Skip to content

Commit b0c025b

Browse files
Merge pull request #214240 from csmulligan/csm-cross-t-acc-settings
[EXID] Clarifying steps in inbound collab steps in cross-tenant acc.
2 parents b85aac3 + 5f4f31f commit b0c025b

File tree

1 file changed

+9
-5
lines changed

1 file changed

+9
-5
lines changed

articles/active-directory/external-identities/cross-tenant-access-settings-b2b-collaboration.md

Lines changed: 9 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ ms.collection: M365-identity-device-management
1616

1717
# Configure cross-tenant access settings for B2B collaboration
1818

19-
Use External Identities cross-tenant access settings to manage how you collaborate with other Azure AD organizations through B2B collaboration. These settings determine both the level of *inbound* access users in external Azure AD organizations have to your resources, as well as the level of *outbound* access your users have to external organizations. They also let you trust multi-factor authentication (MFA) and device claims ([compliant claims and hybrid Azure AD joined claims](../conditional-access/howto-conditional-access-policy-compliant-device.md)) from other Azure AD organizations. For details and planning considerations, see [Cross-tenant access in Azure AD External Identities](cross-tenant-access-overview.md).
19+
Use External Identities cross-tenant access settings to manage how you collaborate with other Azure AD organizations through B2B collaboration. These settings determine both the level of *inbound* access users in external Azure AD organizations have to your resources, and the level of *outbound* access your users have to external organizations. They also let you trust multi-factor authentication (MFA) and device claims ([compliant claims and hybrid Azure AD joined claims](../conditional-access/howto-conditional-access-policy-compliant-device.md)) from other Azure AD organizations. For details and planning considerations, see [Cross-tenant access in Azure AD External Identities](cross-tenant-access-overview.md).
2020

2121
## Before you begin
2222

@@ -92,9 +92,13 @@ With inbound settings, you select which external users and groups will be able t
9292

9393
### To change inbound B2B collaboration settings
9494

95-
1. Select the **B2B collaboration** tab.
95+
1. Sign in to the [Azure portal](https://portal.azure.com) using a Global administrator or Security administrator account. Then open the **Azure Active Directory** service.
96+
97+
1. Select **External Identities** > **Cross-tenant access settings**.
98+
99+
1. Under **Organizational settings** select the link in the **Inbound access** column and the **B2B collaboration** tab.
96100

97-
1. (This step applies to **Organizational settings** only.) If you're configuring inbound access settings for a specific organization, select one of the following:
101+
1. If you're configuring inbound access settings for a specific organization, select one of the following:
98102

99103
- **Default settings**: Select this option if you want the organization to use the default inbound settings (as configured on the **Default** settings tab). If customized settings were already configured for this organization, you'll need to select **Yes** to confirm that you want all settings to be replaced by the default settings. Then select **Save**, and skip the rest of the steps in this procedure.
100104

@@ -232,7 +236,7 @@ With outbound settings, you select which of your users and groups will be able t
232236
- When you're done selecting the users and groups you want to add, choose **Select**.
233237

234238
> [!NOTE]
235-
> When targeting your users and groups, you won't be able to select users who have configured [SMS-based authentication](../authentication/howto-authentication-sms-signin.md). This is because users who have a "federated credential" on their user object are blocked to prevent external users from being added to outbound access settings. As a workaround, you can use the [Microsoft Graph API](/graph/api/resources/crosstenantaccesspolicy-overview?view=graph-rest-1.0) to add the user's object ID directly or target a group the user belongs to.
239+
> When targeting your users and groups, you won't be able to select users who have configured [SMS-based authentication](../authentication/howto-authentication-sms-signin.md). This is because users who have a "federated credential" on their user object are blocked to prevent external users from being added to outbound access settings. As a workaround, you can use the [Microsoft Graph API](/graph/api/resources/crosstenantaccesspolicy-overview) to add the user's object ID directly or target a group the user belongs to.
236240
237241
1. Select the **External applications** tab.
238242

@@ -281,4 +285,4 @@ When you remove an organization from your Organizational settings, the default c
281285
## Next steps
282286

283287
- See [Configure external collaboration settings](external-collaboration-settings-configure.md) for B2B collaboration with non-Azure AD identities, social identities, and non-IT managed external accounts.
284-
- [Configure cross-tenant access settings for B2B direct connect](cross-tenant-access-settings-b2b-direct-connect.md)
288+
- [Configure cross-tenant access settings for B2B direct connect](cross-tenant-access-settings-b2b-direct-connect.md)

0 commit comments

Comments
 (0)