Skip to content

Commit 35fc94d

Browse files
committed
Trust settings info per GitHub issue
1 parent 612a0db commit 35fc94d

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

articles/active-directory/external-identities/b2b-direct-connect-overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -97,7 +97,7 @@ For example, say Contoso (the resource tenant) trusts MFA claims from Fabrikam.
9797

9898
For information about Conditional Access and Teams, see [Overview of security and compliance](/microsoftteams/security-compliance-overview) in the Microsoft Teams documentation.
9999

100-
## Device compliance and hybrid Azure AD joined device
100+
## Trust settings for device compliance
101101

102102
In your cross-tenant access settings, you can use **Trust settings** to trust claims from an external user's home tenant about whether the user's device meets their device compliance policies or is hybrid Azure AD joined. When device trust settings are enabled, Azure AD checks a user's authentication session for a device claim. If the session contains a device claim indicating that the policies have already been met in the user's home tenant, the external user is granted seamless sign-on to your shared resource. You can enable device trust settings for all Azure AD organizations or individual organizations. ([Learn more](authentication-conditional-access.md#device-compliance-and-hybrid-azure-ad-joined-device-policies))
103103

0 commit comments

Comments
 (0)