Skip to content

Commit 77075a6

Browse files
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into erd-aib-troubleshoot
2 parents 7d28ec1 + e7a34fa commit 77075a6

File tree

6 files changed

+18
-14
lines changed

6 files changed

+18
-14
lines changed

.openpublishing.redirection.active-directory.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,10 @@
11
{
22
"redirections": [
3+
{
4+
"source_path_from_root": "/articles/active-directory/develop/active-directory-enterprise-app-role-management.md",
5+
"redirect_url": "/azure/active-directory/develop/enterprise-app-role-management",
6+
"redirect_document_id": false
7+
},
38
{
49
"source_path_from_root": "/articles/active-directory/develop/active-directory-schema-extensions.md",
510
"redirect_url": "/azure/active-directory/develop/schema-extensions",

articles/active-directory/develop/TOC.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -455,7 +455,7 @@
455455
- name: Configure optional claims
456456
href: optional-claims.md
457457
- name: Configure role claim
458-
href: active-directory-enterprise-app-role-management.md
458+
href: enterprise-app-role-management.md
459459
- name: Customize JWT claims
460460
href: jwt-claims-customization.md
461461
- name: Customize SAML claims
Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -20,10 +20,10 @@ In Azure Active Directory (Azure AD), you can customize the role claim in the ac
2020

2121
## Prerequisites
2222

23-
- An Azure AD subscription with a set up tenant. For more information, see [Quickstart: Set up a tenant](quickstart-create-new-tenant.md).
23+
- An Azure AD subscription with a configured tenant. For more information, see [Quickstart: Set up a tenant](quickstart-create-new-tenant.md).
2424
- An enterprise application that has been added to the tenant. For more information, see [Quickstart: Add an enterprise application](../manage-apps/add-application-portal.md).
2525
- Single sign-on (SSO) configured for the application. For more information, see [Enable single sign-on for an enterprise application](../manage-apps/add-application-portal-setup-sso.md).
26-
- A user account that will be assigned to the role. For more information, see [Quickstart: Create and assign a user account](../manage-apps/add-application-portal-assign-users.md).
26+
- A user account that is assigned to the role. For more information, see [Quickstart: Create and assign a user account](../manage-apps/add-application-portal-assign-users.md).
2727

2828
> [!NOTE]
2929
> This article explains how to create, update, or delete application roles on the service principal using APIs in Azure AD. To use the new user interface for App Roles, see [Add app roles to your application and receive them in the token](howto-add-app-roles-in-azure-ad-apps.md).
@@ -43,7 +43,7 @@ Use the following steps to locate the enterprise application:
4343

4444
Use the Microsoft Graph Explorer to add roles to an enterprise application.
4545

46-
1. Open [Microsoft Graph Explorer](https://developer.microsoft.com/graph/graph-explorer) in another window and sign in using the global admin or co-admin credentials for your tenant.
46+
1. Open [Microsoft Graph Explorer](https://developer.microsoft.com/graph/graph-explorer) in another window and sign in using the administrator credentials for your tenant.
4747

4848
> [!NOTE]
4949
> The Cloud App Administrator and App Administrator role won't work in this scenario. The Global Admin permissions are needed for directory read and write.
-6.58 KB
Loading
-17.8 KB
Loading

articles/active-directory/external-identities/reset-redemption-status.md

Lines changed: 9 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,13 @@
11
---
22

3-
title: Reset a guest user's redemption status
3+
title: Reset redemption status for a guest user
44
description: Learn how to reset the invitation redemption status for an Azure Active Directory B2B guest users in Azure AD External Identities.
55

66
services: active-directory
77
ms.service: active-directory
88
ms.subservice: B2B
99
ms.topic: how-to
10-
ms.date: 12/07/2022
10+
ms.date: 05/31/2023
1111

1212
ms.author: cmulligan
1313
author: csmulligan
@@ -26,7 +26,7 @@ In this article, you'll learn how to update the [guest user's](user-properties.m
2626
- The user has moved to a different company, but they still need the same access to your resources
2727
- The user’s responsibilities have been passed along to another user
2828

29-
To manage these scenarios previously, you had to manually delete the guest user’s account from your directory and reinvite the user. Now you can use the Azure portal, PowerShell or the Microsoft Graph invitation API to reset the user's redemption status and reinvite the user while keeping the user's object ID, group memberships, and app assignments. When the user redeems the new invitation, the [UPN](../hybrid/plan-connect-userprincipalname.md#what-is-userprincipalname) of the user doesn't change, but the user's sign-in name changes to the new email. Then the user can sign in using the new email or an email you've added to the `otherMails` property of the user object.
29+
To manage these scenarios previously, you had to manually delete the guest user’s account from your directory and reinvite the user. Now you can use the Azure portal, PowerShell or the Microsoft Graph invitation API to reset the user's redemption status and reinvite the user while keeping the user's object ID, group memberships, and app assignments. When the user redeems the new invitation, the UserPrincipalName (UPN) of the user doesn't change, but the user's sign-in name changes to the new email. Then the user can sign in using the new email or an email you've added to the `otherMails` property of the user object.
3030

3131
## Required Azure AD roles
3232

@@ -48,15 +48,13 @@ To reset a user's redemption status, you'll need one of the following roles:
4848
1. Next to **Other emails**, select **Add email**. Select **Add**, type the new email, and select **Save**.
4949
1. Select the **Save** button at the bottom of the page to save all changes.
5050

51-
1. On the **Overview** tab, under **My Feed**, select the **Manage (resend invitation / reset status)** link in the **B2B collaboration** tile.
51+
1. On the **Overview** tab, under **My Feed**, select the **Reset redemption status** link in the **B2B collaboration** tile.
5252

53-
[ ![Screenshot showing the B2B collaboration reset link.](./media/reset-redemption-status/user-profile-b2b-collaboration.png) ](media/reset-redemption-status/user-profile-b2b-collaboration.png#lightbox)
53+
:::image type="content" source="media/reset-redemption-status/user-profile-b2b-collaboration.png" alt-text="Screenshot showing the B2B collaboration reset link." lightbox="media/reset-redemption-status/user-profile-b2b-collaboration.png":::
5454

55-
1. Under **Redemption status**, next to **Reset invitation status?**, select **Yes**.
55+
1. Under **Reset redemption status**, select **Reset**.
5656

57-
![Screenshot showing the reset invitation status setting.](./media/reset-redemption-status/reset-status.png)
58-
59-
1. Select **Yes** to confirm.
57+
:::image type="content" source="media/reset-redemption-status/reset-status.png" alt-text="Screenshot showing the reset invitation status setting.":::
6058

6159
## Use PowerShell or Microsoft Graph API to reset redemption status
6260

@@ -121,5 +119,6 @@ ContentType: application/json
121119

122120
## Next steps
123121

124-
- [Add Azure Active Directory B2B collaboration users by using PowerShell](customize-invitation-api.md#powershell)
125122
- [Properties of an Azure AD B2B guest user](user-properties.md)
123+
- [Add Azure Active Directory B2B collaboration users by using PowerShell](customize-invitation-api.md#powershell)
124+

0 commit comments

Comments
 (0)