Skip to content

Commit 66c62ae

Browse files
Merge pull request #228262 from v-edmckillop/patch-124
Update 10-secure-local-guest.md
2 parents 7e07032 + 35cc3e6 commit 66c62ae

File tree

1 file changed

+26
-36
lines changed

1 file changed

+26
-36
lines changed
Lines changed: 26 additions & 36 deletions
Original file line numberDiff line numberDiff line change
@@ -1,11 +1,11 @@
11
---
2-
title: Convert local guests into Azure AD B2B guest accounts
3-
description: Learn how to convert local guests into Azure AD B2B guest accounts
2+
title: Convert local guest accounts to Azure AD B2B guest accounts
3+
description: Learn to convert local guests into Azure AD B2B guest accounts by identifying apps and local guest accounts, migration, and more.
44
services: active-directory
55
author: gargi-sinha
66
ms.author: gasinh
77
manager: martinco
8-
ms.date: 11/03/2022
8+
ms.date: 02/22/2023
99
ms.topic: how-to
1010
ms.service: active-directory
1111
ms.subservice: enterprise-users
@@ -14,62 +14,52 @@ ms.custom: it-pro
1414
ms.collection: M365-identity-device-management
1515
---
1616

17-
# Convert local guests into Azure Active Directory B2B guest accounts
17+
# Convert local guest accounts to Azure Active Directory B2B guest accounts
1818

19-
Azure Active Directory (Azure AD B2B) allows external users to collaborate using their own identities. However, it isn't uncommon for organizations to issue local usernames and passwords to external users. This approach isn't recommended as the bring-your-own-identity (BYOI) capabilities provided
20-
by Azure AD B2B to provide better security, lower cost, and reduce
21-
complexity when compared to local account creation. Learn more
22-
[here.](./secure-external-access-resources.md)
19+
With Azure Active Directory (Azure AD B2B), external users collaborate with their identities. Although organizations can issue local usernames and passwords to external users, this approach isn't recommended. Azure AD B2B has improved security, lower cost, and less complexity, compared to creating local accounts. In addition, if your organization issues local credentials that external users manage, you can use Azure AD B2B instead. Use the guidance in this document to make the transition.
2320

24-
If your organization currently issues local credentials that external users have to manage and would like to migrate to using Azure AD B2B instead, this document provides a guide to make the transition as seamlessly as possible.
21+
Learn more: [Plan an Azure AD B2B collaboration deployment](secure-external-access-resources.md)
2522

2623
## Identify external-facing applications
2724

28-
Before migrating local accounts to Azure AD B2B, admins should understand what applications and workloads these external users need to access. For example, if external users need access to an application that is hosted on-premises, admins will need to validate that the application is integrated with Azure AD and that a provisioning process is implemented to provision the user from Azure AD to the application.
29-
The existence and use of on-premises applications could be a reason why local accounts are created in the first place. Learn more about
30-
[provisioning B2B guests to on-premises
31-
applications.](../external-identities/hybrid-cloud-to-on-premises.md)
25+
Before migrating local accounts to Azure AD B2B, confirm the applications and workloads external users can access. For example, for applications hosted on-premises, validate the application is integrated with Azure AD. On-premises applications are a good reason to create local accounts.
3226

33-
All external-facing applications should have single-sign on (SSO) and provisioning integrated with Azure AD for the best end user experience.
27+
Learn more: [Grant B2B users in Azure AD access to your on-premises applications](../external-identities/hybrid-cloud-to-on-premises.md)
28+
29+
We recommend that external-facing applications have single-sign on (SSO) and provisioning integrated with Azure AD for the best end user experience.
3430

3531
## Identify local guest accounts
3632

37-
Admins will need to identify which accounts should be migrated to Azure AD B2B. External identities in Active Directory should be easily identifiable, which can be done with an attribute-value pair. For example, making ExtensionAttribute15 = `External` for all external users. If these users are being provisioned via Azure AD Connect or Cloud Sync, admins can optionally configure these synced external users
38-
to have the `UserType` attributes set to `Guest`. If these users are being
39-
provisioned as cloud-only accounts, admins can directly modify the
40-
users' attributes. What is most important is being able to identify the
41-
users who you want to convert to B2B.
33+
Identify the accounts to be migrated to Azure AD B2B. External identities in Active Directory are identifiable with an attribute-value pair. For example, making ExtensionAttribute15 = `External` for external users. If these users are set up with Azure AD Connect or Cloud Sync, configure synced external users to have the `UserType` attributes set to `Guest`. If the users are set up as cloud-only accounts, you can modify user attributes. Primarily, identify users to convert to B2B.
4234

