Skip to content

Commit 7fd7b1e

Browse files
authored
Update secure-external-access-resources.md
1 parent 454ced0 commit 7fd7b1e

File tree

1 file changed

+7
-7
lines changed

1 file changed

+7
-7
lines changed

articles/active-directory/fundamentals/secure-external-access-resources.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.workload: identity
99
ms.subservice: fundamentals
1010
ms.topic: conceptual
11-
ms.date: 12/16/2022
11+
ms.date: 12/21/2022
1212
ms.author: gasinh
1313
ms.reviewer: ajburnle
1414
ms.custom: "it-pro, seodec18"
@@ -17,7 +17,7 @@ ms.collection: M365-identity-device-management
1717

1818
# Plan an Azure Active Directory B2B collaboration deployment
1919

20-
Secure collaboration with your external partners ensures they have correct access to internal resources, and for the expected duration. This articles covers governance practices to reduce security risks, meet compliance goals, and ensure accurate access.
20+
Secure collaboration with your external partners ensures they have correct access to internal resources, and for the expected duration. Learn about governance practices to reduce security risks, meet compliance goals, and ensure accurate access.
2121

2222
Governed collaboration improves clarity of ownership of access, reduces exposure of sensitive resources, and enables you to attest to access policy.
2323

@@ -30,7 +30,7 @@ Traditionally, organizations use one of two methods to collaborate:
3030
* Create locally managed credentials for external users, or
3131
* Establish federations with partner identity providers (IdP)
3232

33-
Both methods have drawbacks. See the following table for more information.
33+
Both methods have drawbacks. For more information, see the following table.
3434

3535
| Area of concern | Local credentials | Federation |
3636
|----|---|---|
@@ -48,15 +48,15 @@ Azure AD B2B benefits:
4848
- Collaborate with users who have an email address, but no infrastructure
4949
- IT departments don't connect out-of-band to set up access or federation
5050
- Guest user access is protected by the same security processes as internal users
51-
- Clear end-user experience with no additional credentials required
52-
- User collaborate with partners without IT department involvement
53-
- Guest default permissions in the Azure AD directory are not limited or highly restricted
51+
- Clear end-user experience with no extra credentials required
52+
- Users collaborate with partners without IT department involvement
53+
- Guest default permissions in the Azure AD directory aren't limited or highly restricted
5454

5555
## Next steps
5656

5757
* [Determine your security posture for external access](1-secure-access-posture.md)
5858
* [Discover the current state of external collaboration in your organization](2-secure-access-current-state.md)
59-
* [CCreate a security plan for external access](3-secure-access-plan.md)
59+
* [Create a security plan for external access](3-secure-access-plan.md)
6060
* [Securing external access with groups](4-secure-access-groups.md)
6161
* [Transition to governed collaboration with Azure Active Directory B2B collaboration](5-secure-access-b2b.md)
6262
* [Manage external access with entitlement management](6-secure-access-entitlement-managment.md)

0 commit comments

Comments
 (0)