Skip to content

Commit 5e04183

Browse files
authored
Merge pull request #176428 from BarbaraSelden/MTUM
initial MTUM commit
2 parents fdd26d6 + b93f6ee commit 5e04183

File tree

10 files changed

+707
-0
lines changed

10 files changed

+707
-0
lines changed
20.4 KB
Loading
46.1 KB
Loading
111 KB
Loading
Loading
71.9 KB
Loading

articles/active-directory/fundamentals/multi-tenant-common-considerations.md

Lines changed: 210 additions & 0 deletions
Large diffs are not rendered by default.
Lines changed: 122 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,122 @@
1+
---
2+
title: Common solutions for multi-tenant user management in Azure Active Directory
3+
description: Learn about common solutions used to configure user access across Azure Active Directory tenants with guest accounts
4+
services: active-directory
5+
author: BarbaraSelden
6+
manager: martinco
7+
ms.service: active-directory
8+
ms.workload: identity
9+
ms.subservice: fundamentals
10+
ms.topic: conceptual
11+
ms.date: 09/25/2021
12+
ms.author: baselden
13+
ms.custom: "it-pro, seodec18"
14+
ms.collection: M365-identity-device-management
15+
---
16+
17+
# Common solutions for multi-tenant user management
18+
19+
There are two specific challenges our customers have solved using current tools. Their solutions are detailed below. Microsoft recommends a single tenant wherever possible and is working on tools to resolve these challenges more easily. If single tenancy does not work for your scenario, these solutions have worked for customers today.
20+
21+
## Automatic User Lifecycle Management and resource allocation across tenants
22+
23+
A customer acquires a competitor they previously had close business relationships with. The organizations will maintain their corporate identities.
24+
25+
### Current state
26+
27+
Currently, the organizations are synchronizing each other’s users as contact-mail objects so that they show in each other’s directories.
28+
29+
* Each resource tenant has a mail-contact object enabled for all users in the other tenant.
30+
31+
* No access to applications is possible across tenants.
32+
33+
### Goals
34+
35+
This customer had the following goals:
36+
37+
* Every user continues to be shown in each organization’s GAL.
38+
39+
* User account lifecycle changes in the home tenant automatically reflected in the resource tenant GAL.
40+
41+
* Attribute changes in home tenants (such as department, name, SMTP address) automatically reflected in resource tenant GAL and the home GAL.
42+
43+
* Users can access applications and resources in the resource tenant.
44+
45+
* Users can self-serve access requests to resources.
46+
47+
### Solution architecture
48+
49+
The organizations will use a point-to-point architecture with a synchronization engine such as MIM.
50+
51+
![Example of a point-to-point architecture](media/multi-tenant-common-solutions/point-to-point-sync.png)
52+
53+
Each tenant admin does the following to create the user objects:
54+
55+
1. Ensure that their database of users is up to date.
56+
57+
1. [Deploy and configure MIM](/microsoft-identity-manager/microsoft-identity-manager-deploy).
58+
59+
1. Address existing contact objects.
60+
61+
1. Create B2B External Member objects for the other tenant’s members.
62+
63+
1. Synchronize user object attributes.
64+
65+
1. Deploy and configure [Entitlement Management](../governance/entitlement-management-overview.md) access packages.
66+
67+
1. Resources to be shared
68+
69+
1. Expiration and access review policies
70+
71+
## Sharing on-premises apps across tenants
72+
73+
This customer, with multiple peer organizations, has a need to share on-premises applications from one of the tenants.
74+
75+
### Current state
76+
77+
Multiple peer organizations are synchronizing B2B Guest users in a mesh topology, enabling resource allocation to their cloud applications across tenants. They currently
78+
79+
* Share applications in Azure AD.
80+
81+
* Ensure user Lifecycle Management in resource tenant is automated based on home tenant. That is, add, modify, delete is reflected.
82+
83+
* Only member users in Company A access Company A’s on-premises apps.
84+
85+
![Multi-tenant scenario](media/multi-tenant-user-management-scenarios/mesh.png)
86+
87+
### Goals
88+
89+
Along with the current functionality, they would like to
90+
91+
* Provide access to Company A’s on-premises resources for the external guest users.
92+
93+
* Apps with SAML authentication
94+
95+
* Apps with Integrated Windows Authentication and Kerberos
96+
97+
### Solution architecture
98+
99+
Company A is currently providing SSO to on premises apps for its own members via Azure Application Proxy.
100+
101+
![Example of appliction access](media/multi-tenant-common-solutions/app-access-scenario.png)
102+
103+
To enable their guest users to access the same on-premises applications Admins in tenet A will:
104+
105+
1. [Configure access to SAML apps](../external-identities/hybrid-cloud-to-on-premises.md#access-to-saml-apps).
106+
107+
2. [Configure access to other applications](../external-identities/hybrid-cloud-to-on-premises.md#access-to-iwa-and-kcd-apps).
