Skip to content

Commit 9ea7310

Browse files
Merge pull request #238015 from jkdouglas/xtap-custom-role-support
XTAP supports custom roles and protected actions
2 parents 6fbdac4 + 0e4c9e3 commit 9ea7310

File tree

5 files changed

+91
-4
lines changed

5 files changed

+91
-4
lines changed

articles/active-directory/external-identities/cross-cloud-settings.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -49,7 +49,7 @@ After each organization has completed these steps, Azure AD B2B collaboration be
4949

5050
In your Microsoft cloud settings, enable the Microsoft Azure cloud you want to collaborate with.
5151

52-
1. Sign in to the [Azure portal](https://portal.azure.com) using a Global administrator or Security administrator account. Then open the **Azure Active Directory** service.
52+
1. Sign in to the [Azure portal](https://portal.azure.com) using a Global administrator, Security administrator, or an account with a [custom role](cross-tenant-access-overview.md#custom-roles-for-managing-cross-tenant-access-settings) you've created. Then open the **Azure Active Directory** service.
5353
1. Select **External Identities**, and then select **Cross-tenant access settings**.
5454
1. Select **Microsoft cloud settings**.
5555
1. Select the checkboxes next to the external Microsoft Azure clouds you want to enable.

articles/active-directory/external-identities/cross-tenant-access-overview.md

Lines changed: 73 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -123,7 +123,7 @@ To collaborate with a partner tenant in a different Microsoft Azure cloud, both
123123
> [!IMPORTANT]
124124
> Changing the default inbound or outbound settings to block access could block existing business-critical access to apps in your organization or partner organizations. Be sure to use the tools described in this article and consult with your business stakeholders to identify the required access.
125125
126-
- To configure cross-tenant access settings in the Azure portal, you'll need an account with a Global administrator or Security administrator role.
126+
- To configure cross-tenant access settings in the Azure portal, you'll need an account with a Global administrator, Security administrator, or a [custom role](#custom-roles-for-managing-cross-tenant-access-settings) you've defined.
127127

128128
- To configure trust settings or apply access settings to specific users, groups, or applications, you'll need an Azure AD Premium P1 license. The license is required on the tenant that you configure. For B2B direct connect, where mutual trust relationship with another Azure AD organization is required, you'll need an Azure AD Premium P1 license in both tenants.
129129

@@ -144,6 +144,78 @@ To collaborate with a partner tenant in a different Microsoft Azure cloud, both
144144

145145
- If you block access to all apps by default, users will be unable to read emails encrypted with Microsoft Rights Management Service (also known as Office 365 Message Encryption or OME). To avoid this issue, we recommend configuring your outbound settings to allow your users to access this app ID: 00000012-0000-0000-c000-000000000000. If this is the only application you allow, access to all other apps will be blocked by default.
146146

