Skip to content

Commit a89929f

Browse files
Merge pull request #227418 from barclayn/fundamentals-february-issues
updating FAQ question about leaving organizations and including a link
2 parents 1c3008c + ba94623 commit a89929f

File tree

3 files changed

+5
-7
lines changed

3 files changed

+5
-7
lines changed

articles/active-directory/fundamentals/active-directory-faq.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ metadata:
1010
ms.subservice: fundamentals
1111
ms.workload: identity
1212
ms.topic: faq
13-
ms.date: 08/17/2022
13+
ms.date: 02/15/2023
1414
ms.author: barclayn
1515
ms.custom: "it-pro, seodec18"
1616
ms.collection: M365-identity-device-management
@@ -73,7 +73,7 @@ sections:
7373
- question: |
7474
How do I leave a tenant when I'm added as a collaborator?
7575
answer: |
76-
When you are added to another organization's tenant as a collaborator, you can use the "tenant switcher" in the upper right to switch between tenants. Currently, there is no way to leave the inviting organization, and Microsoft is working on providing this functionality. Until this feature is available, you can ask the inviting organization to remove you from their tenant.
76+
Information on how to leave tenants where you were added as a collaborator is documented in [Leave an organization as an external user](../external-identities/leave-the-organization.md)
7777
7878
7979

articles/active-directory/fundamentals/users-default-permissions.md

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.subservice: fundamentals
1010
ms.workload: identity
1111
ms.topic: conceptual
12-
ms.date: 02/13/2023
12+
ms.date: 02/17/2023
1313
ms.author: barclayn
1414
ms.reviewer: vincesm
1515
ms.custom: "it-pro, seodec18, contperf-fy21q1"
@@ -78,8 +78,6 @@ Permission | Setting explanation
7878
---------- | ------------
7979
**Guest user access restrictions** | Setting this option to **Guest users have the same access as members** grants all member user permissions to guest users by default.<p>Setting this option to **Guest user access is restricted to properties and memberships of their own directory objects** restricts guest access to only their own user profile by default. Access to other users is no longer allowed, even when they're searching by user principal name, object ID, or display name. Access to group information, including groups memberships, is also no longer allowed.<p>This setting doesn't prevent access to joined groups in some Microsoft 365 services like Microsoft Teams. To learn more, see [Microsoft Teams guest access](/MicrosoftTeams/guest-access).<p>Guest users can still be added to administrator roles regardless of this permission setting.
8080
**Guests can invite** | Setting this option to **Yes** allows guests to invite other guests. To learn more, see [Configure external collaboration settings](../external-identities/external-collaboration-settings-configure.md).
81-
**Members can invite** | Setting this option to **Yes** allows non-admin members of your directory to invite guests. To learn more, see [Configure external collaboration settings](../external-identities/external-collaboration-settings-configure.md).
82-
**Admins and users in the guest inviter role can invite** | Setting this option to **Yes** allows admins and users in the guest inviter role to invite guests. When you set this option to **Yes**, users in the guest inviter role will still be able to invite guests, regardless of the **Members can invite** setting. To learn more, see [Configure external collaboration settings](../external-identities/external-collaboration-settings-configure.md).
8381

8482
## Object ownership
8583

articles/active-directory/managed-identities-azure-resources/how-to-view-managed-identity-service-principal-powershell.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ ms.subservice: msi
1212
ms.topic: how-to
1313
ms.tgt_pltfrm: na
1414
ms.workload: identity
15-
ms.date: 01/11/2022
15+
ms.date: 02/15/2022
1616
ms.author: barclayn
1717
ms.collection: M365-identity-device-management
1818
ms.custom: devx-track-azurepowershell
@@ -39,7 +39,7 @@ In this article, you learn how to view the service principal of a managed identi
3939

4040
This following command demonstrates how to view the service principal of a VM or application with system assigned identity enabled. Replace `<Azure resource name>` with your own values.
4141

42-
```azurepowershell-interactive
42+
```powershell
4343
Get-AzADServicePrincipal -DisplayName <Azure resource name>
4444
```
4545

0 commit comments

Comments
 (0)