in the invitation email. For more information about the redemption process, see [B2B collaboration invitation redemption](redemption-experience.md).
23
23
@@ -38,11 +38,11 @@ Make sure your organization's external collaboration settings are configured suc
38
38
39
39
To add B2B collaboration users to the directory, follow these steps:
40
40
41
-
1. Sign in to the [Azure portal](https://portal.azure.com)in the **User Administrator** role. A role with Guest Inviter privileges can also invite external users.
41
+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com)as at least a [User administrator](../roles/permissions-reference.md#user-administrator).
42
42
43
-
1.Navigate to **Azure Active Directory** > **Users**.
43
+
1.Browse to **Identity** > **Users** > **All users**.
44
44
45
-
1. Select **Invite external user** from the menu.
45
+
1. Select **New user** > **Invite external user** from the menu.
46
46
47
47

48
48
@@ -121,9 +121,8 @@ The user is added to your directory with a user principal name (UPN) in the form
121
121
122
122
If you need to manually add B2B collaboration users to a group after the user was invited, follow these steps:
123
123
124
-
1. Sign in to the [Azure portal](https://portal.azure.com) as an Azure AD administrator.
125
-
2. Search for and select **Azure Active Directory** from any page.
126
-
3. Under **Manage**, select **Groups**.
124
+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [User administrator](../roles/permissions-reference.md#user-administrator).
125
+
1. Browse to **Identity** > **Groups** > **All groups**.
127
126
4. Select a group (or select **New group** to create a new one). It's a good idea to include in the group description that the group contains B2B guest users.
128
127
5. Under **Manage**, select **Members**.
129
128
6. Select **Add members**.
@@ -149,9 +148,8 @@ You can also use dynamic groups with Azure AD B2B collaboration. For more inform
149
148
150
149
To add B2B collaboration users to an application, follow these steps:
151
150
152
-
1. Sign in to the [Azure portal](https://portal.azure.com) as an Azure AD administrator.
153
-
2. Search for and select **Azure Active Directory** from any page.
154
-
3. Under **Manage**, select **Enterprise applications**.
151
+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [User administrator](../roles/permissions-reference.md#user-administrator).
152
+
1. Browse to **Identity** > **Applications** > **Enterprise applications**.
155
153
4. On the **All applications** page, select the application to which you want to add guest users.
1. Sign in to the [Azure portal](https://portal.azure.com) as a Global Administrator.
89
-
2. In the navigation panel, select **Azure Active Directory**.
90
-
3. Select **Groups**.
88
+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [User administrator](../roles/permissions-reference.md#user-administrator).
89
+
1. Browse to **Identity** > **Groups** > **All groups**.
91
90
4. Under **Settings**, select **General**.
92
91
5. Under **Self Service Group Management**, next to **Owners can manage group membership requests in the Access Panel**, select **Yes**.
93
92
6. Select **Save**.
94
93
95
94
### Create a group to assign to the app and make the user an owner
96
95
97
-
1. Sign in to the [Azure portal](https://portal.azure.com) as an Azure AD administrator or Global Administrator.
98
-
2. In the navigation panel, select **Azure Active Directory**.
99
-
3. Select **Groups**.
96
+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [User administrator](../roles/permissions-reference.md#user-administrator).
97
+
1. Browse to **Identity** > **Groups** > **All groups**.
100
98
4. Select **New group**.
101
99
5. Under **Group type**, select **Security**.
102
100
6. Type a **Group name** and **Group description**.
@@ -107,10 +105,9 @@ Self-service app management requires some initial setup by a Global Administrato
107
105
108
106
### Configure the app for self-service and assign the group to the app
109
107
110
-
1. Sign in to the [Azure portal](https://portal.azure.com) as an Azure AD administrator or Global Administrator.
111
-
2. In the navigation pane, select **Azure Active Directory**.
112
-
3. Under **Manage**, select **Enterprise applications** > **All applications**.
113
-
4. In the application list, find and open the app.
108
+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [User administrator](../roles/permissions-reference.md#user-administrator).
109
+
1. Browse to **Identity** > **Applications** > **Enterprise applications**.
110
+
4. Select **All applications**, in the application list, find and open the app.
114
111
5. Under **Manage**, select **Single sign-on**, and configure the application for single sign-on. (For details, see [how to manage single sign-on for enterprise apps](../manage-apps/add-application-portal-setup-sso.md).)
115
112
6. Under **Manage**, select **Self-service**, and set up self-service app access. (For details, see [how to use self-service app access](../manage-apps/manage-self-service-access.md).)
Copy file name to clipboardExpand all lines: articles/active-directory/external-identities/allow-deny-list.md
+5-5Lines changed: 5 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,7 +1,7 @@
1
1
---
2
2
3
3
title: Allow or block invites to specific organizations
4
-
description: Shows how an administrator can use the Azure portal or PowerShell to set an access or blocklist to allow or block B2B users from certain domains.
4
+
description: Shows how an administrator can use the Microsoft Entra admin center or PowerShell to set an access or blocklist to allow or block B2B users from certain domains.
