|
| 1 | +--- |
| 2 | +title: Add a connected organization in Azure AD entitlement management (Preview) - Azure Active Directory |
| 3 | +description: Learn how to allow people outside your organization to request access packages so that you can collaborate on projects. |
| 4 | +services: active-directory |
| 5 | +documentationCenter: '' |
| 6 | +author: msaburnley |
| 7 | +manager: daveba |
| 8 | +editor: markwahl-msft |
| 9 | +ms.service: active-directory |
| 10 | +ms.workload: identity |
| 11 | +ms.tgt_pltfrm: na |
| 12 | +ms.devlang: na |
| 13 | +ms.topic: conceptual |
| 14 | +ms.subservice: compliance |
| 15 | +ms.date: 10/24/2019 |
| 16 | +ms.author: ajburnle |
| 17 | +ms.reviewer: mwahl |
| 18 | +ms.collection: M365-identity-device-management |
| 19 | + |
| 20 | + |
| 21 | +#Customer intent: As a administrator, I want to allow users in certain partner organizations to request access packages so that our organization can collaborate on projects. |
| 22 | + |
| 23 | +--- |
| 24 | + |
| 25 | +# Add a connected organization in Azure AD entitlement management (Preview) |
| 26 | + |
| 27 | +Azure AD entitlement management enables you to collaborate with people outside your organization. If you frequently collaborate with users in an external Azure AD directory or domain, you can add them as a connected organization. This article describes how to add a connected organization so that you can allow users outside your organization to request resources in your directory. |
| 28 | + |
| 29 | +## What is a connected organization? |
| 30 | + |
| 31 | +A connected organization is an external Azure AD directory or domain that you have a relationship with. |
| 32 | + |
| 33 | +For example, suppose you work at Woodgrove Bank and you want to collaborate with two external organizations: Graphic Design Institute and Contoso. You've been told by your contact at Graphic Design Institute that they use Azure AD, and that Graphic Design Institute's users have a user principal name that ends with `graphicdesigninstitute.com`. And you've been told by your contact at Contoso that they do not yet use Azure AD, but that Contoso's users have a user principal name that ends with `contoso.com`. |
| 34 | + |
| 35 | +You can configure two connected organizations -- one for Graphic Design Institute with the domain `graphicdesigninstitute.com`, and one for Contoso with the domain `contoso.com`. If you then add those two connected organizations to a policy, users from each organization that have a user principal name that matches the policy can request access packages. Furthermore, because Graphic Design Institute has been identified as using Azure AD, then if Graphic Design Institute subsequently has subdomains, such as `graphicdesigninstitute.example`, then users with that user principal name will also be able to request access packages using the same policy. |
| 36 | + |
| 37 | + |
| 38 | + |
| 39 | +How users from the Azure AD directory or domain will authenticate depends on the authentication type. The authentication types for connected organizations are the following: |
| 40 | + |
| 41 | +| Authentication type | Status | |
| 42 | +| --- | --- | |
| 43 | +| Azure AD | Supported | |
| 44 | +| [Direct federation](../b2b/direct-federation.md) | Preview | |
| 45 | +| [One-time passcode](../b2b/one-time-passcode.md) (domain) | Preview | |
| 46 | + |
| 47 | +## Add a connected organization |
| 48 | + |
| 49 | +Follow these steps to add an external Azure AD directory or domain as a connected organization. |
| 50 | + |
| 51 | +**Prerequisite role:** Global administrator, User administrator, or Guest inviter |
| 52 | + |
| 53 | +1. In the Azure portal, click **Azure Active Directory** and then click **Identity Governance**. |
| 54 | + |
| 55 | +1. In the left menu, click **Connected organizations** and then click **Add connected organization**. |
| 56 | + |
| 57 | +  |
| 58 | + |
| 59 | +1. On the **Basics** tab, enter a display name and description for the organization. |
| 60 | + |
| 61 | +  |
| 62 | + |
| 63 | +1. On the **Directory + domain** tab, click **Add directory + domain** to open the Select directories + domains pane. |
| 64 | + |
| 65 | +1. Type a domain name to search for the Azure AD directory or domain. You must type the entire domain name. |
| 66 | + |
| 67 | +1. Verify it is the correct organization by the provided name and authentication type. How users will sign in depends on the authentication type. |
| 68 | + |
| 69 | +  |
| 70 | + |
| 71 | +1. Click **Add** to add the Azure AD directory or domain. Currently, you can only add one Azure AD directory or domain per connected organization. |
| 72 | + |
| 73 | + > [!NOTE] |
| 74 | + > All users from the Azure AD directory or domain will be able to request this access package. This includes users in Azure AD from all subdomains associated with the directory, unless those domains are blocked by the Azure B2B allow or deny list. For more information, see [Allow or block invitations to B2B users from specific organizations](../b2b/allow-deny-list.md). |
| 75 | +
|
| 76 | +1. Once you have added the Azure AD directory or domain, click **Select**. |
| 77 | + |
| 78 | + The organization appears in the list. |
| 79 | + |
| 80 | +  |
| 81 | + |
| 82 | +1. On the **Sponsors** tab, add optional sponsors for this connected organization. |
| 83 | + |
| 84 | + Sponsors are internal or external users already in your directory that are the point of contact for the relationship with this connected organization. Internal sponsors are member users in your directory. External sponsors are guest users from the connected organization that were previously invited and are already in your directory. Sponsors can be utilized as approvers when users in this connected organization request access to this access package. For information about how to invite a guest user to your directory, see [Add Azure Active Directory B2B collaboration users in the Azure portal](../b2b/add-users-administrator.md). |
| 85 | + |
| 86 | + When you click **Add/Remove**, a pane appears to select the internal or external sponsors. The pane displays an unfiltered list of users and groups in your directory. |
| 87 | + |
| 88 | +  |
| 89 | + |
| 90 | +1. On the **Review + create** tab, review your organization settings and then click **Create**. |
| 91 | + |
| 92 | +  |
| 93 | + |
| 94 | +## Delete a connected organization |
| 95 | + |
| 96 | +If you no longer have a relationship with an external Azure AD directory or domain, you can delete the connected organization. |
| 97 | + |
| 98 | +**Prerequisite role:** Global administrator, User administrator, or Guest inviter |
| 99 | + |
| 100 | +1. In the Azure portal, click **Azure Active Directory** and then click **Identity Governance**. |
| 101 | + |
| 102 | +1. In the left menu, click **Connected organizations** and then click to open the connected organization. |
| 103 | + |
| 104 | +1. On the Overview page, click **Delete** to delete the connected organization. |
| 105 | + |
| 106 | + Currently, you can only delete a connected organization if there are no connected users. |
| 107 | + |
| 108 | +  |
| 109 | + |
| 110 | +## Next steps |
| 111 | + |
| 112 | +- [Govern access for external users](entitlement-management-organization.md) |
| 113 | +- [For users not in your directory](entitlement-management-access-package-request-policy.md#for-users-not-in-your-directory) |
0 commit comments