You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
title: Convert local guests into Azure AD B2B guest accounts
3
-
description: Learn how to convert local guests into Azure AD B2B guest accounts
2
+
title: Convert local guest accounts to Azure AD B2B guest accounts
3
+
description: Learn to convert local guests into Azure AD B2B guest accounts by identifying apps and local guest accounts, migration, and more.
4
4
services: active-directory
5
5
author: gargi-sinha
6
6
ms.author: gasinh
7
7
manager: martinco
8
-
ms.date: 11/03/2022
8
+
ms.date: 02/22/2023
9
9
ms.topic: how-to
10
10
ms.service: active-directory
11
11
ms.subservice: enterprise-users
@@ -14,62 +14,52 @@ ms.custom: it-pro
14
14
ms.collection: M365-identity-device-management
15
15
---
16
16
17
-
# Convert local guests into Azure Active Directory B2B guest accounts
17
+
# Convert local guest accounts to Azure Active Directory B2B guest accounts
18
18
19
-
Azure Active Directory (Azure AD B2B) allows external users to collaborate using their own identities. However, it isn't uncommon for organizations to issue local usernames and passwords to external users. This approach isn't recommended as the bring-your-own-identity (BYOI) capabilities provided
20
-
by Azure AD B2B to provide better security, lower cost, and reduce
21
-
complexity when compared to local account creation. Learn more
22
-
[here.](./secure-external-access-resources.md)
19
+
With Azure Active Directory (Azure AD B2B), external users collaborate with their identities. Although organizations can issue local usernames and passwords to external users, this approach isn't recommended. Azure AD B2B has improved security, lower cost, and less complexity, compared to creating local accounts. In addition, if your organization issues local credentials that external users manage, you can use Azure AD B2B instead. Use the guidance in this document to make the transition.
23
20
24
-
If your organization currently issues local credentials that external users have to manage and would like to migrate to using Azure AD B2B instead, this document provides a guide to make the transition as seamlessly as possible.
21
+
Learn more: [Plan an Azure AD B2B collaboration deployment](secure-external-access-resources.md)
25
22
26
23
## Identify external-facing applications
27
24
28
-
Before migrating local accounts to Azure AD B2B, admins should understand what applications and workloads these external users need to access. For example, if external users need access to an application that is hosted on-premises, admins will need to validate that the application is integrated with Azure AD and that a provisioning process is implemented to provision the user from Azure AD to the application.
29
-
The existence and use of on-premises applications could be a reason why local accounts are created in the first place. Learn more about
Before migrating local accounts to Azure AD B2B, confirm the applications and workloads external users can access. For example, for applications hosted on-premises, validate the application is integrated with Azure AD. On-premises applications are a good reason to create local accounts.
32
26
33
-
All external-facing applications should have single-sign on (SSO) and provisioning integrated with Azure AD for the best end user experience.
27
+
Learn more: [Grant B2B users in Azure AD access to your on-premises applications](../external-identities/hybrid-cloud-to-on-premises.md)
28
+
29
+
We recommend that external-facing applications have single-sign on (SSO) and provisioning integrated with Azure AD for the best end user experience.
34
30
35
31
## Identify local guest accounts
36
32
37
-
Admins will need to identify which accounts should be migrated to Azure AD B2B. External identities in Active Directory should be easily identifiable, which can be done with an attribute-value pair. For example, making ExtensionAttribute15 = `External` for all external users. If these users are being provisioned via Azure AD Connect or Cloud Sync, admins can optionally configure these synced external users
38
-
to have the `UserType` attributes set to `Guest`. If these users are being
39
-
provisioned as cloud-only accounts, admins can directly modify the
40
-
users' attributes. What is most important is being able to identify the
41
-
users who you want to convert to B2B.
33
+
Identify the accounts to be migrated to Azure AD B2B. External identities in Active Directory are identifiable with an attribute-value pair. For example, making ExtensionAttribute15 = `External` for external users. If these users are set up with Azure AD Connect or Cloud Sync, configure synced external users to have the `UserType` attributes set to `Guest`. If the users are set up as cloud-only accounts, you can modify user attributes. Primarily, identify users to convert to B2B.