5
5
6
6
services: active-directory
7
7
ms.service: active-directory
@@ -46,8 +46,8 @@ This is the most typical scenario, where your organization wants to work with al
46
46
47
47
To add a blocklist:
48
48
49
-
1. Sign in to the [Azure portal](https://portal.azure.com).
50
-
2. Select **Azure Active Directory** > **Users** > **User settings**.
49
+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [User administrator](../roles/permissions-reference.md#user-administrator).
50
+
1. Browse to **Identity** > **Users** > **User settings**.
51
51
3. Under **External users**, select **Manage external collaboration settings**.
52
52
4. Under **Collaboration restrictions**, select **Deny invitations to the specified domains**.
53
53
5. Under **Target domains**, enter the name of one of the domains that you want to block. For multiple domains, enter each domain on a new line. For example:
@@ -67,8 +67,8 @@ If you want to use an allowlist, make sure that you spend time to fully evaluate
67
67
68
68
To add an allowlist:
69
69
70
-
1. Sign in to the [Azure portal](https://portal.azure.com).
71
-
2. Select **Azure Active Directory** > **Users** > **User settings**.
70
+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [User administrator](../roles/permissions-reference.md#user-administrator).
71
+
1. Browse to **Identity** > **Users** > **User settings**.
72
72
3. Under **External users**, select **Manage external collaboration settings**.
73
73
4. Under **Collaboration restrictions**, select **Allow invitations only to the specified domains (most restrictive)**.
74
74
5. Under **Target domains**, enter the name of one of the domains that you want to allow. For multiple domains, enter each domain on a new line. For example:
Copy file name to clipboardExpand all lines: articles/active-directory/external-identities/b2b-government-national-clouds.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -28,7 +28,7 @@ To set up B2B collaboration between tenants in different clouds, both tenants ne
28
28
29
29
## B2B collaboration within the Microsoft Azure Government cloud
30
30
31
-
Within the Azure US Government cloud, B2B collaboration is enabled between tenants that are both within Azure US Government cloud and that both support B2B collaboration. Azure US Government tenants that support B2B collaboration can also collaborate with social users using Microsoft, Google accounts, or email one-time passcode accounts. If you invite a user outside of these groups (for example, if the user is in a tenant that isn't part of the Azure US Government cloud or doesn't yet support B2B collaboration), the invitation will fail or the user won't be able to redeem the invitation. For Microsoft accounts (MSAs), there are known limitations with accessing the Azure portal: newly invited MSA guests are unable to redeem direct link invitations to the Azure portal, and existing MSA guests are unable to sign in to the Azure portal. For details about other limitations, see [Azure Active Directory Premium P1 and P2 Variations](../../azure-government/compare-azure-government-global-azure.md#azure-active-directory-premium-p1-and-p2).
31
+
Within the Azure US Government cloud, B2B collaboration is enabled between tenants that are both within Azure US Government cloud and that both support B2B collaboration. Azure US Government tenants that support B2B collaboration can also collaborate with social users using Microsoft, Google accounts, or email one-time passcode accounts. If you invite a user outside of these groups (for example, if the user is in a tenant that isn't part of the Azure US Government cloud or doesn't yet support B2B collaboration), the invitation will fail or the user won't be able to redeem the invitation. For Microsoft accounts (MSAs), there are known limitations with accessing the Microsoft Entra admin center: newly invited MSA guests are unable to redeem direct link invitations to the Microsoft Entra admin center, and existing MSA guests are unable to sign in to the Microsoft Entra admin center. For details about other limitations, see [Azure Active Directory Premium P1 and P2 Variations](../../azure-government/compare-azure-government-global-azure.md#azure-active-directory-premium-p1-and-p2).
32
32
33
33
### How can I tell if B2B collaboration is available in my Azure US Government tenant?
34
34
To find out if your Azure US Government cloud tenant supports B2B collaboration, do the following:
Copy file name to clipboardExpand all lines: articles/active-directory/external-identities/b2b-quickstart-add-guest-users-portal.md
+8-9Lines changed: 8 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,6 +1,6 @@
1
1
---
2
2
title: 'Quickstart: Add a guest user and send an invitation'
3
-
description: Use this quickstart to learn how Azure AD admins can add B2B guest users in the Azure portal and walk through the B2B invitation workflow.
3
+
description: Use this quickstart to learn how Azure AD admins can add B2B guest users in the Microsoft Entra admin center and walk through the B2B invitation workflow.
With Azure AD [B2B collaboration](what-is-b2b.md), you can invite anyone to collaborate with your organization using their own work, school, or social account.
20
20
21
-
In this quickstart, you'll learn how to add a new guest user to your Azure AD directory in the Azure portal. You'll also send an invitation and see what the guest user's invitation redemption process looks like.
21
+
In this quickstart, you'll learn how to add a new guest user to your Azure AD directory in the Microsoft Entra admin center. You'll also send an invitation and see what the guest user's invitation redemption process looks like.
22
22
23
23
If you don’t have an Azure subscription, create a [free account](https://azure.microsoft.com/free/?WT.mc_id=A261C142F) before you begin.
