Skip to content

Commit bda2f7c

Browse files
authored
Merge pull request #221730 from v-edmckillop/patch-53
Update secure-external-access-resources.md
2 parents a38f5b7 + 7fd7b1e commit bda2f7c

File tree

1 file changed

+34
-61
lines changed

1 file changed

+34
-61
lines changed

articles/active-directory/fundamentals/secure-external-access-resources.md

Lines changed: 34 additions & 61 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.workload: identity
99
ms.subservice: fundamentals
1010
ms.topic: conceptual
11-
ms.date: 11/03/2022
11+
ms.date: 12/21/2022
1212
ms.author: gasinh
1313
ms.reviewer: ajburnle
1414
ms.custom: "it-pro, seodec18"
@@ -17,77 +17,50 @@ ms.collection: M365-identity-device-management
1717

1818
# Plan an Azure Active Directory B2B collaboration deployment
1919

20-
Secure collaboration with external partners ensures that the right external partners have appropriate access to internal resources for the right length of time. Through a holistic security and governance approach, you can reduce security risks, meet compliance goals, and ensure that you know who has access.
20+
Secure collaboration with your external partners ensures they have correct access to internal resources, and for the expected duration. Learn about governance practices to reduce security risks, meet compliance goals, and ensure accurate access.
2121

22-
Ungoverned collaboration leads to a lack of clarity on ownership of access, and the possibility of sensitive resources being exposed. Moving to secure and governed collaboration can ensure that there are clear lines of ownership and accountability for external users’ access. This includes:
22+
Governed collaboration improves clarity of ownership of access, reduces exposure of sensitive resources, and enables you to attest to access policy.
2323

24-
* Managing the external organizations, and users within them, that have access to resources.
24+
* Manage external organizations, and their users who access resources
25+
* Ensure access is correct, reviewed, and time bound
26+
* Empower business owners to manage collaboration with delegation
2527

26-
* Ensuring that access is appropriate, reviewed, and time bound where appropriate.
28+
Traditionally, organizations use one of two methods to collaborate:
2729

28-
* Empowering business owners to manage collaboration within IT-created guard rails via delegation.
29-
30-
Where you have a compliance requirement, governed collaboration enables you to attest to the appropriateness of access.
31-
32-
Traditionally, organizations have used one of the two methods to collaborate:
33-
34-
1. Creating locally managed credentials for external users, or
35-
2. Establishing federations with partner Identity Providers.
30+
* Create locally managed credentials for external users, or
31+
* Establish federations with partner identity providers (IdP)
3632

37-
Both methods have significant drawbacks in themselves.
33+
Both methods have drawbacks. For more information, see the following table.
3834

3935
| Area of concern | Local credentials | Federation |
40-
|:--------------|:-------------------|:----------------------|
41-
| Security | - Access continues after external user terminated<br> - Usertype is “member” by default which grants too much default access | - No user level visibility <br> - Unknown partner security posture|
42-
| Expense | - Password + Multi-Factor Authentication management<br> - Onboarding process<br> - Identity cleanup<br> - Overhead of running a separate directory | - Small partners cannot afford the infrastructure<br> - Small partners do not have the expertise<br> - Small Partners might only have consumer emails (no IT) |
43-
| Complexity | - Partner users need to manage an additional set of credentials | - Complexity grows with each new partner<br> - Complexity grows on partners’ side as well |
44-
45-
46-
Microsoft offers comprehensive suites of tools for secure external access. Azure Active Directory (Azure AD) B2B Collaboration is at the center of any external collaboration plan. Azure AD B2B can integrate with other tools in Azure AD, and tools in Microsoft 365 services, to help secure and manage your external access.
47-
48-
Azure AD B2B simplifies collaboration, reduces expense, and increases security compared to traditional collaboration methods. Benefits of Azure AD B2B include:
49-
50-
- External users cannot access resources if the home identity is disabled or deleted.
51-
52-
- Authentication and credential management are handled by the user’s home identity provider.
53-
54-
- Resource tenant controls all access and authorization of guest users.
55-
56-
- Can collaborate with any user who has an email address without need for partner infrastructure.
57-
58-
- No need for IT departments to connect out-of-band to set up access/federation.
59-
60-
- Guest user access is protected by the same enterprise-grade security as internal users.
36+
|----|---|---|
37+
| Security | - Access continues after external user terminates<br> - UserType is Member by default, which grants too much default access | - No user-level visibility <br> - Unknown partner security posture|
38+
| Expense | - Password and multi-factor authentication (MFA) management<br> - Onboarding process<br> - Identity cleanup<br> - Overhead of running a separate directory | Small partners can't afford the infrastructure, lack expertise, and might user consumer email|
39+
| Complexity | Partner users manage more credentials | Complexity grows with each new partner, and increased for partners|
6140

