You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Before you learn about the current state of your external collaboration, determine a security posture. Consider centralized vs. delegated control, also governance, regulatory, and compliance targets.
21
21
22
-
Learn more: [Determine your security posture for external users](1-secure-access-posture.md)
22
+
Learn more: [Determine your security posture for external access with Azure Active Directory](1-secure-access-posture.md)
23
23
24
-
Users in your organization likely collaborate with users from other organizations. Collaboration can occur with productivity applications like Microsoft 365, by email, or sharing resources with external users. The foundation of your governance plan can include:
24
+
Users in your organization likely collaborate with users from other organizations. Collaboration occurs with productivity applications like Microsoft 365, by email, or sharing resources with external users. These scenarios include users:
25
25
26
-
*Users initiating external collaboration
27
-
*Collaboration with external users and organizations
28
-
*Access granted to external users
26
+
*Initiating external collaboration
27
+
*Collaborating with external users and organizations
28
+
*Granting access to external users
29
29
30
-
## Users initiating external collaboration
30
+
## Determine who initiates external collaboration
31
31
32
-
Users seeking external collaboration know the applications needed for their work, and when access ends. Therefore, determine users with delegated permission to invite external users, create access packages, and complete access reviews.
32
+
Generally, users seeking external collaboration know the applications to use, and when access ends. Therefore, determine users with delegated permissions to invite external users, create access packages, and complete access reviews.
*[Auditing and reporting a B2B collaboration user](../external-identities/auditing-and-reporting.md)
36
+
* Microsoft 365[Audit log activities](/microsoft-365/compliance/audit-log-activities?view=o365-worldwide&preserve-view=true) - search for events and discover activities audited in Microsoft 365
37
+
*[Auditing and reporting a B2B collaboration user](../external-identities/auditing-and-reporting.md) - verify guest user access, and see records of system and user activities
38
38
39
-
## Collaboration with external users and organizations
39
+
## Enumerate guest users and organizations
40
40
41
-
External users might be Azure AD B2B users with partner-managed credentials, or external users with locally provisioned credentials. Typically, these users are a UserType of Guest. See,[B2B collaboration overview](../external-identities/what-is-b2b.md).
41
+
External users might be Azure AD B2B users with partner-managed credentials, or external users with locally provisioned credentials. Typically, these users are the Guest UserType. To learn about inviting guests users and sharing resources, see[B2B collaboration overview](../external-identities/what-is-b2b.md).
### Discover email domains and companyName property
55
55
56
-
Determine external organizations with the domain names of external user email addresses. This discovery might not be possible with consumer identity providers such as Google. We recommend you write the companyName attribute to identify external organizations.
56
+
You can determine external organizations with the domain names of external user email addresses. This discovery might not be possible with consumer identity providers. We recommend you write the companyName attribute to identify external organizations.
57
57
58
-
### Allowlist, blocklist, and entitlement management
58
+
### Use allowlist, blocklist, and entitlement management
59
59
60
-
For your organization to collaborate with, or block, specific organizations, at the tenant level, there is allowlist or blocklist. Use this feature to control B2B invitations and redemptions regardless of source (such as Microsoft Teams, SharePoint, or the Azure portal). See, [Allow or block invitations to B2B users from specific organizations](../external-identities/allow-deny-list.md).
60
+
Use the allowlist or blocklist to enable your organization to collaborate with, or block, organizations at the tenant level. Control B2B invitations and redemptions regardless of source (such as Microsoft Teams, SharePoint, or the Azure portal).
61
+
62
+
See, [Allow or block invitations to B2B users from specific organizations](../external-identities/allow-deny-list.md)
61
63
62
64
If you use entitlement management, you can confine access packages to a subset of partners with the **Specific connected organizations** option, under New access packages, in Identity Governance.
63
65
64
-

66
+

65
67
66
-
## External user access
68
+
## Determine external user access
67
69
68
-
After you have an inventory of external users and organizations, determine the access to grant to these users. You can use the Microsoft Graph API to determine Azure AD group membership or application assignment.
70
+
With an inventory of external users and organizations, determine the access to grant to the users. You can use the Microsoft Graph API to determine Azure AD group membership or application assignment.
69
71
70
72
*[Working with groups in Microsoft Graph](/graph/api/resources/groups-overview?context=graph%2Fcontext&view=graph-rest-1.0&preserve-view=true)
71
73
*[Applications API overview](/graph/applications-concept-overview?view=graph-rest-1.0&preserve-view=true)
0 commit comments