24
24
@@ -40,9 +40,9 @@ To complete the scenario in this quickstart, you need:
40
40
41
41
This quickstart guide provides the basic steps to invite an external user. To learn about all of the properties and settings that you can include when you invite an external user, see [How to create and delete a user](../fundamentals/how-to-create-delete-users.md).
42
42
43
-
1. Sign in to the [Azure portal](https://portal.azure.com)using one of the roles listed in the Prerequisites.
43
+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com)as at least a [User administrator](../roles/permissions-reference.md#user-administrator).
44
44
45
-
1.Navigate to **Azure Active Directory** > **Users**.
45
+
1.Browse to **Identity** > **Users** > **All users**.
46
46
47
47
1. Select **Invite external user** from the menu.
48
48
@@ -94,14 +94,13 @@ Now sign in as the guest user to see the invitation.
94
94
95
95
When no longer needed, delete the test guest user.
96
96
97
-
1. Sign in to the [Azure portal](https://portal.azure.com) with an account that's been assigned the Global administrator or User administrator role.
98
-
1. Select the **Azure Active Directory** service.
99
-
1. Under **Manage**, select **Users**.
97
+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [User administrator](../roles/permissions-reference.md#user-administrator).
98
+
1. Browse to **Identity** > **Users** > **User settings**.
100
99
1. Select the test user, and then select **Delete user**.
101
100
102
101
## Next steps
103
102
104
-
In this quickstart, you created a guest user in the Azure portal and sent an invitation to share apps. Then you viewed the redemption process from the guest user's perspective, and verified that the guest user was able to access their My Apps page.
105
-
To learn more about adding guest users for collaboration, see [Add Azure Active Directory B2B collaboration users in the Azure portal](add-users-administrator.md).
103
+
In this quickstart, you created a guest user in the Microsoft Entra admin center and sent an invitation to share apps. Then you viewed the redemption process from the guest user's perspective, and verified that the guest user was able to access their My Apps page.
104
+
To learn more about adding guest users for collaboration, see [Add Azure Active Directory B2B collaboration users in the Microsoft Entra admin center](add-users-administrator.md).
106
105
To learn more about adding guest users with PowerShell, see [Add and invite guests with PowerShell](b2b-quickstart-invite-powershell.md).
107
106
You can also bulk invite guest users [via the portal](tutorial-bulk-invite.md) or [via PowerShell](bulk-invite-powershell.md).
Copy file name to clipboardExpand all lines: articles/active-directory/external-identities/b2b-sponsors.md
+6-7Lines changed: 6 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,5 +1,5 @@
1
1
---
2
-
title: Add sponsors to a guest user in the Azure portal - Azure AD (preview)
2
+
title: Add sponsors to a guest user in the Microsoft Entra admin center - Azure AD (preview)
3
3
description: Shows how an admin can add sponsors to guest users in Azure Active Directory (Azure AD) B2B collaboration.
4
4
5
5
services: active-directory
@@ -44,9 +44,9 @@ The Azure Active Directory B2B collaboration sponsor feature serves as a foundat
44
44
45
45
You can add up to five sponsors when inviting a new guest user. If you don’t specify a sponsor, the inviter will be added as a sponsor. To invite a guest user, you need to have the Global Administrator role or a limited administrator directory role such as Guest Inviter or User Administrator.
46
46
47
-
1. Sign in to the [Azure portal](https://portal.azure.com/) .
48
-
1.Navigate to **Azure Active Directory** > **Users**.
49
-
1. Select **Invite external user** from the menu.
47
+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [User administrator](../roles/permissions-reference.md#user-administrator).
48
+
1.Browse to **Identity** > **Users** > **All users**.
49
+
1. Select **New user** > **Invite external user** from the menu.
50
50
1. Entered the details on the Basics tab and select **Next: Properties**.
51
51
1. You can add sponsors under **Job information** on the **Properties** tab,
52
52
:::image type="content" source="media/b2b-sponsors/add-sponsors.png" alt-text="Screenshot showing the Add sponsor option.":::
@@ -60,9 +60,8 @@ You can also add sponsors with the Microsoft Graph API, using invitation manager
60
60
61
61
When you invite a guest user, you became their sponsor by default. If you need to manually change the guest user's sponsor, follow these steps:
62
62
63
-
1. Sign in to the [Azure portal](https://portal.azure.com) as an Azure AD administrator.
64
-
2. Search for and select **Azure Active Directory** from any page.
65
-
3. Under **Manage**, select **Users**.
63
+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [User administrator](../roles/permissions-reference.md#user-administrator).
64
+
1. Browse to **Identity** > **Users** > **All users**.
66
65
4. In the list, select the user's name to open their user profile
67
66
5. Under **Properties** > **Job information** check the **Sponsors** field. If the guest user already has a sponsor, you can select **View** to see the sponsor's name.
68
67
:::image type="content" source="media/b2b-sponsors/sponsors-under-properties.png" alt-text="Screenshot of the sponsors field under the job information.":::
0 commit comments