147+
## Custom roles for managing cross-tenant access settings
148+
149+
Cross-tenant access settings can be managed with custom roles defined by your organization. This enables you to [define your own finely-scoped roles](../roles/custom-create.md) to manage cross-tenant access settings instead of using one of the built-in roles for management.
150+
Your organization can define custom roles to manage cross-tenant access settings. This allows you to create [your own finely-scoped roles](../roles/custom-create.md) to manage cross-tenant access settings instead of using built-in roles for management.
151+
### Recommended custom roles
152+
153+
#### Cross-tenant access administrator
154+
155+
This role can manage everything in cross-tenant access settings, including default and organizational based settings. This role should be assigned to users who need to manage all settings in cross-tenant access settings.
156+
157+
Please find the list of recommended actions for this role below.
158+
159+
| Actions |
160+
| ------- |
161+
| microsoft.directory.tenantRelationships/standard/read |
162+
| microsoft.directory/crossTenantAccessPolicy/standard/read |
163+
| microsoft.directory/crossTenantAccessPolicy/allowedCloudEndpoints/update |
164+
| microsoft.directory/crossTenantAccessPolicy/basic/update |
165+
| microsoft.directory/crossTenantAccessPolicy/default/b2bCollaboration/update |
166+
| microsoft.directory/crossTenantAccessPolicy/default/b2bDirectConnect/update |
167+
| microsoft.directory/crossTenantAccessPolicy/default/crossCloudMeetings/update |
168+
| microsoft.directory/crossTenantAccessPolicy/default/standard/read |
169+
| microsoft.directory/crossTenantAccessPolicy/default/tenantRestrictions/update |
170+
| microsoft.directory/crossTenantAccessPolicy/partners/b2bCollaboration/update |
171+
| microsoft.directory/crossTenantAccessPolicy/partners/b2bDirectConnect/update |
172+
| microsoft.directory/crossTenantAccessPolicy/partners/create |
173+
| microsoft.directory/crossTenantAccessPolicy/partners/crossCloudMeetings/update |
174+
| microsoft.directory/crossTenantAccessPolicy/partners/delete |
175+
| microsoft.directory/crossTenantAccessPolicy/partners/identitySynchronization/basic/update |
176+
| microsoft.directory/crossTenantAccessPolicy/partners/identitySynchronization/create |
177+
| microsoft.directory/crossTenantAccessPolicy/partners/identitySynchronization/standard/read |
178+
| microsoft.directory/crossTenantAccessPolicy/partners/standard/read |
179+
| microsoft.directory/crossTenantAccessPolicy/partners/tenantRestrictions/update |
180+
181+
#### Cross-tenant access reader
182+
This role can read everything in cross-tenant access settings, including default and organizational based settings. This role should be assigned to users who only need to review settings in cross-tenant access settings, but not manage them.
183+
184+
Please find the list of recommended actions for this role below.
185+
186+
| Actions |
187+
| ------- |
188+
| microsoft.directory.tenantRelationships/standard/read |
189+
| microsoft.directory/crossTenantAccessPolicy/standard/read |
190+
| microsoft.directory/crossTenantAccessPolicy/default/standard/read |
191+
| microsoft.directory/crossTenantAccessPolicy/partners/identitySynchronization/standard/read |
192+
| microsoft.directory/crossTenantAccessPolicy/partners/standard/read |
193+
194+
#### Cross-tenant access partner administrator
195+
This role can manage everything relating to partners and read the default settings. This role should be assigned to users who need to manage organizational based settings but not be able to change default settings.
196+
197+
Please find the list of recommended actions for this role below.
198+
199+
| Actions |
200+
| ------- |
201+
| microsoft.directory.tenantRelationships/standard/read |
202+
| microsoft.directory/crossTenantAccessPolicy/standard/read |
203+
| microsoft.directory/crossTenantAccessPolicy/basic/update |
204+
| microsoft.directory/crossTenantAccessPolicy/default/standard/read |
205+
| microsoft.directory/crossTenantAccessPolicy/partners/b2bCollaboration/update |
206+
| microsoft.directory/crossTenantAccessPolicy/partners/b2bDirectConnect/update |
207+
| microsoft.directory/crossTenantAccessPolicy/partners/create |
208+
| microsoft.directory/crossTenantAccessPolicy/partners/crossCloudMeetings/update |
209+
| microsoft.directory/crossTenantAccessPolicy/partners/delete |
210+
| microsoft.directory/crossTenantAccessPolicy/partners/identitySynchronization/basic/update |
211+
| microsoft.directory/crossTenantAccessPolicy/partners/identitySynchronization/create |
212+
| microsoft.directory/crossTenantAccessPolicy/partners/identitySynchronization/standard/read |
213+
| microsoft.directory/crossTenantAccessPolicy/partners/standard/read |
214+
| microsoft.directory/crossTenantAccessPolicy/partners/tenantRestrictions/update |
215+
216+
## Protect cross-tenant access administrative actions
217+
Any actions that modify cross-tenant access settings are considered protected actions and can be additionally protected with Conditional Access policies. For more information and configuration steps see [protected actions](../roles/protected-actions-overview.md).
218+
147219
## Identify inbound and outbound sign-ins
148220

149221
Several tools are available to help you identify the access your users and partners need before you set inbound and outbound access settings. To ensure you don’t remove access that your users and partners need, you should examine current sign-in behavior. Taking this preliminary step will help prevent loss of desired access for your end users and partner users. However, in some cases these logs are only retained for 30 days, so we strongly recommend you speak with your business stakeholders to ensure required access isn't lost.

articles/active-directory/external-identities/cross-tenant-access-settings-b2b-collaboration.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -37,7 +37,7 @@ Use External Identities cross-tenant access settings to manage how you collabora
3737

3838
Default cross-tenant access settings apply to all external tenants for which you haven't created organization-specific customized settings. If you want to modify the Azure AD-provided default settings, follow these steps.
3939