42
34
43
35
## Map local guest accounts to external identities
44
36
45
-
Once you've identified which external user accounts you want to
46
-
convert to Azure AD B2B, you need to identify the BYOI identities or external emails for each user. For example, admins will need to identify that the local account ([email protected]) is a user whose home identity/email address is [email protected]. How to identify the home identities is up to the organization, but some examples include:
47
-
48
-
- Asking the external user's sponsor to provide the information.
49
-
50
-
- Asking the external user to provide the information.
37
+
Identify user identities or external emails. Confirm that the local account ([email protected]) is a user with the home identity and email address: [email protected]. To identify home identities:
51
38
52
-
- Referring to an internal database if this information is already known and stored by the organization.
39
+
- The external user's sponsor provides the information
40
+
- The external user provides the information
41
+
- Refer to an internal database, if the information is known and stored
53
42
54
-
Once the mapping of each external local account to the BYOI identity is done, admins will need to add the external identity/email to the user.mail attribute on each local account.
43
+
After mapping external local accounts to identities, add external identities or email to the user.mail attribute on local accounts.
55
44
56
45
## End user communications
57
46
58
-
External users should be notified that the migration will be taking place and when it will happen. Ensure you communicate the expectation that external users will stop using their existing password and post-migration will authenticate with their own home/corporate credentials going forward. Communications can include email campaigns, posters, and announcements.
47
+
Notify external users about migration timing. Communicate expectations, such as when external users must stop using a current password to enable authenticate by home and corporate credentials. Communications can include email campaigns and announcements.
59
48
60
49
## Migrate local guest accounts to Azure AD B2B
61
50
62
-
Once the local accounts have their user.mail attributes populated with the external identity/email that they're mapped to, admins can [convert the local accounts to Azure AD B2B by inviting the local account.](../external-identities/invite-internal-users.md)
63
-
This can be done in the UX or programmatically via PowerShell or the Microsoft Graph API. Once complete, the users will no longer
64
-
authenticate with their local password, but will instead authenticate with their home identity/email that was populated in the user.mail attribute. You've successfully migrated to Azure AD B2B.
51
+
After local accounts have user.mail attributes populated with the external identity and email, convert local accounts to Azure AD B2B by inviting the local account. You can use PowerShell or the Microsoft Graph API.
65
52
66
-
## Post-migration considerations
53
+
Learn more: [Invite internal users to B2B collaboration](../external-identities/invite-internal-users.md)
67
54
68
-
If local accounts for external users were being synced from on-premises, admins should take steps to reduce their on-premises footprint and use cloud-native B2B guest accounts moving forward. Some possible actions can include:
55
+
## Post-migration considerations
69
56
70
-
- Transition existing local accounts for external users to Azure AD B2B and stop creating local accounts. Post-migration, admins should invite external users natively in Azure AD.
57
+
If external user local accounts were synced from on-premises, reduce their on-premises footprint and use B2B guest accounts. You can:
71
58
72
-
- Randomize the passwords of existing local accounts for external users to ensure they can't authenticate locally to on-premises resources. This will increase security by ensuring that authentication and user lifecycle is tied to the external user's home identity.
59
+
- Transition external user local accounts to Azure AD B2B and stop creating local accounts
60
+
- Invite external users in Azure AD
61
+
- Randomize external user's local-account passwords to prevent authentication to on-premises resources
62
+
- This action ensures authentication and user lifecycle is connected to the external user home identity
73
63
74
64
## Next steps
75
65
@@ -84,4 +74,4 @@ See the following articles on securing external access to resources. We recommen
84
74
1.[Secure access with Conditional Access policies](7-secure-access-conditional-access.md)
85
75
1.[Secure access with Sensitivity labels](8-secure-access-sensitivity-labels.md)
86
76
1.[Secure access to Microsoft Teams, OneDrive, and SharePoint](9-secure-access-teams-sharepoint.md)
87
-
1.[Convert local guest accounts to B2B](10-secure-local-guest.md) (You’re here)
77
+
1.[Convert local guest accounts to B2B](10-secure-local-guest.md) (You’re here)
0 commit comments