Skip to content

Commit 7f0b3ae

Browse files
authored
Update clean-up-unmanaged-azure-ad-accounts.md
1 parent 5c172f8 commit 7f0b3ae

File tree

1 file changed

+5
-5
lines changed

1 file changed

+5
-5
lines changed

articles/active-directory/enterprise-users/clean-up-unmanaged-azure-ad-accounts.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -16,21 +16,21 @@ ms.collection: M365-identity-device-management
1616

1717
# Clean up unmanaged Azure Active Directory accounts
1818

19-
Prior to August 2022, Azure Acticve Directory B2B (Azure AD B2B) supported self-service sign-up for email-verified users. With this feature, users create Azure AD accounts, when they verify email ownership. These accounts were created in unmanaged (or viral) tenants: users created accounts with an organization domain, not under IT team management. Access persists after users leave the organization.
19+
Prior to August 2022, Azure Active Directory B2B (Azure AD B2B) supported self-service sign-up for email-verified users. With this feature, users create Azure AD accounts, when they verify email ownership. These accounts were created in unmanaged (or viral) tenants: users created accounts with an organization domain, not under IT team management. Access persists after users leave the organization.
2020

2121
To learn more, see, [What is self-service sign-up for Azure AD?](./directory-self-service-signup.md)
2222

2323
> [!NOTE]
24-
> Unmanaged Azure AD accounts via Azure AD B2B are deprecated. As of August 2022, new B2B invitations can't be redeemed. However, invitations prior to August 2022 were redeemable with unmanaged Azure AD accounts.
24+
> Unmanaged Azure AD accounts via Azure AD B2B were deprecated. As of August 2022, new B2B invitations can't be redeemed. However, invitations prior to August 2022 were redeemable with unmanaged Azure AD accounts.
2525
2626
## Remove unmanaged Azure AD accounts
2727

28-
Use the following guidance to remove unmanaged Azure AD accounts from your Azure AD tenants. Tool features help identify viral users in your Azure AD tenant. You can reset the user redemption status.
28+
Use the following guidance to remove unmanaged Azure AD accounts from Azure AD tenants. Tool features help identify viral users in the Azure AD tenant. You can reset the user redemption status.
2929

3030
* Use the sample application in [Azure-samples/Remove-unmanaged-guests](https://github.com/Azure-Samples/Remove-Unmanaged-Guests)
3131
* Use PowerShell cmdlets in [AzureAD/MSIdentityTools](https://github.com/AzureAD/MSIdentityTools/wiki/)
3232

33-
After you run a tool, users with unmanaged Azure AD accounts access the tenant, and re-redeem their invitations. However, Azure AD prevents users from redeeming with an unmanaged Azure AD account. They can redeem with another account type. Google Federation and SAML/WS-Fed are not enabled by default. Therefore, users redeem with a Microsoft account (MSA) or email one-time password (OTP). MSA is recommended.
33+
After you run a tool, users with unmanaged Azure AD accounts access the tenant, and re-redeem their invitations. However, Azure AD prevents users from redeeming with an unmanaged Azure AD account. They can redeem with another account type. Google Federation and SAML/WS-Federation aren't enabled by default. Therefore, users redeem with a Microsoft account (MSA) or email one-time password (OTP). MSA is recommended.
3434

3535
Learn more: [Invitation redemption flow](../external-identities/redemption-experience.md#invitation-redemption-flow)
3636

@@ -44,7 +44,7 @@ Some overtaken domains might not be updated. For example, a missing DNS TXT reco
4444

4545
* For guest users from unmanaged tenants, redemption status is reset. A consent prompt appears.
4646
* Redemption occurs with same account
47-
* After resetting unmanaged user redemption status, the tool might identify unmanaged users as false positives
47+
* The tool might identify unmanaged users as false positives after you reset unmanaged user redemption status
4848

4949
## Reset redemption with a sample application
5050

0 commit comments

Comments
 (0)