4335
## Map local guest accounts to external identities
4436

45-
Once you've identified which external user accounts you want to
46-
convert to Azure AD B2B, you need to identify the BYOI identities or external emails for each user. For example, admins will need to identify that the local account ([email protected]) is a user whose home identity/email address is [email protected]. How to identify the home identities is up to the organization, but some examples include:
47-
48-
- Asking the external user's sponsor to provide the information.
49-
50-
- Asking the external user to provide the information.
37+
Identify user identities or external emails. Confirm that the local account ([email protected]) is a user with the home identity and email address: [email protected]. To identify home identities:
5138

52-
- Referring to an internal database if this information is already known and stored by the organization.
39+
- The external user's sponsor provides the information
40+
- The external user provides the information
41+
- Refer to an internal database, if the information is known and stored
5342

54-
Once the mapping of each external local account to the BYOI identity is done, admins will need to add the external identity/email to the user.mail attribute on each local account.
43+
After mapping external local accounts to identities, add external identities or email to the user.mail attribute on local accounts.
5544

5645
## End user communications
5746

58-
External users should be notified that the migration will be taking place and when it will happen. Ensure you communicate the expectation that external users will stop using their existing password and post-migration will authenticate with their own home/corporate credentials going forward. Communications can include email campaigns, posters, and announcements.
47+
Notify external users about migration timing. Communicate expectations, such as when external users must stop using a current password to enable authenticate by home and corporate credentials. Communications can include email campaigns and announcements.
5948

6049
## Migrate local guest accounts to Azure AD B2B
6150

62-
Once the local accounts have their user.mail attributes populated with the external identity/email that they're mapped to, admins can [convert the local accounts to Azure AD B2B by inviting the local account.](../external-identities/invite-internal-users.md)
63-
This can be done in the UX or programmatically via PowerShell or the Microsoft Graph API. Once complete, the users will no longer
64-
authenticate with their local password, but will instead authenticate with their home identity/email that was populated in the user.mail attribute. You've successfully migrated to Azure AD B2B.
51+
After local accounts have user.mail attributes populated with the external identity and email, convert local accounts to Azure AD B2B by inviting the local account. You can use PowerShell or the Microsoft Graph API.
6552

66-
## Post-migration considerations
53+
Learn more: [Invite internal users to B2B collaboration](../external-identities/invite-internal-users.md)
6754

68-
If local accounts for external users were being synced from on-premises, admins should take steps to reduce their on-premises footprint and use cloud-native B2B guest accounts moving forward. Some possible actions can include:
55+
## Post-migration considerations
6956

70-
- Transition existing local accounts for external users to Azure AD B2B and stop creating local accounts. Post-migration, admins should invite external users natively in Azure AD.
57+
If external user local accounts were synced from on-premises, reduce their on-premises footprint and use B2B guest accounts. You can:
7158

72-
- Randomize the passwords of existing local accounts for external users to ensure they can't authenticate locally to on-premises resources. This will increase security by ensuring that authentication and user lifecycle is tied to the external user's home identity.
59+
- Transition external user local accounts to Azure AD B2B and stop creating local accounts
60+
- Invite external users in Azure AD
61+
- Randomize external user's local-account passwords to prevent authentication to on-premises resources
62+
- This action ensures authentication and user lifecycle is connected to the external user home identity
7363

7464
## Next steps
7565

@@ -84,4 +74,4 @@ See the following articles on securing external access to resources. We recommen
8474
1. [Secure access with Conditional Access policies](7-secure-access-conditional-access.md)
8575
1. [Secure access with Sensitivity labels](8-secure-access-sensitivity-labels.md)
8676
1. [Secure access to Microsoft Teams, OneDrive, and SharePoint](9-secure-access-teams-sharepoint.md)
87-
1. [Convert local guest accounts to B2B](10-secure-local-guest.md) (You’re here)
77+
1. [Convert local guest accounts to B2B](10-secure-local-guest.md) (You’re here)

0 commit comments

Comments
 (0)