108+
109+
3. Create on-premises guest users through [MIM](../external-identities/hybrid-cloud-to-on-premises.md#create-b2b-guest-user-objects-through-mim) or [PowerShell](https://www.microsoft.com/en-us/download/details.aspx?id=51495).
110+
111+
For more information about B2B collaboration, see
112+
113+
[Grant B2B users in Azure AD access to your on-premises resources](../external-identities/hybrid-cloud-to-on-premises.md)
114+
115+
[Azure Active Directory B2B collaboration for hybrid organizations](../external-identities/hybrid-organizations.md)
116+
117+
## Next steps
118+
[Multi-tenant user management introduction](multi-tenant-user-management-introduction.md)
119+
120+
[Multi-tenant end user management scenarios](multi-tenant-user-management-scenarios.md)
121+
122+
[Multi-tenant common considerations](multi-tenant-common-considerations.md)
Lines changed: 112 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,112 @@
1+
---
2+
title: Configuring multi-tenant user management in Azure Active Directory
3+
description: Learn about the different patterns used to configure user access across Azure Active Directory tenants with guest accounts
4+
services: active-directory
5+
author: BarbaraSelden
6+
manager: martinco
7+
ms.service: active-directory
8+
ms.workload: identity
9+
ms.subservice: fundamentals
10+
ms.topic: conceptual
11+
ms.date: 09/25/2021
12+
ms.author: baselden
13+
ms.custom: "it-pro, seodec18"
14+
ms.collection: M365-identity-device-management
15+
---
16+
17+
# Multi-tenant user management
18+
19+
Provisioning users into a single Azure Active Directory (Azure AD) tenant provides a unified view of resources and a single set of policies and controls. This approach enables consistent user lifecycle management.
20+
21+
**Microsoft recommends a single tenant when possible**. However, immediate consolidation to a single Azure AD tenant isn't always possible. Multi-tenant organizations may span two or more Azure AD tenants. This can result in unique cross-tenant collaboration and management requirements.
22+
23+
Organizations may have identity and access management (IAM) requirements that are complicated by:
24+
25+
* mergers, acquisitions, and divestitures.
26+
27+
* collaboration across public, sovereign, and or regional clouds.
28+
29+
* political or organizational structures prohibiting consolidation to a single Azure AD tenant.
30+
31+
The guidance also provides guidance to help you achieve a consistent state of user lifecycle management. That is, provisioning, managing, and deprovisioning users across tenants using the tools available with Azure. Specifically, by using [Azure AD B2B collaboration](../external-identities/what-is-b2b.md).
32+
33+
## Azure AD B2B collaboration
34+
35+
Azure AD collaboration enables you to securely share your company's applications and services with external guest users. The users can come from any organization. Using Azure AD B2B collaboration helps you maintain control over access to your IT environment and data.
36+
Azure AD B2B collaboration can also be used to provide guest access to internal users. Traditionally, B2B guest user access is used to authorize access to external users that aren't managed by your own organization. However, guest user access can also be used to manage access across multiple tenants managed by your organization. While not truly a B2B solution, Azure AD B2B collaboration can be used to manage internal users across your multi-tenant scenario.
37+
38+
The following links provide additional information you can visit to find out more about Azure AD B2B collaboration:
39+
40+
| Article| Description |
41+
| - |-|
42+
| **Conceptual articles**| |
43+
| [B2B best practices](../external-identities/b2b-fundamentals.md)| Recommendations for the smoothest experience for your users and administrators.|
44+
| [B2B and Office 365 external sharing](../external-identities/o365-external-user.md)| Explains the similarities and differences among sharing resources through B2B, office 365, and SharePoint/OneDrive.|
45+
| [Properties on an Azure AD B2B collaboration user](../external-identities/user-properties.md)| Describes the properties and states of the B2B guest user object in Azure Active Directory (Azure AD). The description provides details before and after invitation redemption.|
46+
| [B2B user tokens](../external-identities/user-token.md)| Provides examples of the bearer tokens for B2B a B2B guest user.|
47+
| [Conditional access for B2B](../external-identities/conditional-access.md)| Describes how conditional access and MFA work for guest users.|
48+
| **How-to articles**| |
49+
| [Use PowerShell to bulk invite Azure AD B2B collaboration users](../external-identities/bulk-invite-powershell.md)| Learn how to use PowerShell to send bulk invitations to external users.|
50+
| [Enforce multifactor authentication for B2B guest users](../external-identities/b2b-tutorial-require-mfa.md)|Use conditional access and MFA policies to enforce tenant, app, or individual guest user authentication levels. |
51+
