You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
# Customer intent: As a tenant administrator, I want to enable B2B user access to on-premises apps.
18
18
---
19
19
20
-
# Grant B2B users in Microsoft Entra ID access to your on-premises applications
20
+
# Grant Microsoft Entra B2B users access to your on-premises applications
21
21
22
22
As an organization that uses Microsoft Entra B2B collaboration capabilities to invite guest users from partner organizations, you can now provide these B2B users access to on-premises apps. These on-premises apps can use SAML-based authentication or integrated Windows authentication (IWA) with Kerberos constrained delegation (KCD).
Copy file name to clipboardExpand all lines: articles/active-directory/external-identities/self-service-sign-up-add-api-connector.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -73,7 +73,7 @@ Content-type: application/json
73
73
}
74
74
```
75
75
76
-
Only user properties and custom attributes listed in the **Microsoft Entra ID** > **External Identities** > **Custom user attributes** experience are available to be sent in the request.
76
+
Only user properties and custom attributes listed in the **Identity** > **External Identities** > **Custom user attributes** experience are available to be sent in the request.
77
77
78
78
Custom attributes exist in the **extension_\<extensions-app-id>_AttributeName** format in the directory. Your API should expect to receive claims in this same serialized format. For more information on custom attributes, see [define custom attributes for self-service sign-up flows](user-flow-add-custom-attributes.md).
79
79
@@ -106,7 +106,7 @@ Follow these steps to add an API connector to a self-service sign-up user flow.
106
106
107
107
## After federating with an identity provider during sign-up
108
108
109
-
An API connector at this step in the sign-up process is invoked immediately after the user authenticates with an identity provider (like Google, Facebook, & Microsoft Entra ID). This step precedes the ***attribute collection page***, which is the form presented to the user to collect user attributes.
109
+
An API connector at this step in the sign-up process is invoked immediately after the user authenticates with an identity provider (like Google, Facebook, or Microsoft Entra ID). This step precedes the ***attribute collection page***, which is the form presented to the user to collect user attributes.
Copy file name to clipboardExpand all lines: articles/active-directory/external-identities/self-service-sign-up-user-flow.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -40,7 +40,7 @@ Microsoft Entra ID is the default identity provider for self-service sign-up. Th
40
40
41
41
### Define custom attributes (optional)
42
42
43
-
User attributes are values collected from the user during self-service sign-up. Microsoft Entra ID comes with a built-in set of attributes, but you can create custom attributes for use in your user flow. You can also read and write these attributes by using the Microsoft Graph API. See [Define custom attributes for user flows](user-flow-add-custom-attributes.md).
43
+
User attributes are values collected from the user during self-service sign-up. Microsoft Entra External ID comes with a built-in set of attributes, but you can create custom attributes for use in your user flow. You can also read and write these attributes by using the Microsoft Graph API. See [Define custom attributes for user flows](user-flow-add-custom-attributes.md).
44
44
45
45
## Enable self-service sign-up for your tenant
46
46
@@ -69,7 +69,7 @@ Next, you'll create the user flow for self-service sign-up and add it to an appl
69
69
70
70
1. Select the user flow type (for example, **Sign up and sign in**), and then select the version (**Recommended** or **Preview**).
71
71
1. On the **Create** page, enter a **Name** for the user flow. The name is automatically prefixed with **B2X_1_**.
72
-
1. In the **Identity providers** list, select one or more identity providers that your external users can use to log into your application. **Microsoft Entra ID Sign up** is selected by default. (See [Before you begin](#before-you-begin) earlier in this article to learn how to add identity providers.)
72
+
1. In the **Identity providers** list, select one or more identity providers that your external users can use to log into your application. **Azure Active Directory Sign up** is selected by default. (See [Before you begin](#before-you-begin) earlier in this article to learn how to add identity providers.)
73
73
1. Under **User attributes**, choose the attributes you want to collect from the user. For more attributes, select **Show more**. For example, select **Show more**, and then choose attributes and claims for **Country/Region**, **Display Name**, and **Postal Code**. Select **OK**.
74
74
75
75
:::image type="content" source="media/self-service-sign-up-user-flow/create-user-flow.png" alt-text="Screenshot of the new user flow creation page. ":::
> This article applies to B2B collaboration user flows. If your tenant is configured for customer identity and access management, see [Collect user attributes during sign-up](customers/how-to-define-custom-attributes.md) for customers.
23
23
24
-
For each application, you might have different requirements for the information you want to collect during sign-up. Microsoft Entra ID comes with a built-in set of information stored in attributes, such as Given Name, Surname, City, and Postal Code. With Microsoft Entra ID, you can extend the set of attributes stored on a guest account when the external user signs up through a user flow.
