Skip to content

Commit b57c6e0

Browse files
authored
Update clean-up-unmanaged-azure-ad-accounts.md
1 parent 26f6417 commit b57c6e0

File tree

1 file changed

+22
-33
lines changed

1 file changed

+22
-33
lines changed

articles/active-directory/enterprise-users/clean-up-unmanaged-azure-ad-accounts.md

Lines changed: 22 additions & 33 deletions
Original file line numberDiff line numberDiff line change
@@ -30,62 +30,51 @@ Use the following guidance to remove unmanaged Azure AD accounts from your Azure
3030
* Use the sample application in [Azure-samples/Remove-unmanaged-guests](https://github.com/Azure-Samples/Remove-Unmanaged-Guests)
3131
* Use PowerShell cmdlets in [AzureAD/MSIdentityTools](https://github.com/AzureAD/MSIdentityTools/wiki/)
3232

33-
After you run a tool, users with unmanaged Azure AD accounts access the tenant, and re-redeem their invitations. However, Azure AD prevents users from redeeming with an unmanaged Azure AD account. They’ll redeem with another account type. Google Federation and SAML/WS-Fed are not enabled by default. Therefore, users redeem with a Microsoft account (MSA) or email one-time password (OTP). MSA is recommended.
33+
After you run a tool, users with unmanaged Azure AD accounts access the tenant, and re-redeem their invitations. However, Azure AD prevents users from redeeming with an unmanaged Azure AD account. They can redeem with another account type. Google Federation and SAML/WS-Fed are not enabled by default. Therefore, users redeem with a Microsoft account (MSA) or email one-time password (OTP). MSA is recommended.
3434

35-
Learn more: [Invitation redemption flow](../external-identities/redemption-experience.md#invitation-redemption-flow).
35+
Learn more: [Invitation redemption flow](../external-identities/redemption-experience.md#invitation-redemption-flow)
3636

3737
## Overtaken tenants and domains
3838

39-
Some tenants created as unmanaged tenants can be taken over and
40-
converted to a managed tenant. See, [take over an unmanaged directory as
41-
administrator in Azure AD](./domains-admin-takeover.md).
39+
It's possible to convert some unmanaged tenants to managed tenants.
4240

43-
In some cases, overtaken domains might not be updated, for example, missing a DNS TXT record and therefore become flagged as unmanaged. Implications are:
41+
Learn more: [Take over an unmanaged directory as administrator in Azure AD](./domains-admin-takeover.md).
4442

45-
- For guest users who belong to formerly unmanaged tenants, redemption status is reset and one consent prompt appears. Redemption occurs with same account as before.
43+
Some overtaken domains might not be updated. For example, a missing DNS TXT record indicates an unmanaged state. Implications are:
4644

47-
- After unmanaged user redemption status is reset, the tool might identify unmanaged users that are false positives.
45+
* For guest users from unmanaged tenants, redemption status is reset. A consent prompt appears.
46+
* Redemption occurs with same account
47+
* After resetting unmanaged user redemption status, the tool might identify unmanaged users as false positives
4848

49-
## Reset redemption using a sample application
49+
## Reset redemption with a sample application
5050

51-
Use the sample application on
52-
[Azure-Samples/Remove-Unmanaged-Guests](https://github.com/Azure-Samples/Remove-Unmanaged-Guests).
51+
Use the sample application on [Azure-Samples/Remove-Unmanaged-Guests](https://github.com/Azure-Samples/Remove-Unmanaged-Guests).
5352

5453
## Reset redemption using MSIdentityTools PowerShell Module
5554

56-
MSIdentityTools PowerShell Module is a collection of cmdlets and
57-
scripts. They are for use in the Microsoft identity platform and Azure
58-
AD; they augment capabilities in the PowerShell SDK. See, [Microsoft
59-
Graph PowerShell
60-
SDK](https://github.com/microsoftgraph/msgraph-sdk-powershell).
55+
MSIdentityTools PowerShell Module is a collection of cmdlets and scripts, which you use in the Microsoft identity platform and Azure AD. Use the cmdlets and scripts to augment PowerShell SDK capabilities. See, [microsoftgraph/msgraph-sdk-powershell](https://github.com/microsoftgraph/msgraph-sdk-powershell).
6156

6257
Run the following cmdlets:
6358

64-
- `Install-Module Microsoft.Graph -Scope CurrentUser`
65-
66-
- `Install-Module MSIdentityTools`
67-
68-
- `Import-Module msidentitytools,microsoft.graph`
59+
* `Install-Module Microsoft.Graph -Scope CurrentUser`
60+
* `Install-Module MSIdentityTools`
61+
* `Import-Module msidentitytools,microsoft.graph`
6962

7063
To identify unmanaged Azure AD accounts, run:
7164

72-
- `Connect-MgGraph -Scope User.ReadAll`
73-
74-
- `Get-MsIdUnmanagedExternalUser`
65+
* `Connect-MgGraph -Scope User.ReadAll`
66+
* `Get-MsIdUnmanagedExternalUser`
7567

7668
To reset unmanaged Azure AD account redemption status, run:
7769

78-
- `Connect-MgGraph -Scopes User.ReadWriteAll`
79-
80-
- `Get-MsIdUnmanagedExternalUser | Reset-MsIdExternalUser`
70+
* `Connect-MgGraph -Scopes User.ReadWriteAll`
71+
* `Get-MsIdUnmanagedExternalUser | Reset-MsIdExternalUser`
8172

8273
To delete unmanaged Azure AD accounts, run:
8374

84-
- `Connect-MgGraph -Scopes User.ReadWriteAll`
85-
86-
- `Get-MsIdUnmanagedExternalUser | Remove-MgUser`
75+
* `Connect-MgGraph -Scopes User.ReadWriteAll`
76+
* `Get-MsIdUnmanagedExternalUser | Remove-MgUser`
8777

88-
## Next steps
78+
## Resources
8979

90-
Examples of using
91-
[Get-MSIdUnmanagedExternalUser](https://github.com/AzureAD/MSIdentityTools/wiki/Get-MsIdUnmanagedExternalUser)
80+
See, [Get-MSIdUnmanagedExternalUser](https://github.com/AzureAD/MSIdentityTools/wiki/Get-MsIdUnmanagedExternalUser). The tool returns a list of external unmanaged users, or viral users, in the tenant.

0 commit comments

Comments
 (0)