You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/app-provisioning/customize-application-attributes.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -348,7 +348,7 @@ Selecting this option forces a resynchronization of all users while the provisio
348
348
- The attribute `IsSoftDeleted` is often part of the default mappings for an application. `IsSoftdeleted` can be true in one of four scenarios: 1) The user is out of scope due to being unassigned from the application. 2) The user is out of scope due to not meeting a scoping filter. 3) The user has been soft deleted in Azure AD. 4) The property `AccountEnabled` is set to false on the user. It's not recommended to remove the `IsSoftDeleted` attribute from your attribute mappings.
349
349
- The Azure AD provisioning service doesn't support provisioning null values.
350
350
- They primary key, typically "ID", shouldn't be included as a target attribute in your attribute mappings.
351
-
- The role attribute typically needs to be mapped using an expression, rather than a direct mapping. For more information about role mapping, see [Provisioning a role to a SCIM app](#Provisioning a role to a SCIM app).
351
+
- The role attribute typically needs to be mapped using an expression, rather than a direct mapping. For more information about role mapping, see [Provisioning a role to a SCIM app](#provisioning-a-role-to-a-scim-app).
352
352
- While you can disable groups from your mappings, disabling users isn't supported.
Copy file name to clipboardExpand all lines: articles/active-directory/cloud-infrastructure-entitlement-management/onboard-gcp.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -81,12 +81,12 @@ To enable Controller mode **On** for any projects, add these roles to the specif
81
81
- Role Administrators
82
82
- Security Admin
83
83
84
-
The required commands to run in Google Cloud Shell are listed in the Manage Authorization screen for each scope of a project, folder or organization. This is also configured in the GPC console.
84
+
The required commands to run in Google Cloud Shell are listed in the Manage Authorization screen for each scope of a project, folder or organization. This is also configured in the GCP console.
85
85
86
86
3. Select **Next**.
87
87
88
88
#### Option 2: Enter authorization systems
89
-
You have the ability to specify only certain GCP member projects to manage and monitor with MEPM (up to 100 per collector). Follow the steps to configure these GCP member projects to be monitored:
89
+
You have the ability to specify only certain GCP member projects to manage and monitor with Permissions Management (up to 100 per collector). Follow the steps to configure these GCP member projects to be monitored:
90
90
1. In the **Permissions Management Onboarding - GCP Project Ids** page, enter the **Project IDs**.
91
91
92
92
You can enter up to comma separated 100 GCP project IDs.
@@ -109,7 +109,7 @@ To enable Controller mode **On** for any projects, add these roles to the specif
109
109
- Role Administrators
110
110
- Security Admin
111
111
112
-
The required commands to run in Google Cloud Shell are listed in the Manage Authorization screen for each scope of a project, folder or organization. This is also configured in the GPC console.
112
+
The required commands to run in Google Cloud Shell are listed in the Manage Authorization screen for each scope of a project, folder or organization. This is also configured in the GCP console.
Copy file name to clipboardExpand all lines: articles/active-directory/external-identities/cross-cloud-settings.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -49,7 +49,7 @@ After each organization has completed these steps, Azure AD B2B collaboration be
49
49
50
50
In your Microsoft cloud settings, enable the Microsoft Azure cloud you want to collaborate with.
51
51
52
-
1. Sign in to the [Azure portal](https://portal.azure.com) using a Global administrator or Security administratoraccount. Then open the **Azure Active Directory** service.
52
+
1. Sign in to the [Azure portal](https://portal.azure.com) using a Global administrator, Security administrator, or an account with a [custom role](cross-tenant-access-overview.md#custom-roles-for-managing-cross-tenant-access-settings) you've created. Then open the **Azure Active Directory** service.
53
53
1. Select **External Identities**, and then select **Cross-tenant access settings**.
54
54
1. Select **Microsoft cloud settings**.
55
55
1. Select the checkboxes next to the external Microsoft Azure clouds you want to enable.
Copy file name to clipboardExpand all lines: articles/active-directory/external-identities/cross-tenant-access-overview.md
+73-1Lines changed: 73 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -123,7 +123,7 @@ To collaborate with a partner tenant in a different Microsoft Azure cloud, both
123
123
> [!IMPORTANT]
124
124
> Changing the default inbound or outbound settings to block access could block existing business-critical access to apps in your organization or partner organizations. Be sure to use the tools described in this article and consult with your business stakeholders to identify the required access.