24
+
For each application, you might have different requirements for the information you want to collect during sign-up. Microsoft Entra External ID comes with a built-in set of information stored in attributes, such as Given Name, Surname, City, and Postal Code. With Microsoft Entra External ID, you can extend the set of attributes stored on a guest account when the external user signs up through a user flow.
25
25
26
26
You can create custom attributes in the Microsoft Entra admin center and use them in your [self-service sign-up user flows](self-service-sign-up-user-flow.md). You can also read and write these attributes by using the [Microsoft Graph API](../../active-directory-b2c/microsoft-graph-operations.md). Microsoft Graph API supports creating and updating a user with extension attributes. Extension attributes in the Graph API are named by using the convention `extension_<extensions-app-id>_attributename`. For example:
The `<extensions-app-id>` is specific to your tenant. To find this identifier, navigate to **Microsoft Entra ID** > **App registrations** > **All applications**. Search for the app that starts with `aad-extensions-app` and select it. On the app's Overview page, note the Application (client) ID.
32
+
The `<extensions-app-id>` is specific to your tenant. To find this identifier, navigate to **Identity** > **App registrations** > **All applications**. Search for the app that starts with `aad-extensions-app` and select it. On the app's Overview page, note the Application (client) ID.
Copy file name to clipboardExpand all lines: articles/active-directory/external-identities/user-flow-customize-language.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,6 +1,6 @@
1
1
---
2
2
title: Language customization in Microsoft Entra user flows
3
-
description: Learn about customizing the language experience in your user flows in Microsoft Entra ID.
3
+
description: Learn about customizing the language experience in your user flows in Microsoft Entra External ID.
4
4
services: active-directory
5
5
author: msmimart
6
6
manager: celestedg
@@ -16,12 +16,12 @@ ms.custom: engagement-fy23
16
16
# Customer intent: As a tenant administrator, I want to modify the user flow language, when the users are signing up via the self-service sign-up user flow.
17
17
---
18
18
19
-
# Language customization in Microsoft Entra ID
19
+
# Language customization in Microsoft Entra External ID
20
20
21
21
> [!TIP]
22
22
> This article applies to B2B collaboration user flows. If your tenant is configured for customer identity and access management, see [Customize the language of the authentication experience](customers/how-to-customize-languages-customers.md) for customers.
23
23
24
-
Language customization in Microsoft Entra ID allows your user flow to accommodate different languages to suit your user's needs. Microsoft provides the translations for [36 languages](#supported-languages). In this article, you'll learn how to customize the attribute names on the [attribute collection page](self-service-sign-up-user-flow.md#select-the-layout-of-the-attribute-collection-form), even if your experience is provided for only a single language.
24
+
Language customization in Microsoft Entra External ID allows your user flow to accommodate different languages to suit your user's needs. Microsoft provides the translations for [36 languages](#supported-languages). In this article, you'll learn how to customize the attribute names on the [attribute collection page](self-service-sign-up-user-flow.md#select-the-layout-of-the-attribute-collection-form), even if your experience is provided for only a single language.
25
25
26
26
## How language customization works
27
27
@@ -144,7 +144,7 @@ Chrome and Firefox both request for their set language. If it's a supported lang
144
144
145
145
## Supported languages
146
146
147
-
Microsoft Entra ID includes support for the following languages. User flow languages are provided by Microsoft Entra ID. The multifactor authentication notification languages are provided by [Microsoft Entra multifactor authentication](../authentication/concept-mfa-howitworks.md).
147
+
Microsoft Entra External ID includes support for the following languages. User flow languages are provided by Microsoft Entra External ID. The multifactor authentication notification languages are provided by [Microsoft Entra multifactor authentication](../authentication/concept-mfa-howitworks.md).
148
148
149
149
| Language | Language code | User flows | MFA notifications |
Copy file name to clipboardExpand all lines: articles/active-directory/external-identities/user-properties.md
+5-5Lines changed: 5 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -37,7 +37,7 @@ The user type you choose has the following limitations for apps or services (but
37
37
38
38
## Invitation redemption
39
39
40
-
Now, let's see what a Microsoft Entra B2B collaboration user looks like in Microsoft Entra ID.
40
+
Now, let's see what a Microsoft Entra B2B collaboration user looks like in Microsoft Entra External ID.
41
41
42
42
### Before invitation redemption
43
43
@@ -53,7 +53,7 @@ After the B2B collaboration user accepts the invitation, the **Identities** prop
53
53
54
54

55
55
56
-
- If the B2B collaboration user is using credentials from another Microsoft Entra organization, **Identities** is **External Microsoft Entra ID**.
