You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory-b2c/trustframeworkpolicy.md
+2-1Lines changed: 2 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,7 +8,7 @@ manager: CelesteDG
8
8
ms.service: active-directory
9
9
ms.workload: identity
10
10
ms.topic: reference
11
-
ms.date: 03/15/2021
11
+
ms.date: 11/09/2021
12
12
ms.author: kengaderdus
13
13
ms.subservice: B2C
14
14
---
@@ -66,6 +66,7 @@ The **TrustFrameworkPolicy** element contains the following elements:
66
66
|[BuildingBlocks](buildingblocks.md)| 0:1 | The building blocks of your policy. |
67
67
|[ClaimsProviders](claimsproviders.md)| 0:1 | A collection of claims providers. |
68
68
|[UserJourneys](userjourneys.md)| 0:1 | A collection of user journeys. |
69
+
|[SubJourneys](subjourneys.md)| 0:1 | A collection of sub journeys. |
69
70
|[RelyingParty](relyingparty.md)| 0:1 | A definition of a relying party policy. |
70
71
71
72
To inherit a policy from another policy, a **BasePolicy** element must be declared under the **TrustFrameworkPolicy** element of the policy file. The **BasePolicy** element is a reference to the base policy from which this policy is derived.
Copy file name to clipboardExpand all lines: articles/active-directory/external-identities/b2b-tutorial-require-mfa.md
+37-37Lines changed: 37 additions & 37 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ services: active-directory
6
6
ms.service: active-directory
7
7
ms.subservice: B2B
8
8
ms.topic: tutorial
9
-
ms.date: 06/22/2021
9
+
ms.date: 11/08/2021
10
10
11
11
ms.author: mimart
12
12
author: msmimart
@@ -44,24 +44,24 @@ If you don’t have an Azure subscription, create a [free account](https://azure
44
44
45
45
To complete the scenario in this tutorial, you need:
46
46
47
-
-**Access to Azure AD Premium edition**, which includes Conditional Access policy capabilities. To enforce MFA, you need to create an Azure AD Conditional Access policy. Note that MFA policies are always enforced at your organization, regardless of whether the partner has MFA capabilities. If you set up MFA for your organization, you’ll need to make sure you have sufficient Azure AD Premium licenses for your guest users.
47
+
-**Access to Azure AD Premium edition**, which includes Conditional Access policy capabilities. To enforce MFA, you need to create an Azure AD Conditional Access policy. Note that MFA policies are always enforced at your organization, regardless of whether the partner has MFA capabilities.
48
48
-**A valid external email account** that you can add to your tenant directory as a guest user and use to sign in. If you don't know how to create a guest account, see [Add a B2B guest user in the Azure portal](add-users-administrator.md).
49
49
50
50
## Create a test guest user in Azure AD
51
51
52
52
1. Sign in to the [Azure portal](https://portal.azure.com/) as an Azure AD administrator.
53
-
2. In the left pane, select **Azure Active Directory**.
54
-
3. Under**Manage**, select **Users**.
55
-
4. Select **New guest user**.
53
+
1. In the Azure portal, select **Azure Active Directory**.
54
+
1. In the left menu, under**Manage**, select **Users**.
55
+
1. Select **New guest user**.
56
56
57
57

58
58
59
-
5. Under **User name**, enter the email address of the external user. Optionally, include a welcome message.
59
+
1. Under **Identity**, enter the email address of the external user. Optionally, include a name and welcome message.
60
60
61
61

62
62
63
-
6. Select **Invite** to automatically send the invitation to the guest user. A **Successfully invited user** message appears.
64
-
7. After you send the invitation, the user account is automatically added to the directory as a guest.
63
+
1. Select **Invite** to automatically send the invitation to the guest user. A **Successfully invited user** message appears.
64
+
1. After you send the invitation, the user account is automatically added to the directory as a guest.
65
65
66
66
## Test the sign-in experience before MFA setup
67
67
@@ -72,76 +72,76 @@ To complete the scenario in this tutorial, you need:
72
72
## Create a Conditional Access policy that requires MFA
73
73
74
74
1. Sign in to your [Azure portal](https://portal.azure.com/) as a security administrator or a Conditional Access administrator.
75
-
2. In the Azure portal, select **Azure Active Directory**.
76
-
3. On the **Azure Active Directory** page, in the **Security** section, select **Conditional Access**.
77
-
4. On the **Conditional Access** page, in the toolbar on the top, select **New policy**.
78
-
5. On the **New** page, in the **Name** textbox, type **Require MFA for B2B portal access**.
79
-
6. In the **Assignments** section, select **Users and groups**.
80
-
7. On the **Users and groups** page, choose **Select users and groups**, and then select **All guest and external users**.
75
+
1. In the Azure portal, select **Azure Active Directory**.
76
+
1. In the left menu, under **Manage**, select **Security**.
77
+
1. Under **Protect**, select **Conditional Access**.
78
+
1. On the **Conditional Access** page, in the toolbar on the top, select **New policy**.
79
+
1. On the **New** page, in the **Name** textbox, type **Require MFA for B2B portal access**.
80
+
1. In the **Assignments** section, choose the link under **Users and groups**.
81
+
1. On the **Users and groups** page, choose **Select users and groups**, and then choose **All guest and external users**.
81
82
82
83