| [Email one-time passcode authentication](../external-identities/one-time-passcode.md)| The Email one-time passcode feature authenticates B2B guest users when they can't be authenticated through other means like Azure AD, a Microsoft account (MSA), or Google federation.|
52+
53+
## Terminology
54+
55+
These terms are used throughout this content:
56+
57+
* **Resource tenant**: The Azure AD tenant containing the resources that users want to share with others.
58+
59+
* **Home tenant**: The Azure AD tenant containing users requiring access to the resources in the resource tenant.
60+
61+
* **User lifecycle management**: the process of provisioning, managing, and deprovisioning user access to resources.
62+
63+
* **Unified GAL**: Each user in each tenant can see users from each organization in their Global Address List (GAL).
64+
65+
## Deciding how to meet your requirements
66+
67+
Your organization’s unique requirements will determine your strategy for managing your users across tenants. To create an effective strategy, you must consider:
68+
69+
* Number of tenants
70+
71+
* Type of organization
72+
73+
* Current topologies
74+
75+
* Specific user synchronization needs
76+
77+
### Common Requirements
78+
79+
Many organizations initially focus on requirements they want in place for immediate collaboration. Sometimes known as Day One requirements, these requirements focus on enabling end users to merge smoothly without interrupting their ability to generate value for the company. As you define your Day One and administrative requirements, consider including these goals:
80+
81+
| Requirement categories| Common needs|
82+
| ------------ | - |
83+
| **Communications Requirements**| |
84+
| Unified global address list| Each user can see all other users in the GAL in their home tenant. |
85+
| Free/Busy information| Enable users to discover each other’s availability. You can do this with [Organization relationships in Exchange Online](/exchange/sharing/organization-relationships/create-an-organization-relationship).|
86+
| Chat and presence| Enable users to determine others’ presence and initiate instant messaging. This can be configured through [external access in Microsoft Teams](/microsoftteams/manage-external-access).|
87+
| Book resources such as meeting rooms| Enable users to book conference rooms or other resources across the organization. Cross-tenant conference room booking isn't possible today.|
88+
‎Single email domain| Enable all users to send and receive mail from a single email domain, for example *[email protected]*. Sending requires a third party address rewrite solution today.|
89+
| **Access requirements**| |
90+
| Document access| Enable users to share documents from SharePoint, OneDrive, and Teams |
91+
| Administration| Allow administrators to manage configuration of subscriptions and services deployed across multiple tenants |
92+
| Application access| Allow end users to access applications across the organization |
93+
| Single Sign-on| Enable users to access resources across the organization without the need to enter more credentials.|
94+
95+
### Patterns for account creation
96+
97+
There are several mechanisms available for creating and managing the lifecycle of your guest user accounts. Microsoft has distilled three common patterns. You can use the patterns to help define and implement your requirements. Choose which best aligns with your scenario and then focus on the details for that pattern.
98+
99+
| Mechanism | Description | Best when |
100+
| - | - | - |
101+
| [End-user-initiated](multi-tenant-user-management-scenarios.md#end-user-initiated-scenario) | Resource tenant admins delegate the ability to invite guest users to the tenant, an app, or a resource to users within the resource tenant. Users from the home tenant are invited or sign up individually. | <li>Users need improvised access to resources. <li>No automatic synchronization of user attributes is necessary.<li>Unified GAL is not needed.a |
102+
|[Scripted](multi-tenant-user-management-scenarios.md#scripted-scenario) | Resource tenant administrators deploy a scripted “pull” process to automate discovery and provisioning of guest users to support sharing scenarios. | <li>No more than two tenants.<li>No automatic synchronization of user attributes is necessary.<li>Users need pre-configured (not improvised) access to resources.|
103+
|[Automated](multi-tenant-user-management-scenarios.md#automated-scenario)|Resource tenant admins use an identity provisioning system to automate the provisioning and deprovisioning processes. | <li>Full identity lifecycle management with provisioning and deprovisioning must be automated.<li>Attribute syncing is required to populate the GAL details and support dynamic entitlement scenarios.<li>Users need pre-configured (not ad hoc) access to resources on “Day One”.|
104+
105+
106+
## Next steps
107+
108+
[Multi-tenant user management scenarios](multi-tenant-user-management-scenarios.md)
109+
110+
[Multi-tenant common considerations](multi-tenant-common-considerations.md)
111+
112+
[Multi-tenant common solutions](multi-tenant-common-solutions.md)

0 commit comments

Comments
 (0)