125
125
126
-
- To configure cross-tenant access settings in the Azure portal, you'll need an account with a Global administrator or Security administratorrole.
126
+
- To configure cross-tenant access settings in the Azure portal, you'll need an account with a Global administrator, Security administrator, or a [custom role](#custom-roles-for-managing-cross-tenant-access-settings) you've defined.
127
127
128
128
- To configure trust settings or apply access settings to specific users, groups, or applications, you'll need an Azure AD Premium P1 license. The license is required on the tenant that you configure. For B2B direct connect, where mutual trust relationship with another Azure AD organization is required, you'll need an Azure AD Premium P1 license in both tenants.
129
129
@@ -144,6 +144,78 @@ To collaborate with a partner tenant in a different Microsoft Azure cloud, both
144
144
145
145
- If you block access to all apps by default, users will be unable to read emails encrypted with Microsoft Rights Management Service (also known as Office 365 Message Encryption or OME). To avoid this issue, we recommend configuring your outbound settings to allow your users to access this app ID: 00000012-0000-0000-c000-000000000000. If this is the only application you allow, access to all other apps will be blocked by default.
146
146
147
+
## Custom roles for managing cross-tenant access settings
148
+
149
+
Cross-tenant access settings can be managed with custom roles defined by your organization. This enables you to [define your own finely-scoped roles](../roles/custom-create.md) to manage cross-tenant access settings instead of using one of the built-in roles for management.
150
+
Your organization can define custom roles to manage cross-tenant access settings. This allows you to create [your own finely-scoped roles](../roles/custom-create.md) to manage cross-tenant access settings instead of using built-in roles for management.
151
+
### Recommended custom roles
152
+
153
+
#### Cross-tenant access administrator
154
+
155
+
This role can manage everything in cross-tenant access settings, including default and organizational based settings. This role should be assigned to users who need to manage all settings in cross-tenant access settings.
156
+
157
+
Please find the list of recommended actions for this role below.
This role can read everything in cross-tenant access settings, including default and organizational based settings. This role should be assigned to users who only need to review settings in cross-tenant access settings, but not manage them.
183
+
184
+
Please find the list of recommended actions for this role below.
This role can manage everything relating to partners and read the default settings. This role should be assigned to users who need to manage organizational based settings but not be able to change default settings.
196
+
197
+
Please find the list of recommended actions for this role below.
Any actions that modify cross-tenant access settings are considered protected actions and can be additionally protected with Conditional Access policies. For more information and configuration steps see [protected actions](../roles/protected-actions-overview.md).
218
+
147
219
## Identify inbound and outbound sign-ins
148
220
149
221
Several tools are available to help you identify the access your users and partners need before you set inbound and outbound access settings. To ensure you don’t remove access that your users and partners need, you should examine current sign-in behavior. Taking this preliminary step will help prevent loss of desired access for your end users and partner users. However, in some cases these logs are only retained for 30 days, so we strongly recommend you speak with your business stakeholders to ensure required access isn't lost.
Copy file name to clipboardExpand all lines: articles/active-directory/external-identities/cross-tenant-access-settings-b2b-collaboration.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -37,7 +37,7 @@ Use External Identities cross-tenant access settings to manage how you collabora
37
37
38
38
Default cross-tenant access settings apply to all external tenants for which you haven't created organization-specific customized settings. If you want to modify the Azure AD-provided default settings, follow these steps.
39
39
40
-
1. Sign in to the [Azure portal](https://portal.azure.com) using a Global administrator or Security administratoraccount. Then open the **Azure Active Directory** service.
40
+
1. Sign in to the [Azure portal](https://portal.azure.com) using a Global administrator, Security administrator, or an account with a [custom role](cross-tenant-access-overview.md#custom-roles-for-managing-cross-tenant-access-settings) you've created. Then open the **Azure Active Directory** service.
41
41
1. Select **External Identities**, and then select **Cross-tenant access settings**.
42
42
1. Select the **Default settings** tab and review the summary page.
0 commit comments