40-
1. Sign in to the [Azure portal](https://portal.azure.com) using a Global administrator or Security administrator account. Then open the **Azure Active Directory** service.
40+
1. Sign in to the [Azure portal](https://portal.azure.com) using a Global administrator, Security administrator, or an account with a [custom role](cross-tenant-access-overview.md#custom-roles-for-managing-cross-tenant-access-settings) you've created. Then open the **Azure Active Directory** service.
4141
1. Select **External Identities**, and then select **Cross-tenant access settings**.
4242
1. Select the **Default settings** tab and review the summary page.
4343

articles/active-directory/external-identities/cross-tenant-access-settings-b2b-direct-connect.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -42,7 +42,7 @@ Learn more about using cross-tenant access settings to [manage B2B direct connec
4242

4343
Default cross-tenant access settings apply to all external tenants for which you haven't created organization-specific customized settings. If you want to modify the Azure AD-provided default settings, follow these steps.
4444

45-
1. Sign in to the [Azure portal](https://portal.azure.com) using a Global administrator or Security administrator account. Then open the **Azure Active Directory** service.
45+
1. Sign in to the [Azure portal](https://portal.azure.com) using a Global administrator, Security administrator, or an account with a [custom role](cross-tenant-access-overview.md#custom-roles-for-managing-cross-tenant-access-settings) you've created. Then open the **Azure Active Directory** service.
4646
1. Select **External Identities**, and then select **Cross-tenant access settings**.
4747
1. Select the **Default settings** tab and review the summary page.
4848

articles/active-directory/roles/protected-actions-overview.md

Lines changed: 15 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -35,6 +35,7 @@ We recommend using multi-factor authentication on all accounts, especially accou
3535
Conditional Access policies can be applied to limited set of permissions. You can use protected actions in the following areas:
3636

3737
- Conditional Access policy management
38+
- Cross-tenant access settings management
3839
- Custom rules that define network locations
3940
- Protected action management
4041

@@ -46,6 +47,20 @@ Here's the initial set of permissions:
4647
> | microsoft.directory/conditionalAccessPolicies/basic/update | Update basic properties for Conditional Access policies |
4748
> | microsoft.directory/conditionalAccessPolicies/create | Create Conditional Access policies |
4849
> | microsoft.directory/conditionalAccessPolicies/delete | Delete Conditional Access policies |
50+
> | microsoft.directory/conditionalAccessPolicies/basic/update | Update basic properties for conditional access policies |
51+
> | microsoft.directory/conditionalAccessPolicies/create | Create conditional access policies |
52+
> | microsoft.directory/conditionalAccessPolicies/delete | Delete conditional access policies |
53+
> | microsoft.directory/crossTenantAccessPolicy/allowedCloudEndpoints/update | Update allowed cloud endpoints of the cross-tenant access policy|
54+
> | microsoft.directory/crossTenantAccessPolicy/default/b2bCollaboration/update | Update Azure AD B2B collaboration settings of the default cross-tenant access policy |
55+
> | microsoft.directory/crossTenantAccessPolicy/default/b2bDirectConnect/update | Update Azure AD B2B direct connect settings of the default cross-tenant access policy |
56+
> | microsoft.directory/crossTenantAccessPolicy/default/crossCloudMeetings/update | Update cross-cloud Teams meeting settings of the default cross-tenant access policy.
57+
> | microsoft.directory/crossTenantAccessPolicy/default/tenantRestrictions/update | Update tenant restrictions of the default cross-tenant access policy.
58+
> | microsoft.directory/crossTenantAccessPolicy/partners/b2bCollaboration/update | Update Azure AD B2B collaboration settings of cross-tenant access policy for partners. |
59+
> | microsoft.directory/crossTenantAccessPolicy/partners/b2bDirectConnect/update | Update Azure AD B2B direct connect settings of cross-tenant access policy for partners. |
60+
> | microsoft.directory/crossTenantAccessPolicy/partners/create | Create cross-tenant access policy for partners. |
61+
> | microsoft.directory/crossTenantAccessPolicy/partners/crossCloudMeetings/update | Update cross-cloud Teams meeting settings of cross-tenant access policy for partners. |
62+
> | microsoft.directory/crossTenantAccessPolicy/partners/delete | Delete cross-tenant access policy for partners. |
63+
> | microsoft.directory/crossTenantAccessPolicy/partners/tenantRestrictions/update | Update tenant restrictions of cross-tenant access policy for partners. |
4964
> | microsoft.directory/namedLocations/basic/update | Update basic properties of custom rules that define network locations |
5065
> | microsoft.directory/namedLocations/create | Create custom rules that define network locations |
5166
> | microsoft.directory/namedLocations/delete | Delete custom rules that define network locations |

0 commit comments

Comments
 (0)