62-
- Easy end user experience with no additional credentials needed.
41+
Azure Active Directory (Azure AD) B2B integrates with other tools in Azure AD, and Microsoft 365 services. Azure AD B2B simplifies collaboration, reduces expense, and increases security.
6342

64-
- Users can collaborate easily with partners without needing their IT departments involvement.
43+
Azure AD B2B benefits:
6544

66-
- No need for Guest default permissions in the Azure AD directory can be limited or highly restricted.
67-
68-
This document set is designed to enable you to move from ad hoc or loosely governed external collaboration to a more secure state.
45+
- If the home identity is disabled or deleted, external users can't access resources
46+
- User home IdP handles authentication and credential management
47+
- Resource tenant controls guest-user access and authorization
48+
- Collaborate with users who have an email address, but no infrastructure
49+
- IT departments don't connect out-of-band to set up access or federation
50+
- Guest user access is protected by the same security processes as internal users
51+
- Clear end-user experience with no extra credentials required
52+
- Users collaborate with partners without IT department involvement
53+
- Guest default permissions in the Azure AD directory aren't limited or highly restricted
6954

7055
## Next steps
7156

72-
See the following articles on securing external access to resources. We recommend you take the actions in the listed order.
73-
74-
75-
1. [Determine your security posture for external access](1-secure-access-posture.md)
76-
77-
2. [Discover your current state](2-secure-access-current-state.md)
78-
79-
3. [Create a governance plan](3-secure-access-plan.md)
80-
81-
4. [Use groups for security](4-secure-access-groups.md)
82-
83-
5. [Transition to Azure AD B2B](5-secure-access-b2b.md)
84-
85-
6. [Secure access with Entitlement Management](6-secure-access-entitlement-managment.md)
86-
87-
7. [Secure access with Conditional Access policies](7-secure-access-conditional-access.md)
88-
89-
8. [Secure access with Sensitivity labels](8-secure-access-sensitivity-labels.md)
90-
91-
9. [Secure access to Microsoft Teams, OneDrive, and SharePoint](9-secure-access-teams-sharepoint.md)
57+
* [Determine your security posture for external access](1-secure-access-posture.md)
58+
* [Discover the current state of external collaboration in your organization](2-secure-access-current-state.md)
59+
* [Create a security plan for external access](3-secure-access-plan.md)
60+
* [Securing external access with groups](4-secure-access-groups.md)
61+
* [Transition to governed collaboration with Azure Active Directory B2B collaboration](5-secure-access-b2b.md)
62+
* [Manage external access with entitlement management](6-secure-access-entitlement-managment.md)
63+
* [Secure access with Conditional Access policies](7-secure-access-conditional-access.md)
64+
* [Control access with sensitivity labels](8-secure-access-sensitivity-labels.md)
65+
* [Secure external access to Microsoft Teams, SharePoint, and OneDrive for Business](9-secure-access-teams-sharepoint.md)
9266

93-
10. [Convert local guest accounts to B2B](10-secure-local-guest.md)

0 commit comments

Comments
 (0)