Skip to content

Commit b44cf62

Browse files
authored
Merge pull request #193635 from MicrosoftDocs/main
3/31 PM Publish
2 parents ae245e4 + f85da46 commit b44cf62

File tree

117 files changed

+2397
-897
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

117 files changed

+2397
-897
lines changed

articles/active-directory/external-identities/b2b-direct-connect-overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ manager: celestedg
1414
ms.collection: M365-identity-device-management
1515
---
1616

17-
# B2B direct connect overview
17+
# B2B direct connect overview (Preview)
1818

1919
Azure Active Directory (Azure AD) B2B direct connect is a feature of External Identities that lets you set up a mutual trust relationship with another Azure AD organization for seamless collaboration. With B2B direct connect, users from both organizations can work together using their home credentials and B2B direct connect-enabled apps, without having to be added to each other’s organizations as guests. Use B2B direct connect to share resources with external Azure AD organizations. Or use it to share resources across multiple Azure AD tenants within your own organization.
2020

articles/active-directory/external-identities/cross-tenant-access-settings-b2b-direct-connect.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.custom: "it-pro"
1414
ms.collection: M365-identity-device-management
1515
---
1616

17-
# Configure cross-tenant access settings for B2B direct connect
17+
# Configure cross-tenant access settings for B2B direct connect (Preview)
1818

1919
> [!NOTE]
2020
> Cross-tenant access settings are preview features of Azure Active Directory. For more information about previews, see [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/).

articles/active-directory/external-identities/external-identities-pricing.md

Lines changed: 18 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: B2B
88
ms.topic: conceptual
9-
ms.date: 07/13/2021
9+
ms.date: 03/29/2022
1010

1111
ms.author: mimart
1212
author: msmimart
@@ -36,17 +36,17 @@ To take advantage of MAU billing, your Azure AD tenant must be linked to an Azur
3636

3737
In your Azure AD tenant, guest user collaboration usage is billed based on the count of unique guest users with authentication activity within a calendar month. This model replaces the 1:5 ratio billing model, which allowed up to five guest users for each Azure AD Premium license in your tenant. When your tenant is linked to a subscription and you use External Identities features to collaborate with guest users, you'll be automatically billed using the MAU-based billing model.
3838

39+
Your first 50,000 MAUs per month are free for both Premium P1 and Premium P2 features. To determine the total number of MAUs, we combine MAUs from all your tenants (both Azure AD and Azure AD B2C) that are linked to the same subscription.
40+
3941
The pricing tier that applies to your guest users is based on the highest pricing tier assigned to your Azure AD tenant. For more information, see [Azure Active Directory External Identities Pricing](https://azure.microsoft.com/pricing/details/active-directory/external-identities/).
4042

4143
## Link your Azure AD tenant to a subscription
4244

43-
An Azure AD tenant must be linked to an Azure subscription for proper billing and access to features. If the directory doesn't already have a subscription you can link to, you'll have the opportunity to add one during this process.
45+
An Azure AD tenant must be linked to a resource group within an Azure subscription for proper billing and access to features.
4446

4547
1. Sign in to the [Azure portal](https://portal.azure.com/) with an Azure account that's been assigned at least the [Contributor](../../role-based-access-control/built-in-roles.md) role within the subscription or a resource group within the subscription.
4648

47-
2. Select the directory you want to link: In the Azure portal toolbar, select the **Directory + Subscription** icon, and then select the directory.
48-
49-
![Select the Directory + Subscription icon](media/external-identities-pricing/portal-mau-pick-directory.png)
49+
2. Select the directory you want to link: In the Azure portal toolbar, select the **Directories + subscriptions** icon in the portal toolbar. Then on the **Portal settings | Directories + subscriptions** page, find your directory in the **Directory name** list, and then select **Switch**.
5050

5151
3. Under **Azure Services**, select **Azure Active Directory**.
5252

@@ -58,17 +58,23 @@ An Azure AD tenant must be linked to an Azure subscription for proper billing an
5858

5959
![Select the tenant and link a subscription](media/external-identities-pricing/linked-subscriptions.png)
6060

61-
7. In the Link a subscription pane, select a **Subscription** and a **Resource group**. Then select **Apply**.
62-
63-
> [!NOTE]
64-
>
65-
> * Your first 50,000 MAUs per month are free for both Premium P1 and Premium P2 features. To determine the total number of MAUs, we combine MAUs from all your tenants (both Azure AD and Azure AD B2C) that are linked to the same subscription.
66-
>* If there are no subscriptions listed, you can [associate a subscription to your tenant](../fundamentals/active-directory-how-subscriptions-associated-directory.md). Or, you can add a new subscription by selecting the link **if you don't already have a subscription you may create one here**.
61+
7. In the **Link a subscription** pane, select a **Subscription** and a **Resource group**. Then select **Apply**. (If there are no subscriptions listed, see [What if I can't find a subscription?](#what-if-i-cant-find-a-subscription).)
6762

