You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/users-groups-roles/directory-self-service-signup.md
+12-11Lines changed: 12 additions & 11 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -18,18 +18,18 @@ ms.custom: it-pro
18
18
19
19
ms.collection: M365-identity-device-management
20
20
---
21
-
# What is self-service signup for Azure Active Directory?
21
+
# What is self-service sign-up for Azure Active Directory?
22
22
23
-
This article explains how to use self-service signup to populate an organization in Azure Active Directory (Azure AD). If you want to take over a domain name from an unmanaged Azure AD organization, see [Take over an unmanaged directory as administrator](domains-admin-takeover.md).
23
+
This article explains how to use self-service sign-up to populate an organization in Azure Active Directory (Azure AD). If you want to take over a domain name from an unmanaged Azure AD organization, see [Take over an unmanaged directory as administrator](domains-admin-takeover.md).
24
24
25
-
## Why use self-service signup?
25
+
## Why use self-service sign-up?
26
26
* Get customers to services they want faster
27
27
* Create email-based offers for a service
28
-
* Create email-based signup flows that quickly allow users to create identities using their easy-to-remember work email aliases
28
+
* Create email-based sign-up flows that quickly allow users to create identities using their easy-to-remember work email aliases
29
29
* A self-service-created Azure AD directory can be turned into a managed directory that can be used for other services
30
30
31
31
## Terms and definitions
32
-
***Self-service signup**: This is the method by which a user signs up for a cloud service and has an identity automatically created for them in Azure AD based on their email domain.
32
+
***Self-service sign-up**: This is the method by which a user signs up for a cloud service and has an identity automatically created for them in Azure AD based on their email domain.
33
33
***Unmanaged Azure AD directory**: This is the directory where that identity is created. An unmanaged directory is a directory that has no global administrator.
34
34
***Email-verified user**: This is a type of user account in Azure AD. A user who has an identity created automatically after signing up for a self-service offer is known as an email-verified user. An email-verified user is a regular member of a directory tagged with creationmethod=EmailVerified.
35
35
@@ -43,31 +43,31 @@ Admins have two self-service controls today. They can control whether:
43
43
An admin can configure these capabilities using the following Azure AD cmdlet Set-MsolCompanySettings parameters:
44
44
45
45
***AllowEmailVerifiedUsers** controls whether a user can create or join a directory. If you set that parameter to $false, no email-verified user can join the directory.
46
-
***AllowAdHocSubscriptions** controls the ability for users to perform self-service signup. If you set that parameter to $false, no user can perform self-service signup.
46
+
***AllowAdHocSubscriptions** controls the ability for users to perform self-service sign-up. If you set that parameter to $false, no user can perform self-service sign-up.
47
47
48
-
AllowEmailVerifiedUsers and AllowAdHocSubscriptions are directory-wide settings that can be applied to an managed or an unmanaged directory. Here's an example where:
48
+
AllowEmailVerifiedUsers and AllowAdHocSubscriptions are directory-wide settings that can be applied to a managed or unmanaged directory. Here's an example where:
49
49
50
50
* You administer a directory with a verified domain such as contoso.com
51
51
* You use B2B collaboration from a different directory to invite a user that does not already exist ([email protected]) in the home directory of contoso.com
52
52
* The home directory has the AllowEmailVerifiedUsers turned on
53
53
54
54
If the preceding conditions are true, then a member user is created in the home directory, and a B2B guest user is created in the inviting directory.
55
55
56
-
Flow and PowerApps trial signups are not controlled by the **AllowAdHocSubscriptions** setting. For more information, see the following articles:
56
+
Flow and PowerApps trial sign-ups are not controlled by the **AllowAdHocSubscriptions** setting. For more information, see the following articles:
57
57
58
58
*[How can I prevent my existing users from starting to use Power BI?](https://support.office.com/article/Power-BI-in-your-Organization-d7941332-8aec-4e5e-87e8-92073ce73dc5#bkmk_preventjoining)
59
59
*[Flow in your organization Q&A](https://docs.microsoft.com/flow/organization-q-and-a)
60
60
61
61
### How do the controls work together?
62
-
These two parameters can be used in conjunction to define more precise control over self-service signup. For example, the following command will allow users to perform self-service signup, but only if those users already have an account in Azure AD (in other words, users who would need an email-verified account to be created first cannot perform self-service signup):
62
+
These two parameters can be used in conjunction to define more precise control over self-service sign-up. For example, the following command will allow users to perform self-service sign-up, but only if those users already have an account in Azure AD (in other words, users who would need an email-verified account to be created first cannot perform self-service sign-up):
The following flowchart explains the different combinations for these parameters and the resulting conditions for the directory and self-service signup.
68
+
The following flowchart explains the different combinations for these parameters and the resulting conditions for the directory and self-service sign-up.
69
69
70
-

