Skip to content

Commit 7724eca

Browse files
authored
Merge pull request #187754 from msmimart/mm-xtas-update
[EXID] Cross-tenant access overview and Conditional Access edits
2 parents 8c36ece + 5015016 commit 7724eca

File tree

2 files changed

+5
-5
lines changed

2 files changed

+5
-5
lines changed

articles/active-directory/external-identities/authentication-conditional-access.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: B2B
88
ms.topic: conceptual
9-
ms.date: 01/31/2022
9+
ms.date: 02/07/2022
1010

1111
ms.author: mimart
1212
author: msmimart
@@ -52,7 +52,7 @@ The following diagram illustrates the authentication flow when an external user
5252
|--------------|-----------------------|
5353
| **1** | The B2B guest user requests access to a resource. The resource redirects the user to its resource tenant, a trusted IdP.|
5454
| **2** | The resource tenant identifies the user as external and redirects the user to the B2B guest user’s IdP. The user performs primary authentication in the IdP.
55-
| **3** | Outbound cross-tenant access settings are evaluated. If the user is allowed outbound access, the B2B guest user’s IdP issues a token to the user. The user is redirected back to the resource tenant with the token. The resource tenant validates the token and then evaluates the user against its Conditional Access policies. For example, the resource tenant could require the user to perform Azure Active Directory (AD) MFA.
55+
| **3** | Authorization policies are evaluated in the B2B guest user's IdP. If the user satisfies these policies, the B2B guest user’s IdP issues a token to the user. The user is redirected back to the resource tenant with the token. The resource tenant validates the token and then evaluates the user against its Conditional Access policies. For example, the resource tenant could require the user to perform Azure Active Directory (AD) MFA.
5656
| **4** | Inbound cross-tenant access settings and Conditional Access policies are evaluated. If all policies are satisfied, the resource tenant issues its own token and redirects the user to its resource.
5757

5858
### Example 2: Authentication flow and token for one-time passcode user

articles/active-directory/external-identities/cross-tenant-access-overview.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ services: active-directory
55
ms.service: active-directory
66
ms.subservice: B2B
77
ms.topic: how-to
8-
ms.date: 01/31/2022
8+
ms.date: 02/07/2022
99

1010
ms.author: mimart
1111
author: msmimart
@@ -53,7 +53,7 @@ You can configure organization-specific settings by adding an organization and m
5353

5454
## Important considerations
5555

56-
> [!CAUTION]
56+
> [!IMPORTANT]
5757
> Changing the default inbound or outbound settings to block access could block existing business-critical access to apps in your organization or partner organizations. Be sure to use the tools described in this article and consult with your business stakeholders to identify the required access.
5858
5959
- Cross-tenant access settings are used to manage B2B collaboration with other Azure AD organizations. For non-Azure AD identities (for example, social identities or non-IT managed external accounts), use [external collaboration settings](external-collaboration-settings-configure.md). External collaboration settings include options for restricting guest user access, specifying who can invite guests, and allowing or blocking domains.
@@ -84,7 +84,7 @@ Several tools are available to help you identify the access your users and partn
8484
To determine your users access to external Azure AD organizations in the last 30 days, run the following PowerShell script:
8585

8686
```powershell
87-
Get-MgAuditLogsSignIn `
87+
Get-MgAuditLogSignIn `
8888
-Filter “ResourceTenantID ne ‘your tenant id’” `
8989
-all:$True| `
9090
group ResourceTenantId,AppDisplayName,UserPrincipalName| `

0 commit comments

Comments
 (0)