6863
![Select a subscription and resource group](media/external-identities-pricing/link-subscription-resource.png)
6964

7065
After you complete these steps, your Azure subscription is billed based on your Azure Direct or Enterprise Agreement details, if applicable.
7166

67+
## What if I can't find a subscription?
68+
69+
If no subscriptions are available in the **Link a subscription** pane, here are some possible reasons:
70+
71+
- You don't have the appropriate permissions. Be sure to sign in with an Azure account that's been assigned at least the [Contributor](../../role-based-access-control/built-in-roles.md) role within the subscription or a resource group within the subscription.
72+
73+
- A subscription exists, but it hasn't been associated with your directory yet. You can [associate an existing subscription to your tenant](../fundamentals/active-directory-how-subscriptions-associated-directory.md) and then repeat the steps for [linking it to your tenant](#link-your-azure-ad-tenant-to-a-subscription).
74+
75+
- No subscription exists. In the **Link a subscription** pane, you can create a subscription by selecting the link **if you don't already have a subscription you may create one here**. After you create a new subscription, you'll need to [create a resource group](../../azure-resource-manager/management/manage-resource-groups-portal.md) in the new subscription, and then repeat the steps for [linking it to your tenant](#link-your-azure-ad-tenant-to-a-subscription).
76+
7277
## Next steps
7378

74-
For the latest pricing information, see [Azure Active Directory pricing](https://www.microsoft.com/security/business/identity-access-management/azure-ad-pricing).
79+
For the latest pricing information, see [Azure Active Directory pricing](https://www.microsoft.com/security/business/identity-access-management/azure-ad-pricing).
80+
Learn more about [managing Azure resources](../../azure-resource-manager/management/overview.md).

articles/active-directory/external-identities/index.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -24,7 +24,7 @@ landingContent:
2424
url: external-identities-overview.md
2525
- text: What is Azure AD B2B collaboration?
2626
url: what-is-b2b.md
27-
- text: What is Azure AD B2B direct connect?
27+
- text: What is Azure AD B2B direct connect? (preview)
2828
url: b2b-direct-connect-overview.md
2929
- text: What is Azure AD B2C (business-to-consumer) identity?
3030
url: ../../active-directory-b2c/overview.md

articles/active-directory/external-identities/toc.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -34,7 +34,7 @@
3434
href: external-identities-pricing.md
3535
- name: Best practices
3636
href: b2b-fundamentals.md
37-
- name: Cross-tenant access overview
37+
- name: Cross-tenant access overview (Preview)
3838
href: cross-tenant-access-overview.md
3939
- name: B2B collaboration
4040
expanded: false
@@ -53,7 +53,7 @@
5353
href: user-token.md
5454
- name: B2B collaboration for hybrid organizations
5555
href: hybrid-organizations.md
56-
- name: B2B direct connect
56+
- name: B2B direct connect (Preview)
5757
href: b2b-direct-connect-overview.md
5858
- name: Self-service sign-up
5959
expanded: false

articles/active-directory/external-identities/troubleshoot.md

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ services: active-directory
55
ms.service: active-directory
66
ms.subservice: B2B
77
ms.topic: troubleshooting
8-
ms.date: 03/21/2022
8+
ms.date: 03/31/2022
99
tags: active-directory
1010
ms.author: mimart
1111
author: msmimart
@@ -24,6 +24,10 @@ Here are some remedies for common problems with Azure Active Directory (Azure AD
2424
> - **Starting July 2022**, we'll begin rolling out a change to turn on the email one-time passcode feature for all existing tenants and enable it by default for new tenants. As part of this change, Microsoft will stop creating new, unmanaged ("viral") Azure AD accounts and tenants during B2B collaboration invitation redemption. We're enabling the email one-time passcode feature because it provides a seamless fallback authentication method for your guest users. However, if you don't want to allow this feature to turn on automatically, you can [disable it](one-time-passcode.md#disable-email-one-time-passcode).
2525
2626

27+
## Guest sign-in fails with error code AADSTS50020
28+
29+
When a guest user from an identity provider (IdP) can't sign in to a resource tenant in Azure AD and receives an error code AADSTS50020, there are several possible causes. See the troubleshooting article for error [AADSTS50020](/troubleshoot/azure/active-directory/error-code-aadsts50020-user-account-identity-provider-does-not-exist).
30+
2731
## B2B direct connect user is unable to access a shared channel (error AADSTS90071)
2832