70
+

71
71
72
72
For more information and examples of how to use these parameters, see [Set-MsolCompanySettings](/powershell/module/msonline/set-msolcompanysettings?view=azureadps-1.0).
73
73
@@ -78,3 +78,4 @@ For more information and examples of how to use these parameters, see [Set-MsolC
title: Close your work or school account in an unmanaged directory - Azure Active Directory | Microsoft Docs
3
+
description: How to close your work or school account in an unmanaged Azure Active Directory.
4
+
services: active-directory
5
+
author: rolyon
6
+
manager: mtillman
7
+
8
+
ms.service: active-directory
9
+
ms.subservice: users-groups-roles
10
+
ms.topic: article
11
+
ms.workload: identity
12
+
ms.date: 05/20/2019
13
+
ms.author: rolyon
14
+
ms.reviewer:
15
+
ms.custom: it-pro
16
+
17
+
ms.collection: M365-identity-device-management
18
+
---
19
+
20
+
# Close your work or school account in an unmanaged directory
21
+
22
+
If you are a user in an unmanaged Azure Active Directory (Azure AD) organization, and you no longer need to use apps from that organization or maintain any association with is, you can close your account at any time. An unmanaged directory does not have a Global administrator. Users in an unmanaged directory can close their accounts on their own, without having to contact an administrator.
23
+
24
+
Users in an unmanaged directory are often created during self-service sign-up. An example might be an information worker in an organization who signs up for a free service. For more information about self-service sign-up, see [What is self-service sign-up for Azure Active Directory?](directory-self-service-signup.md).
Before you can close your account, you should confirm the following items:
31
+
32
+
* Make sure you are a user of an unmanaged Azure AD directory. You can't close your account if you belong to a managed directory. If you belong to a managed directory and want to close your account, you must contact your administrator. For information about how to determine whether you belong to an unmanaged directory, see [Delete the user from Unmanaged Tenant](https://docs.microsoft.com/flow/gdpr-dsr-delete#delete-the-user-from-unmanaged-tenant).
33
+
34
+
* Save any data you want to keep. For information about how to submit an export request, see [Accessing and exporting system-generated logs for Unmanaged Tenants](https://docs.microsoft.com/power-platform/admin/powerapps-gdpr-dsr-guide-systemlogs#accessing-and-exporting-system-generated-logs-for-unmanaged-tenants).
35
+
36
+
> [!WARNING]
37
+
> Closing your account is irreversible. When you close your account, all personal data will be removed. You will no longer have access to your account and data associated with your account.
38
+
39
+
## Close your account
40
+
41
+
To close an unmanaged work or school account, follow these steps:
42
+
43
+
1. Sign in to [close your account](https://go.microsoft.com/fwlink/?linkid=873123), using the account that you want to close.
44
+
45
+
1. On **My data requests**, select **Close account**.
46
+
47
+

48
+
49
+
1. Review the confirmation message and then select **Yes**.
50
+
51
+

52
+
53
+
## Next steps
54
+
55
+
-[What is self-service sign-up for Azure Active Directory?](directory-self-service-signup.md)
56
+
-[Delete the user from Unmanaged Tenant](https://docs.microsoft.com/flow/gdpr-dsr-delete#delete-the-user-from-unmanaged-tenant)
57
+
-[Accessing and exporting system-generated logs for Unmanaged Tenants](https://docs.microsoft.com/power-platform/admin/powerapps-gdpr-dsr-guide-systemlogs#accessing-and-exporting-system-generated-logs-for-unmanaged-tenants)
0 commit comments