56
+
- If the B2B collaboration user is using credentials from another Microsoft Entra organization, **Identities** is **ExternalAzureAD**.
57
57
58
58
- For external users who are using internal credentials, the **Identities** property is set to the host’s organization domain. The **Directory synced** property is **Yes** if the account is homed in the organization’s on-premises Active Directory and synced with Microsoft Entra ID, or **No** if the account is a cloud-only Microsoft Entra account. The directory sync information is also available via the `onPremisesSyncEnabled` property in Microsoft Graph.
59
59
@@ -85,12 +85,12 @@ This property indicates the user’s primary identity provider. A user can have
85
85
86
86
Identities property value | Sign-in state
87
87
--------------------- | -------------------------
88
-
External Microsoft Entra ID | This user is homed in an external organization and authenticates by using a Microsoft Entra account that belongs to the other organization.
88
+
ExternalAzureAD | This user is homed in an external organization and authenticates by using a Microsoft Entra account that belongs to the other organization.
89
89
Microsoft account | This user is homed in a Microsoft account and authenticates by using a Microsoft account.
90
90
{host’s domain} | This user authenticates by using a Microsoft Entra account that belongs to this organization.
91
91
google.com | This user has a Gmail account and has signed up by using self-service to the other organization.
92
92
facebook.com | This user has a Facebook account and has signed up by using self-service to the other organization.
93
-
mail | This user has signed up by using Microsoft Entra ID Email one-time passcode (OTP).
93
+
mail | This user has signed up by using Microsoft Entra External ID email one-time passcode (OTP).
94
94
{issuer URI} | This user is homed in an external organization that doesn't use Microsoft Entra ID as their identity provider, but instead uses a SAML/WS-Fed-based identity provider. The issuer URI is shown when the Identities field is clicked.
95
95
96
96
Phone sign-in is not supported for external users. B2B accounts cannot use `phone`value as an identity provider.
B2B guest users are not supported in Microsoft Teams shared channels. For access to shared channels see [B2B direct connect.](b2b-direct-connect-overview.md)
126
126
127
-
There may be cases where you want to give your guest users higher privileges. You can add a guest user to any role and even remove the default guest user restrictions in the directory to give a user the same privileges as members. It's possible to turn off the default limitations so that a guest user in the company directory has the same permissions as a member user. For more information, check out the [Restrict guest access permissions in Microsoft Entra ID](../enterprise-users/users-restrict-guest-permissions.md) article.
127
+
There may be cases where you want to give your guest users higher privileges. You can add a guest user to any role and even remove the default guest user restrictions in the directory to give a user the same privileges as members. It's possible to turn off the default limitations so that a guest user in the company directory has the same permissions as a member user. For more information, check out the [Restrict guest access permissions in Microsoft Entra External ID](../enterprise-users/users-restrict-guest-permissions.md) article.
128
128
129
129

# Understand user tokens in Microsoft Entra B2B collaboration
21
21
22
-
If you want to know what the token looks like for a B2B collaboration user, here are the bearer token details and token content for a Microsoft Entra guest and a Microsoft account guest in the resource tenant (for tenant ID 04dcc6ab-388a-4559-b527-fbec656300ea). To see the JSON Web Token (JWT) contents, use [https://jwt.io/](https://jwt.io/) or [https://jwt.ms/](https://jwt.ms/).
22
+
If you want to know what the token looks like for a B2B collaboration user, here are the bearer token details and token content for a Microsoft Entra account guest and a Microsoft account guest in the resource tenant (for tenant ID 04dcc6ab-388a-4559-b527-fbec656300ea). To see the JSON Web Token (JWT) contents, use [https://jwt.io/](https://jwt.io/) or [https://jwt.ms/](https://jwt.ms/).
Copy file name to clipboardExpand all lines: articles/active-directory/external-identities/what-is-b2b.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -95,7 +95,7 @@ Bring your external partners on board in ways customized to your organization's
95
95
96
96
## Integrate with Identity providers
97
97
98
-
Microsoft Entra ID supports external identity providers like Facebook, Microsoft accounts, Google, or enterprise identity providers. You can set up federation with identity providers. This way your external users can sign in with their existing social or enterprise accounts instead of creating a new account just for your application. Learn more about [identity providers for External Identities](identity-providers.md).
98
+
Microsoft Entra External ID supports external identity providers like Facebook, Microsoft accounts, Google, or enterprise identity providers. You can set up federation with identity providers. This way your external users can sign in with their existing social or enterprise accounts instead of creating a new account just for your application. Learn more about [identity providers for External Identities](identity-providers.md).
99
99
100
100
:::image type="content" source="media/what-is-b2b/identity-providers.png" alt-text="Screenshot showing the Identity providers page.":::
0 commit comments