2933
When a B2B direct connect sees the following error message when trying to access another organization's Teams shared channel, multi-factor authentication trust settings haven't been configured by the external organization:
Lines changed: 82 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,82 @@
1+
---
2+
title: Overview of admin consent workflow
3+
titleSuffix: Azure AD
4+
description: Learn about the admin consent workflow in Azure Active Directory
5+
services: active-directory
6+
author: eringreenlee
7+
manager: CelesteDG
8+
ms.service: active-directory
9+
ms.subservice: app-mgmt
10+
ms.workload: identity
11+
ms.topic: how-to
12+
ms.date: 03/30/2022
13+
ms.author: ergreenl
14+
ms.reviewer: davidmu
15+
ms.collection: M365-identity-device-management
16+
17+
#customer intent: As an admin, I want to learn about the admin consent workflow and how it affects end-user and admin consent experience
18+
---
19+
20+
# Overview of admin consent workflow
21+
22+
There may be situations where your end-users need to consent to permissions for applications that they're creating or using with their work accounts. However, non-admin users aren't allowed to consent to permissions that require admin consent. Also, users can’t consent to applications when [user consent](configure-user-consent.md) is disabled in the user’s tenant.
23+
24+
In such situations where user consent is disabled, an admin can grant users the ability to make requests for gaining access to applications by enabling the admin consent workflow. In this article, you’ll learn about the user and admin experience when the admin consent workflow is disabled vs when it's enabled.
25+
26+
When attempting to sign in, users may see a consent prompt like the one in the following screenshot:
27+
28+
:::image type="content" source="media/configure-admin-consent-workflow/admin-consent-workflow-off.png" alt-text="Screenshot of consent prompt when workflow is disabled.":::
29+
30+
If the user doesn’t know who to contact to grant them access, they may be unable to use the application. This situation also requires administrators to create a separate workflow to track requests for applications if they're open to receiving them.
31+
As an admin, the following options exist for you to determine how users consent to applications:
32+
- Disable user consent. For example, a high school may want to turn off user consent so that the school IT administration has full control over all the applications that are used in their tenant.
33+
- Allow users to consent to the required permissions. It's NOT recommended to keep user consent open if you have sensitive data in your tenant.
34+
- If you still want to retain admin-only consent for certain permissions but want to assist your end-users in onboarding their application, you can use the admin consent workflow to evaluate and respond to admin consent requests. This way, you can have a queue of all the requests for admin consent for your tenant and can track and respond to them directly through the Azure portal.
35+
To learn how to configure the admin consent workflow, see [configure-admin-consent-workflow.md](configure-admin-consent-workflow.md).
36+
37+
## How the admin consent workflow works
38+
39+
When you configure the admin consent workflow, your end users can request for consent directly through the prompt. The users may see a consent prompt like the one in the following screenshot:
40+
41+
:::image type="content" source="media/configure-admin-consent-workflow/consent prompt-workflow-on.png" alt-text="Screenshot of consent prompt when workflow is enabled.":::
42+
43+
When an administrator responds to a request, the user receives an email alert informing them that the request has been processed.
44+
45+
When the user submits a consent request, the request shows up in the admin consent request page in the Azure portal. Administrators and designated reviewers sign in to [view and act on the new requests](review-admin-consent-requests.md). Reviewers only see consent requests that were created after they were designated as reviewers. Requests show up in the following two tabs in the admin consent requests blade.
46+
- My pending: This shows any active requests that have the signed-in user designated as a reviewer. Although reviewers can block or deny requests, only people with the correct RBAC permissions to consent to the requested permissions can do so.
47+
- All(Preview): All requests, active or expired, that exist in the tenant.
48+
Each request includes information about the application and the user(s) requesting the application.
49+
50+
## Email notifications
51+
52+
If configured, all reviewers will receive email notifications when:
53+
54+
- A new request has been created
55+
- A request has expired
56+
- A request is nearing the expiration date.
57+
58+
Requestors will receive email notifications when:
59+
60+
- They submit a new request for access
61+
- Their request has expired
62+
- Their request has been denied or blocked
63+
- Their request has been approved
64+
65+
## Audit logs
66+
67+
The table below outlines the scenarios and audit values available for the admin consent workflow.
68+
69+
|Scenario |Audit Service |Audit Category |Audit Activity |Audit Actor |Audit log limitations |
70+
|---------|---------|---------|---------|---------|---------|
71+
|Admin enabling the consent request workflow |Access Reviews |UserManagement |Create governance policy template |App context |Currently you can’t find the user context |
72+
|Admin disabling the consent request workflow |Access Reviews |UserManagement |Delete governance policy template |App context |Currently you can’t find the user context |
73+
|Admin updating the consent workflow configurations |Access Reviews |UserManagement |Update governance policy template |App context |Currently you can’t find the user context |
74+
|End user creating an admin consent request for an app |Access Reviews |Policy |Create request |App context |Currently you can’t find the user context |
75+
|Reviewers approving an admin consent request |Access Reviews |UserManagement |Approve all requests in business flow |App context |Currently you can’t find the user context or the app ID that was granted admin consent. |
76+
|Reviewers denying an admin consent request |Access Reviews |UserManagement |Approve all requests in business flow |App context | Currently you can’t find the user context of the actor that denied an admin consent request |
77+
78+
## Next steps
79+
80+
- [Enable the admin consent request workflow](configure-admin-consent-workflow.md)
81+
- [Review admin consent request](review-admin-consent-requests.md)
82+
- [Manage consent requests](manage-consent-requests.md)

0 commit comments

Comments
 (0)