83
-
9. Select **Done**.
84
-
10. On the **New** page, in the **Assignments** section, select **Cloud apps**.
85
-
11. On the **Cloud apps** page, choose **Select apps**, and then choose **Select**.
84
+
1. In the **Assignments** section, choose the link under **Cloud apps or actions**.
85
+
1. Choose **Select apps**, and then choose the link under **Select**.
86
86
87
87

88
88
89
-
12. On the **Select** page, choose **Microsoft Azure Management**, and then choose **Select**.
89
+
1. On the **Select** page, choose **Microsoft Azure Management**, and then choose **Select**.
90
90
91
91

92
92
93
-
13. On the **Cloud apps** page, select **Done**.
94
-
14. On the **New** page, in the **Access controls** section, select **Grant**.
95
-
15. On the **Grant** page, choose **Grant access**, select the **Require multi-factor authentication** check box, and then choose **Select**.
93
+
1. On the **New** page, in the **Access controls** section, choose the link under **Grant**.
94
+
1. On the **Grant** page, choose **Grant access**, select the **Require multi-factor authentication** check box, and then choose **Select**.
96
95
97
96

98
97
99
-
16. Under **Enable policy**, select **On**.
98
+
1. Under **Enable policy**, select **On**.
100
99
101
100

102
101
103
-
17. Select **Create**.
102
+
1. Select **Create**.
104
103
105
104
## Use the What If option to simulate sign-in
106
105
107
-
1. On the **Conditional Access - Policies** page, select **What If**.
106
+
1. On the **Conditional Access | Policies** page, select **What If**.
108
107
109
108

110
109
111
-
2. Select **User**, choose your test guest user, and then choose **Select**.
110
+
1. Select the link under **User**.
111
+
1. In the search box, type the name of your test guest user. Choose the user in the search results, and then choose **Select**.
112
112
113
113

114
114
115
-
3. Select **Cloud apps**.
116
-
4. On the **Cloud apps** page, choose **Select apps**and then click **Select**. In the applications list, select **Microsoft Azure Management**, and then click**Select**.
115
+
1. Select the link under **Cloud apps, actions, or authentication content**.
116
+
. Choose **Select apps**, and then choose the link under**Select**.
117
117
118
118

119
119
120
-
5. On the **Cloud apps** page, select **Done**.
121
-
6. Select**What If**, and verify that your new policy appears under **Evaluation results** on the **Policies that will apply** tab.
120
+
1. On the **Cloud apps** page, in the applications list, choose **Microsoft Azure Management**, and then choose **Select**.
121
+
1. Choose**What If**, and verify that your new policy appears under **Evaluation results** on the **Policies that will apply** tab.
122
122
123
123

124
124
125
125
## Test your Conditional Access policy
126
126
127
127
1. Use your test user name and password to sign in to your [Azure portal](https://portal.azure.com/).
128
-
2. You should see a request for additional authentication methods. Note that it could take some time for the policy to take effect.
128
+
1. You should see a request for additional authentication methods. Note that it could take some time for the policy to take effect.
129
129
130
130

131
131
132
-
3. Sign out.
132
+
1. Sign out.
133
133
134
134
## Clean up resources
135
135
136
136
When no longer needed, remove the test user and the test Conditional Access policy.
137
137
138
138
1. Sign in to the [Azure portal](https://portal.azure.com/) as an Azure AD administrator.
139
-
2. In the left pane, select **Azure Active Directory**.
140
-
3. Under **Manage**, select **Users**.
141
-
4. Select the test user, and then select **Delete user**.
142
-
5. In the left pane, select **Azure Active Directory**.
143
-
6. Under **Security**, select **Conditional Access**.
144
-
7. In the **Policy Name** list, select the context menu (…) for your test policy, and then select **Delete**. Select **Yes** to confirm.
139
+
1. In the left pane, select **Azure Active Directory**.
140
+
1. Under **Manage**, select **Users**.
141
+
1. Select the test user, and then select **Delete user**.
142
+
1. In the left pane, select **Azure Active Directory**.
143
+
1. Under **Security**, select **Conditional Access**.
144
+
1. In the **Policy Name** list, select the context menu (…) for your test policy, and then select **Delete**. Select **Yes** to confirm.
0 commit comments