Skip to content

Commit 865d650

Browse files
authored
Merge pull request #223763 from csmulligan/csmulligan-exid-msa
[EXID] Content engagement update for microsoft-account (ADO-59224)
2 parents 6374325 + 6cd0ce2 commit 865d650

File tree

1 file changed

+8
-8
lines changed

1 file changed

+8
-8
lines changed

articles/active-directory/external-identities/microsoft-account.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -1,20 +1,20 @@
11
---
22

3-
title: Microsoft account (MSA) identity provider in Azure AD
3+
title: Add Microsoft account (MSA) as an identity provider - Azure AD
44
description: Use Azure AD to enable an external user (guest) to sign in to your Azure AD apps with their Microsoft account (MSA).
55

66
services: active-directory
77
ms.service: active-directory
88
ms.subservice: B2B
99
ms.topic: how-to
10-
ms.date: 09/29/2022
10+
ms.date: 01/12/2023
1111

1212
ms.author: mimart
1313
author: msmimart
1414
manager: celestedg
15-
ms.collection: M365-identity-device-management
15+
ms.collection: engagement-fy23, M365-identity-device-management
1616

17-
#Customer intent: As an Azure AD administrator user, I want to set up invitation flow or a self-service sign-up user flow for guest users, so they can sign into my Azure AD apps with their Microsoft account (MSA).
17+
#Customer intent: As an Azure AD administrator user, I want to set up an invitation flow or a self-service sign-up user flow for guest users, so they can sign into my Azure AD apps with their Microsoft account (MSA).
1818
---
1919

2020
# Add Microsoft account (MSA) as an identity provider for External Identities
@@ -25,7 +25,7 @@ Microsoft accounts are set up by a user to get access to consumer-oriented Micro
2525

2626
## Guest sign-in using Microsoft accounts
2727

28-
Microsoft account is available by default in the list of **External Identities** > **All identity providers**. No further configuration is needed to allow guest users to sign in with their Microsoft account using either the invitation flow, or a self-service sign-up user flow.
28+
Microsoft account is available by default in the list of **External Identities** > **All identity providers**. No further configuration is needed to allow guest users to sign in with their Microsoft account, using either the invitation flow, or a self-service sign-up user flow.
2929

3030
:::image type="content" source="media/microsoft-account/microsoft-account-identity-provider.png" alt-text="Screenshot of Microsoft account in the identity providers list.":::
3131

@@ -42,7 +42,7 @@ Microsoft account is an identity provider option for your self-service sign-up u
4242
:::image type="content" source="media/microsoft-account/microsoft-account-user-flow.png" alt-text="Screenshot of the Microsoft account in a self-service sign-up user flow.":::
4343

4444
## Verifying the application's publisher domain
45-
As of November 2020, new application registrations show up as unverified in the user consent prompt, unless [the application's publisher domain is verified](../develop/howto-configure-publisher-domain.md), ***and*** the company’s identity has been verified with the Microsoft Partner Network and associated with the application. ([Learn more](../develop/publisher-verification-overview.md) about this change.) For Azure AD user flows, the publisher’s domain appears only when using a Microsoft account or other [Azure AD tenant](azure-ad-account.md) as the identity provider. To meet these new requirements, follow the steps below:
45+
As of November 2020, new application registrations show up as unverified in the user consent prompt, unless [the application's publisher domain is verified](../develop/howto-configure-publisher-domain.md), ***and*** the company’s identity has been verified with the Microsoft Partner Network and associated with the application. For Azure AD user flows, the publisher’s domain appears only when using a Microsoft account or another Azure AD tenant as the identity provider. To meet these new requirements, follow the steps below:
4646

4747
1. [Verify your company identity using your Microsoft Partner Network (MPN) account](/partner-center/verification-responses). This process verifies information about your company and your company’s primary contact.
4848
1. Complete the publisher verification process to associate your MPN account with your app registration using one of the following options:
@@ -51,5 +51,5 @@ As of November 2020, new application registrations show up as unverified in the
5151

5252
## Next steps
5353

54-
- [Add Azure Active Directory B2B collaboration users](add-users-administrator.md)
55-
- [Add self-service sign-up to an app](self-service-sign-up-user-flow.md)
54+
- [Publisher verification overview](../develop/publisher-verification-overview.md)
55+
- [Add Azure Active Directory (Azure AD) as an identity provider for External Identities](azure-ad-account.md)

0 commit comments

Comments
 (0)