Skip to content

Commit 630dd84

Browse files
Merge pull request #218727 from csmulligan/csm-exid-ybrid-on-premises
[EXID] Content freshness update for hybrid-on-premises-to-cloud.md
2 parents 64e6c4f + e7d499b commit 630dd84

File tree

1 file changed

+6
-4
lines changed

1 file changed

+6
-4
lines changed

articles/active-directory/external-identities/hybrid-on-premises-to-cloud.md

Lines changed: 6 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,25 +1,27 @@
11
---
22
title: Sync local partner accounts to cloud as B2B users - Azure AD
3-
description: Give locally-managed external partners access to both local and cloud resources using the same credentials with Azure AD B2B collaboration.
3+
description: Give locally managed external partners access to both local and cloud resources using the same credentials with Azure AD B2B collaboration.
44

55
services: active-directory
66
ms.service: active-directory
77
ms.subservice: B2B
88
ms.topic: how-to
9-
ms.date: 11/03/2020
9+
ms.date: 11/17/2022
1010

1111
ms.author: mimart
1212
author: msmimart
1313
manager: celestedg
1414
ms.custom: "it-pro, seo-update-azuread-jan"
1515
ms.collection: M365-identity-device-management
16+
17+
# Customer intent: As a tenant administrator, I want to enable locally-managed external partners' access to both local and cloud resources via the Azure AD B2B collaboration.
1618
---
1719

18-
# Grant locally-managed partner accounts access to cloud resources using Azure AD B2B collaboration
20+
# Grant locally managed partner accounts access to cloud resources using Azure AD B2B collaboration
1921

2022
Before Azure Active Directory (Azure AD), organizations with on-premises identity systems have traditionally managed partner accounts in their on-premises directory. In such an organization, when you start to move apps to Azure AD, you want to make sure your partners can access the resources they need. It shouldn't matter whether the resources are on-premises or in the cloud. Also, you want your partner users to be able to use the same sign-in credentials for both on-premises and Azure AD resources.
2123

22-
If you create accounts for your external partners in your on-premises directory (for example, you create an account with a sign-in name of "wmoran" for an external user named Wendy Moran in your partners.contoso.com domain), you can now sync these accounts to the cloud. Specifically, you can use Azure AD Connect to sync the partner accounts to the cloud, which creates a user account with UserType = Guest. This enables your partner users to access cloud resources using the same credentials as their local accounts, without giving them more access than they need.
24+
If you create accounts for your external partners in your on-premises directory (for example, you create an account with a sign-in name of "msullivan" for an external user named Maria Sullivan in your partners.contoso.com domain), you can now sync these accounts to the cloud. Specifically, you can use [Azure AD Connect](../hybrid/whatis-azure-ad-connect.md) to sync the partner accounts to the cloud, which creates a user account with UserType = Guest. This enables your partner users to access cloud resources using the same credentials as their local accounts, without giving them more access than they need.
2325

2426
> [!NOTE]
2527
> See also how to [invite internal users to B2B collaboration](invite-internal-users.md). With this feature, you can invite internal guest users to use B2B collaboration, regardless of whether you've synced their accounts from your on-premises directory to the cloud. Once the user accepts the invitation to use B2B collaboration, they'll be able to use their own identities and credentials to sign in to the resources you want them to access. You won’t need to maintain passwords or manage account lifecycles.

0 commit comments

Comments
 (0)